Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:20926 - Security Advisory
Issued:
2025-11-11
Updated:
2025-11-11

RHSA-2025:20926 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: redis security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for redis is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log.

Security Fix(es):

  • redis: Lua library commands may lead to integer overflow and potential RCE (CVE-2025-46817)
  • Redis: Redis: Authenticated users can execute LUA scripts as a different user (CVE-2025-46818)
  • Redis: Redis is vulnerable to DoS via specially crafted LUA scripts (CVE-2025-46819)
  • Redis: Redis Lua Use-After-Free may lead to remote code execution (CVE-2025-49844)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64

Fixes

  • BZ - 2401258 - CVE-2025-46817 redis: Lua library commands may lead to integer overflow and potential RCE
  • BZ - 2401292 - CVE-2025-46818 Redis: Redis: Authenticated users can execute LUA scripts as a different user
  • BZ - 2401322 - CVE-2025-46819 Redis: Redis is vulnerable to DoS via specially crafted LUA scripts
  • BZ - 2401324 - CVE-2025-49844 Redis: Redis Lua Use-After-Free may lead to remote code execution
  • RHEL-6784 - Redis files under /lib not root owned SCAP finding

CVEs

  • CVE-2025-46817
  • CVE-2025-46818
  • CVE-2025-46819
  • CVE-2025-49844

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 9

SRPM
redis-6.2.20-2.el9_7.src.rpm SHA-256: 2a205778378429b33d422a81aadb25c46b65e2848de71bcc7ae422bf4eca3ebe
x86_64
redis-6.2.20-2.el9_7.x86_64.rpm SHA-256: 6f09699ec7c377f215cd05c6da9e7b90e36bc9cbfa69931f0d94d5b377f230df
redis-debuginfo-6.2.20-2.el9_7.i686.rpm SHA-256: dfc6de61b7c3bc9a8be9e34be276ed1594bffdbeebfea1d7edffafd5ddc6c738
redis-debuginfo-6.2.20-2.el9_7.x86_64.rpm SHA-256: 9d02fd9dac324f8734fc6901cd46ac5b0ac7f87f31d28ed03ea8ecffee14c092
redis-debugsource-6.2.20-2.el9_7.i686.rpm SHA-256: b8ef15aa45d157383a36547d76685e5cb2e64980fe72b5d6ac7c1a8d3ac5fa9f
redis-debugsource-6.2.20-2.el9_7.x86_64.rpm SHA-256: 0d4525ea639a18e95f5f3f6201d389248f85f4535c2e3d1d41c63e5de2663558
redis-devel-6.2.20-2.el9_7.i686.rpm SHA-256: edcfadb2e2daebae1c58ee2521cb68bbaef05a257ee41a772a4d30425c390a55
redis-devel-6.2.20-2.el9_7.x86_64.rpm SHA-256: a7f7996ab5d17750ed40a9c5b18efad50d86a6a684443fb6bf0671f211c7e842
redis-doc-6.2.20-2.el9_7.noarch.rpm SHA-256: 5dbf66274af30bf0edf34d88dbe206a27df7473e23ea8383531864024a734f4a

Red Hat Enterprise Linux for IBM z Systems 9

SRPM
redis-6.2.20-2.el9_7.src.rpm SHA-256: 2a205778378429b33d422a81aadb25c46b65e2848de71bcc7ae422bf4eca3ebe
s390x
redis-6.2.20-2.el9_7.s390x.rpm SHA-256: fd930ddbed7d3cf3dd467471daed4a004d126827baa5986c41f52410dba77064
redis-debuginfo-6.2.20-2.el9_7.s390x.rpm SHA-256: e2227b12658f406bde4559e4676504f39046b5730de8fab4be99268f64eaefac
redis-debugsource-6.2.20-2.el9_7.s390x.rpm SHA-256: a5c4dea823ba07b9e2ca66ca1673f1394443f1b0cf04288408bc11b640d30df3
redis-devel-6.2.20-2.el9_7.s390x.rpm SHA-256: 2bcb0f96e8237533d5d25e1fe53c7c4928e2343f4f6c1b5d5e4435052ff1a84f
redis-doc-6.2.20-2.el9_7.noarch.rpm SHA-256: 5dbf66274af30bf0edf34d88dbe206a27df7473e23ea8383531864024a734f4a

Red Hat Enterprise Linux for Power, little endian 9

SRPM
redis-6.2.20-2.el9_7.src.rpm SHA-256: 2a205778378429b33d422a81aadb25c46b65e2848de71bcc7ae422bf4eca3ebe
ppc64le
redis-6.2.20-2.el9_7.ppc64le.rpm SHA-256: bdf296b388d719398f6f15271c4d3894dd71319907b2857e46b66dda764146ce
redis-debuginfo-6.2.20-2.el9_7.ppc64le.rpm SHA-256: e21210679cc723f5ae9f114da77e00afa1a7694b868ea46de0caf08f918d9041
redis-debugsource-6.2.20-2.el9_7.ppc64le.rpm SHA-256: 4be5e9ba1464212a96e7d83d6b271f9e65cea28014359f130bdd1a8f4df7c9be
redis-devel-6.2.20-2.el9_7.ppc64le.rpm SHA-256: 5b687869593e8d9c012af3bdc1d44ba5f472dedd788f8475f0433f164ddec85f
redis-doc-6.2.20-2.el9_7.noarch.rpm SHA-256: 5dbf66274af30bf0edf34d88dbe206a27df7473e23ea8383531864024a734f4a

Red Hat Enterprise Linux for ARM 64 9

SRPM
redis-6.2.20-2.el9_7.src.rpm SHA-256: 2a205778378429b33d422a81aadb25c46b65e2848de71bcc7ae422bf4eca3ebe
aarch64
redis-6.2.20-2.el9_7.aarch64.rpm SHA-256: 93ee8360bcfd2ed8b7fc5b2bce9810fe5982f1c22f07c8f6ffd70fa2787ced5f
redis-debuginfo-6.2.20-2.el9_7.aarch64.rpm SHA-256: 43dfe0ba9c229b7164ca84fd599dde3a40e9a40df887df5a7f1fceab671b1719
redis-debugsource-6.2.20-2.el9_7.aarch64.rpm SHA-256: 80328966be15ad0ba4dd87723fcc7e7e9100e5e3fa2a1e164a8d2cff2bcf8d76
redis-devel-6.2.20-2.el9_7.aarch64.rpm SHA-256: 87693fbce1b460f5fce595b4e48201977df3c6a96c6ee6d87d6c22524e3a33fb
redis-doc-6.2.20-2.el9_7.noarch.rpm SHA-256: 5dbf66274af30bf0edf34d88dbe206a27df7473e23ea8383531864024a734f4a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility