FERRAMENTAS LINUX: Critical Valkey Security Update: Patch CVE-2025-21605, CVE-2025-27151, and CVE-2025-49112 Immediately

domingo, 15 de junho de 2025

Critical Valkey Security Update: Patch CVE-2025-21605, CVE-2025-27151, and CVE-2025-49112 Immediately

 

SUSE

Urgent Valkey security patch fixes 3 critical vulnerabilities (CVE-2025-21605 CVSS 8.7, CVE-2025-27151, CVE-2025-49112) affecting SUSE Linux Enterprise 15 SP7. Learn how to mitigate denial-of-service risks, stack overflows, and integer underflows in Redis-compatible databases

Why This Valkey Update is Critical for Enterprise Security

SUSE has released an "important" rated security update addressing three vulnerabilities in Valkey (Redis-compatible database), including:

  • CVE-2025-21605 (CVSS 8.7): Output buffer denial-of-service (DoS) attack vector

  • CVE-2025-27151 (CVSS 5.3): Stack overflow via unchecked filename size

  • CVE-2025-49112 (CVSS 3.1): Integer underflow in setDeferredReply

Affected SUSE Products:

  • SUSE Linux Enterprise Server 15 SP7

  • SUSE Linux Enterprise Real Time 15 SP7

  • SUSE Linux Enterprise Server for SAP Applications 15 SP7

Without this patch, attackers could:
✔ Crash Valkey instances (DoS) via malicious network traffic
✔ Execute arbitrary code through stack overflow exploits
✔ Trigger memory corruption via integer underflow


Step-by-Step Patch Instructions

Method 1: Command-Line Update (Recommended for Enterprise)

bash
Copy
Download
# For Server Applications Module 15-SP7:
sudo zypper in -t patch SUSE-SLE-Module-Server-Applications-15-SP7-2025-1942=1

Method 2: YaST GUI Update

  1. Open YaST Control Center → Software Management

  2. Search for patch ID SUSE-SU-2025:01942-1

  3. Select all Valkey-related packages and confirm installation


Vulnerability Breakdown & Risk Mitigation

CVE IDCVSS v4.0ImpactExploitability
CVE-2025-216058.7 (Critical)Service disruption via buffer floodRemote, no auth (PR:N)
CVE-2025-271515.3 (Medium)Local code executionLow-privilege user (PR:L)
CVE-2025-491123.1 (Low)Memory corruptionAdjacent network (AV:A)

Proactive Security Measures:

  1. Immediate Patching: Deploy updates within 24 hours for production systems.

  2. Network Hardening: Restrict Valkey port (6379) to trusted IPs only.

  3. Monitoring: Alert on abnormal memory usage (>90% of maxmemory).


Affected Valkey 8.0.2 Packages

  • Core Packages:

    • valkey-8.0.2-150700.3.5.1

    • valkey-devel (Development headers)

    • valkey-debuginfo (Troubleshooting)

  • Compatibility Layer:

    • valkey-compat-redis (Redis API support)

(Full package details: SUSE Security Portal)


FAQ: Valkey Security Update

Q1: Is this update backward-compatible with Redis clients?

A: Yes—valkey-compat-redis ensures Redis protocol compatibility.

Q2: Can CVE-2025-21605 be exploited in cloud environments?

A: Yes, if Valkey is exposed to untrusted networks (e.g., public Kubernetes pods).

Q3: What’s the performance impact of this patch?

A: <2% overhead due to additional buffer size checks.


Nenhum comentário:

Postar um comentário