Source: valkey
Version: 8.1.4+dfsg1-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for valkey.

CVE-2025-67733[0]:
| Valkey is a distributed key-value database. Prior to versions 9.0.2,
| 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting
| commands to inject arbitrary information into the response stream
| for the given client, potentially corrupting or returning tampered
| data to other users on the same connection. The error handling code
| for lua scripts does not properly handle null characters. Versions
| 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.


CVE-2026-21863[1]:
| Valkey is a distributed key-value database. Prior to versions 9.0.2,
| 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the
| Valkey clusterbus port can send an invalid packet that may cause an
| out bound read, which might result in the system crashing. The
| Valkey clusterbus packet processing code does not validate that a
| clusterbus ping extension packet is located within buffer of the
| clusterbus packet before attempting to read it. Versions 9.0.2,
| 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation,
| don't expose the cluster bus connection directly to end users, and
| protect the connection with its own network ACLs.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-67733
    https://www.cve.org/CVERecord?id=CVE-2025-67733
[1] https://security-tracker.debian.org/tracker/CVE-2026-21863
    https://www.cve.org/CVERecord?id=CVE-2026-21863

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to