CVE-2025-21605

NameCVE-2025-21605
DescriptionRedis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore, the output buffer can grow unlimitedly over time. As a result, the service is exhausted and the memory is unavailable. When password authentication is enabled on the Redis server, but no password is provided, the client can still cause the output buffer to grow from "NOAUTH" responses until the system will run out of memory. This issue has been patched in version 7.4.3. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways. Either using network access control tools like firewalls, iptables, security groups, etc, or enabling TLS and requiring users to authenticate using client side certificates.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1104010, 1104011, 1104012

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
redict (PTS)sid, trixie7.3.2+ds-1vulnerable
redis (PTS)bullseye5:6.0.16-1+deb11u2vulnerable
bullseye (security)5:6.0.16-1+deb11u5vulnerable
bookworm, bookworm (security)5:7.0.15-1~deb12u3vulnerable
sid, trixie5:7.0.15-3vulnerable
valkey (PTS)sid, trixie8.0.2+dfsg1-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
redictsource(unstable)(unfixed)1104011
redissource(unstable)(unfixed)1104010
valkeysource(unstable)(unfixed)1104012

Notes

https://github.com/redis/redis/security/advisories/GHSA-r67f-p999-2gff
https://github.com/valkey-io/valkey/pull/1994
Fixed by: https://github.com/valkey-io/valkey/commit/fff628e0f52df0c59eb8543e96de9ef27fa9c2fc (8.1.1)

Search for package or bug name: Reporting problems