diff options
author | Oran Agra <oran@redislabs.com> | 2021-10-04 10:10:52 +0300 |
---|---|---|
committer | Oran Agra <oran@redislabs.com> | 2021-10-04 13:58:43 +0300 |
commit | 704ba5f5b22ae1ecafbcfb7a3258311c27ff94ff (patch) | |
tree | 5e14c78b601f6bdaa88f4e1968f3be3004406000 | |
parent | 6facfb7a103b26b9a602253a738b2130afb7c5d3 (diff) | |
download | redis-704ba5f5b22ae1ecafbcfb7a3258311c27ff94ff.tar.gz |
Redis 5.0.145.0.14
-rw-r--r-- | 00-RELEASENOTES | 30 | ||||
-rw-r--r-- | src/version.h | 2 |
2 files changed, 31 insertions, 1 deletions
diff --git a/00-RELEASENOTES b/00-RELEASENOTES index 11dffc8a6..21b437556 100644 --- a/00-RELEASENOTES +++ b/00-RELEASENOTES @@ -12,6 +12,36 @@ SECURITY: There are security fixes in the release. -------------------------------------------------------------------------------- ================================================================================ +Redis 5.0.14 Released Mon Oct 4 12:00:00 IDT 2021 +================================================================================ + +Upgrade urgency: SECURITY, contains fixes to security issues. + +Security Fixes: +* (CVE-2021-41099) Integer to heap buffer overflow handling certain string + commands and network payloads, when proto-max-bulk-len is manually configured + to a non-default, very large value [reported by yiyuaner]. +* (CVE-2021-32762) Integer to heap buffer overflow issue in redis-cli and + redis-sentinel parsing large multi-bulk replies on some older and less common + platforms [reported by Microsoft Vulnerability Research]. +* (CVE-2021-32687) Integer to heap buffer overflow with intsets, when + set-max-intset-entries is manually configured to a non-default, very large + value [reported by Pawel Wieczorkiewicz, AWS]. +* (CVE-2021-32675) Denial Of Service when processing RESP request payloads with + a large number of elements on many connections. +* (CVE-2021-32672) Random heap reading issue with Lua Debugger [reported by + Meir Shpilraien]. +* (CVE-2021-32628) Integer to heap buffer overflow handling ziplist-encoded + data types, when configuring a large, non-default value for + hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries + or zset-max-ziplist-value [reported by sundb]. +* (CVE-2021-32627) Integer to heap buffer overflow issue with streams, when + configuring a non-default, large value for proto-max-bulk-len and + client-query-buffer-limit [reported by sundb]. +* (CVE-2021-32626) Specially crafted Lua scripts may result with Heap buffer + overflow [reported by Meir Shpilraien]. + +================================================================================ Redis 5.0.13 Released Wed Jul 21 16:32:19 IDT 2021 ================================================================================ diff --git a/src/version.h b/src/version.h index 58eb2990f..b439ff2f0 100644 --- a/src/version.h +++ b/src/version.h @@ -1 +1 @@ -#define REDIS_VERSION "5.0.13" +#define REDIS_VERSION "5.0.14" |