Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to client starvation and, ultimately, a denial of service. This vulnerability is fixed in 8.0.3, 7.4.5, 7.2.10, and 6.2.19.
{ "vanir_signatures": [ { "id": "CVE-2025-48367-397c9ea3", "digest": { "line_hashes": [ "98936157602691914216690546985369772120", "183733293261192172797368521731562795598", "172020968814055321842044683497390447458", "340217816218076505040900373037402792118" ], "threshold": 0.9 }, "source": "https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2", "target": { "file": "src/unix.c" }, "signature_version": "v1", "deprecated": false, "signature_type": "Line" }, { "id": "CVE-2025-48367-4ae9c739", "digest": { "length": 572.0, "function_hash": "25588904898412745021997180017669793625" }, "source": "https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2", "target": { "function": "connUnixAcceptHandler", "file": "src/unix.c" }, "signature_version": "v1", "deprecated": false, "signature_type": "Function" }, { "id": "CVE-2025-48367-6e7ba22e", "digest": { "line_hashes": [ "118497525202188729795289243995684389941", "297139365873333832823096195474994194716", "130294221691368039320907907956125193330", "340217816218076505040900373037402792118" ], "threshold": 0.9 }, "source": "https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2", "target": { "file": "src/tls.c" }, "signature_version": "v1", "deprecated": false, "signature_type": "Line" }, { "id": "CVE-2025-48367-70ece57b", "digest": { "line_hashes": [ "194353779569871489190513388971300796330", "64572138291643432520115137763751579546" ], "threshold": 0.9 }, "source": "https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2", "target": { "file": "src/anet.h" }, "signature_version": "v1", "deprecated": false, "signature_type": "Line" }, { "id": "CVE-2025-48367-98350588", "digest": { "length": 1234.0, "function_hash": "109122372632909548732783756535206333486" }, "source": "https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2", "target": { "function": "clusterAcceptHandler", "file": "src/cluster_legacy.c" }, "signature_version": "v1", "deprecated": false, "signature_type": "Function" }, { "id": "CVE-2025-48367-a16b8fd1", "digest": { "line_hashes": [ "118497525202188729795289243995684389941", "297139365873333832823096195474994194716", "130294221691368039320907907956125193330", "340217816218076505040900373037402792118" ], "threshold": 0.9 }, "source": "https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2", "target": { "file": "src/socket.c" }, "signature_version": "v1", "deprecated": false, "signature_type": "Line" }, { "id": "CVE-2025-48367-ad3ce5b7", "digest": { "length": 607.0, "function_hash": "206822357457243532625743742369653528667" }, "source": "https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2", "target": { "function": "tlsAcceptHandler", "file": "src/tls.c" }, "signature_version": "v1", "deprecated": false, "signature_type": "Function" }, { "id": "CVE-2025-48367-b33dbf1c", "digest": { "line_hashes": [ "55515391537997998906568047533448697424", "297139365873333832823096195474994194716", "251971537945772704860889030980600989516", "172545920549424859126988862928798573688" ], "threshold": 0.9 }, "source": "https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2", "target": { "file": "src/cluster_legacy.c" }, "signature_version": "v1", "deprecated": false, "signature_type": "Line" }, { "id": "CVE-2025-48367-d68a7061", "digest": { "length": 580.0, "function_hash": "327052520633560002766286879125101889945" }, "source": "https://github.com/redis/redis/commit/bde62951accfc4bb0a516276fd0b4b307e140ce2", "target": { "function": "connSocketAcceptHandler", "file": "src/socket.c" }, "signature_version": "v1", "deprecated": false, "signature_type": "Function" } ] }