openSUSE: 2023:4290-1: important: redis Security Advisory Update
Description
This update for redis fixes the following issues: * CVE-2023-45145: Fixed a potential permission bypass due to a race condition during UNIX socket creation (bsc#1216376).
Patch
## Patch Instructions: To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product: * openSUSE Leap 15.4 zypper in -t patch SUSE-2023-4290=1 openSUSE-SLE-15.4-2023-4290=1 * openSUSE Leap 15.5 zypper in -t patch openSUSE-SLE-15.5-2023-4290=1 * Server Applications Module 15-SP4 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP4-2023-4290=1 * Server Applications Module 15-SP5 zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP5-2023-4290=1
Package List
* openSUSE Leap 15.4 (aarch64 ppc64le s390x x86_64 i586) * redis-debuginfo-6.2.6-150400.3.25.1 * redis-debugsource-6.2.6-150400.3.25.1 * redis-6.2.6-150400.3.25.1 * openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64) * redis-debuginfo-6.2.6-150400.3.25.1 * redis-debugsource-6.2.6-150400.3.25.1 * redis-6.2.6-150400.3.25.1 * Server Applications Module 15-SP4 (aarch64 ppc64le s390x x86_64) * redis-debuginfo-6.2.6-150400.3.25.1 * redis-debugsource-6.2.6-150400.3.25.1 * redis-6.2.6-150400.3.25.1 * Server Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64) * redis-debuginfo-6.2.6-150400.3.25.1 * redis-debugsource-6.2.6-150400.3.25.1 * redis-6.2.6-150400.3.25.1
References
* bsc#1216376 ## References: * https://www.suse.com/security/cve/CVE-2023-45145.html * https://bugzilla.suse.com/show_bug.cgi?id=1216376