INFSA-2025:19675: valkey security update
Information about definition
Identificator: INFSA-2025:19675
Type: security
Release date: 2025-11-07 21:19:09 UTC
Information about package
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Vulnerabilities description
- CVE-2025-46817
Redis could allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution.
- CVE-2025-46818
Redis could allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
- CVE-2025-46819
Redis could allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service.
- CVE-2025-49844
Redis could allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution.
Severity level
| CVE | Score CVSS 2.0 | Score CVSS 3.x | Score CVSS 4.0 |
|---|---|---|---|
|
NIST — CVE-2025-46817
|
no information | 8.8 | no information |
|
NIST — CVE-2025-46818
|
no information | 6.0 | no information |
|
NIST — CVE-2025-46819
|
no information | 6.3 | no information |
|
NIST — CVE-2025-49844
|
no information | 8.8 | no information |
Updated packages