{"id":"RLSA-2025:0595","summary":"Important: redis:6 security update","details":"Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands may lead to denial-of-service (CVE-2023-22458)\n\n* redis: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands may result with false OOM panic (CVE-2022-35977)\n\n* redis: Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow (CVE-2022-36021)\n\n* redis: String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack (CVE-2023-25155)\n\n* redis: Insufficient validation of HINCRBYFLOAT command (CVE-2023-28856)\n\n* redis: heap overflow in the lua cjson and cmsgpack libraries (CVE-2022-24834)\n\n* redis: possible bypass of Unix socket permissions on startup (CVE-2023-45145)\n\n* redis: Lua library commands may lead to stack overflow and RCE in Redis (CVE-2024-31449)\n\n* redis: Denial-of-service due to unbounded pattern matching in Redis (CVE-2024-31228)\n\n* redis: Redis' Lua library commands may lead to remote code execution (CVE-2024-46981)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-03-11T06:31:59.909022Z","published":"2025-02-13T20:34:26.141542Z","upstream":["CVE-2022-24834","CVE-2022-35977","CVE-2022-36021","CVE-2023-22458","CVE-2023-25155","CVE-2023-28856","CVE-2023-45145","CVE-2024-31228","CVE-2024-31449","CVE-2024-46981"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2025:0595"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163132"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163133"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2174305"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2174306"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187525"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221662"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244940"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317058"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336004"}],"affected":[{"package":{"name":"redis","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/redis?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.17-1.module+el8.10.0+1923+5b85c6a7"}],"database_specific":{"yum_repository":"AppStream"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2025:0595.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}