ELA-988-1 redis security update

authorisation bypass vulnerability

It was discovered that there was an authentication bypass vulnerability in Redis, a popular key-value database similar to memcached.

On startup, Redis began listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) was used, this created a race condition that enabled, during a short period of time, another process to establish an otherwise unauthorized connection.