First published: Wed Mar 19 2025(Updated: )
It was discovered that Valkey did not properly handle memory cleanup. An attacker could possibly use this issue to execute arbitrary code. (CVE-2024-46981) It was discovered that Valkey did not properly handle resource access permissions. An authenticated attacker could possibly use this issue to cause a denial of service. (CVE-2024-51741)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/valkey-redis-compat | <7.2.8+dfsg1-0ubuntu0.24.10.2 | 7.2.8+dfsg1-0ubuntu0.24.10.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/valkey-sentinel | <7.2.8+dfsg1-0ubuntu0.24.10.2 | 7.2.8+dfsg1-0ubuntu0.24.10.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/valkey-server | <7.2.8+dfsg1-0ubuntu0.24.10.2 | 7.2.8+dfsg1-0ubuntu0.24.10.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/valkey-tools | <7.2.8+dfsg1-0ubuntu0.24.10.2 | 7.2.8+dfsg1-0ubuntu0.24.10.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/valkey-redis-compat | <7.2.8+dfsg1-0ubuntu0.24.04.2 | 7.2.8+dfsg1-0ubuntu0.24.04.2 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/valkey-sentinel | <7.2.8+dfsg1-0ubuntu0.24.04.2 | 7.2.8+dfsg1-0ubuntu0.24.04.2 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/valkey-server | <7.2.8+dfsg1-0ubuntu0.24.04.2 | 7.2.8+dfsg1-0ubuntu0.24.04.2 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/valkey-tools | <7.2.8+dfsg1-0ubuntu0.24.04.2 | 7.2.8+dfsg1-0ubuntu0.24.04.2 |
Ubuntu | =24.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability USN-7359-1 may allow an attacker to execute arbitrary code due to improper memory cleanup and resource access handling.
To fix the vulnerability USN-7359-1, upgrade to the updated package version 7.2.8+dfsg1-0ubuntu0.24.10.2 or 7.2.8+dfsg1-0ubuntu0.24.04.2 depending on your Ubuntu release.
Users running affected packages like valkey-redis-compat, valkey-sentinel, valkey-server, or valkey-tools on Ubuntu 24.10 or 24.04 are at risk due to USN-7359-1.
An authenticated attacker can exploit USN-7359-1 to gain unauthorized access or perform unauthorized actions due to improper handling of resource access permissions.
It is recommended to apply the security update for USN-7359-1 immediately to mitigate any potential exploitation of the vulnerability.