vulnerability
Ubuntu: USN-7893-1 (CVE-2025-46819): Valkey vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:L/AC:M/Au:S/C:C/I:N/A:C) | Oct 3, 2025 | Nov 27, 2025 | Nov 28, 2025 |
Description
Benny Isaacs, Nir Brakha, and Sagi Tzadik discovered that Valkey incorrectly
handled memory when running Lua scripts. An authenticated attacker could
use this vulnerability to trigger a use-after-free condition, and
potentially achieve remote code execution on the Valkey server.
(CVE-2025-49844)
It was discovered that Valkey incorrectly handled memory when running Lua
scripts. An authenticated attacker could use this vulnerability to trigger
a integer overflow condition, and potentially achieve remote code execution
on the Valkey server. (CVE-2025-46817)
It was discovered that Valkey incorrectly handled Lua objects. An
authenticated attacker could possibly use this issue to escalate their
privileges. (CVE-2025-46818)
It was discovered that Valkey incorrectly handled memory when running Lua
scripts. An authenticated attacker could use this vulnerability to read
out-of-bounds memory, causing a denial of service or possibly obtaining
sensitive information. (CVE-2025-46819)
It was discovered that Valkey incorrectly handled memory in some
calculations. An attacker could possibly use this issue to cause a denial
of service. (CVE-2025-49112)
Solution
References
- CVE-2025-46819
- https://attackerkb.com/topics/CVE-2025-46819
- CWE-125
- CWE-190
- UBUNTU-USN-7893-1
- URL-https://github.com/redis/redis/commit/3a1624da2449ac3dbfc4bdaed43adf77a0b7bfba
- URL-https://github.com/redis/redis/releases/tag/8.2.2
- URL-https://github.com/redis/redis/security/advisories/GHSA-4c68-q8q8-3g4f
- URL-https://github.com/valkey-io/valkey/commit/6dd003e88feace83e55491f32376f6927896e31e
- URL-https://ubuntu.com/security/notices/USN-7893-1
- URL-https://www.cve.org/CVERecord?id=CVE-2025-46819
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.