Bug 1999873 - [RFE] Bringing Redis 6.2>= to RHEL 8
Summary: [RFE] Bringing Redis 6.2>= to RHEL 8
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: redis
Version: 8.4
Hardware: All
OS: Linux
Target Milestone: rc
: ---
Assignee: Remi Collet
QA Contact: Branislav Náter
Lenka Špačková
: 1965247 (view as bug list)
Depends On:
TreeView+ depends on / blocked
Reported: 2021-08-31 20:54 UTC by Daniel Chong
Modified: 2022-11-08 10:27 UTC (History)
7 users (show)

Fixed In Version: redis-6-8070020220509142426.3b9f49c4
Doc Type: Enhancement
Doc Text:
.`redis` rebased to version 6.2.7 `Redis 6`, which is an advanced key-value store provided the `redis:6` module stream, has been updated to version 6.2.7. This update provides bug fixes, security fixes, and improvements over version 6.0 available since RHEL 8.4.
Clone Of:
Last Closed: 2022-11-08 09:36:56 UTC
Type: Bug
Target Upstream Version:

Attachments (Terms of Use)

System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHELPLAN-95769 0 None None None 2021-08-31 20:58:29 UTC
Red Hat Product Errata RHSA-2022:7541 0 None None None 2022-11-08 09:37:15 UTC

Description Daniel Chong 2021-08-31 20:54:01 UTC

Comment 3 Joe Orton 2022-03-02 17:20:49 UTC
*** Bug 1965247 has been marked as a duplicate of this bug. ***

Comment 6 Remi Collet 2022-05-09 12:37:44 UTC
Rebase to 6.2.7 will also fix 
- bug #2080878 - CVE-2022-24735 redis: Code injection via Lua script execution environment 
- bug #2080883 - CVE-2022-24736 redis: Malformed Lua script can crash Redis

Comment 17 errata-xmlrpc 2022-11-08 09:36:56 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (Low: redis:6 security, bug fix, and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.


Note You need to log in before you can comment on or make changes to this bug.