summaryrefslogtreecommitdiffstats
path: root/meta-oe/recipes-extended/redis
Commit message (Collapse)AuthorAgeFilesLines
* redis: upgrade 6.2.16 -> 6.2.18Vijay Anusuri2025-06-031-1/+1
| | | | | | | | | | | | | | Changelog: https://github.com/redis/redis/releases/tag/6.2.17 https://github.com/redis/redis/releases/tag/6.2.18 Security fixes ============== * (CVE-2024-46981) Lua script commands may lead to remote code execution * (CVE-2025-21605) An unauthenticated client can cause an unlimited growth of output buffers Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.7 -> 7.2.8Vijay Anusuri2025-05-2910-1/+1
| | | | | | | | | | | | | | | | | | | | ChangeLog: https://github.com/redis/redis/releases/tag/7.2.8 Update urgency: SECURITY: There are security fixes in the release. Security fixes ================== * (CVE-2025-21605) An unauthenticated client can cause an unlimited growth of output buffers Bug fixes ================= * #12817, #12905 Fix race condition issues between the main thread and module threads * #13863 RANDOMKEY - infinite loop during client pause * #13877 ShardID inconsistency when both primary and replica support it Signed-off-by: Vijay Anusuri <vanusuri@mvista.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: don't inherit autotoolsRoss Burton2025-03-192-4/+4
| | | | | | | | | This upstream does not in fact use autotools, so remove the inherit. Also, clean up a oe_runmake to not require a subshell. Signed-off-by: Ross Burton <ross.burton@arm.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* hiredis: set rdepends on virtual-redisYi Zhao2025-03-111-0/+2
| | | | | | | | | | | Now hiredis can be used not only with Redis, but also with Valkey, an open source key/value datastore that is fully compatible with Redis. As Redis changed its license, many users have switched to Valkey. Add RPROVIDES virtual-redis in both redis and valkey, and set it as the runtime dependency of hiredis. Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.6 -> 7.2.7Divya Chellam2025-01-2410-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | ChangeLog: https://github.com/redis/redis/releases/tag/7.2.7 Upgrade urgency SECURITY: See security fixes below. Security fixes ==================== * (CVE-2024-46981) Lua script commands may lead to remote code execution * (CVE-2024-51741) Denial-of-service due to malformed ACL selectors Bug fixes ==================== * #13380 Possible crash due to OOM panic on invalid command * #13338 Streams: XINFO lag field is wrong when tombstone is after the last_id of the consume group * #13473 Streams: XTRIM does not update the maximal tombstone, leading to an incorrect lag * #13311 Cluster: crash due to unblocking client during slot migration * #13443 Cluster: crash when loading cluster config * #13422 Cluster: CLUSTER SHARDS returns empty array * #13465 Cluster: incompatibility with older node versions Signed-off-by: Divya Chellam <divya.chellam@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: ignore CVE-2022-0543Peter Marko2024-12-191-0/+1
| | | | | | | | This is Debian-specific CVE. NVD tracks this CVE as version-less. Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.5 -> 7.2.6Yi Zhao2024-10-1010-26/+25
| | | | | | | | | | | | | | | | | | | | ChangeLog: Security fixes ============== * (CVE-2024-31449) Lua library commands may lead to stack overflow and potential RCE. * (CVE-2024-31227) Potential Denial-of-service due to malformed ACL selectors. * (CVE-2024-31228) Potential Denial-of-service due to unbounded pattern matching. Bug fixes ========= * Fixed crashes in cluster mode (#13315) Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.14 -> 6.2.16Yi Zhao2024-10-108-40/+36
| | | | | | | | | | | | | | ChangeLog: Security fixes ============== * (CVE-2024-31449) Lua library commands may lead to stack overflow and potential RCE. * (CVE-2024-31228) Potential Denial-of-service due to unbounded pattern matching. Signed-off-by: Yi Zhao <yi.zhao@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Update status for CVE-2022-3734Ninette Adhikari2024-07-031-0/+2
| | | | | | | CVE only applies for Windows. Signed-off-by: Ninette Adhikari <ninette@thehoodiefirm.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.4 -> 7.2.5Wang Mingyu2024-05-2810-1/+1
| | | | | Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* recipes: Start WORKDIR -> UNPACKDIR transitionKhem Raj2024-05-232-6/+6
| | | | | | | Replace references of WORKDIR with UNPACKDIR where it makes sense to do so in preparation for changing the default value of UNPACKDIR. Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: restore Upstream-StatusMartin Jansa2024-01-301-0/+1
| | | | | | | | * accidentally dropped in: https://git.openembedded.org/meta-openembedded/commit/?id=e91fa668ed1dd4a3f6b06bcb099f70dbdd2a50b4 Signed-off-by: Martin Jansa <martin.jansa@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.3 -> 7.2.4Wang Mingyu2024-01-2310-16/+12
| | | | | | | | | | | | | | | | | | | 0001-src-Do-not-reset-FINAL_LIBS.patch 0006-Define-correct-gregs-for-RISCV32.patch lua-update-Makefile-to-use-environment-build-setting.patch refreshed for 7.2.4 Changelog: ============ -(CVE-2023-41056) In some cases, Redis may incorrectly handle resizing of memory buffers which can result in incorrect accounting of buffer sizes and lead to heap overflow and potential remote code execution. -Fix crashes of cluster commands clusters with mixed versions of 7.0 and 7.2 -Fix slot ownership not being properly handled when deleting a slot from a node -Fix atomicity issues with the RedisModuleEvent_Key module API event Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.13 -> 6.2.14Changqing Li2023-12-291-1/+1
| | | | | | | | | | | | Upgrade urgency SECURITY: See security fixes below. Security fixes: (CVE-2023-45145) The wrong order of listen(2) and chmod(2) calls creates a race condition that can be used by another process to bypass desired Unix socket permissions on startup. Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Create state directory in systemd serviceJoshua Watt2023-12-182-0/+2
| | | | | | | | Configures the systemd service file for redis to create the required state directory before redis starts. Signed-off-by: Joshua Watt <JPEWhacker@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.2 -> 7.2.3Wang Mingyu2023-11-2810-1/+1
| | | | | | | | | | | Changelog: ============= -Fix file descriptor leak preventing deleted files from freeing disk space on replicas -Fix a possible crash after cluster node removal Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Inherit pkgconfigPeter Kjellerstedt2023-11-261-1/+1
| | | | | | | The Makefile uses pkg-config if USE_SYSTEMD is "yes". Signed-off-by: Peter Kjellerstedt <peter.kjellerstedt@axis.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.1 -> 7.2.2Wang Mingyu2023-10-2310-1/+1
| | | | | | | | | | | | | | | | | | | | | | Changelog: ============ * (CVE-2023-45145) The wrong order of listen(2) and chmod(2) calls creates a race condition that can be used by another process to bypass desired Unix socket permissions on startup. * Fix compilation error on MacOS 13 (#12611) * WAITAOF could timeout in the absence of write traffic in case a new AOF is created and an AOF rewrite can't immediately start (#12620) * Fix crash when running rebalance command in a mixed cluster of 7.0 and 7.2 nodes (#12604) * Fix the return type of the slot number in cluster shards to integer, which makes it consistent with past behavior (#12561) * Fix CLUSTER commands are called from modules or scripts to return TLS info appropriately (#12569) * redis-cli, fix crash on reconnect when in SUBSCRIBE mode (#12571) * Fix overflow calculation for next timer event (#12474) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* minifi-cpp, mozjs-115, redis-7.2.1, pv: add missing Upstream-StatusMartin Jansa2023-09-272-0/+4
| | | | | Signed-off-by: Martin Jansa <martin.jansa@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.2.0 -> 7.2.1Wang Mingyu2023-09-2010-1/+1
| | | | | | | | | | | | | | Changelog: ========== -(CVE-2023-41053) Redis does not correctly identify keys accessed by SORT_RO and, as a result, may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. -Fix crashes when joining a node to an existing 7.0 Redis Cluster (#12538) Correct request_policy and response_policy command tips on for some admin / configuration commands (#12545, #12530) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.12 -> 7.2.0Wang Mingyu2023-08-2610-13/+9
| | | | | | | | | hiredis-use-default-CC-if-it-is-set.patch oe-use-libc-malloc.patch refreshed for 7.2.0 Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.11 -> 7.0.12Wang Mingyu2023-07-2010-1/+1
| | | | | | | | | | | | | Changelog: ========== -Re-enable downscale rehashing while there is a fork child (#12276) -Fix possible hang in HRANDFIELD, SRANDMEMBER, ZRANDMEMBER when used with <count> (#12276) -Improve fairness issue in RANDOMKEY, HRANDFIELD, SRANDMEMBER, ZRANDMEMBER, SPOP, and eviction (#12276) -Fix WAIT to be effective after a blocked module command being unblocked (#12220) -Avoid unnecessary full sync after master restart in a rare case (#12088) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.12 -> 6.2.13Wang Mingyu2023-07-201-1/+1
| | | | | | | | | Changelogg: ========== Re-enable downscale rehashing while there is a fork child Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* *.patch: add Upstream-Status to all patchesMartin Jansa2023-06-216-0/+12
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | There is new patch-status QA check in oe-core: https://git.openembedded.org/openembedded-core/commit/?id=76a685bfcf927593eac67157762a53259089ea8a This is temporary work around just to hide _many_ warnings from optional patch-status (if you add it to WARN_QA). This just added Upstream-Status: Pending everywhere without actually investigating what's the proper status. This is just to hide current QA warnings and to catch new .patch files being added without Upstream-Status, but the number of Pending patches is now terrible: 5 (26%) meta-xfce 6 (50%) meta-perl 15 (42%) meta-webserver 21 (36%) meta-gnome 25 (57%) meta-filesystems 26 (43%) meta-initramfs 45 (45%) meta-python 47 (55%) meta-multimedia 312 (63%) meta-networking 756 (61%) meta-oe Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: use the files path correctlyChen Qi2023-06-1410-2/+0
| | | | | | | | | | | | | | | | | | | | | Recipes are not expected to set FILESPATH directly, they are expected to use FILESEXTRAPATH. I can see the seting of FILESPATH in this recipe only wants to find redis-7 specific patches and files. This could be easily achieved by using redis-7.0.11/ directory to hold all those files. Using FILESPATH in this way removes the possibility of overriding some files (e.g., the redis service file) from other layers via FILESEXTRAPATH:prepend, which is kind of a common practice and is actually working for basically all other recipes. This is because we have: meta/classes-global/base.bbclass:FILESPATH = "${@base_set_filespath(["${FILE_DIRNAME}/${BP}", "${FILE_DIRNAME}/${BPN}", "${FILE_DIRNAME}/files"], d)}" And FILESEXTRAPATH is handled in base_set_filespath. Signed-off-by: Chen Qi <Qi.Chen@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.11 -> 6.2.12Changqing Li2023-05-111-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.10 -> 7.0.11Wang Mingyu2023-04-231-1/+1
| | | | | Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.9 -> 7.0.10Changqing Li2023-03-221-1/+1
| | | | | | | | | | | | | | | | | | Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: * (CVE-2023-28425) Specially crafted MSETNX command can lead to assertion and denial-of-service Bug Fixes ========= * Large blocks of replica client output buffer may lead to psync loops and unnecessary memory usage (#11666) * Fix CLIENT REPLY OFF|SKIP to not silence push notifications (#11875) * Trim excessive memory usage in stream nodes when exceeding `stream-node-max-bytes` (#11885) * Fix module RM_Call commands failing with OOM when maxmemory is changed to zero (#11319) Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: fix service redis-server restart not working under sysvinitStefan Ghinea2023-03-182-0/+62
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | Under sysvinit when trying to restart redis-server using service redis-server restart two calls are made to start-stop-daemon, first with the --stop argument and then with --start argument consecutively. Because the process doesn't immediately terminate when start-stop-daemon --stop is called, the next call to start-stop-daemon --start finds the process still running and does not attempt to start another one. This leads to only a stop of the redis-server process when a restart is requested. This behavior affects all redis versions using sysvinit only. This can be fixed by using the --retry <timeout/schedule> argument with start-stop-daemon --stop in order for the call to block until the process terminates so that start-stop-daemon --start will attempt to start a new process. Unfortunately the --retry argument works only in the implementation of start-stop-daemon provided by dpkg package and is ignored in the implementation provided by busybox package. A repeated check if the process is still running and another try with another signal after a timeout will effectively simulate a stop with --retry=TERM/5/KILL/5 schedule. Signed-off-by: Stefan Ghinea <stefan.ghinea@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade 7.x to 7.0.9Khem Raj2023-03-051-1/+1
| | | | Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade 6.x recipe to 6.2.11Khem Raj2023-03-051-1/+1
| | | | Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade to 6.2.9Chee Yang Lee2023-01-171-1/+1
| | | | | | | | | | | | | | | | | | | | | | | Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: (CVE-2022-35977) Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands can drive Redis to OOM panic (CVE-2023-22458) Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands can lead to denial-of-service Bug Fixes: Avoid possible hang when client issues long KEYS, SRANDMEMBER, HRANDFIELD, and ZRANDMEMBER commands and gets disconnected by client output buffer limit (#11676) Fix sentinel issue if replica changes IP (#11590) Signed-off-by: Chee Yang Lee <chee.yang.lee@intel.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: Upgrade to 7.0.8Chee Yang Lee2023-01-171-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: (CVE-2022-35977) Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands can drive Redis to OOM panic (CVE-2023-22458) Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands can lead to denial-of-service Bug Fixes Avoid possible hang when client issues long KEYS, SRANDMEMBER, HRANDFIELD, and ZRANDMEMBER commands and gets disconnected by client output buffer limit (#11676) Make sure that fork child doesn't do incremental rehashing (#11692) Fix a bug where blocking commands with a sub-second timeout would block forever (#11688) Fix sentinel issue if replica changes IP (#11590) Signed-off-by: Chee Yang Lee <chee.yang.lee@intel.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: 7.0.5 -> 7.0.7Changqing Li2023-01-062-10/+12
| | | | | | | This upgrade include fix for CVE-2022-3647 Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: 6.2.7 -> 6.2.8Changqing Li2023-01-062-7/+10
| | | | | | | This upgrade include fix for CVE-2022-3647 Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.4 to 7.0.5Changqing Li2022-10-141-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: build with USE_SYSTEMD=yes when systemd is enabledOvidiu Panait2022-09-232-2/+7
| | | | | | | | | | | | | Compile redis with full systemd support when the chosen init system is systemd. Enabling systemd supervision allows redis to communicate the actual server status (i.e. "Loading dataset", "Waiting for master<->replica sync") to systemd, instead of declaring readiness right after initializing the server process. Signed-off-by: Ovidiu Panait <ovidiu.panait@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: fix do_patch fuzz warningChangqing Li2022-08-142-2/+2
| | | | | | | | | | | | | Fix: WARNING: lib32-redis-7.0.4-r0 do_patch: Fuzz detected: Applying patch GNU_SOURCE.patch patching file src/zmalloc.c Hunk #1 succeeded at 32 with fuzz 2 (offset 4 lines). There are two version of redis, and need different GNU_SOURCE.patch Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.2 -> 7.0.4wangmy2022-07-261-1/+1
| | | | | | | | | | | | | | | Changelog: ========== Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: ---------------- (CVE-2022-31144) A specially crafted XAUTOCLAIM command on a stream key in a specific state may result with heap overflow, and potentially remote code execution. The problem affects Redis versions 7.0.0 or newer. Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0.0 to 7.0.2Changqing Li2022-07-111-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.6 -> 6.2.7Changqing Li2022-07-022-7/+9
| | | | | | | | | This upgrade include CVE fix: CVE-2022-24735 CVE-2022-24736 Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 7.0-rc3 -> 7.0.0Changqing Li2022-05-311-1/+1
| | | | | Signed-off-by: Changqing Li <changqing.li@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade to 7.0-rc3Oleksandr Kravchuk2022-04-131-1/+1
| | | | | Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: remove fuzz warningMingli Yu2022-03-091-4/+14
| | | | | | | | | | | | Fixes: WARNING: lib32-redis-7.0-rc1-r0 do_patch: Fuzz detected: Applying patch GNU_SOURCE.patch patching file src/zmalloc.c Hunk #1 succeeded at 32 with fuzz 2 (offset 4 lines). Signed-off-by: Mingli Yu <mingli.yu@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: add recipe for 7.0-rc1Oleksandr Kravchuk2022-02-0310-0/+1702
| | | | | | | | | Redis 7.0 "includes changes that potentially break backwards compatibility with older versions", so let's let folks some time to test 7.0 and later decide which version(s) we want to keep. Signed-off-by: Oleksandr Kravchuk <open.source@oleksandr-kravchuk.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.5 -> 6.2.6wangmy2021-10-141-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Upgrade urgency: SECURITY, contains fixes to security issues. Security Fixes: (CVE-2021-41099) Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value [reported by yiyuaner]. (CVE-2021-32762) Integer to heap buffer overflow issue in redis-cli and redis-sentinel parsing large multi-bulk replies on some older and less common platforms [reported by Microsoft Vulnerability Research]. (CVE-2021-32687) Integer to heap buffer overflow with intsets, when set-max-intset-entries is manually configured to a non-default, very large value [reported by Pawel Wieczorkiewicz, AWS]. (CVE-2021-32675) Denial Of Service when processing RESP request payloads with a large number of elements on many connections. (CVE-2021-32672) Random heap reading issue with Lua Debugger [reported by Meir Shpilraien]. (CVE-2021-32628) Integer to heap buffer overflow handling ziplist-encoded data types, when configuring a large, non-default value for hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value [reported by sundb]. (CVE-2021-32627) Integer to heap buffer overflow issue with streams, when configuring a non-default, large value for proto-max-bulk-len and client-query-buffer-limit [reported by sundb]. (CVE-2021-32626) Specially crafted Lua scripts may result with Heap buffer overflow [reported by Meir Shpilraien]. Bug fixes that involve behavior changes: GEO* STORE with empty source key deletes the destination key and return 0 (#9271) Previously it would have returned an empty array like the non-STORE variant. PUBSUB NUMPAT replies with number of patterns rather than number of subscriptions (#9209) This actually changed in 6.2.0 but was overlooked and omitted from the release notes. Bug fixes that are only applicable to previous releases of Redis 6.2: Fix CLIENT PAUSE, used an old timeout from previous PAUSE (#9477) Fix CLIENT PAUSE in a replica would mess the replication offset (#9448) Add some missing error statistics in INFO errorstats (#9328) Other bug fixes: Fix incorrect reply of COMMAND command key positions for MIGRATE command (#9455) Fix appendfsync to always guarantee fsync before reply, on MacOS and FreeBSD (kqueue) (#9416) Fix the wrong mis-detection of sync_file_range system call, affecting performance (#9371) CLI tools: When redis-cli received ASK response, it didn't handle it (#8930) Improvements: Add latency monitor sample when key is deleted via lazy expire (#9317) Sanitize corrupt payload improvements (#9321, #9399) Delete empty keys when loading RDB file or handling a RESTORE command (#9297, #9349) Signed-off-by: Wang Mingyu <wangmy@fujitsu.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: advance to version 6.2.5Joe Slater2021-09-091-1/+1
| | | | | | | Pull in fix for CVE-2021-32761. Signed-off-by: Joe Slater <joe.slater@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* Convert to new override syntaxMartin Jansa2021-08-031-10/+10
| | | | | | | | | | This is the result of automated script (0.9.1) conversion: oe-core/scripts/contrib/convert-overrides.py . converting the metadata to use ":" as the override character instead of "_". Signed-off-by: Martin Jansa <Martin.Jansa@gmail.com>
* redis: upgrade to 6.2.4Tony Tascioglu2021-06-301-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Upstream changelog: Upgrade urgency: SECURITY, Contains fixes to security issues that affect authenticated client connections. MODERATE otherwise. Fix integer overflow in STRALGO LCS (CVE-2021-32625) An integer overflow bug in Redis version 6.0 or newer can be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. Bug fixes that are only applicable to previous releases of Redis 6.2: Fix crash after a diskless replication fork child is terminated (#8991) Fix redis-benchmark crash on unsupported configs (#8916) Other bug fixes: Fix crash in UNLINK on a stream key with deleted consumer groups (#8932) SINTERSTORE: Add missing keyspace del event when none of the sources exist (#8949) Sentinel: Fix CONFIG SET of empty string sentinel-user/sentinel-pass configs (#8958) Enforce client output buffer soft limit when no traffic (#8833) Improvements: Hide AUTH passwords in MIGRATE command from slowlog (#8859) Signed-off-by: Tony Tascioglu <tony.tascioglu@windriver.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
* redis: upgrade 6.2.2 -> 6.2.3Andreas Müller2021-05-222-7/+5
| | | | | Signed-off-by: Andreas Müller <schnitzeltony@gmail.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>