Additionally, https://ubuntu.com/security/CVE-2025-32023 mentions valkey needs evaluation for noble. I tested valkey ``` ubuntu@valkey:~$ /usr/bin/valkey-server --version Server v=7.2.11 sha=00000000:0 malloc=jemalloc-5.3.0 bits=64 build=4db28f08fd498d66 ubuntu@valkey:~$ sha256sum /usr/bin/valkey-server 29d776e69fcd5c1beba27a8c23fae2e6f3c4b14d8b9019facbbae80f550280c2 /usr/bin/valkey-server ubuntu@valkey:~$ ``
Not Vulnerable ``` ubuntu@valkey:~$ python3 twd425_poc.py Normal merge should work Normal merge is good trigger crash pfmerge failed - as expected with bad input. It didn't crash. Patched! ``` -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2141721 Title: CVE-2025-32023: Redis allows out of bounds writes in hyperloglog commands leading to RCE To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/redis/+bug/2141721/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
