CVE-2025-26269

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-26269
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-26269.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-26269
Published
2025-04-17T18:15:49.073Z
Modified
2025-11-20T12:34:40.968736Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

DragonflyDB Dragonfly through 1.28.2 (fixed in 1.29.0) allows authenticated users to cause a denial of service (daemon crash) via a Lua library command that references a large negative integer.

References

Affected packages

Git / github.com/dragonflydb/dragonfly

Affected ranges

Type
GIT
Repo
https://github.com/dragonflydb/dragonfly
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.10.0
v0.11.0
v0.12.0
v0.13.0
v0.13.1
v0.14.0
v0.15.0
v0.16.0
v0.17.0
v0.2.0
v0.3.0
v0.3.0-alpha
v0.3.1
v0.4.0
v0.5.0
v0.6.0
v0.7.0
v0.8.0
v0.9.0
v0.9.1

v1.*

v1.0.0
v1.1.0
v1.1.1
v1.1.2
v1.11.0
v1.12.0
v1.13.0
v1.14.0
v1.15.0
v1.16.0
v1.17.0
v1.18.0
v1.19.0
v1.2.0
v1.2.1
v1.20.0
v1.21.0
v1.22.0
v1.23.0
v1.24.0
v1.26.0
v1.27.0
v1.28.0
v1.3.0
v1.4.0
v1.5.0
v1.6.0
v1.7.0
v1.7.1
v1.8.0
v1.9.0

Database specific

vanir_signatures

[
    {
        "digest": {
            "length": 459.0,
            "function_hash": "125611634191808489381825496912512814864"
        },
        "id": "CVE-2025-26269-2b759343",
        "source": "https://github.com/dragonflydb/dragonfly/commit/4612aec9a78e3f604e6fb19bee51acde89723308",
        "signature_type": "Function",
        "target": {
            "file": "src/redis/lua/bit/bit.c",
            "function": "bit_tohex"
        },
        "signature_version": "v1",
        "deprecated": false
    },
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "314776429107067813439156101348949018206"
            ]
        },
        "id": "CVE-2025-26269-61535f10",
        "source": "https://github.com/dragonflydb/dragonfly/commit/4612aec9a78e3f604e6fb19bee51acde89723308",
        "signature_type": "Line",
        "target": {
            "file": "src/core/interpreter_test.cc"
        },
        "signature_version": "v1",
        "deprecated": false
    },
    {
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "81644248424810584190196126839978675504",
                "117675617312166902298717477480161915198",
                "329128182759651675646437850253582475501",
                "233827467916471191526971335225257705694"
            ]
        },
        "id": "CVE-2025-26269-a67f7b22",
        "source": "https://github.com/dragonflydb/dragonfly/commit/4612aec9a78e3f604e6fb19bee51acde89723308",
        "signature_type": "Line",
        "target": {
            "file": "src/redis/lua/bit/bit.c"
        },
        "signature_version": "v1",
        "deprecated": false
    }
]

source

"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-26269.json"