Логотип exploitDog
bind:"CVE-2026-21863"
Консоль
Логотип exploitDog

exploitDog

bind:"CVE-2026-21863"

Количество 11

Количество 11

ubuntu логотип

CVE-2026-21863

около 1 месяца назад

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the clusterbus packet before attempting to read it. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation, don't expose the cluster bus connection directly to end users, and protect the connection with its own network ACLs.

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2026-21863

около 1 месяца назад

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the clusterbus packet before attempting to read it. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation, don't expose the cluster bus connection directly to end users, and protect the connection with its own network ACLs.

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2026-21863

около 1 месяца назад

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the clusterbus packet before attempting to read it. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation, don't expose the cluster bus connection directly to end users, and protect the connection with its own network ACLs.

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2026-21863

около 1 месяца назад

Malformed Valkey Cluster bus message can lead to Remote DoS

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2026-21863

около 1 месяца назад

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8 ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0848-1

20 дней назад

Security update for valkey

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2026:0685-1

29 дней назад

Security update for valkey

EPSS: Низкий
rocky логотип

RLSA-2026:3507

23 дня назад

Important: valkey security update

EPSS: Низкий
rocky логотип

RLSA-2026:3443

28 дней назад

Important: valkey security update

EPSS: Низкий
oracle-oval логотип

ELSA-2026-3507

26 дней назад

ELSA-2026-3507: valkey security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2026-3443

около 1 месяца назад

ELSA-2026-3443: valkey security update (IMPORTANT)

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2026-21863

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the clusterbus packet before attempting to read it. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation, don't expose the cluster bus connection directly to end users, and protect the connection with its own network ACLs.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
redhat логотип
CVE-2026-21863

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the clusterbus packet before attempting to read it. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation, don't expose the cluster bus connection directly to end users, and protect the connection with its own network ACLs.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
nvd логотип
CVE-2026-21863

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the clusterbus packet before attempting to read it. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation, don't expose the cluster bus connection directly to end users, and protect the connection with its own network ACLs.

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
msrc логотип
CVE-2026-21863

Malformed Valkey Cluster bus message can lead to Remote DoS

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
debian логотип
CVE-2026-21863

Valkey is a distributed key-value database. Prior to versions 9.0.2, 8 ...

CVSS3: 7.5
0%
Низкий
около 1 месяца назад
suse-cvrf логотип
SUSE-SU-2026:0848-1

Security update for valkey

20 дней назад
suse-cvrf логотип
SUSE-SU-2026:0685-1

Security update for valkey

29 дней назад
rocky логотип
RLSA-2026:3507

Important: valkey security update

23 дня назад
rocky логотип
RLSA-2026:3443

Important: valkey security update

28 дней назад
oracle-oval логотип
ELSA-2026-3507

ELSA-2026-3507: valkey security update (IMPORTANT)

26 дней назад
oracle-oval логотип
ELSA-2026-3443

ELSA-2026-3443: valkey security update (IMPORTANT)

около 1 месяца назад

Уязвимостей на страницу