Package "valkey"
WARNING: the "valkey" package was deleted from this repository
| Name: |
valkey
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Conversion script and compatibility symlinks for Redis
- Persistent key-value database with network interface (monitoring)
- Persistent key-value database with network interface
- Persistent key-value database with network interface (client)
|
| Latest version: |
*DELETED* |
| Release: |
noble (24.04) |
| Level: |
proposed |
| Repository: |
universe |
Links
Other versions of "valkey" in Noble
Packages in group
Deleted packages are displayed in grey.
Changelog
|
valkey (7.2.12+dfsg1-0ubuntu0.1) noble; urgency=medium
* New upstream version 7.2.12 (LP: #2142590)
- Security fixes:
+ CVE-2025-67733: RESP Protocol Injection via Lua error_reply.
+ CVE-2026-21863: Remote DoS with malformed Valkey Cluster bus message.
- Bug fixes:
+ Fix ltrim should not call signalModifiedKey when no elements are
removed.
+ Fix potential infinite loop in clusterNodeGetMaster.
+ Avoids crash during MODULE UNLOAD when ACL rules reference a module
command and subcommand.
-- Lena Voytek <email address hidden> Tue, 24 Feb 2026 09:01:01 -0500
|
| 2142590 |
Update Valkey to 7.2.12 in noble, 8.1.6 in questing, and 9.0.3 in resolute |
| CVE-2025-67733 |
Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject |
| CVE-2026-21863 |
Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus |
|
|
valkey (7.2.11+dfsg1-0ubuntu0.1) noble; urgency=medium
* New upstream version 7.2.11 (LP: #2127122)
- Security fixes:
+ CVE-2025-49844: Lua script may lead to remote code execution.
+ CVE-2025-46817: Lua script may lead to int overflow and potential RCE.
+ CVE-2025-46818: Lua script can be executed in context of another user.
+ CVE-2025-46819: LUA out-of-bound read.
+ CVE-2025-49112: Integer underflow in setDeferredReply networking.c.
- Bug fixes:
+ Ensure empty error tables in scripts don't crash Valkey.
+ Fix client tracking memory overhead calculation.
+ Fix assumptions that pthread functions set errno.
* d/rules: Increase test timeout during build.
-- Lena Voytek <email address hidden> Sat, 11 Oct 2025 23:49:31 -0400
|
| 2127122 |
Update Valkey to 7.2.11 in noble, 8.0.6 in plucky, and 8.1.4 in questing + resolute |
| CVE-2025-49844 |
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lu |
| CVE-2025-46817 |
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lu |
| CVE-2025-46818 |
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lu |
| CVE-2025-46819 |
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LU |
| CVE-2025-49112 |
setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used. |
|
About
-
Send Feedback to @ubuntu_updates