DragonflyDB Dragonfly through 1.28.2 (fixed in 1.29.0) allows authenticated users to cause a denial of service (daemon crash) via a Lua library command that references a large negative integer.
[
{
"digest": {
"length": 459.0,
"function_hash": "125611634191808489381825496912512814864"
},
"id": "CVE-2025-26269-2b759343",
"source": "https://github.com/dragonflydb/dragonfly/commit/4612aec9a78e3f604e6fb19bee51acde89723308",
"signature_type": "Function",
"target": {
"file": "src/redis/lua/bit/bit.c",
"function": "bit_tohex"
},
"signature_version": "v1",
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"314776429107067813439156101348949018206"
]
},
"id": "CVE-2025-26269-61535f10",
"source": "https://github.com/dragonflydb/dragonfly/commit/4612aec9a78e3f604e6fb19bee51acde89723308",
"signature_type": "Line",
"target": {
"file": "src/core/interpreter_test.cc"
},
"signature_version": "v1",
"deprecated": false
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"81644248424810584190196126839978675504",
"117675617312166902298717477480161915198",
"329128182759651675646437850253582475501",
"233827467916471191526971335225257705694"
]
},
"id": "CVE-2025-26269-a67f7b22",
"source": "https://github.com/dragonflydb/dragonfly/commit/4612aec9a78e3f604e6fb19bee51acde89723308",
"signature_type": "Line",
"target": {
"file": "src/redis/lua/bit/bit.c"
},
"signature_version": "v1",
"deprecated": false
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-26269.json"