Package "valkey"
| Name: |
valkey
|
Description: |
This package is just an umbrella for a group of other packages,
it has no description. Description samples from packages in group:
- Conversion script and compatibility symlinks for Redis
- Persistent key-value database with network interface (monitoring)
- Persistent key-value database with network interface
- Persistent key-value database with network interface (client)
|
| Latest version: |
7.2.11+dfsg1-0ubuntu0.1 |
| Release: |
noble (24.04) |
| Level: |
updates |
| Repository: |
universe |
Links
Other versions of "valkey" in Noble
Packages in group
Deleted packages are displayed in grey.
Changelog
|
valkey (7.2.11+dfsg1-0ubuntu0.1) noble; urgency=medium
* New upstream version 7.2.11 (LP: #2127122)
- Security fixes:
+ CVE-2025-49844: Lua script may lead to remote code execution.
+ CVE-2025-46817: Lua script may lead to int overflow and potential RCE.
+ CVE-2025-46818: Lua script can be executed in context of another user.
+ CVE-2025-46819: LUA out-of-bound read.
+ CVE-2025-49112: Integer underflow in setDeferredReply networking.c.
- Bug fixes:
+ Ensure empty error tables in scripts don't crash Valkey.
+ Fix client tracking memory overhead calculation.
+ Fix assumptions that pthread functions set errno.
* d/rules: Increase test timeout during build.
-- Lena Voytek <email address hidden> Sat, 11 Oct 2025 23:49:31 -0400
|
| Source diff to previous version |
| 2127122 |
Update Valkey to 7.2.11 in noble, 8.0.6 in plucky, and 8.1.4 in questing + resolute |
| CVE-2025-49844 |
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lu |
| CVE-2025-46817 |
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lu |
| CVE-2025-46818 |
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lu |
| CVE-2025-46819 |
Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LU |
| CVE-2025-49112 |
setDeferredReply in networking.c in Valkey through 8.1.1 has an integer underflow for prev->size - prev->used. |
|
|
valkey (7.2.10+dfsg1-0ubuntu0.1) noble; urgency=medium
* New upstream version 7.2.10 (LP: #2115258)
- Security fixes:
+ CVE-2025-21605: Allocation of Resources Without Limits or Throttling.
+ CVE-2025-32023: Out-of-bounds write during hyperloglog operations.
+ CVE-2025-48367: IP Protocol errors resulting in DoS.
+ CVE-2025-27151: AOF file name length not checked.
- Bug fixes:
+ Only mark the client reprocessing flag when unblocked on keys.
+ Free module context even if there was no content written in auxsave2.
+ Fix Detect SSL_new() returning NULL in outgoing connections.
+ Correctly cast the extension lengths.
+ Fix cluster myself CLUSTER SLOTS/NODES wrong port after updating
port/tls-port.
+ Fix replica can't finish failover when config epoch is outdated.
+ Fix CLIENT UNBLOCK ability to unpause paused clients.
+ Fix defrag crash when using FLUSHDB ASYNC in cluster mode.
+ Fix memory leak in forgotten node ping ext code path.
+ Fix module LatencyAddSample still work when latency-monitor-threshold
is 0.
+ Fix raxRemove crash at memcpy() due to key size exceeds max Rax size.
+ Fix error "SSL routines::bad length" when connTLSWrite is called second
time with smaller buffer.
+ Fix RANDOMKEY infinite loop during CLIENT PAUSE.
+ Fix adding samples to stream object consumer trees.
+ Fix panic in primary when blocking shutdown after previous block with
timeout.
+ Fix incorrect lag reported in XINFO GROUPS.
-- Lena Voytek <email address hidden> Tue, 24 Jun 2025 15:08:25 -0400
|
| Source diff to previous version |
| 2115258 |
Update Valkey to 7.2.10 in noble, 8.0.4 in plucky, and 8.1.3 in questing |
| CVE-2025-21605 |
Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can caus |
| CVE-2025-32023 |
Redis is an open source, in-memory database that persists on disk. From 2.8 to before 8.0.3, 7.4.5, 7.2.10, and 6.2.19, an authenticated user may use |
| CVE-2025-48367 |
Redis is an open source, in-memory database that persists on disk. An unauthenticated connection can cause repeated IP protocol errors, leading to cl |
| CVE-2025-27151 |
Redis is an open source, in-memory database that persists on disk. In versions starting from 7.0.0 to before 8.0.2, a stack-based buffer overflow exi |
|
|
valkey (7.2.8+dfsg1-0ubuntu0.24.04.3) noble; urgency=medium
* d/valkey-redis-compat.postinst: Do not migrate on upgrade if redis files
have already been migrated (LP: #2104217).
-- Lena Voytek <email address hidden> Wed, 18 Jun 2025 16:58:33 -0400
|
| Source diff to previous version |
| 2104217 |
Package upgrade reinstalls /etc/valkey/REDIS_MIGRATION |
|
|
valkey (7.2.8+dfsg1-0ubuntu0.24.04.2) noble-security; urgency=medium
* No-change rebuild in the ~security pocket
-- Julia Sarris <email address hidden> Mon, 03 Mar 2025 10:25:22 -0500
|
| Source diff to previous version |
|
valkey (7.2.8+dfsg1-0ubuntu0.24.04.1) noble; urgency=medium
* New upstream version 7.2.8 (LP: #2097546)
- Security fixes:
+ CVE-2024-46981: Lua script commands may lead to remote code
execution.
+ CVE-2024-51741: Denial-of-service due to malformed ACL
selectors.
- Bug fixes:
+ Fix extra memory use when storing strings in inline protocol.
+ Fix error message when FUNCTION KILL is used on a script.
+ Fix last accessed time update using TOUCH with CLIENT NO-TOUCH
option.
-- Lena Voytek <email address hidden> Thu, 06 Feb 2025 08:58:24 -0500
|
| 2097546 |
Update Valkey to 7.2.8 in noble and oracular |
| CVE-2024-46981 |
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to manipulate the gar |
| CVE-2024-51741 |
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector wh |
|
About
-
Send Feedback to @ubuntu_updates