redis was added to epel7 repo on 2014-06-21
      
Page updated: 2023-11-21 11:36
      
Repo Status -
      Overall Status
    
Source NVR: redis-3.2.12-2.el7 (2018-11-11)
| redis | redis-3.2.12-2.el7 | 
| redis-trib | redis-trib-3.2.12-2.el7 | 
| 1598568 | NEW | redis 4.0.9. | 
| 1732830 | NEW | Request - Shutdown Save | 
| 1932636 | NEW | CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms [epel-all] | 
| 1948769 | NEW | CVE-2021-3470 redis: potential heap overflow when using a heap allocator other than jemalloc or glibc's malloc [epel-all] | 
| 1957412 | NEW | CVE-2021-29477 redis: Integer overflow via STRALGO LCS command [epel-7] | 
| 1957416 | NEW | CVE-2021-29478 redis: Integer overflow via COPY command for large intsets [epel-7] | 
| 2012198 | NEW | CVE-2021-32672 redis: Out of bounds read in lua debugger protocol parser [epel-7] | 
| 2012205 | NEW | CVE-2021-32675 redis: Denial of service via Redis Standard Protocol (RESP) request [epel-7] | 
| 2012208 | NEW | CVE-2021-32762 redis: Integer overflow in redis-cli, redis-sentinel on some platforms [epel-7] | 
| 2012211 | NEW | CVE-2021-32687 redis: Integer overflow issue with intsets [epel-7] | 
| 2012214 | NEW | CVE-2021-32628 redis: Integer overflow bug in the ziplist data structure [epel-7] | 
| 2012217 | NEW | CVE-2021-32626 redis: Lua scripts can overflow the heap-based Lua stack [epel-7] | 
| 2012219 | NEW | CVE-2021-41099 redis: Integer overflow issue with strings [epel-7] | 
| 2061344 | NEW | Update to 3.2.13 | 
| 2080288 | NEW | CVE-2022-24735 redis: Code injection via Lua script execution environment [epel-7] | 
| 2080291 | NEW | CVE-2022-24736 redis: Malformed Lua script can crash Redis [epel-7] | 
| 2163189 | NEW | CVE-2022-35977 redis: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands may result with false OOM panic [epel-7] | 
| 2174646 | NEW | CVE-2022-36021 redis: Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow [epel-7] | 
| 2174652 | NEW | CVE-2023-25155 redis: String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack [epel-7] | 
| 2187526 | NEW | CVE-2023-28856 redis: Insufficient validation of HINCRBYFLOAT command [epel-7] | 
| 2238561 | NEW | CVE-2023-41053 redis: Redis SORT_RO may bypass ACL configuration [epel-7] |