Additionally, https://ubuntu.com/security/CVE-2025-32023 mentions valkey needs 
evaluation for noble.
I tested valkey 
```
ubuntu@valkey:~$ /usr/bin/valkey-server --version
Server v=7.2.11 sha=00000000:0 malloc=jemalloc-5.3.0 bits=64 
build=4db28f08fd498d66
ubuntu@valkey:~$ sha256sum /usr/bin/valkey-server 
29d776e69fcd5c1beba27a8c23fae2e6f3c4b14d8b9019facbbae80f550280c2  
/usr/bin/valkey-server
ubuntu@valkey:~$ 
``

Not Vulnerable

```
ubuntu@valkey:~$ python3 twd425_poc.py 
Normal merge should work
Normal merge is good
trigger crash
pfmerge failed - as expected with bad input.
It didn't crash. Patched!
```

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/2141721

Title:
  CVE-2025-32023: Redis allows out of bounds writes in hyperloglog
  commands leading to RCE

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/redis/+bug/2141721/+subscriptions


-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to