summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-extended/redis
Commit message (Collapse)AuthorAgeFilesLines
* redis: ignore CVE-2025-46686Gyorgy Sarvari2025-12-262-0/+2
| | | | | | | | | | | | | | Details: https://nvd.nist.gov/vuln/detail/CVE-2025-46686 Upstream disputes that it is a security violation, and says that implementing a mitigation for this would negatively affect the rest of the application, so they elected to ignore it. See Github advisory about the same vulnerability: https://github.com/redis/redis/security/advisories/GHSA-2r7g-8hpc-rpq9 Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Refine CVE-2022-0543 status descriptionDeepak Rathore2025-12-052-2/+12
| | | | | | | | | | | | | | | | | | | | | Refine the CVE_STATUS description for CVE-2022-0543 to provide a more precise explanation of this Debian-specific vulnerability. The vulnerability originates from Debian's packaging methodology, which loads system-wide Lua libraries (lua-cjson, lua-cmsgpack), enabling Lua sandbox escape. Upstream Redis builds, including those built by Yocto/OpenEmbedded, utilize embedded Lua from the deps/ directory and are therefore not affected by this issue. It is also fixed in Debian with this commit: https://salsa.debian.org/lamby/pkg-redis/-/commit/c7fd665150dc4769402cae97d1152b3c6e4366f0 References: - https://www.ubercomp.com/posts/2022-01-20_redis_on_debian_rce - https://nvd.nist.gov/vuln/detail/CVE-2022-0543 Signed-off-by: Deepak Rathore <deeratho@cisco.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.20 -> 6.2.21Ankur Tyagi2025-11-131-1/+1
| | | | | | | | Changelog: https://github.com/redis/redis/releases/tag/6.2.21 Signed-off-by: Ankur Tyagi <ankur.tyagi85@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: ignore CVE-2025-46817, CVE-2025-46818, CVE-2025-46819Ankur Tyagi2025-11-041-0/+3
| | | | | | | | | | Fixes for CVE 46817[1], 46818[2], 47819[3] are included in the used version [1] https://github.com/redis/redis/commit/fc282edb61b56e7fe1e6bacf9400252145852fdc [2] https://github.com/redis/redis/commit/dccb672d838f05c940f040c27b74fde6fb47b2a7 [3] https://github.com/redis/redis/commit/2802b52b554cb9f0f249a24474c9fba94e933dbb Signed-off-by: Ankur Tyagi <ankur.tyagi85@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.11 -> 7.2.12Ankur Tyagi2025-11-0410-15/+19
| | | | | | | | | | and refresh patches Changelog: https://github.com/redis/redis/releases/tag/7.2.12 Signed-off-by: Ankur Tyagi <ankur.tyagi85@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: ignore CVE-2022-3734 and CVE-2022-0543Gyorgy Sarvari2025-10-081-0/+2
| | | | | | | | | | | CVE-2022-3734 only affects Windows. CVE-2022-0543 affects only packages that were packaged for Debian and Debian-derivative distros. Neither of these issues is present in upstream Redis. Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: ignore CVE-2025-27151Gyorgy Sarvari2025-10-071-0/+1
| | | | | | | | The fix has been backported by upstream, and it is included in the used version: https://github.com/redis/redis/commit/d0eeee6e31f0fefb510007a8cfdf5dce729a8be9 Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: ignore CVE-2025-21605Gyorgy Sarvari2025-10-072-0/+4
| | | | | | | | | | | | | | | The fix has been backported to both redis versions by upstream, and both versions contain it already. For 6.2.20 [1] contains the backported fix. For 7.2.11 [2] contains the backported fix. [1]: https://github.com/redis/redis/commit/5e93f9cb9dbc3e7ac9bce36f2838156cbc5c9e62 [2]: https://github.com/redis/redis/commit/42fb340ce426364d64f5dccc9c2549e58f48ac6f Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.10 -> 7.2.11Gyorgy Sarvari2025-10-0610-1/+1
| | | | | | | | | | | Changelog: (CVE-2025-49844) A Lua script may lead to remote code execution (CVE-2025-46817) A Lua script may lead to integer overflow and potential RCE (CVE-2025-46818) A Lua script can be executed in the context of another user (CVE-2025-46819) LUA out-of-bound read Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.18 -> 6.2.20Gyorgy Sarvari2025-10-061-1/+1
| | | | | | | | | | | | | | | | | Changelog: 6.2.19: (CVE-2025-32023) Fix out-of-bounds write in HyperLogLog commands (CVE-2025-48367) Retry accepting other connections even if the accepted connection reports an error 6.2.20: (CVE-2025-49844) A Lua script may lead to remote code execution (CVE-2025-46817) A Lua script may lead to integer overflow and potential RCE (CVE-2025-46818) A Lua script can be executed in the context of another user (CVE-2025-46819) LUA out-of-bound read Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* hiredis: Build vendored hdr_histogram fpconvKhem Raj2025-08-261-1/+1
| | | | | | | | | | | | | | This fixes a build race which is seen with high parallel builds ( -j 80) Fixes aarch64-yoe-linux-clang: error: no such file or directory: '../deps/hdr_histogram/libhdrhistogram.a' aarch64-yoe-linux-clang: error: no such file or directory: '../deps/hdr_histogram/libhdrhistogram.a' aarch64-yoe-linux-clang: error: no such file or directory: '../deps/fpconv/libfpconv.a' make[1]: *** [Makefile:431: redis-benchmark] Error 1 make[1]: *** Waiting for unfinished jobs.... make[1]: *** [Makefile:407: redis-server] Error 1 Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade to 7.2.10Khem Raj2025-08-0110-11/+10
| | | | Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.16 -> 6.2.18Vijay Anusuri2025-06-031-1/+1
| | | | | | | | | | | | | | Changelog: https://github.com/redis/redis/releases/tag/6.2.17 https://github.com/redis/redis/releases/tag/6.2.18 Security fixes ============== * (CVE-2024-46981) Lua script commands may lead to remote code execution * (CVE-2025-21605) An unauthenticated client can cause an unlimited growth of output buffers Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.7 -> 7.2.8Vijay Anusuri2025-05-2910-1/+1
| | | | | | | | | | | | | | | | | | | | ChangeLog: https://github.com/redis/redis/releases/tag/7.2.8 Update urgency: SECURITY: There are security fixes in the release. Security fixes ================== * (CVE-2025-21605) An unauthenticated client can cause an unlimited growth of output buffers Bug fixes ================= * #12817, #12905 Fix race condition issues between the main thread and module threads * #13863 RANDOMKEY - infinite loop during client pause * #13877 ShardID inconsistency when both primary and replica support it Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: don't inherit autotoolsRoss Burton2025-03-192-4/+4
| | | | | | | | | This upstream does not in fact use autotools, so remove the inherit. Also, clean up a oe_runmake to not require a subshell. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* hiredis: set rdepends on virtual-redisYi Zhao2025-03-111-0/+2
| | | | | | | | | | | Now hiredis can be used not only with Redis, but also with Valkey, an open source key/value datastore that is fully compatible with Redis. As Redis changed its license, many users have switched to Valkey. Add RPROVIDES virtual-redis in both redis and valkey, and set it as the runtime dependency of hiredis. Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.6 -> 7.2.7Divya Chellam2025-01-2410-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | ChangeLog: https://github.com/redis/redis/releases/tag/7.2.7 Upgrade urgency SECURITY: See security fixes below. Security fixes ==================== * (CVE-2024-46981) Lua script commands may lead to remote code execution * (CVE-2024-51741) Denial-of-service due to malformed ACL selectors Bug fixes ==================== * #13380 Possible crash due to OOM panic on invalid command * #13338 Streams: XINFO lag field is wrong when tombstone is after the last_id of the consume group * #13473 Streams: XTRIM does not update the maximal tombstone, leading to an incorrect lag * #13311 Cluster: crash due to unblocking client during slot migration * #13443 Cluster: crash when loading cluster config * #13422 Cluster: CLUSTER SHARDS returns empty array * #13465 Cluster: incompatibility with older node versions Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: ignore CVE-2022-0543Peter Marko2024-12-191-0/+1
| | | | | | | | This is Debian-specific CVE. NVD tracks this CVE as version-less. Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.5 -> 7.2.6Yi Zhao2024-10-1010-26/+25
| | | | | | | | | | | | | | | | | | | | ChangeLog: Security fixes ============== * (CVE-2024-31449) Lua library commands may lead to stack overflow and potential RCE. * (CVE-2024-31227) Potential Denial-of-service due to malformed ACL selectors. * (CVE-2024-31228) Potential Denial-of-service due to unbounded pattern matching. Bug fixes ========= * Fixed crashes in cluster mode (#13315) Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.14 -> 6.2.16Yi Zhao2024-10-108-40/+36
| | | | | | | | | | | | | | ChangeLog: Security fixes ============== * (CVE-2024-31449) Lua library commands may lead to stack overflow and potential RCE. * (CVE-2024-31228) Potential Denial-of-service due to unbounded pattern matching. Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Update status for CVE-2022-3734Ninette Adhikari2024-07-031-0/+2
| | | | | | | CVE only applies for Windows. Signed-off-by: Ninette Adhikari <ninette@thehoodiefirm.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.4 -> 7.2.5Wang Mingyu2024-05-2810-1/+1
| | | | | Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* recipes: Start WORKDIR -> UNPACKDIR transitionKhem Raj2024-05-232-6/+6
| | | | | | | Replace references of WORKDIR with UNPACKDIR where it makes sense to do so in preparation for changing the default value of UNPACKDIR. Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: restore Upstream-StatusMartin Jansa2024-01-301-0/+1
| | | | | | | | * accidentally dropped in: https://git.openembedded.org/meta-openembedded/commit/?id=e91fa668ed1dd4a3f6b06bcb099f70dbdd2a50b4 Signed-off-by: Martin Jansa <martin.jansa@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.3 -> 7.2.4Wang Mingyu2024-01-2310-16/+12
| | | | | | | | | | | | | | | | | | | 0001-src-Do-not-reset-FINAL_LIBS.patch 0006-Define-correct-gregs-for-RISCV32.patch lua-update-Makefile-to-use-environment-build-setting.patch refreshed for 7.2.4 Changelog: ============ -(CVE-2023-41056) In some cases, Redis may incorrectly handle resizing of memory buffers which can result in incorrect accounting of buffer sizes and lead to heap overflow and potential remote code execution. -Fix crashes of cluster commands clusters with mixed versions of 7.0 and 7.2 -Fix slot ownership not being properly handled when deleting a slot from a node -Fix atomicity issues with the RedisModuleEvent_Key module API event Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.13 -> 6.2.14Changqing Li2023-12-291-1/+1
| | | | | | | | | | | | Upgrade urgency SECURITY: See security fixes below. Security fixes: (CVE-2023-45145) The wrong order of listen(2) and chmod(2) calls creates a race condition that can be used by another process to bypass desired Unix socket permissions on startup. Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Create state directory in systemd serviceJoshua Watt2023-12-182-0/+2
| | | | | | | | Configures the systemd service file for redis to create the required state directory before redis starts. Signed-off-by: Joshua Watt <JPEWhacker@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.2 -> 7.2.3Wang Mingyu2023-11-2810-1/+1
| | | | | | | | | | | Changelog: ============= -Fix file descriptor leak preventing deleted files from freeing disk space on replicas -Fix a possible crash after cluster node removal Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Inherit pkgconfigPeter Kjellerstedt2023-11-261-1/+1
| | | | | | | The Makefile uses pkg-config if USE_SYSTEMD is "yes". Signed-off-by: Peter Kjellerstedt <peter.kjellerstedt@axis.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.1 -> 7.2.2Wang Mingyu2023-10-2310-1/+1
| | | | | | | | | | | | | | | | | | | | | | Changelog: ============ * (CVE-2023-45145) The wrong order of listen(2) and chmod(2) calls creates a race condition that can be used by another process to bypass desired Unix socket permissions on startup. * Fix compilation error on MacOS 13 (#12611) * WAITAOF could timeout in the absence of write traffic in case a new AOF is created and an AOF rewrite can't immediately start (#12620) * Fix crash when running rebalance command in a mixed cluster of 7.0 and 7.2 nodes (#12604) * Fix the return type of the slot number in cluster shards to integer, which makes it consistent with past behavior (#12561) * Fix CLUSTER commands are called from modules or scripts to return TLS info appropriately (#12569) * redis-cli, fix crash on reconnect when in SUBSCRIBE mode (#12571) * Fix overflow calculation for next timer event (#12474) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* minifi-cpp, mozjs-115, redis-7.2.1, pv: add missing Upstream-StatusMartin Jansa2023-09-272-0/+4
| | | | | Signed-off-by: Martin Jansa <martin.jansa@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.0 -> 7.2.1Wang Mingyu2023-09-2010-1/+1
| | | | | | | | | | | | | | Changelog: ========== -(CVE-2023-41053) Redis does not correctly identify keys accessed by SORT_RO and, as a result, may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. -Fix crashes when joining a node to an existing 7.0 Redis Cluster (#12538) Correct request_policy and response_policy command tips on for some admin / configuration commands (#12545, #12530) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.12 -> 7.2.0Wang Mingyu2023-08-2610-13/+9
| | | | | | | | | hiredis-use-default-CC-if-it-is-set.patch oe-use-libc-malloc.patch refreshed for 7.2.0 Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.11 -> 7.0.12Wang Mingyu2023-07-2010-1/+1
| | | | | | | | | | | | | Changelog: ========== -Re-enable downscale rehashing while there is a fork child (#12276) -Fix possible hang in HRANDFIELD, SRANDMEMBER, ZRANDMEMBER when used with <count> (#12276) -Improve fairness issue in RANDOMKEY, HRANDFIELD, SRANDMEMBER, ZRANDMEMBER, SPOP, and eviction (#12276) -Fix WAIT to be effective after a blocked module command being unblocked (#12220) -Avoid unnecessary full sync after master restart in a rare case (#12088) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.12 -> 6.2.13Wang Mingyu2023-07-201-1/+1
| | | | | | | | | Changelogg: ========== Re-enable downscale rehashing while there is a fork child Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* *.patch: add Upstream-Status to all patchesMartin Jansa2023-06-216-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | There is new patch-status QA check in oe-core: https://git.openembedded.org/openembedded-core/commit/?id=76a685bfcf927593eac67157762a53259089ea8a This is temporary work around just to hide _many_ warnings from optional patch-status (if you add it to WARN_QA). This just added Upstream-Status: Pending everywhere without actually investigating what's the proper status. This is just to hide current QA warnings and to catch new .patch files being added without Upstream-Status, but the number of Pending patches is now terrible: 5 (26%) meta-xfce 6 (50%) meta-perl 15 (42%) meta-webserver 21 (36%) meta-gnome 25 (57%) meta-filesystems 26 (43%) meta-initramfs 45 (45%) meta-python 47 (55%) meta-multimedia 312 (63%) meta-networking 756 (61%) meta-oe Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: use the files path correctlyChen Qi2023-06-1410-2/+0
| | | | | | | | | | | | | | | | | | | | | Recipes are not expected to set FILESPATH directly, they are expected to use FILESEXTRAPATH. I can see the seting of FILESPATH in this recipe only wants to find redis-7 specific patches and files. This could be easily achieved by using redis-7.0.11/ directory to hold all those files. Using FILESPATH in this way removes the possibility of overriding some files (e.g., the redis service file) from other layers via FILESEXTRAPATH:prepend, which is kind of a common practice and is actually working for basically all other recipes. This is because we have: meta/classes-global/base.bbclass:FILESPATH = "${@base_set_filespath(["${FILE_DIRNAME}/${BP}", "${FILE_DIRNAME}/${BPN}", "${FILE_DIRNAME}/files"], d)}" And FILESEXTRAPATH is handled in base_set_filespath. Signed-off-by: Chen Qi <Qi.Chen@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.11 -> 6.2.12Changqing Li2023-05-111-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.10 -> 7.0.11Wang Mingyu2023-04-231-1/+1
| | | | | Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.9 -> 7.0.10Changqing Li2023-03-221-1/+1
| | | | | | | | | | | | | | | | | | Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: * (CVE-2023-28425) Specially crafted MSETNX command can lead to assertion and denial-of-service Bug Fixes ========= * Large blocks of replica client output buffer may lead to psync loops and unnecessary memory usage (#11666) * Fix CLIENT REPLY OFF|SKIP to not silence push notifications (#11875) * Trim excessive memory usage in stream nodes when exceeding `stream-node-max-bytes` (#11885) * Fix module RM_Call commands failing with OOM when maxmemory is changed to zero (#11319) Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: fix service redis-server restart not working under sysvinitStefan Ghinea2023-03-182-0/+62
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | Under sysvinit when trying to restart redis-server using service redis-server restart two calls are made to start-stop-daemon, first with the --stop argument and then with --start argument consecutively. Because the process doesn't immediately terminate when start-stop-daemon --stop is called, the next call to start-stop-daemon --start finds the process still running and does not attempt to start another one. This leads to only a stop of the redis-server process when a restart is requested. This behavior affects all redis versions using sysvinit only. This can be fixed by using the --retry <timeout/schedule> argument with start-stop-daemon --stop in order for the call to block until the process terminates so that start-stop-daemon --start will attempt to start a new process. Unfortunately the --retry argument works only in the implementation of start-stop-daemon provided by dpkg package and is ignored in the implementation provided by busybox package. A repeated check if the process is still running and another try with another signal after a timeout will effectively simulate a stop with --retry=TERM/5/KILL/5 schedule. Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade 7.x to 7.0.9Khem Raj2023-03-051-1/+1
| | | | Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade 6.x recipe to 6.2.11Khem Raj2023-03-051-1/+1
| | | | Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade to 6.2.9Chee Yang Lee2023-01-171-1/+1
| | | | | | | | | | | | | | | | | | | | | | | Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: (CVE-2022-35977) Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands can drive Redis to OOM panic (CVE-2023-22458) Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands can lead to denial-of-service Bug Fixes: Avoid possible hang when client issues long KEYS, SRANDMEMBER, HRANDFIELD, and ZRANDMEMBER commands and gets disconnected by client output buffer limit (#11676) Fix sentinel issue if replica changes IP (#11590) Signed-off-by: Chee Yang Lee <chee.yang.lee@intel.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade to 7.0.8Chee Yang Lee2023-01-171-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: (CVE-2022-35977) Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands can drive Redis to OOM panic (CVE-2023-22458) Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands can lead to denial-of-service Bug Fixes Avoid possible hang when client issues long KEYS, SRANDMEMBER, HRANDFIELD, and ZRANDMEMBER commands and gets disconnected by client output buffer limit (#11676) Make sure that fork child doesn't do incremental rehashing (#11692) Fix a bug where blocking commands with a sub-second timeout would block forever (#11688) Fix sentinel issue if replica changes IP (#11590) Signed-off-by: Chee Yang Lee <chee.yang.lee@intel.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: 7.0.5 -> 7.0.7Changqing Li2023-01-062-10/+12
| | | | | | | This upgrade include fix for CVE-2022-3647 Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: 6.2.7 -> 6.2.8Changqing Li2023-01-062-7/+10
| | | | | | | This upgrade include fix for CVE-2022-3647 Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.4 to 7.0.5Changqing Li2022-10-141-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: build with USE_SYSTEMD=yes when systemd is enabledOvidiu Panait2022-09-232-2/+7
| | | | | | | | | | | | | Compile redis with full systemd support when the chosen init system is systemd. Enabling systemd supervision allows redis to communicate the actual server status (i.e. "Loading dataset", "Waiting for master<->replica sync") to systemd, instead of declaring readiness right after initializing the server process. Signed-off-by: Ovidiu Panait <ovidiu.panait@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: fix do_patch fuzz warningChangqing Li2022-08-142-2/+2
| | | | | | | | | | | | | Fix: WARNING: lib32-redis-7.0.4-r0 do_patch: Fuzz detected: Applying patch GNU_SOURCE.patch patching file src/zmalloc.c Hunk #1 succeeded at 32 with fuzz 2 (offset 4 lines). There are two version of redis, and need different GNU_SOURCE.patch Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>