git: 86c0781ad496 - main - security/vuxml: Document DoS vulnerability in redis and valkey
- Go to: [ bottom of page ] [ top of archives ] [ this month ]
Date: Thu, 24 Apr 2025 08:22:08 UTC
The branch main has been updated by yasu:
URL: https://cgit.FreeBSD.org/ports/commit/?id=86c0781ad496e7ce78443a61d0098236efe06142
commit 86c0781ad496e7ce78443a61d0098236efe06142
Author: Yasuhiro Kimura <yasu@FreeBSD.org>
AuthorDate: 2025-04-24 07:56:02 +0000
Commit: Yasuhiro Kimura <yasu@FreeBSD.org>
CommitDate: 2025-04-24 08:20:30 +0000
security/vuxml: Document DoS vulnerability in redis and valkey
---
security/vuxml/vuln/2025.xml | 50 ++++++++++++++++++++++++++++++++++++++++++++
1 file changed, 50 insertions(+)
diff --git a/security/vuxml/vuln/2025.xml b/security/vuxml/vuln/2025.xml
index 5455c89cedde..caaa12fbe26c 100644
--- a/security/vuxml/vuln/2025.xml
+++ b/security/vuxml/vuln/2025.xml
@@ -1,3 +1,53 @@
+ <vuln vid="af8d043f-20df-11f0-b9c5-000c295725e4">
+ <topic>redis,valkey -- DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client</topic>
+ <affects>
+ <package>
+ <name>redis</name>
+ <range><lt>7.4.3</lt></range>
+ </package>
+ <package>
+ <name>redis72</name>
+ <range><lt>7.2,8</lt></range>
+ </package>
+ <package>
+ <name>redis62</name>
+ <range><lt>6.2.18</lt></range>
+ </package>
+ <package>
+ <name>valkey</name>
+ <range><lt>8.1.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Axel Mierczuk reports:</p>
+ <blockquote cite="https://github.com/redis/redis/security/advisories/GHSA-r67f-p999-2gff">
+ <p>
+ By default, the Redis configuration does not limit the
+ output buffer of normal clients (see
+ client-output-buffer-limit). Therefore, the output buffer
+ can grow unlimitedly over time. As a result, the service
+ is exhausted and the memory is unavailable.
+ </p>
+ <p>
+ When password authentication is enabled on the Redis
+ server, but no password is provided, the client can still
+ cause the output buffer to grow from "NOAUTH" responses
+ until the system will run out of memory.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2025-21605</cvename>
+ <url>https://github.com/redis/redis/security/advisories/GHSA-r67f-p999-2gff</url>
+ </references>
+ <dates>
+ <discovery>2025-04-23</discovery>
+ <entry>2025-04-24</entry>
+ </dates>
+ </vuln>
+
<vuln vid="11b71871-20ba-11f0-9471-2cf05da270f3">
<topic>Gitlab -- Vulnerabilities</topic>
<affects>