Redis Security Update Advisory
Overview
We have released a security update to address a vulnerability in Redis. Users of affected products are advised to update to the latest version.
Affected Products
CVE-2025-32023
Redis Version: 2.8 and above but below 6.2.19
Redis version: 7.2.0 and above but below 7.2.10
Redis version: 7.4.0 or later but less than 7.4.5
Redis version: 8.0.0 or later but less than 8.0.3
CVE-2025-48367
Redis Version: 6.2.19 and earlier
Redis version: 7.2.0 or later but less than 7.2.10
Redis version: 7.4.0 or later but less than 7.4.5
Redis version: 8.0.0 or later but not earlier than 8.0.3
Resolved Vulnerabilities
Code execution vulnerability due to out-of-bounds memory write when handling hyperloglog commands in Redis (CVE-2025-32023)
Denial of service vulnerability due to incorrect handling of connection errors in Redis (CVE-2025-48367)
Vulnerability Patches
Vulnerability patches have been made available in the latest updates. Please follow the instructions on the Referenced Sites to update to the latest Vulnerability Patches version.
CVE-2025-32023, CVE-2025-48367
Redis version: 6.2.19
Redis version: 7.2.10
Redis Version : 7.4.5
Redis Version : 8.0.3
Referenced Sites
[1] Out of bounds write in hyperloglog commands leads to RCE
https://github.com/redis/redis/security/advisories/GHSA-rp2m-q4j6-gr43
[2] Redis DoS Vulnerability due to bad connection error handling
https://github.com/redis/redis/security/advisories/GHSA-4q32-c38c-pwgq