rhsa-2025:0595
Vulnerability from csaf_redhat
Published
2025-01-22 10:42
Modified
2025-03-24 11:49
Summary
Red Hat Security Advisory: redis:6 security update

Notes

Topic
An update for the redis:6 module is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Security Fix(es): * redis: Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands may lead to denial-of-service (CVE-2023-22458) * redis: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands may result with false OOM panic (CVE-2022-35977) * redis: Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow (CVE-2022-36021) * redis: String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack (CVE-2023-25155) * redis: Insufficient validation of HINCRBYFLOAT command (CVE-2023-28856) * redis: heap overflow in the lua cjson and cmsgpack libraries (CVE-2022-24834) * redis: possible bypass of Unix socket permissions on startup (CVE-2023-45145) * redis: Lua library commands may lead to stack overflow and RCE in Redis (CVE-2024-31449) * redis: Denial-of-service due to unbounded pattern matching in Redis (CVE-2024-31228) * redis: Redis' Lua library commands may lead to remote code execution (CVE-2024-46981) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.



{
   document: {
      aggregate_severity: {
         namespace: "https://access.redhat.com/security/updates/classification/",
         text: "Important",
      },
      category: "csaf_security_advisory",
      csaf_version: "2.0",
      distribution: {
         text: "Copyright © Red Hat, Inc. All rights reserved.",
         tlp: {
            label: "WHITE",
            url: "https://www.first.org/tlp/",
         },
      },
      lang: "en",
      notes: [
         {
            category: "summary",
            text: "An update for the redis:6 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
            title: "Topic",
         },
         {
            category: "general",
            text: "Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.\n\nSecurity Fix(es):\n\n* redis: Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands may lead to denial-of-service (CVE-2023-22458)\n\n* redis: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands may result with false OOM panic (CVE-2022-35977)\n\n* redis: Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow (CVE-2022-36021)\n\n* redis: String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack (CVE-2023-25155)\n\n* redis: Insufficient validation of HINCRBYFLOAT command (CVE-2023-28856)\n\n* redis: heap overflow in the lua cjson and cmsgpack libraries (CVE-2022-24834)\n\n* redis: possible bypass of Unix socket permissions on startup (CVE-2023-45145)\n\n* redis: Lua library commands may lead to stack overflow and RCE in Redis (CVE-2024-31449)\n\n* redis: Denial-of-service due to unbounded pattern matching in Redis (CVE-2024-31228)\n\n* redis: Redis' Lua library commands may lead to remote code execution (CVE-2024-46981)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
            title: "Details",
         },
         {
            category: "legal_disclaimer",
            text: "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
            title: "Terms of Use",
         },
      ],
      publisher: {
         category: "vendor",
         contact_details: "https://access.redhat.com/security/team/contact/",
         issuing_authority: "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
         name: "Red Hat Product Security",
         namespace: "https://www.redhat.com",
      },
      references: [
         {
            category: "self",
            summary: "https://access.redhat.com/errata/RHSA-2025:0595",
            url: "https://access.redhat.com/errata/RHSA-2025:0595",
         },
         {
            category: "external",
            summary: "https://access.redhat.com/security/updates/classification/#important",
            url: "https://access.redhat.com/security/updates/classification/#important",
         },
         {
            category: "external",
            summary: "2163132",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2163132",
         },
         {
            category: "external",
            summary: "2163133",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2163133",
         },
         {
            category: "external",
            summary: "2174305",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2174305",
         },
         {
            category: "external",
            summary: "2174306",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2174306",
         },
         {
            category: "external",
            summary: "2187525",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2187525",
         },
         {
            category: "external",
            summary: "2221662",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2221662",
         },
         {
            category: "external",
            summary: "2244940",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2244940",
         },
         {
            category: "external",
            summary: "2317056",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2317056",
         },
         {
            category: "external",
            summary: "2317058",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2317058",
         },
         {
            category: "external",
            summary: "2336004",
            url: "https://bugzilla.redhat.com/show_bug.cgi?id=2336004",
         },
         {
            category: "external",
            summary: "RHEL-66165",
            url: "https://issues.redhat.com/browse/RHEL-66165",
         },
         {
            category: "self",
            summary: "Canonical URL",
            url: "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_0595.json",
         },
      ],
      title: "Red Hat Security Advisory: redis:6 security update",
      tracking: {
         current_release_date: "2025-03-24T11:49:15+00:00",
         generator: {
            date: "2025-03-24T11:49:15+00:00",
            engine: {
               name: "Red Hat SDEngine",
               version: "4.4.1",
            },
         },
         id: "RHSA-2025:0595",
         initial_release_date: "2025-01-22T10:42:40+00:00",
         revision_history: [
            {
               date: "2025-01-22T10:42:40+00:00",
               number: "1",
               summary: "Initial version",
            },
            {
               date: "2025-01-22T10:42:40+00:00",
               number: "2",
               summary: "Last updated version",
            },
            {
               date: "2025-03-24T11:49:15+00:00",
               number: "3",
               summary: "Last generated version",
            },
         ],
         status: "final",
         version: "3",
      },
   },
   product_tree: {
      branches: [
         {
            branches: [
               {
                  branches: [
                     {
                        category: "product_name",
                        name: "Red Hat Enterprise Linux AppStream (v. 8)",
                        product: {
                           name: "Red Hat Enterprise Linux AppStream (v. 8)",
                           product_id: "AppStream-8.10.0.Z.MAIN.EUS",
                           product_identification_helper: {
                              cpe: "cpe:/a:redhat:enterprise_linux:8::appstream",
                           },
                        },
                     },
                  ],
                  category: "product_family",
                  name: "Red Hat Enterprise Linux",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "redis:6:8100020250113083959:489197e6",
                        product: {
                           name: "redis:6:8100020250113083959:489197e6",
                           product_id: "redis:6:8100020250113083959:489197e6",
                           product_identification_helper: {
                              purl: "pkg:rpmmod/redhat/redis@6:8100020250113083959:489197e6",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
                        product: {
                           name: "redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
                           product_id: "redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-doc@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=noarch",
                           },
                        },
                     },
                  ],
                  category: "architecture",
                  name: "noarch",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                        product: {
                           name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                           product_id: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=src",
                           },
                        },
                     },
                  ],
                  category: "architecture",
                  name: "src",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                        product: {
                           name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                           product_id: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=aarch64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                        product: {
                           name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                           product_id: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-debuginfo@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=aarch64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                        product: {
                           name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                           product_id: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-debugsource@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=aarch64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                        product: {
                           name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                           product_id: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-devel@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=aarch64",
                           },
                        },
                     },
                  ],
                  category: "architecture",
                  name: "aarch64",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                        product: {
                           name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                           product_id: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=ppc64le",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                        product: {
                           name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                           product_id: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-debuginfo@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=ppc64le",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                        product: {
                           name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                           product_id: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-debugsource@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=ppc64le",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                        product: {
                           name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                           product_id: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-devel@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=ppc64le",
                           },
                        },
                     },
                  ],
                  category: "architecture",
                  name: "ppc64le",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                        product: {
                           name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                           product_id: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=s390x",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                        product: {
                           name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                           product_id: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-debuginfo@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=s390x",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                        product: {
                           name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                           product_id: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-debugsource@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=s390x",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                        product: {
                           name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                           product_id: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-devel@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=s390x",
                           },
                        },
                     },
                  ],
                  category: "architecture",
                  name: "s390x",
               },
               {
                  branches: [
                     {
                        category: "product_version",
                        name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                        product: {
                           name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                           product_id: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=x86_64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                        product: {
                           name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                           product_id: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-debuginfo@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=x86_64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                        product: {
                           name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                           product_id: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-debugsource@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=x86_64",
                           },
                        },
                     },
                     {
                        category: "product_version",
                        name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                        product: {
                           name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                           product_id: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                           product_identification_helper: {
                              purl: "pkg:rpm/redhat/redis-devel@6.2.17-1.module%2Bel8.10.0%2B22680%2B748527fd?arch=x86_64",
                           },
                        },
                     },
                  ],
                  category: "architecture",
                  name: "x86_64",
               },
            ],
            category: "vendor",
            name: "Red Hat",
         },
      ],
      relationships: [
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
            },
            product_reference: "redis:6:8100020250113083959:489197e6",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64 as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
            },
            product_reference: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
            },
            product_reference: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
            },
            product_reference: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
            },
            product_reference: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64 as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
            },
            product_reference: "redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64 as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
            },
            product_reference: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
            },
            product_reference: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
            },
            product_reference: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64 as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
            },
            product_reference: "redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64 as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
            },
            product_reference: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
            },
            product_reference: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
            },
            product_reference: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64 as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
            },
            product_reference: "redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64 as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
            },
            product_reference: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
            },
            product_reference: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
            },
            product_reference: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64 as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
            },
            product_reference: "redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
         {
            category: "default_component_of",
            full_product_name: {
               name: "redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch as a component of redis:6:8100020250113083959:489197e6 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
               product_id: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            },
            product_reference: "redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            relates_to_product_reference: "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
         },
      ],
   },
   vulnerabilities: [
      {
         cve: "CVE-2022-24834",
         cwe: {
            id: "CWE-680",
            name: "Integer Overflow to Buffer Overflow",
         },
         discovery_date: "2023-07-10T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "2221662",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A heap-based buffer overflow flaw was found in Redis. This flaw allows a local authenticated attacker user or attacker to execute a specially crafted Lua script in Redis. This attack triggers a heap overflow in the cjson and cmsgpack libraries, resulting in heap corruption and potential remote code execution.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "redis: heap overflow in the lua cjson and cmsgpack libraries",
               title: "Vulnerability summary",
            },
            {
               category: "other",
               text: "The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users.",
               title: "Statement",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2022-24834",
            },
            {
               category: "external",
               summary: "RHBZ#2221662",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2221662",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2022-24834",
               url: "https://www.cve.org/CVERecord?id=CVE-2022-24834",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-24834",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2022-24834",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/security/advisories/GHSA-p8x2-9v9q-c838",
               url: "https://github.com/redis/redis/security/advisories/GHSA-p8x2-9v9q-c838",
            },
            {
               category: "external",
               summary: "https://groups.google.com/g/redis-db/c/JDjKS0GubsQ",
               url: "https://groups.google.com/g/redis-db/c/JDjKS0GubsQ",
            },
         ],
         release_date: "2023-07-10T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2025-01-22T10:42:40+00:00",
               details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2025:0595",
            },
            {
               category: "workaround",
               details: "Prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "redis: heap overflow in the lua cjson and cmsgpack libraries",
      },
      {
         cve: "CVE-2022-35977",
         cwe: {
            id: "CWE-190",
            name: "Integer Overflow or Wraparound",
         },
         discovery_date: "2023-01-23T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "2163133",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A flaw was found in Redis, an in-memory database that persists on disk. This flaw allows authenticated users to issue specially crafted `SETRANGE` and `SORT(_RO)` commands to trigger an integer overflow, resulting in Redis attempting to allocate impossible amounts of memory and abort with an out-of-memory (OOM) panic.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "redis: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands may result with false OOM panic",
               title: "Vulnerability summary",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2022-35977",
            },
            {
               category: "external",
               summary: "RHBZ#2163133",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2163133",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2022-35977",
               url: "https://www.cve.org/CVERecord?id=CVE-2022-35977",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-35977",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2022-35977",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/security/advisories/GHSA-mrcw-fhw9-fj8j",
               url: "https://github.com/redis/redis/security/advisories/GHSA-mrcw-fhw9-fj8j",
            },
         ],
         release_date: "2023-01-17T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2025-01-22T10:42:40+00:00",
               details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2025:0595",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "redis: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands may result with false OOM panic",
      },
      {
         cve: "CVE-2022-36021",
         cwe: {
            id: "CWE-407",
            name: "Inefficient Algorithmic Complexity",
         },
         discovery_date: "2023-03-01T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "2174305",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A vulnerability was found in Redis. This flaw allows an authenticated to use string matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial of service attack on Redis, causing it to hang and consume 100% of CPU time.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "redis: Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow",
               title: "Vulnerability summary",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2022-36021",
            },
            {
               category: "external",
               summary: "RHBZ#2174305",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2174305",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2022-36021",
               url: "https://www.cve.org/CVERecord?id=CVE-2022-36021",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2022-36021",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2022-36021",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84",
               url: "https://github.com/redis/redis/commit/dcbfcb916ca1a269b3feef86ee86835294758f84",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv",
               url: "https://github.com/redis/redis/security/advisories/GHSA-jr7j-rfj5-8xqv",
            },
         ],
         release_date: "2023-02-28T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2025-01-22T10:42:40+00:00",
               details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2025:0595",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "redis: Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow",
      },
      {
         cve: "CVE-2023-22458",
         cwe: {
            id: "CWE-190",
            name: "Integer Overflow or Wraparound",
         },
         discovery_date: "2023-01-23T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "2163132",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A flaw was found in Redis, an in-memory database that persists on disk. This flaw allows authenticated users to issue an `HRANDFIELD` or `ZRANDMEMBER` command with specially crafted arguments to trigger a denial of service by crashing Redis with an assertion failure.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "redis: Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands may lead to denial-of-service",
               title: "Vulnerability summary",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2023-22458",
            },
            {
               category: "external",
               summary: "RHBZ#2163132",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2163132",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2023-22458",
               url: "https://www.cve.org/CVERecord?id=CVE-2023-22458",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-22458",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2023-22458",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/security/advisories/GHSA-r8w2-2m53-gprj",
               url: "https://github.com/redis/redis/security/advisories/GHSA-r8w2-2m53-gprj",
            },
         ],
         release_date: "2023-01-17T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2025-01-22T10:42:40+00:00",
               details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2025:0595",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "redis: Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands may lead to denial-of-service",
      },
      {
         cve: "CVE-2023-25155",
         cwe: {
            id: "CWE-190",
            name: "Integer Overflow or Wraparound",
         },
         discovery_date: "2023-03-01T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "2174306",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A vulnerability was found in Redis. This flaw allows authenticated users issuing specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands to trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "redis: String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack",
               title: "Vulnerability summary",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2023-25155",
            },
            {
               category: "external",
               summary: "RHBZ#2174306",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2174306",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2023-25155",
               url: "https://www.cve.org/CVERecord?id=CVE-2023-25155",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-25155",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2023-25155",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619",
               url: "https://github.com/redis/redis/commit/2a2a582e7cd99ba3b531336b8bd41df2b566e619",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83",
               url: "https://github.com/redis/redis/security/advisories/GHSA-x2r7-j9vw-3w83",
            },
         ],
         release_date: "2023-02-28T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2025-01-22T10:42:40+00:00",
               details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2025:0595",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 6.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "redis: String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack",
      },
      {
         cve: "CVE-2023-28856",
         cwe: {
            id: "CWE-20",
            name: "Improper Input Validation",
         },
         discovery_date: "2023-04-17T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "2187525",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A vulnerability was found in Redis. This flaw allows authenticated users to use the HINCRBYFLOAT command to create an invalid hash field that may crash Redis on access.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "redis: Insufficient validation of HINCRBYFLOAT command",
               title: "Vulnerability summary",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2023-28856",
            },
            {
               category: "external",
               summary: "RHBZ#2187525",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2187525",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2023-28856",
               url: "https://www.cve.org/CVERecord?id=CVE-2023-28856",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-28856",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2023-28856",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6",
               url: "https://github.com/redis/redis/security/advisories/GHSA-hjv8-vjf6-wcr6",
            },
         ],
         release_date: "2023-04-17T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2025-01-22T10:42:40+00:00",
               details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2025:0595",
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "redis: Insufficient validation of HINCRBYFLOAT command",
      },
      {
         cve: "CVE-2023-45145",
         cwe: {
            id: "CWE-269",
            name: "Improper Privilege Management",
         },
         discovery_date: "2023-10-18T00:00:00+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "2244940",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A flaw was found in Redis, an in-memory database that persists on disk. On startup, Redis listens on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "redis: possible bypass of Unix socket permissions on startup",
               title: "Vulnerability summary",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2023-45145",
            },
            {
               category: "external",
               summary: "RHBZ#2244940",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2244940",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2023-45145",
               url: "https://www.cve.org/CVERecord?id=CVE-2023-45145",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2023-45145",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2023-45145",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx",
               url: "https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx",
            },
         ],
         release_date: "2023-10-18T00:00:00+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2025-01-22T10:42:40+00:00",
               details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2025:0595",
            },
            {
               category: "workaround",
               details: "It is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "NONE",
                  baseScore: 3.6,
                  baseSeverity: "LOW",
                  confidentialityImpact: "LOW",
                  integrityImpact: "LOW",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
                  version: "3.1",
               },
               products: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Low",
            },
         ],
         title: "redis: possible bypass of Unix socket permissions on startup",
      },
      {
         cve: "CVE-2024-31228",
         cwe: {
            id: "CWE-674",
            name: "Uncontrolled Recursion",
         },
         discovery_date: "2024-10-07T20:01:32.319599+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "2317058",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A flaw was found in Redis. This flaw allows authenticated users to trigger a denial of service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST`, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "redis: Denial-of-service due to unbounded pattern matching in Redis",
               title: "Vulnerability summary",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2024-31228",
            },
            {
               category: "external",
               summary: "RHBZ#2317058",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2317058",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2024-31228",
               url: "https://www.cve.org/CVERecord?id=CVE-2024-31228",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2024-31228",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2024-31228",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/commit/9317bf64659b33166a943ec03d5d9b954e86afb0",
               url: "https://github.com/redis/redis/commit/9317bf64659b33166a943ec03d5d9b954e86afb0",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/security/advisories/GHSA-66gq-c942-6976",
               url: "https://github.com/redis/redis/security/advisories/GHSA-66gq-c942-6976",
            },
         ],
         release_date: "2024-10-07T19:51:06.784000+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2025-01-22T10:42:40+00:00",
               details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2025:0595",
            },
            {
               category: "workaround",
               details: "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "LOW",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 5.5,
                  baseSeverity: "MEDIUM",
                  confidentialityImpact: "NONE",
                  integrityImpact: "NONE",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
                  version: "3.1",
               },
               products: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "redis: Denial-of-service due to unbounded pattern matching in Redis",
      },
      {
         cve: "CVE-2024-31449",
         cwe: {
            id: "CWE-20",
            name: "Improper Input Validation",
         },
         discovery_date: "2024-10-07T20:01:19.998028+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "2317056",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A flaw was found in Redis. This flaw allows an authenticated user to use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may lead to remote code execution. The problem exists in all versions of Redis with Lua scripting.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "redis: Lua library commands may lead to stack overflow and RCE in Redis",
               title: "Vulnerability summary",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2024-31449",
            },
            {
               category: "external",
               summary: "RHBZ#2317056",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2317056",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2024-31449",
               url: "https://www.cve.org/CVERecord?id=CVE-2024-31449",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2024-31449",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2024-31449",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/commit/1f7c148be2cbacf7d50aa461c58b871e87cc5ed9",
               url: "https://github.com/redis/redis/commit/1f7c148be2cbacf7d50aa461c58b871e87cc5ed9",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/security/advisories/GHSA-whxg-wx83-85p5",
               url: "https://github.com/redis/redis/security/advisories/GHSA-whxg-wx83-85p5",
            },
         ],
         release_date: "2024-10-07T19:51:08.775000+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2025-01-22T10:42:40+00:00",
               details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2025:0595",
            },
            {
               category: "workaround",
               details: "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Moderate",
            },
         ],
         title: "redis: Lua library commands may lead to stack overflow and RCE in Redis",
      },
      {
         cve: "CVE-2024-46981",
         cwe: {
            id: "CWE-416",
            name: "Use After Free",
         },
         discovery_date: "2025-01-06T22:00:39.382359+00:00",
         ids: [
            {
               system_name: "Red Hat Bugzilla ID",
               text: "2336004",
            },
         ],
         notes: [
            {
               category: "description",
               text: "A flaw was found in the Redis server. This flaw allows an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, potentially leading to remote code execution.",
               title: "Vulnerability description",
            },
            {
               category: "summary",
               text: "redis: Redis' Lua library commands may lead to remote code execution",
               title: "Vulnerability summary",
            },
            {
               category: "other",
               text: "The problem exists in all versions of Redis with Lua scripting.\n\nThis vulnerability in Redis is classified as high severity rather than moderate due to its potential impact and exploitation scope. By manipulating the Lua garbage collector through crafted scripts, an authenticated attacker can achieve remote code execution (RCE), allowing them to execute arbitrary commands on the host system. This compromises not only the integrity and confidentiality of the data stored in Redis but also the underlying server itself. Furthermore, the exploitation does not require direct access to the server binary, making it feasible for attackers to execute through legitimate, albeit malicious, commands.",
               title: "Statement",
            },
            {
               category: "general",
               text: "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
               title: "CVSS score applicability",
            },
         ],
         product_status: {
            fixed: [
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
               "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
            ],
         },
         references: [
            {
               category: "self",
               summary: "Canonical URL",
               url: "https://access.redhat.com/security/cve/CVE-2024-46981",
            },
            {
               category: "external",
               summary: "RHBZ#2336004",
               url: "https://bugzilla.redhat.com/show_bug.cgi?id=2336004",
            },
            {
               category: "external",
               summary: "https://www.cve.org/CVERecord?id=CVE-2024-46981",
               url: "https://www.cve.org/CVERecord?id=CVE-2024-46981",
            },
            {
               category: "external",
               summary: "https://nvd.nist.gov/vuln/detail/CVE-2024-46981",
               url: "https://nvd.nist.gov/vuln/detail/CVE-2024-46981",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/releases/tag/6.2.17",
               url: "https://github.com/redis/redis/releases/tag/6.2.17",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/releases/tag/7.2.7",
               url: "https://github.com/redis/redis/releases/tag/7.2.7",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/releases/tag/7.4.2",
               url: "https://github.com/redis/redis/releases/tag/7.4.2",
            },
            {
               category: "external",
               summary: "https://github.com/redis/redis/security/advisories/GHSA-39h2-x6c4-6w4c",
               url: "https://github.com/redis/redis/security/advisories/GHSA-39h2-x6c4-6w4c",
            },
         ],
         release_date: "2025-01-06T21:11:51.687000+00:00",
         remediations: [
            {
               category: "vendor_fix",
               date: "2025-01-22T10:42:40+00:00",
               details: "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
               restart_required: {
                  category: "none",
               },
               url: "https://access.redhat.com/errata/RHSA-2025:0595",
            },
            {
               category: "workaround",
               details: "A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.",
               product_ids: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         scores: [
            {
               cvss_v3: {
                  attackComplexity: "HIGH",
                  attackVector: "LOCAL",
                  availabilityImpact: "HIGH",
                  baseScore: 7,
                  baseSeverity: "HIGH",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "LOW",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               products: [
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.src",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debuginfo-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-debugsource-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.aarch64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.ppc64le",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.s390x",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-devel-0:6.2.17-1.module+el8.10.0+22680+748527fd.x86_64",
                  "AppStream-8.10.0.Z.MAIN.EUS:redis:6:8100020250113083959:489197e6:redis-doc-0:6.2.17-1.module+el8.10.0+22680+748527fd.noarch",
               ],
            },
         ],
         threats: [
            {
               category: "impact",
               details: "Important",
            },
         ],
         title: "redis: Redis' Lua library commands may lead to remote code execution",
      },
   ],
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.