Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-67733

Опубликовано: 23 фев. 2026
Источник: debian
EPSS Низкий

Описание

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
redisunfixedpackage
redictunfixedpackage
valkeyunfixedpackage

Примечания

  • https://github.com/valkey-io/valkey/security/advisories/GHSA-p876-p7q5-hv2m

  • Fixed by: https://github.com/valkey-io/valkey/commit/3d7598e8c7db4857a0e76582861dec14b555c343 (8.1.6)

EPSS

Процентиль: 5%
0.0002
Низкий

Связанные уязвимости

CVSS3: 8.5
ubuntu
около 1 месяца назад

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.

CVSS3: 7.1
redhat
около 1 месяца назад

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.

CVSS3: 8.5
nvd
около 1 месяца назад

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.

CVSS3: 8.5
msrc
около 1 месяца назад

Valkey Affected by RESP Protocol Injection via Lua error_reply

suse-cvrf
21 день назад

Security update for valkey

EPSS

Процентиль: 5%
0.0002
Низкий