Логотип exploitDog
bind: "CVE-2025-21605"
Консоль
Логотип exploitDog

exploitDog

bind: "CVE-2025-21605"

Количество 19

Количество 19

ubuntu логотип

CVE-2025-21605

7 месяцев назад

Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore, the output buffer can grow unlimitedly over time. As a result, the service is exhausted and the memory is unavailable. When password authentication is enabled on the Redis server, but no password is provided, the client can still cause the output buffer to grow from "NOAUTH" responses until the system will run out of memory. This issue has been patched in version 7.4.3. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways. Either using network access control tools like...

CVSS3: 7.5
EPSS: Низкий
redhat логотип

CVE-2025-21605

7 месяцев назад

Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore, the output buffer can grow unlimitedly over time. As a result, the service is exhausted and the memory is unavailable. When password authentication is enabled on the Redis server, but no password is provided, the client can still cause the output buffer to grow from "NOAUTH" responses until the system will run out of memory. This issue has been patched in version 7.4.3. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways. Either using network access control tools like...

CVSS3: 7.5
EPSS: Низкий
nvd логотип

CVE-2025-21605

7 месяцев назад

Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore, the output buffer can grow unlimitedly over time. As a result, the service is exhausted and the memory is unavailable. When password authentication is enabled on the Redis server, but no password is provided, the client can still cause the output buffer to grow from "NOAUTH" responses until the system will run out of memory. This issue has been patched in version 7.4.3. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways. Either using network access control tools like fi

CVSS3: 7.5
EPSS: Низкий
msrc логотип

CVE-2025-21605

6 месяцев назад

Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client

CVSS3: 7.5
EPSS: Низкий
debian логотип

CVE-2025-21605

7 месяцев назад

Redis is an open source, in-memory database that persists on disk. In ...

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1566-1

6 месяцев назад

Security update for valkey

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1433-1

6 месяцев назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1432-1

6 месяцев назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1420-1

6 месяцев назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:1419-1

6 месяцев назад

Security update for redis

EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:02010-1

5 месяцев назад

Security update for redis

EPSS: Низкий
redos логотип

ROS-20250505-11

6 месяцев назад

Уязвимость redis

CVSS3: 7.5
EPSS: Низкий
rocky логотип

RLSA-2025:7509

около 1 месяца назад

Important: valkey security update

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7686

6 месяцев назад

ELSA-2025-7686: redis:6 security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7509

4 месяца назад

ELSA-2025-7509: valkey security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7438

6 месяцев назад

ELSA-2025-7438: redis security update (IMPORTANT)

EPSS: Низкий
oracle-oval логотип

ELSA-2025-7429

6 месяцев назад

ELSA-2025-7429: redis:7 security update (IMPORTANT)

EPSS: Низкий
fstec логотип

BDU:2025-05997

7 месяцев назад

Уязвимость сервера системы управления базами данных (СУБД) Redis, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
EPSS: Низкий
suse-cvrf логотип

SUSE-SU-2025:01942-1

5 месяцев назад

Security update for valkey

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2025-21605

Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore, the output buffer can grow unlimitedly over time. As a result, the service is exhausted and the memory is unavailable. When password authentication is enabled on the Redis server, but no password is provided, the client can still cause the output buffer to grow from "NOAUTH" responses until the system will run out of memory. This issue has been patched in version 7.4.3. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways. Either using network access control tools like...

CVSS3: 7.5
0%
Низкий
7 месяцев назад
redhat логотип
CVE-2025-21605

Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore, the output buffer can grow unlimitedly over time. As a result, the service is exhausted and the memory is unavailable. When password authentication is enabled on the Redis server, but no password is provided, the client can still cause the output buffer to grow from "NOAUTH" responses until the system will run out of memory. This issue has been patched in version 7.4.3. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways. Either using network access control tools like...

CVSS3: 7.5
0%
Низкий
7 месяцев назад
nvd логотип
CVE-2025-21605

Redis is an open source, in-memory database that persists on disk. In versions starting at 2.6 and prior to 7.4.3, An unauthenticated client can cause unlimited growth of output buffers, until the server runs out of memory or is killed. By default, the Redis configuration does not limit the output buffer of normal clients (see client-output-buffer-limit). Therefore, the output buffer can grow unlimitedly over time. As a result, the service is exhausted and the memory is unavailable. When password authentication is enabled on the Redis server, but no password is provided, the client can still cause the output buffer to grow from "NOAUTH" responses until the system will run out of memory. This issue has been patched in version 7.4.3. An additional workaround to mitigate this problem without patching the redis-server executable is to block access to prevent unauthenticated users from connecting to Redis. This can be done in different ways. Either using network access control tools like fi

CVSS3: 7.5
0%
Низкий
7 месяцев назад
msrc логотип
CVE-2025-21605

Redis DoS Vulnerability due to unlimited growth of output buffers abused by unauthenticated client

CVSS3: 7.5
0%
Низкий
6 месяцев назад
debian логотип
CVE-2025-21605

Redis is an open source, in-memory database that persists on disk. In ...

CVSS3: 7.5
0%
Низкий
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1566-1

Security update for valkey

0%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1433-1

Security update for redis

0%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1432-1

Security update for redis

0%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1420-1

Security update for redis

0%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:1419-1

Security update for redis

0%
Низкий
6 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:02010-1

Security update for redis

0%
Низкий
5 месяцев назад
redos логотип
ROS-20250505-11

Уязвимость redis

CVSS3: 7.5
0%
Низкий
6 месяцев назад
rocky логотип
RLSA-2025:7509

Important: valkey security update

0%
Низкий
около 1 месяца назад
oracle-oval логотип
ELSA-2025-7686

ELSA-2025-7686: redis:6 security update (IMPORTANT)

6 месяцев назад
oracle-oval логотип
ELSA-2025-7509

ELSA-2025-7509: valkey security update (IMPORTANT)

4 месяца назад
oracle-oval логотип
ELSA-2025-7438

ELSA-2025-7438: redis security update (IMPORTANT)

6 месяцев назад
oracle-oval логотип
ELSA-2025-7429

ELSA-2025-7429: redis:7 security update (IMPORTANT)

6 месяцев назад
fstec логотип
BDU:2025-05997

Уязвимость сервера системы управления базами данных (СУБД) Redis, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 7.5
0%
Низкий
7 месяцев назад
suse-cvrf логотип
SUSE-SU-2025:01942-1

Security update for valkey

5 месяцев назад

Уязвимостей на страницу