Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:18996 - Security Advisory
Issued:
2025-10-23
Updated:
2025-10-23

RHSA-2025:18996 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: redis security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for redis is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.

Security Fix(es):

  • redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817)
  • Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4 x86_64
  • Red Hat Enterprise Linux Server - AUS 9.4 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4 s390x
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4 ppc64le
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4 aarch64
  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4 x86_64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4 s390x

Fixes

  • BZ - 2401258 - CVE-2025-46817 redis: Lua library commands may lead to integer overflow and potential RCE
  • BZ - 2401324 - CVE-2025-49844 Redis: Redis Lua Use-After-Free may lead to remote code execution

CVEs

  • CVE-2025-46817
  • CVE-2025-49844

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.4

SRPM
redis-6.2.7-1.el9_4.5.src.rpm SHA-256: ab9bccd13b0588cbb887eb62c088c1960f47198d08f075325afcb16a8d97fd20
x86_64
redis-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: bbffb17a4da0d1a937bd71d2bb830270b5e70479295d3ecef588f8468c99d0aa
redis-debuginfo-6.2.7-1.el9_4.5.i686.rpm SHA-256: 6a8b5c9b6e24cbb28bce45bb04e1501cac3cdbbc426bea8f07ddfa6d8f27be2e
redis-debuginfo-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: 824bd4f582d883795b8ceec98acac0e0c4dc5fe31e936d15674308651742480c
redis-debugsource-6.2.7-1.el9_4.5.i686.rpm SHA-256: 6f6975d57e5e8f3d56ef6358d6502b0f8fbb2420ec5fc35a9fef3d77119f0cb0
redis-debugsource-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: 4cd12d21b3d157ec1faed3830e273dd76254ef16a312b2f2f6f0464877dc4550
redis-devel-6.2.7-1.el9_4.5.i686.rpm SHA-256: 9130c457c01b3735d754ca820cc7e072965c71891aa1f087037b42734ac68966
redis-devel-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: e71aec9c36e08b96ff3b84026a958734a3632d879e2c28bd0ab1203127e9e809
redis-doc-6.2.7-1.el9_4.5.noarch.rpm SHA-256: 6b2cc9fa6a4da9688d58ee7fbcd10cd489dc24c6f300340a2e8d08d5f689db46

Red Hat Enterprise Linux Server - AUS 9.4

SRPM
redis-6.2.7-1.el9_4.5.src.rpm SHA-256: ab9bccd13b0588cbb887eb62c088c1960f47198d08f075325afcb16a8d97fd20
x86_64
redis-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: bbffb17a4da0d1a937bd71d2bb830270b5e70479295d3ecef588f8468c99d0aa
redis-debuginfo-6.2.7-1.el9_4.5.i686.rpm SHA-256: 6a8b5c9b6e24cbb28bce45bb04e1501cac3cdbbc426bea8f07ddfa6d8f27be2e
redis-debuginfo-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: 824bd4f582d883795b8ceec98acac0e0c4dc5fe31e936d15674308651742480c
redis-debugsource-6.2.7-1.el9_4.5.i686.rpm SHA-256: 6f6975d57e5e8f3d56ef6358d6502b0f8fbb2420ec5fc35a9fef3d77119f0cb0
redis-debugsource-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: 4cd12d21b3d157ec1faed3830e273dd76254ef16a312b2f2f6f0464877dc4550
redis-devel-6.2.7-1.el9_4.5.i686.rpm SHA-256: 9130c457c01b3735d754ca820cc7e072965c71891aa1f087037b42734ac68966
redis-devel-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: e71aec9c36e08b96ff3b84026a958734a3632d879e2c28bd0ab1203127e9e809
redis-doc-6.2.7-1.el9_4.5.noarch.rpm SHA-256: 6b2cc9fa6a4da9688d58ee7fbcd10cd489dc24c6f300340a2e8d08d5f689db46

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 9.4

SRPM
redis-6.2.7-1.el9_4.5.src.rpm SHA-256: ab9bccd13b0588cbb887eb62c088c1960f47198d08f075325afcb16a8d97fd20
s390x
redis-6.2.7-1.el9_4.5.s390x.rpm SHA-256: 0d89f2e6ebe4ab58ffe3ca5700088e6d936954da6fc206fb2be8da70ee106814
redis-debuginfo-6.2.7-1.el9_4.5.s390x.rpm SHA-256: aef5ac3dca2d3e79469d559f21bcf7dae48eed3d7d3f466940c6527999a58b0f
redis-debugsource-6.2.7-1.el9_4.5.s390x.rpm SHA-256: 559f12a552f8a5285095778e4598de56a9c408180fbe8e2b02a58c3b71e66ade
redis-devel-6.2.7-1.el9_4.5.s390x.rpm SHA-256: 99bc63d4072a80c5b5ea038b3e2e191602f21f76f35b5bc4416c5d3693198725
redis-doc-6.2.7-1.el9_4.5.noarch.rpm SHA-256: 6b2cc9fa6a4da9688d58ee7fbcd10cd489dc24c6f300340a2e8d08d5f689db46

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.4

SRPM
redis-6.2.7-1.el9_4.5.src.rpm SHA-256: ab9bccd13b0588cbb887eb62c088c1960f47198d08f075325afcb16a8d97fd20
ppc64le
redis-6.2.7-1.el9_4.5.ppc64le.rpm SHA-256: f8f0cd331adf239b857eaeeca88f34e60e8635a0e780cd7792a6b82bcde62f71
redis-debuginfo-6.2.7-1.el9_4.5.ppc64le.rpm SHA-256: 2104e2648208e6adb728a650b6e5725e0d4a058f4a7b651f4510150f746ed0ee
redis-debugsource-6.2.7-1.el9_4.5.ppc64le.rpm SHA-256: ba13952c4a51568c363cedd54cfc19de6e5e12676097a590ed6ff5ce65295ee9
redis-devel-6.2.7-1.el9_4.5.ppc64le.rpm SHA-256: 9e9e958830150e6eddf1ff1e28190e146c57383860669e8751604673c0c81d8c
redis-doc-6.2.7-1.el9_4.5.noarch.rpm SHA-256: 6b2cc9fa6a4da9688d58ee7fbcd10cd489dc24c6f300340a2e8d08d5f689db46

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.4

SRPM
redis-6.2.7-1.el9_4.5.src.rpm SHA-256: ab9bccd13b0588cbb887eb62c088c1960f47198d08f075325afcb16a8d97fd20
aarch64
redis-6.2.7-1.el9_4.5.aarch64.rpm SHA-256: 198343f62dfeafda79c6fa7e5bbee810370bb8a0e5ebd7e06612e9da9187118e
redis-debuginfo-6.2.7-1.el9_4.5.aarch64.rpm SHA-256: c4d93d09302485e80b55806ad7916a37e85f6a7b518b74ce338ea451ed342a4c
redis-debugsource-6.2.7-1.el9_4.5.aarch64.rpm SHA-256: 5f6c95c1da572ff5e377cc298eadbb8f905e4a7498a32ccc709e07132a2d5129
redis-devel-6.2.7-1.el9_4.5.aarch64.rpm SHA-256: 102879dc8e4b5d93a085d43f39b37233d9f7531badfb3dc9aca262b92a11d815
redis-doc-6.2.7-1.el9_4.5.noarch.rpm SHA-256: 6b2cc9fa6a4da9688d58ee7fbcd10cd489dc24c6f300340a2e8d08d5f689db46

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.4

SRPM
redis-6.2.7-1.el9_4.5.src.rpm SHA-256: ab9bccd13b0588cbb887eb62c088c1960f47198d08f075325afcb16a8d97fd20
ppc64le
redis-6.2.7-1.el9_4.5.ppc64le.rpm SHA-256: f8f0cd331adf239b857eaeeca88f34e60e8635a0e780cd7792a6b82bcde62f71
redis-debuginfo-6.2.7-1.el9_4.5.ppc64le.rpm SHA-256: 2104e2648208e6adb728a650b6e5725e0d4a058f4a7b651f4510150f746ed0ee
redis-debugsource-6.2.7-1.el9_4.5.ppc64le.rpm SHA-256: ba13952c4a51568c363cedd54cfc19de6e5e12676097a590ed6ff5ce65295ee9
redis-devel-6.2.7-1.el9_4.5.ppc64le.rpm SHA-256: 9e9e958830150e6eddf1ff1e28190e146c57383860669e8751604673c0c81d8c
redis-doc-6.2.7-1.el9_4.5.noarch.rpm SHA-256: 6b2cc9fa6a4da9688d58ee7fbcd10cd489dc24c6f300340a2e8d08d5f689db46

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.4

SRPM
redis-6.2.7-1.el9_4.5.src.rpm SHA-256: ab9bccd13b0588cbb887eb62c088c1960f47198d08f075325afcb16a8d97fd20
x86_64
redis-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: bbffb17a4da0d1a937bd71d2bb830270b5e70479295d3ecef588f8468c99d0aa
redis-debuginfo-6.2.7-1.el9_4.5.i686.rpm SHA-256: 6a8b5c9b6e24cbb28bce45bb04e1501cac3cdbbc426bea8f07ddfa6d8f27be2e
redis-debuginfo-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: 824bd4f582d883795b8ceec98acac0e0c4dc5fe31e936d15674308651742480c
redis-debugsource-6.2.7-1.el9_4.5.i686.rpm SHA-256: 6f6975d57e5e8f3d56ef6358d6502b0f8fbb2420ec5fc35a9fef3d77119f0cb0
redis-debugsource-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: 4cd12d21b3d157ec1faed3830e273dd76254ef16a312b2f2f6f0464877dc4550
redis-devel-6.2.7-1.el9_4.5.i686.rpm SHA-256: 9130c457c01b3735d754ca820cc7e072965c71891aa1f087037b42734ac68966
redis-devel-6.2.7-1.el9_4.5.x86_64.rpm SHA-256: e71aec9c36e08b96ff3b84026a958734a3632d879e2c28bd0ab1203127e9e809
redis-doc-6.2.7-1.el9_4.5.noarch.rpm SHA-256: 6b2cc9fa6a4da9688d58ee7fbcd10cd489dc24c6f300340a2e8d08d5f689db46

Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.4

SRPM
redis-6.2.7-1.el9_4.5.src.rpm SHA-256: ab9bccd13b0588cbb887eb62c088c1960f47198d08f075325afcb16a8d97fd20
aarch64
redis-6.2.7-1.el9_4.5.aarch64.rpm SHA-256: 198343f62dfeafda79c6fa7e5bbee810370bb8a0e5ebd7e06612e9da9187118e
redis-debuginfo-6.2.7-1.el9_4.5.aarch64.rpm SHA-256: c4d93d09302485e80b55806ad7916a37e85f6a7b518b74ce338ea451ed342a4c
redis-debugsource-6.2.7-1.el9_4.5.aarch64.rpm SHA-256: 5f6c95c1da572ff5e377cc298eadbb8f905e4a7498a32ccc709e07132a2d5129
redis-devel-6.2.7-1.el9_4.5.aarch64.rpm SHA-256: 102879dc8e4b5d93a085d43f39b37233d9f7531badfb3dc9aca262b92a11d815
redis-doc-6.2.7-1.el9_4.5.noarch.rpm SHA-256: 6b2cc9fa6a4da9688d58ee7fbcd10cd489dc24c6f300340a2e8d08d5f689db46

Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.4

SRPM
redis-6.2.7-1.el9_4.5.src.rpm SHA-256: ab9bccd13b0588cbb887eb62c088c1960f47198d08f075325afcb16a8d97fd20
s390x
redis-6.2.7-1.el9_4.5.s390x.rpm SHA-256: 0d89f2e6ebe4ab58ffe3ca5700088e6d936954da6fc206fb2be8da70ee106814
redis-debuginfo-6.2.7-1.el9_4.5.s390x.rpm SHA-256: aef5ac3dca2d3e79469d559f21bcf7dae48eed3d7d3f466940c6527999a58b0f
redis-debugsource-6.2.7-1.el9_4.5.s390x.rpm SHA-256: 559f12a552f8a5285095778e4598de56a9c408180fbe8e2b02a58c3b71e66ade
redis-devel-6.2.7-1.el9_4.5.s390x.rpm SHA-256: 99bc63d4072a80c5b5ea038b3e2e191602f21f76f35b5bc4416c5d3693198725
redis-doc-6.2.7-1.el9_4.5.noarch.rpm SHA-256: 6b2cc9fa6a4da9688d58ee7fbcd10cd489dc24c6f300340a2e8d08d5f689db46

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility