{"affected":[{"ecosystem_specific":{"binaries":[{"redis7":"7.0.8-150500.3.9.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Server Applications 15 SP5","name":"redis7","purl":"pkg:rpm/suse/redis7&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"7.0.8-150500.3.9.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"redis7":"7.0.8-150500.3.9.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.5","name":"redis7","purl":"pkg:rpm/opensuse/redis7&distro=openSUSE%20Leap%2015.5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"7.0.8-150500.3.9.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for redis7 fixes the following issues:\n\n- CVE-2023-45145: Fixed a potential permission bypass due to a race\n  condition during UNIX socket creation (bsc#1216376).\n\nThe following non-security issues were fixed:\n\n- Redis services are no longer disabled after an upgrade (bsc#1212119).\n","id":"SUSE-SU-2024:0200-1","modified":"2024-01-23T17:12:34Z","published":"2024-01-23T17:12:34Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240200-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1212119"},{"type":"REPORT","url":"https://bugzilla.suse.com/1216376"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-45145"}],"related":["CVE-2023-45145"],"summary":"Security update for redis7","upstream":["CVE-2023-45145"]}