Описание
Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valkey system does not properly reset the networking state after processing an empty request. A malicious actor can then send a request that the server incorrectly identifies as breaking server side invariants, which results in the server shutting down. Version 9.0.3 fixes the issue. As an additional mitigation, properly isolate Valkey deployments so that only trusted users have access.
A flaw was found in Valkey. A malicious actor with network access to Valkey can cause the system to shut down by sending a specially crafted request. This occurs because the system does not properly reset its networking state after processing an empty request, leading to an assertion failure. This vulnerability results in a Denial of Service (DoS), making the Valkey database unavailable.
Отчет
This is an IMPORTANT denial-of-service vulnerability in Valkey versions 9.0.0 through 9.0.2. A remote, unauthenticated attacker with network access to a Valkey instance can send a malformed request, causing the server to terminate due to an assertion failure. This issue arises from improper state handling after processing an empty request.
Меры по смягчению последствий
To mitigate this issue, restrict network access to Valkey deployments. Configure network firewalls or access control lists to ensure that only trusted users and systems can establish connections to the Valkey service. This will limit the exposure to malicious actors and prevent unauthorized denial of service attacks. Reloading network configurations or restarting firewall services may be required for changes to take effect.
Затронутые пакеты
| Платформа | Пакет | Состояние | Рекомендация | Релиз |
|---|---|---|---|---|
| Red Hat Enterprise Linux 10 | valkey | Affected | ||
| Red Hat Enterprise Linux 9 | valkey | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valkey system does not properly reset the networking state after processing an empty request. A malicious actor can then send a request that the server incorrectly identifies as breaking server side invariants, which results in the server shutting down. Version 9.0.3 fixes the issue. As an additional mitigation, properly isolate Valkey deployments so that only trusted users have access.
Valkey is a distributed key-value database. Starting in version 9.0.0 and prior to version 9.0.3, a malicious actor with network access to Valkey can cause the system to abort by triggering an assertion. When processing incoming requests, the Valkey system does not properly reset the networking state after processing an empty request. A malicious actor can then send a request that the server incorrectly identifies as breaking server side invariants, which results in the server shutting down. Version 9.0.3 fixes the issue. As an additional mitigation, properly isolate Valkey deployments so that only trusted users have access.
Valkey is a distributed key-value database. Starting in version 9.0.0 ...
EPSS
7.5 High
CVSS3