| Summary: | redis new security issue fixed upstream in 3.2.7 (CVE-2016-10517) | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | Joseph Wang <joequant> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | mageia |
| Version: | Cauldron | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| URL: | https://lwn.net/Vulnerabilities/714127/ | ||
| Whiteboard: | |||
| Source RPM: | redis-3.0.7-7.mga6.src.rpm | CVE: | 20270 |
| Status comment: | |||
|
Description
David Walser
2017-02-12 16:22:38 CET
Gentoo has issued an advisory on February 21: https://security.gentoo.org/glsa/201702-16 It fixes an issue (CVE-2016-8339) that was fixed upstream in 3.2.4. LWN reference: https://lwn.net/Vulnerabilities/715169/ pushed in cauldron CC:
(none) =>
mageia Upload rejected: - systemd-unit-in-etc /etc/systemd/system/redis.service.d/limit.conf - systemd-unit-in-etc /etc/systemd/system/redis-sentinel.service.d/limit.conf - systemd-unit-in-etc /etc/systemd/system/redis-sentinel.service.d - systemd-unit-in-etc /etc/systemd/system/redis.service.d - non-ghost-in-var-run /var/run/redis Those files in /etc need to be moved to /usr/lib and it needs a tmpfiles snippet for the /var/run dir. Status:
RESOLVED =>
REOPENED ok in cauldron now Status:
REOPENED =>
RESOLVED This has been assigned CVE-2016-10517: http://openwall.com/lists/oss-security/2017/10/25/1 Summary:
redis new security issue fixed upstream in 3.2.7 =>
redis new security issue fixed upstream in 3.2.7 (CVE-2016-10517) |