CVE-2025-62507

NameCVE-2025-62507
DescriptionRedis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
redis (PTS)bullseye5:6.0.16-1+deb11u2fixed
bullseye (security)5:6.0.16-1+deb11u8fixed
bookworm5:7.0.15-1~deb12u5fixed
bookworm (security)5:7.0.15-1~deb12u6fixed
trixie (security), trixie5:8.0.2-3+deb13u1fixed
forky, sid5:8.0.5-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
redissource(unstable)(not affected)

Notes

- redis <not-affected> (Vulnerable code not present)
https://github.com/redis/redis/security/advisories/GHSA-jhjx-x4cf-4vm8
Introduced with: https://github.com/redis/redis/commit/fa040a72c0720d9b0a833117b086e5bbafa6ddc8 (8.2-rc1)
Fixed by: https://github.com/redis/redis/commit/5f83972188f6e5b1d6f1940218c650a9cbdf7741 (8.2.3)

Search for package or bug name: Reporting problems