valkey-8.0.7-1.el9_7

エラータID: AXSA:2026-259:02

リリース日: 
2026/03/05 Thursday - 18:42
題名: 
valkey-8.0.7-1.el9_7
影響のあるチャネル: 
MIRACLE LINUX 9 for x86_64
Severity: 
High
Description: 

Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.

Security Fix(es):

* Valkey: Valkey: Data tampering and denial of service via improper null character handling in Lua scripts (CVE-2025-67733)
* valkey: Valkey: Denial of Service via invalid clusterbus packet (CVE-2026-21863)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

CVE-2025-67733
Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.
CVE-2026-21863
Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the clusterbus packet before attempting to read it. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation, don't expose the cluster bus connection directly to end users, and protect the connection with its own network ACLs.

解決策: 

Update packages.

追加情報: 

N/A

ダウンロード: 

SRPMS
  1. valkey-8.0.7-1.el9_7.src.rpm
    MD5: ae0b63aac27f3e0d48cd12252a7274df
    SHA-256: 0a38157a3db2da79f388166a049f48c028aee9be45d5baf7de0cecf482212f66
    Size: 3.50 MB

Asianux Server 9 for x86_64
  1. valkey-8.0.7-1.el9_7.x86_64.rpm
    MD5: 1f32cd2633404177687ed46916cc6d38
    SHA-256: bfd793fd00db6e6c2c972b743d71f4f99fa86e6341d4c33b135490b9d11451da
    Size: 1.60 MB
  2. valkey-devel-8.0.7-1.el9_7.x86_64.rpm
    MD5: 5b07764fd00e144d559d520c7bb5867b
    SHA-256: ecb2652187aa9acd381f8cd37f5a9ca0fb31509ae136e0ea62e3642f8337e553
    Size: 26.20 kB