{"id":"RHSA-2025:0595","summary":"Red Hat Security Advisory: redis:6 security update","modified":"2026-04-02T10:11:59Z","published":"2025-01-23T10:02:39Z","upstream":["CVE-2022-24834","CVE-2022-35977","CVE-2022-36021","CVE-2023-22458","CVE-2023-25155","CVE-2023-28856","CVE-2023-45145","CVE-2024-31228","CVE-2024-31449","CVE-2024-46981"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:0595"},{"type":"ARTICLE","url":"https://access.redhat.com/security/updates/classification/#important"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163132"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2163133"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2174305"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2174306"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2187525"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2221662"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2244940"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317056"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2317058"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2336004"},{"type":"ARTICLE","url":"https://issues.redhat.com/browse/RHEL-66165"},{"type":"ADVISORY","url":"https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_0595.json"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-24834"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-24834"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24834"},{"type":"ARTICLE","url":"https://github.com/redis/redis/security/advisories/GHSA-p8x2-9v9q-c838"},{"type":"ARTICLE","url":"https://groups.google.com/g/redis-db/c/JDjKS0GubsQ"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-35977"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-35977"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-35977"},{"type":"ARTICLE","url":"https://github.com/redis/redis/security/advisories/GHSA-mrcw-fhw9-fj8j"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2022-36021"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2022-36021"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-36021"},{"type":"ARTICLE","url":"https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84"},{"type":"ARTICLE","url":"https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-22458"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-22458"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-22458"},{"type":"ARTICLE","url":"https://github.com/redis/redis/security/advisories/GHSA-r8w2-2m53-gprj"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-25155"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-25155"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-25155"},{"type":"ARTICLE","url":"https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619"},{"type":"ARTICLE","url":"https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-28856"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-28856"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-28856"},{"type":"ARTICLE","url":"https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2023-45145"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2023-45145"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-45145"},{"type":"ARTICLE","url":"https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-31228"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-31228"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31228"},{"type":"ARTICLE","url":"https://github.com/redis/redis/commit/9317bf64659b33166a943ec03d5d9b954e86afb0"},{"type":"ARTICLE","url":"https://github.com/redis/redis/security/advisories/GHSA-66gq-c942-6976"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-31449"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-31449"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-31449"},{"type":"ARTICLE","url":"https://github.com/redis/redis/commit/1f7c148be2cbacf7d50aa461c58b871e87cc5ed9"},{"type":"ARTICLE","url":"https://github.com/redis/redis/security/advisories/GHSA-whxg-wx83-85p5"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2024-46981"},{"type":"ADVISORY","url":"https://www.cve.org/CVERecord?id=CVE-2024-46981"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-46981"},{"type":"ARTICLE","url":"https://github.com/redis/redis/releases/tag/6.2.17"},{"type":"ARTICLE","url":"https://github.com/redis/redis/releases/tag/7.2.7"},{"type":"ARTICLE","url":"https://github.com/redis/redis/releases/tag/7.4.2"},{"type":"ARTICLE","url":"https://github.com/redis/redis/security/advisories/GHSA-39h2-x6c4-6w4c"}],"affected":[{"package":{"name":"redis","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/redis"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.17-1.module+el8.10.0+22680+748527fd"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:0595.json"}},{"package":{"name":"redis-debuginfo","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/redis-debuginfo"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.17-1.module+el8.10.0+22680+748527fd"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:0595.json"}},{"package":{"name":"redis-debugsource","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/redis-debugsource"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.17-1.module+el8.10.0+22680+748527fd"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:0595.json"}},{"package":{"name":"redis-devel","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/redis-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.17-1.module+el8.10.0+22680+748527fd"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:0595.json"}},{"package":{"name":"redis-doc","ecosystem":"Red Hat:enterprise_linux:8::appstream","purl":"pkg:rpm/redhat/redis-doc"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:6.2.17-1.module+el8.10.0+22680+748527fd"}]}],"database_specific":{"source":"https://security.access.redhat.com/data/osv/RHSA-2025:0595.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}