vulnerability

FreeBSD: VID-af8d043f-20df-11f0-b9c5-000c295725e4 (CVE-2025-21605): redis,valkey -- DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
Apr 24, 2025
Added
Apr 25, 2025
Modified
Mar 25, 2026

Description

Axel Mierczuk reports: By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore, the output buffer can grow unlimitedly over time. As a result, the service is exhausted and the memory is unavailable. When password authentication is enabled on the Redis server, but no password is provided, the client can still cause the output buffer to grow from "NOAUTH" responses until the system will run out of memory.

Solutions

freebsd-upgrade-package-redisfreebsd-upgrade-package-redis72freebsd-upgrade-package-redis62freebsd-upgrade-package-valkey
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.