(CVE-2022-36021) String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack on Redis, causing it to hang and consume 100% CPU time. https://github.com/gentoo/gentoo/pull/29860
https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619 https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83
Created pymodbus tracking bugs for this issue: Affects: fedora-37 [bug 2174654] Created redis tracking bugs for this issue: Affects: epel-7 [bug 2174652] Affects: fedora-36 [bug 2174653] Affects: fedora-37 [bug 2174656]
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:0595 https://access.redhat.com/errata/RHSA-2025:0595