MGASA-2023-0301

Source
https://advisories.mageia.org/MGASA-2023-0301.html
Import Source
https://advisories.mageia.org/MGASA-2023-0301.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2023-0301
Related
Published
2023-10-24T17:25:46Z
Modified
2023-10-24T17:16:22Z
Summary
Updated redis package fixes a security vulnerability
Details

Redis upstream published a fix for CVE-2023-45145.

CVE-2023-45145: The wrong order of listen(2) and chmod(2) calls creates a race condition that can be used by another process to bypass desired Unix socket permissions on startup.

References
Credits

Affected packages

Mageia:9 / redis

Package

Name
redis
Purl
pkg:rpm/mageia/redis?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.0.14-1.mga9

Ecosystem specific

{
    "section": "core"
}