Name | CVE-2025-49112 |
Description | setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1107210, 1107211, 1107212 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
redict (PTS) | forky, sid | 7.3.5+ds-1 | fixed |
redis (PTS) | bullseye | 5:6.0.16-1+deb11u2 | vulnerable |
| bullseye (security) | 5:6.0.16-1+deb11u7 | vulnerable |
| bookworm, bookworm (security) | 5:7.0.15-1~deb12u5 | vulnerable |
| forky, sid, trixie | 5:8.0.2-3 | vulnerable |
valkey (PTS) | forky, sid, trixie | 8.1.1+dfsg1-3 | fixed |
The information below is based on the following data on fixed versions.
Notes
[trixie] - redis <postponed> (Minor issue; can be fixed along with next DSA)
[bookworm] - redis <postponed> (Minor issue; can be fixed along with next DSA)
[bullseye] - redis <postponed> (Minor issue; can be fixed along with next DLA)
https://github.com/redis/redis/issues/14199
https://github.com/valkey-io/valkey/pull/2101
Fixed by: https://github.com/valkey-io/valkey/commit/374718b2a365ca69f715d542709b7d71540b1387
Redis upstream considers this issue only defensive programming / hardening, cf.
https://github.com/redis/redis/issues/14199#issuecomment-3076467634