It was discovered that there was an authentication bypass vulnerability in Redis, a popular key-value database similar to memcached.
On startup, Redis began listening on a Unix socket before adjusting its
permissions to the user-provided configuration. If a permissive umask(2)
was
used, this created a race condition that enabled, during a short period of
time, another process to establish an otherwise unauthorized connection.