CVE-2025-32023: Redis allows out of bounds writes in hyperloglog commands leading to RCE
| Affects | Status | Importance | Assigned to | Milestone | |
|---|---|---|---|---|---|
| redis (Ubuntu) |
New
|
Undecided
|
Unassigned | ||
Bug Description
https:/
https:/
Noble is vulnerable.
This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19. I tried to trigger it by installing apt-get install redis-server and running `/usr/bin/
There is a poc here: https:/
I modified it to test make sure we didn't crash redis when input was good.
When using `/usr/bin/
```
ubuntu@launchpad:~$ python3 twd425_poc.py
Normal merge should work
Normal merge is good
trigger crash
pfmerge failed - as expected with bad input.
It crashed. Not patched yet!
ubuntu@launchpad:~$
```
After patching and running `./src/redis-server --port 30000`
```
ubuntu@launchpad:~$ python3 twd425_poc.py
Normal merge should work
Normal merge is good
trigger crash
pfmerge failed - as expected with bad input.
It didn't crash. Patched!
ubuntu@launchpad:~$
```
The fix is based on this pull request in July of 2025
https:/
The pull request also fixes CVE-2025-48367. I decided not to include the fix for the other CVE as I have not tested it yet.
The official fix for CVE-2025-32023 comes with 2 commits
- c5de37d
- 78d5be1
I only applied c5de37d as that was the minimal change needed to make it work. The other commit, 78d5be1 is to support tcl8.5. Noble comes with tcl8.6 therefore I did not apply the second patch.
Built and tested on noble (multipass vm on aarch64) using
```
DEB_BUILD_
./runtest --single unit/hyperloglog
\o/ All tests passed without errors!
```

Additionally, https:/ /ubuntu. com/security/ CVE-2025- 32023 mentions valkey needs evaluation for noble. valkey- server --version jemalloc- 5.3.0 bits=64 build=4db28f08f d498d66 valkey- server beba27a8c23fae2 e6f3c4b14d8b901 9facbbae80f5502 80c2 /usr/bin/ valkey- server
I tested valkey
```
ubuntu@valkey:~$ /usr/bin/
Server v=7.2.11 sha=00000000:0 malloc=
ubuntu@valkey:~$ sha256sum /usr/bin/
29d776e69fcd5c1
ubuntu@valkey:~$
``
Not Vulnerable
```
ubuntu@valkey:~$ python3 twd425_poc.py
Normal merge should work
Normal merge is good
trigger crash
pfmerge failed - as expected with bad input.
It didn't crash. Patched!
```