USN-8106-1

Source
https://ubuntu.com/security/notices/USN-8106-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8106-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-8106-1
Upstream
Related
Published
2026-03-18T13:31:29Z
Modified
2026-03-19T08:44:02.031261Z
Summary
valkey vulnerabilities
Details

It was discovered that Valkey incorrectly handled errors for lua scripts. An attacker could possibly use this issue to inject arbitrary information into the response stream for other clients. (CVE-2025-67733)

It was discovered that Valkey incorrectly handled malformed cluster bus messages. A remote attacker could possibly use this issue to cause Valkey to crash, resulting in a denial of service. (CVE-2026-21863)

References

Affected packages

Ubuntu:24.04:LTS / valkey

Package

Name
valkey
Purl
pkg:deb/ubuntu/valkey@7.2.12+dfsg1-0ubuntu0.1?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
7.2.12+dfsg1-0ubuntu0.1

Affected versions

7.*
7.2.5+dfsg1-2ubuntu4~24.04.1
7.2.7+dfsg1-0ubuntu0.24.04.1
7.2.8+dfsg1-0ubuntu0.24.04.1
7.2.8+dfsg1-0ubuntu0.24.04.2
7.2.8+dfsg1-0ubuntu0.24.04.3
7.2.10+dfsg1-0ubuntu0.1
7.2.11+dfsg1-0ubuntu0.1
7.2.11+dfsg1-0ubuntu0.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "valkey-redis-compat",
            "binary_version": "7.2.12+dfsg1-0ubuntu0.1"
        },
        {
            "binary_name": "valkey-sentinel",
            "binary_version": "7.2.12+dfsg1-0ubuntu0.1"
        },
        {
            "binary_name": "valkey-server",
            "binary_version": "7.2.12+dfsg1-0ubuntu0.1"
        },
        {
            "binary_name": "valkey-tools",
            "binary_version": "7.2.12+dfsg1-0ubuntu0.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-67733"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2026-21863"
        }
    ],
    "ecosystem": "Ubuntu:24.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8106-1.json"

Ubuntu:25.10 / valkey

Package

Name
valkey
Purl
pkg:deb/ubuntu/valkey@8.1.6+dfsg1-0ubuntu0.1?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.1.6+dfsg1-0ubuntu0.1

Affected versions

8.*
8.0.2+dfsg1-1ubuntu1
8.1.1+dfsg1-2ubuntu1
8.1.3+dfsg1-0ubuntu1
8.1.3+dfsg1-0ubuntu2
8.1.4+dfsg1-0ubuntu0.1
8.1.4+dfsg1-0ubuntu0.2

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "valkey-sentinel",
            "binary_version": "8.1.6+dfsg1-0ubuntu0.1"
        },
        {
            "binary_name": "valkey-server",
            "binary_version": "8.1.6+dfsg1-0ubuntu0.1"
        },
        {
            "binary_name": "valkey-tools",
            "binary_version": "8.1.6+dfsg1-0ubuntu0.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H"
                },
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2025-67733"
        },
        {
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2026-21863"
        }
    ],
    "ecosystem": "Ubuntu:25.10"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-8106-1.json"