Source: redis
Version: 5:8.0.0-2
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for redis.

CVE-2025-48367[0]:
| Redis is an open source, in-memory database that persists on disk.
| An unauthenticated connection can cause repeated IP protocol errors,
| leading to client starvation and, ultimately, a denial of service.
| This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-48367
    https://www.cve.org/CVERecord?id=CVE-2025-48367
[1] https://github.com/redis/redis/security/advisories/GHSA-4q32-c38c-pwgq
[2] 
https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to