CVE-2025-49112

NameCVE-2025-49112
DescriptionsetDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1107210, 1107211, 1107212

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
redict (PTS)forky, sid7.3.5+ds-1fixed
redis (PTS)bullseye5:6.0.16-1+deb11u2vulnerable
bullseye (security)5:6.0.16-1+deb11u7vulnerable
bookworm, bookworm (security)5:7.0.15-1~deb12u5vulnerable
forky, sid, trixie5:8.0.2-3vulnerable
valkey (PTS)forky, sid, trixie8.1.1+dfsg1-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
redictsource(unstable)7.3.5+ds-11107212
redissource(unstable)(unfixed)1107211
valkeysource(unstable)8.1.1+dfsg1-21107210

Notes

[trixie] - redis <postponed> (Minor issue; can be fixed along with next DSA)
[bookworm] - redis <postponed> (Minor issue; can be fixed along with next DSA)
[bullseye] - redis <postponed> (Minor issue; can be fixed along with next DLA)
https://github.com/redis/redis/issues/14199
https://github.com/valkey-io/valkey/pull/2101
Fixed by: https://github.com/valkey-io/valkey/commit/374718b2a365ca69f715d542709b7d71540b1387
Redis upstream considers this issue only defensive programming / hardening, cf.
https://github.com/redis/redis/issues/14199#issuecomment-3076467634

Search for package or bug name: Reporting problems