Impact
A malformed message sent to the Valkey clusterbus can trigger an out of bounds read, potentially disrupting the server and causing a system crash. This vulnerability allows an attacker with access to the clusterbus port to send crafted packets that the server processes without proper bounds checking, leading to remote denial of service.
Affected Systems
The issue affects Valkey versions prior to 9.0.2, 8.1.6, 8.0.7, and 7.2.12. The vulnerable component is the clusterbus packet processing code in the distributed key‑value database developed by Valkey.io.
Risk and Exploitability
The CVSS score is 7.5, indicating a high severity. The EPSS score is less than 1%, implying a very low probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Attackers who can reach the clusterbus port—either locally or over an exposed network—might send a malicious packet to induce a crash, though no public exploitation code is reported.
OpenCVE Enrichment
Debian DSA
Ubuntu USN