Source: redict Version: 7.3.2+ds-1 Severity: grave Tags: security upstream Justification: user security hole Forwarded: https://codeberg.org/redict/redict/issues/105 X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>
Hi, The following vulnerability was published for redict. CVE-2025-48367[0]: | Redis is an open source, in-memory database that persists on disk. | An unauthenticated connection can cause repeated IP protocol errors, | leading to client starvation and, ultimately, a denial of service. | This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2025-48367 https://www.cve.org/CVERecord?id=CVE-2025-48367 [1] https://codeberg.org/redict/redict/issues/105 Regards, Salvatore

