Redis Software 发行说明 7.8.2-34(2024 年 11 月)
Redis 社区版 7.4 功能。哈希字段过期。客户端缓存支持。指标流引擎预览。用于检查数据库可用性、重新平衡分片、故障转移分片和控制数据库流量的新 API。针对节点作、数据库标签和数据库配置的 Cluster Manager UI 增强功能。用户管理员角色。基于大小和时间的日志轮换。模块管理增强功能。可配置的最小密码长度。可配置的许可证到期警报阈值。
Redis 企业软件 |
---|
突出
此版本提供:
-
Redis 社区版 7.4 功能
-
哈希字段过期
-
客户端缓存支持
-
指标流引擎预览
-
用于检查数据库可用性、重新平衡分片、故障转移分片和控制数据库流量的新 API
-
针对节点作、数据库标签和数据库配置的集群管理器 UI 增强功能
-
用户管理员角色
-
基于大小和时间的日志轮换
-
模块管理增强功能
-
可配置的最小密码长度
-
可配置的许可证到期警报阈值
此版本中的新增功能
新功能
-
现在,当您使用数据库版本 7.4 创建或升级数据库时,可以使用 Redis 社区版和 Redis Stack 7.4 功能,包括:
-
新的矢量数据类型以减少内存使用
-
时间序列插入过滤器
-
有关详细信息,请参阅 Redis 7.4 版本博客文章和 Redis 社区版 7.4 发行说明。
-
客户端缓存支持:
-
客户端缓存允许 Redis 客户端在本地缓存中存储数据子集,并避免向 Redis 数据库发送重复的读取请求。
-
当用于缓存经常访问的数据时,此技术可以通过减少网络流量、延迟和数据库负载来提高性能。
-
支持 Redis 版本 7.4 及更高版本的 Redis 数据库。
-
有关更多信息,请参阅客户端缓存介绍和客户端缓存与 Redis Software 的兼容性。
-
-
数据库可用性 API:
-
验证 Redis Software 数据库是否可用于执行读取和写入作,以及是否可以响应来自客户端应用程序的查询。
-
负载均衡器和自动监控工具可以使用此 API 来监控数据库可用性。
-
有关详细信息,请参阅检查数据库可用性和 REST API 参考。
-
-
指标流引擎预览:
-
新指标流引擎基于导出器的基础设施提供了对更准确、实时数据的访问。这个增强的可扩展监控系统允许您设置更有效的警报并更快地响应问题。
-
公开新的
/v2
Prometheus 抓取终端节点,可用于将指标导出到外部监控工具,例如 Grafana、DataDog、NewRelic 和 Dynatrace。 -
导出原始数据而不是聚合数据,与 v1 Prometheus 指标相比,可以提高大规模监控和准确性。
-
有关新指标流引擎导出的指标的初始列表,请参阅 Prometheus 指标 v2。虽然指标流引擎处于预览状态,但本文档仅提供部分列表。将添加更多指标。
-
V1 Prometheus 指标已弃用,但仍可用。要过渡到新的指标流引擎,请立即使用 Prometheus v1 指标和等效的 v2 PromQL 迁移现有控制面板,或者等待新的预配置控制面板在未来版本中可用。
-
新的指标流引擎解决了一些已知问题和错误:
-
RS31923:向 Prometheus 指标添加了缺失的类型。
-
RS80626:向指标导出器添加了 DMC 线程利用率指标。
-
RS113028:将节点导出器依赖项升级到版本 1.7.0。
-
RS103537:修复了节点宕机时缺少指示的问题。您可以查看节点的指标,直到它关闭,并且可以进行监控
node_metrics_up
以获取它已关闭的指示。 -
RS103251:指标现在可在状态机作期间使用。
-
RS74732:修复了在删除并重新添加副本 CRDB 实例后副本 CRDB 的统计信息丢失的问题。
-
RS65948:修复了当集群同时具有常规数据库和主动-主动数据库时,指标导出程序生成重复统计信息标头的问题。
-
-
-
再平衡分片放置 REST API 请求,该请求根据数据库的分片放置策略在节点之间分配数据库的分片。有关分片放置和可用策略的更多信息,请参阅分片放置策略。
-
分片故障转移 REST API 请求,用于对指定的主分片执行故障转移并将其副本提升为主分片。
增强
-
新的 Cluster Manager UI 增强功能:
-
从 Nodes (节点) 屏幕执行节点作,以验证节点、将节点设置为主节点或辅助节点、删除节点以及管理节点警报设置。
-
使用自定义标签对数据库进行分类。当您向数据库添加新标签时,现有标签已使用的键和值将显示为建议。
-
在数据库配置屏幕上移动了几个设置:
-
驱逐设置现在显示在 Capacity (容量) 部分中。
-
-
改进了登录屏幕上针对被锁定用户的错误消息,以及密码不正确或过期的错误消息。
-
刷新主动-主动数据库。
-
-
专为用户管理设计的新用户管理员角色可用于基于角色的访问控制。
-
此管理角色允许分配的用户使用 Cluster Manager UI 和 REST API 创建、编辑和删除用户。
-
有关用户管理员角色授予的权限的更多详细信息,请参阅集群管理器 UI 权限和 REST API 权限。
-
-
升级数据库时,默认情况下,升级过程还会尝试升级数据库模块。
-
rladmin upgrade db
将始终升级数据库的模块。 -
如果使用 REST API 升级数据库,则可以将
"latest_with_modules": false
以防止模块升级。
-
-
添加了对基于大小和时间的日志轮换的支持。
-
最小密码长度以前硬编码为 8 个字符,现在可以在 Cluster Manager UI 和 REST API 中配置。
-
集群许可证到期警报阈值(确定您希望提前多长时间收到许可证到期通知)可在集群管理器 UI 和 REST API 中配置。
-
集群管理器 UI 的时区可以通过更新 CM 设置 REST API 请求进行配置。
-
可以使用更新数据库配置 REST API 请求来配置引发连接警报的超时:
-
crdt_sync_connection_alarm_timeout_seconds
:如果 Syncer 连接到 Active-Active 数据库的时间超过指定的秒数,请发出连接警报。 -
replica_sync_connection_alarm_timeout_seconds
:如果 Syncer 连接到副本所需的时间超过指定的秒数,则引发连接警报。
-
-
预留以下端口:
港口 进程名称 用法 3347 cert_exporter 报告集群证书指标 3348 process_exporter 报告 DMC 和 Redis 进程的进程指标 3349 cluster_wd_exporter 报告集群监控定时器指标 3350 db_controller 节点间通信 9091 node_exporter 报告与 CPU、内存、磁盘等相关的主机节点指标 9125 statsd_exporter 报告与 DMC 和 syncer 相关的推送指标,以及一些集群和节点指标
Redis 数据库版本
Redis 软件版本 7.8.2 包括三个 Redis 数据库版本:7.4、7.2 和 6.2。
默认 Redis 数据库版本为 7.4。
Redis 模块功能集
Redis 软件附带多个模块。截至 7.8.2 版,Redis 软件包括三个功能集,与不同的 Redis 数据库版本兼容。
下表显示了哪些 Redis 模块与此版本中包含的每个 Redis 数据库版本兼容。
- RedisGraph 的生命周期已宣布终止,并将在未来版本中删除。有关更多详细信息,请参阅 RedisGraph 生命周期终止公告。
已解决的问题
-
RS123645:修复了启用分片时分片创建的不一致行为。现在,在创建启用了分片的数据库时,您必须始终提供
shard_key_regex
. -
RS130444:修复了无法在 Cluster Manager UI 中创建或编辑没有电子邮件地址的用户的问题。
-
RS121796:“multiple endpoint” 配置数据库默认设置在选中时也应启用分片。
-
RS128768:修复了阻止指标图时间戳详细信息显示在集群管理器 UI 中的问题。
-
RS127120:修复了
crdt_replicas
在刷新主动-主动数据库时未正确更新。 -
RS127054:修复了安装脚本错误地报告“端口 53 被占用”而不是被占用端口的正确值的问题。
-
RS125934:修复了在现有 TLS 证书过期时阻止更新主动-主动数据库配置的验证。
-
RS125412:修复了在加入集群时,在节点配置期间已删除的外部 IP 地址仍列为可用的问题。
-
RS122012:修复了为长时间运行的警报发送截止电子邮件的问题。
-
RS121726:阻止
remove_shards
选项rlutil
.您可以改用 Replica Of 来减少分片计数。 -
RS121076:在将副本分片提升为主角色时,添加了 5 分钟的连接超时。
-
RS118103:删除了不准确的分片
BACKUP_PROGRESS
列rladmin status
命令的输出。 -
RS116990:修复了启用闪存的数据库的一个问题,其中
FLUSHDB
可能会导致版本 7.0 和 7.2 中的分片崩溃,并导致客户端在早期版本中停止响应。 -
RS114923:修复了旧版 RDB 解析器可能生成
XGROUP CREATE
命令中带有不正确的ENTRIESREAD
值。 -
RS114258:修复了如果目标分片过时,主动-主动数据库实例在部分同步期间可能会丢失键的问题。
-
RS133653:修复了过期的客户端证书阻止更新与 TLS 无关的数据库配置的验证问题。
-
RS126235:修复了由于分片数据过时而导致数据库更新可能超时并进入更改待处理状态的问题。
-
RS125128:改进了安装和升级的实时日志记录,以提高可见性。
-
RS119958:删除了导致 Auto Tiering 集群中 debuginfo 脚本失败并显示错误“/bin/tar: Argument list too long”的日志文件限制,并改进了 RocksDB 日志文件轮换。
-
RS137396:在 Cluster Manager UI 中创建新的 ACL 用户时,不再要求提供电子邮件地址。
-
RS134238:改进了 Cluster Manager UI 中的数据库排序性能。
-
RS129418:改进了 Auto Tiering 集群的日志轮换机制,以减少过多的日志。
-
RS137231:修复了由于节点数据过时,数据库分片在迁移过程中可能卡住的问题。
版本变更
-
添加了验证,以在更新 LDAP 配置时验证 LDAP 服务器 URI 是否包含主机和端口。
-
的
oss_sharding
API 字段在早期版本的 Redis Software 中没有影响。然而oss_sharding
现在将作为未来计划的一部分生效。在另行通知之前,请将此字段设置为false
以避免意外影响。
重大更改
Redis 软件版本 7.8.2 引入了以下重大更改:
-
升级数据库时,默认情况下,升级过程还会尝试升级数据库模块。
-
默认值
latest_with_modules
已更改为true
. -
rladmin upgrade db
将始终升级数据库的模块。 -
使用 REST API 升级数据库时,您可以设置
"latest_with_modules": false
以防止模块升级。
-
Redis 数据库版本 7.4 重大更改
当 Redis 社区版的新主要版本更改现有命令时,将数据库升级到新版本可能会破坏某些功能。在升级之前,请阅读提供的会影响 Redis Software 的重大更改列表,并更新连接到数据库的任何应用程序以处理这些更改。
确认您的 Redis 数据库版本 (redis_version
) 或运行以下命令INFO
command 替换为redis-cli
:
$ redis-cli -p <port> INFO
"# Server
redis_version:7.0.8
..."
Security behavior changes
- #13108 Lua: LRU eviction for scripts generated with
EVAL
.
Other general behavior changes
-
#13133 Lua: allocate VM code with jemalloc instead of libc and count it as used memory.
-
#12171 ACL LOAD
: do not disconnect all clients.
Product lifecycle updates
End-of-life policy extension
The end-of-life policy for Redis Software versions 6.2 and later has been extended to 24 months after the formal release of the subsequent major version. For the updated end-of-life schedule, see the Redis Software product lifecycle.
Supported upgrade paths
Redis Software versions 6.2.4 and 6.2.8 do not support direct upgrades beyond version 7.4.x. Versions 6.2.10, 6.2.12, and 6.2.18 are part of the upgrade path. To upgrade from 6.2.4 or 6.2.8 to versions later than 7.4.x, an intermediate upgrade is required.
The next major Redis Software release will still bundle Redis database version 6.2 and allow database upgrades from Redis database version 6.2 to 7.x.
See the Redis Software product lifecycle for more information about release numbers.
End of triggers and functions preview
The triggers and functions (RedisGears) preview has been discontinued.
-
Commands such as TFCALL
, TFCALLASYNC
, and TFUNCTION
will be deprecated and will return error messages.
-
Any JavaScript functions stored in Redis will be removed.
-
JavaScript-based triggers will be blocked.
-
Lua functions and scripts will not be affected.
If your database currently uses triggers and functions, you need to:
-
Adjust your applications to accommodate these changes.
-
Delete all triggers and functions libraries from your existing database:
-
Run TFUNCTION LIST
.
-
Copy all library names.
-
Run TFUNCTION DELETE
for each library in the list.
If any triggers and functions libraries remain in the database, the RDB snapshot won't load on a cluster without RedisGears.
-
Migrate your database to a new database without the RedisGears module.
Deprecations
API deprecations
-
Deprecated background_op
field from BDB REST API object. Use GET /v1/actions/bdb/<bdb_uid>
instead.
-
Deprecated the following fields for upgrade database REST API requests:
-
keep_redis_version
; use redis_version
instead
-
current_module
; use new_module_args
instead
-
new_module
; use new_module_args
instead
-
Deprecated the following module_list
fields for create database REST API requests:
-
module_id
; use module_name
instead
-
semantic_version
; use module_args instead
-
min_redis_version
is only relevant to Redis database versions earlier than 7.4 and is replaced with compatible_redis_version
in module REST API responses.
-
Deprecated the rladmin upgrade modules
command. Use rladmin upgrade db
instead.
-
Deprecated POST /v1/modules/upgrade/bdb/<uid>
REST API request. Use POST /v1/bdbs/<uid>/upgrade
to upgrade modules instead.
V1 Prometheus metrics deprecation
V1 Prometheus metrics are deprecated but still available. To transition to the new metrics stream engine, either migrate your existing dashboards using Prometheus v1 metrics and equivalent v2 PromQL now, or wait to use new preconfigured dashboards when they become available in a future release.
Download center modules deprecation
New Redis modules will not be available for download from the Redis download center.
Legacy UI not supported
The legacy UI was deprecated in favor of the new Cluster Manager UI in Redis Software version 7.2.4 and is no longer supported as of Redis Software version 7.8.2.
Redis 6.0 databases not supported
Redis database version 6.0 was deprecated in Redis Software version 7.4.2 and is no longer supported as of Redis Software version 7.8.2.
To prepare for the removal of Redis database version 6.0 before you upgrade to Redis Software version 7.8.2:
-
For Redis Software 6.2.* clusters, upgrade Redis 6.0 databases to Redis 6.2. See the Redis 6.2 release notes for the list of changes.
-
For Redis Software 7.2.4 and 7.4.2 clusters, upgrade Redis 6.0 databases to Redis 7.2. Before you upgrade your databases, see the list of Redis 7.2 breaking changes and update any applications that connect to your database to handle these changes.
Ubuntu 18.04 not supported
Ubuntu 18.04 was deprecated in Redis Software version 7.2.4 and is no longer supported as of Redis Software version 7.8.2.
Upcoming changes
Default image change for Redis Software containers
Starting with version 7.8, Redis Software containers with the image tag x.y.z-build
will be based on RHEL instead of Ubuntu.
This change will only affect you if you use containers outside the official Redis Enterprise for Kubernetes product and use Ubuntu-specific commands.
To use Ubuntu-based images after this change, you can specify the operating system suffix in the image tag. For example, use the image tag 7.4.2-216.focal
instead of 7.4.2-216
.
Supported platforms
The following table provides a snapshot of supported platforms as of this Redis Software release. See the supported platforms reference for more details about operating system compatibility.
✅ Supported – The platform is supported for this version of Redis Software and Redis Stack modules.
⚠️ Deprecation warning – The platform is still supported for this version of Redis Software, but support will be removed in a future release.
Redis Software
major versions
7.8
7.4
7.2
6.4
6.2
Release date
Nov 2024
Feb 2024
Aug 2023
Feb 2023
Aug 2021
End-of-life date
Determined after
next major release
Nov 2026
Feb 2026
Aug 2025
Feb 2025
Platforms
RHEL 9 &
compatible distros1
✅
✅
–
–
–
RHEL 9
FIPS mode5
✅
–
–
–
–
RHEL 8 &
compatible distros1
✅
✅
✅
✅
✅
RHEL 7 &
compatible distros1
–
–
⚠️
✅
✅
Ubuntu 20.042
✅
✅
✅
✅
–
Ubuntu 18.042
–
⚠️
⚠️
✅
✅
Ubuntu 16.042
–
–
⚠️
✅
✅
Amazon Linux 2
✅
✅
✅
✅
–
Amazon Linux 1
–
–
✅
✅
✅
Kubernetes3
✅
✅
✅
✅
✅
Docker4
✅
✅
✅
✅
✅
-
The RHEL-compatible distributions CentOS, CentOS Stream, Alma, and Rocky are supported if they have full RHEL compatibility. Oracle Linux running the Red Hat Compatible Kernel (RHCK) is supported, but the Unbreakable Enterprise Kernel (UEK) is not supported.
-
The server version of Ubuntu is recommended for production installations. The desktop version is only recommended for development deployments.
-
See the Redis Enterprise for Kubernetes documentation for details about support per version and Kubernetes distribution.
-
Docker images of Redis Software are certified for development and testing only.
-
Supported only if FIPS was enabled during RHEL installation to ensure FIPS compliance.
Downloads
The following table shows the SHA256 checksums for the available packages:
Package
SHA256 checksum (7.8.2-34 Nov release)
Ubuntu 20
17500356d8338e4f8fd8a37e7b39a190d05ca66d35ae6c4aa3aa8cbc7bb99864
Red Hat Enterprise Linux (RHEL) 8
caa2ccd24749ae1fb904841df50a8b69b69c74441458649ca49b9b617e286191
Red Hat Enterprise Linux (RHEL) 9
31f9d07beb7dfd9239083ecad99ecbfe3cdfcf96673881ebed08171d8194bff3
Amazon Linux 2
a737ca86d800caf9ca266d5771fbcffd3f973a7fb8e63e7b819681322ff6ed67
Known issues
- RS131972: Creating an ACL that contains a line break in the Cluster Manager UI can cause shard migration to fail due to ACL errors.
Known limitations
New Cluster Manager UI limitations
The following legacy UI features are not yet available in the new Cluster Manager UI:
-
Purge an Active-Active instance.
Use crdb-cli crdb purge-instance
instead.
-
Search and export the log.
RedisGraph prevents upgrade to RHEL 9
You cannot upgrade from a prior RHEL version to RHEL 9 if the Redis Software cluster contains a RedisGraph module, even if unused by any database. The RedisGraph module has reached End-of-Life and is completely unavailable in RHEL 9.
Query results might include hash keys with lazily expired fields
If one or more fields of a hash key expire after an FT.SEARCH
or FT.AGGREGATE
query begins, Redis does not account for these lazily expired fields. As a result, keys with expired fields might still be included in the query results, leading to potentially incorrect or inconsistent results.
Security
Open source Redis security fixes compatibility
As part of Redis's commitment to security, Redis Software implements the latest security fixes available with open source Redis. Redis Software has already included the fixes for the relevant CVEs.
Some CVEs announced for open source Redis do not affect Redis Software due to different or additional functionality available in Redis Software that is not available in open source Redis.
Redis Software 7.8.2-34 supports open source Redis 7.4, 7.2, and 6.2. Below is the list of open source Redis CVEs fixed by version.
Redis 7.2.x:
-
(CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.
-
(CVE-2024-31228) An authenticated user can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as KEYS
, SCAN
, PSUBSCRIBE
, FUNCTION LIST
, COMMAND LIST
, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.
-
(CVE-2023-41056) In some cases, Redis may incorrectly handle resizing of memory buffers, which can result in incorrect accounting of buffer sizes and lead to heap overflow and potential remote code execution.
-
(CVE-2023-41053) Redis does not correctly identify keys accessed by SORT_RO
and, as a result, may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. (Redis 7.2.1)
Redis 7.0.x:
-
(CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.
-
(CVE-2024-31228) An authenticated user can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as KEYS
, SCAN
, PSUBSCRIBE
, FUNCTION LIST
, COMMAND LIST
, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.
-
(CVE-2023-41056) In some cases, Redis may incorrectly handle resizing of memory buffers, which can result in incorrect accounting of buffer sizes and lead to heap overflow and potential remote code execution.
-
(CVE-2023-41053) Redis does not correctly identify keys accessed by SORT_RO
and, as a result, may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. (Redis 7.0.13)
-
(CVE-2023-36824) Extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption, and potentially remote code execution. Specifically: using COMMAND GETKEYS*
and validation of key names in ACL rules. (Redis 7.0.12)
-
(CVE-2023-28856) Authenticated users can use the HINCRBYFLOAT
command to create an invalid hash field that will crash Redis on access. (Redis 7.0.11)
-
(CVE-2023-28425) Specially crafted MSETNX
commands can lead to assertion and denial-of-service. (Redis 7.0.10)
-
(CVE-2023-25155) Specially crafted SRANDMEMBER
, ZRANDMEMBER
, and HRANDFIELD
commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. (Redis 7.0.9)
-
(CVE-2023-22458) Integer overflow in the Redis HRANDFIELD
and ZRANDMEMBER
commands can lead to denial-of-service. (Redis 7.0.8)
-
(CVE-2022-36021) String matching commands (like SCAN
or KEYS
) with a specially crafted pattern to trigger a denial-of-service attack on Redis can cause it to hang and consume 100% CPU time. (Redis 7.0.9)
-
(CVE-2022-35977) Integer overflow in the Redis SETRANGE
and SORT
/SORT_RO
commands can drive Redis to OOM panic. (Redis 7.0.8)
-
(CVE-2022-35951) Executing an XAUTOCLAIM
command on a stream key in a specific state, with a specially crafted COUNT
argument, may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. The problem affects Redis versions 7.0.0 or newer. (Redis 7.0.5)
-
(CVE-2022-31144) A specially crafted XAUTOCLAIM
command on a stream key in a specific state may result in heap overflow and potentially remote code execution. The problem affects Redis versions 7.0.0 or newer. (Redis 7.0.4)
-
(CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. (Redis 7.0.12)
-
(CVE-2022-24736) An attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result in a crash of the redis-server
process. This issue affects all versions of Redis. (Redis 7.0.0)
-
(CVE-2022-24735) By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. (Redis 7.0.0)
Redis 6.2.x:
-
(CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.
-
(CVE-2024-31228) An authenticated user can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as KEYS
, SCAN
, PSUBSCRIBE
, FUNCTION LIST
, COMMAND LIST
, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.
-
(CVE-2023-28856) Authenticated users can use the HINCRBYFLOAT
command to create an invalid hash field that will crash Redis on access. (Redis 6.2.12)
-
(CVE-2023-25155) Specially crafted SRANDMEMBER
, ZRANDMEMBER
, and HRANDFIELD
commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. (Redis 6.2.11)
-
(CVE-2023-22458) Integer overflow in the Redis HRANDFIELD
and ZRANDMEMBER
commands can lead to denial-of-service. (Redis 6.2.9)
-
(CVE-2022-36021) String matching commands (like SCAN
or KEYS
) with a specially crafted pattern to trigger a denial-of-service attack on Redis can cause it to hang and consume 100% CPU time. (Redis 6.2.11)
-
(CVE-2022-35977) Integer overflow in the Redis SETRANGE
and SORT
/SORT_RO
commands can drive Redis to OOM panic. (Redis 6.2.9)
-
(CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. (Redis 6.2.13)
-
(CVE-2022-24736) An attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result in a crash of the redis-server
process. This issue affects all versions of Redis. (Redis 6.2.7)
-
(CVE-2022-24735) By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. (Redis 6.2.7)
-
(CVE-2021-41099) Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len
is manually configured to a non-default, very large value. (Redis 6.2.6)
-
(CVE-2021-32762) Integer to heap buffer overflow issue in redis-cli
and redis-sentinel
parsing large multi-bulk replies on some older and less common platforms. (Redis 6.2.6)
-
(CVE-2021-32761) An integer overflow bug in Redis version 2.2 or newer can be exploited using the BITFIELD
command to corrupt the heap and potentially result with remote code execution. (Redis 6.2.5)
-
(CVE-2021-32687) Integer to heap buffer overflow with intsets, when set-max-intset-entries
is manually configured to a non-default, very large value. (Redis 6.2.6)
-
(CVE-2021-32675) Denial Of Service when processing RESP request payloads with a large number of elements on many connections. (Redis 6.2.6)
-
(CVE-2021-32672) Random heap reading issue with Lua Debugger. (Redis 6.2.6)
-
(CVE-2021-32628) Integer to heap buffer overflow handling ziplist-encoded data types, when configuring a large, non-default value for hash-max-ziplist-entries
, hash-max-ziplist-value
, zset-max-ziplist-entries
or zset-max-ziplist-value
. (Redis 6.2.6)
-
(CVE-2021-32627) Integer to heap buffer overflow issue with streams, when configuring a non-default, large value for proto-max-bulk-len
and client-query-buffer-limit
. (Redis 6.2.6)
-
(CVE-2021-32626) Specially crafted Lua scripts may result with Heap buffer overflow. (Redis 6.2.6)
-
(CVE-2021-32625) An integer overflow bug in Redis version 6.0 or newer can be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. (Redis 6.2.4)
-
(CVE-2021-29478) An integer overflow bug in Redis 6.2 could be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default set-max-intset-entries configuration value, creating a large set key that consists of integer values and using the COPY command to duplicate it. The integer overflow bug exists in all versions of Redis starting with 2.6, where it could result with a corrupted RDB or DUMP payload, but not exploited through COPY (which did not exist before 6.2). (Redis 6.2.3)
-
(CVE-2021-29477) An integer overflow bug in Redis version 6.0 or newer could be exploited using the STRALGO LCS command to corrupt the heap and potentially result in remote code execution. The integer overflow bug exists in all versions of Redis starting with 6.0. (Redis 6.2.3)
On this page