MGASA-2025-0307

Source
https://advisories.mageia.org/MGASA-2025-0307.html
Import Source
https://advisories.mageia.org/MGASA-2025-0307.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2025-0307
Related
Published
2025-11-21T19:56:16Z
Modified
2025-11-21T19:58:53.487612Z
Summary
Updated redis packages fix security vulnerabilities
Details

A Lua script may lead to remote code execution. (CVE-2025-49844) A Lua script may lead to integer overflow and potential RCE. (CVE-2025-46817) A Lua script can be executed in the context of another user. (CVE-2025-46818) LUA out-of-bound read. (CVE-2025-46819)

References
Credits

Affected packages

Mageia:9 / redis

Package

Name
redis
Purl
pkg:rpm/mageia/redis?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.2.12-1.mga9

Ecosystem specific

{
    "section": "core"
}