Bug 1999873
Summary: | [RFE] Bringing Redis 6.2>= to RHEL 8 | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 8 | Reporter: | Daniel Chong <dchong> |
Component: | redis | Assignee: | Remi Collet <rcollet> |
Status: | CLOSED ERRATA | QA Contact: | Branislav Náter <bnater> |
Severity: | medium | Docs Contact: | Lenka Špačková <lkuprova> |
Priority: | medium | ||
Version: | 8.4 | CC: | apmukher, jaykim, jorton, nathans, rcollet, redis-maint, sjanderk |
Target Milestone: | rc | Keywords: | FutureFeature, Rebase, Triaged |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | redis-6-8070020220509142426.3b9f49c4 | Doc Type: | Enhancement |
Doc Text: |
.`redis` rebased to version 6.2.7
`Redis 6`, which is an advanced key-value store provided the `redis:6` module stream, has been updated to version 6.2.7. This update provides bug fixes, security fixes, and improvements over version 6.0 available since RHEL 8.4.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2022-11-08 09:36:56 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Daniel Chong
2021-08-31 20:54:01 UTC
*** Bug 1965247 has been marked as a duplicate of this bug. *** Rebase to 6.2.7 will also fix - bug #2080878 - CVE-2022-24735 redis: Code injection via Lua script execution environment - bug #2080883 - CVE-2022-24736 redis: Malformed Lua script can crash Redis Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (Low: redis:6 security, bug fix, and enhancement update), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2022:7541 |