vulnerability
Rocky Linux: CVE-2025-46817: valkey (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:M/Au:S/C:C/I:C/A:C) | Nov 25, 2025 | Feb 5, 2026 | Feb 5, 2026 |
Description
Valkey is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Valkey works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Valkey also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Valkey behave like a cache. You can use Valkey from most programming languages also.
Solutions
References
- CVE-2025-46817
- https://attackerkb.com/topics/CVE-2025-46817
- CWE-190
- URL-https://errata.rockylinux.org/RLSA-2025:19237
- URL-https://errata.rockylinux.org/RLSA-2025:19238
- URL-https://errata.rockylinux.org/RLSA-2025:19345
- URL-https://errata.rockylinux.org/RLSA-2025:19675
- URL-https://errata.rockylinux.org/RLSA-2025:20926
- URL-https://errata.rockylinux.org/RLSA-2025:20955
- URL-https://errata.rockylinux.org/RLSA-2025:21916
- URL-https://errata.rockylinux.org/RLSA-2025:21936
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.