summaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Redis 3.2.13.3.2.13antirez2019-03-182-1/+7
|
* HyperLogLog: handle wrong offset in the base case.antirez2019-03-181-6/+2
|
* Fix hyperloglog corruptionJohn Sully2019-03-181-0/+6
|
* Replicas aren't allowed to run the replicaof commandJohn Sully2019-03-181-0/+8
|
* Sentinel: add an option to deny online script reconfiguration.antirez2018-06-292-0/+41
| | | | | | | | | | | | The ability of "SENTINEL SET" to change the reconfiguration script at runtime is a problem even in the security model of Redis: any client inside the network may set any executable to be ran once a failover is triggered. This option adds protection for this problem: by default the two SENTINEL SET subcommands modifying scripts paths are denied. However the user is still able to rever that using the Sentinel configuration file in order to allow such a feature.
* Redis 3.2.12.3.2.12antirez2018-06-132-1/+12
|
* Security: fix redis-cli buffer overflow.antirez2018-06-131-11/+16
| | | | | | | Thanks to Fakhri Zulkifli for reporting it. The fix switched to dynamic allocation, copying the final prompt in the static buffer only at the end.
* Security: fix Lua struct package offset handling.antirez2018-06-131-2/+6
| | | | | | | | | | After the first fix to the struct package I found another similar problem, which is fixed by this patch. It could be reproduced easily by running the following script: return struct.unpack('f', "xxxxxxxxxxxxx",-3) The above will access bytes before the 'data' pointer.
* Security: more cmsgpack fixes by @soloestoy.antirez2018-06-131-0/+7
| | | | | | | @soloestoy sent me this additional fixes, after searching for similar problems to the one reported in mp_pack(). I'm committing the changes because it was not possible during to make a public PR to protect Redis users and give Redis providers some time to patch their systems.
* Security: update Lua struct package for security.antirez2018-06-131-23/+23
| | | | | | | | | | | | During an auditing Apple found that the "struct" Lua package we ship with Redis (http://www.inf.puc-rio.br/~roberto/struct/) contains a security problem. A bound-checking statement fails because of integer overflow. The bug exists since we initially integrated this package with Lua, when scripting was introduced, so every version of Redis with EVAL/EVALSHA capabilities exposed is affected. Instead of just fixing the bug, the library was updated to the latest version shipped by the author.
* Security: fix Lua cmsgpack library stack overflow.antirez2018-06-131-0/+3
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | During an auditing effort, the Apple Vulnerability Research team discovered a critical Redis security issue affecting the Lua scripting part of Redis. -- Description of the problem Several years ago I merged a pull request including many small changes at the Lua MsgPack library (that originally I authored myself). The Pull Request entered Redis in commit 90b6337c1, in 2014. Unfortunately one of the changes included a variadic Lua function that lacked the check for the available Lua C stack. As a result, calling the "pack" MsgPack library function with a large number of arguments, results into pushing into the Lua C stack a number of new values proportional to the number of arguments the function was called with. The pushed values, moreover, are controlled by untrusted user input. This in turn causes stack smashing which we believe to be exploitable, while not very deterministic, but it is likely that an exploit could be created targeting specific versions of Redis executables. However at its minimum the issue results in a DoS, crashing the Redis server. -- Versions affected Versions greater or equal to Redis 2.8.18 are affected. -- Reproducing Reproduce with this (based on the original reproduction script by Apple security team): https://gist.github.com/antirez/82445fcbea6d9b19f97014cc6cc79f8a -- Verification of the fix The fix was tested in the following way: 1) I checked that the problem is no longer observable running the trigger. 2) The Lua code was analyzed to understand the stack semantics, and that actually enough stack is allocated in all the cases of mp_pack() calls. 3) The mp_pack() function was modified in order to show exactly what items in the stack were being set, to make sure that there is no silent overflow even after the fix. -- Credits Thank you to the Apple team and to the other persons that helped me checking the patch and coordinating this communication.
* Fix dictScan(): It can't scan all buckets when dict is shrinking.赵磊2018-06-081-11/+14
|
* Actually use ae_flags to add AE_BARRIER if needed.antirez2018-02-281-1/+1
| | | | Many thanks to @Plasma that spotted this problem reviewing the code.
* ae.c: insetad of not firing, on AE_BARRIER invert the sequence.antirez2018-02-271-22/+38
| | | | | | | | | | | | AE_BARRIER was implemented like: - Fire the readable event. - Do not fire the writabel event if the readable fired. However this may lead to the writable event to never be called if the readable event is always fired. There is an alterantive, we can just invert the sequence of the calls in case AE_BARRIER is set. This commit does that.
* AOF: fix a bug that may prevent proper fsyncing when fsync=always.antirez2018-02-271-6/+18
| | | | | | | | | | | In case the write handler is already installed, it could happen that we serve the reply of a query in the same event loop cycle we received it, preventing beforeSleep() from guaranteeing that we do the AOF fsync before sending the reply to the client. The AE_BARRIER mechanism, introduced in a previous commit, prevents this problem. This commit makes actual use of this new feature to fix the bug.
* Cluster: improve crash-recovery safety after failover auth vote.antirez2018-02-271-2/+3
| | | | | | | | Add AE_BARRIER to the writable event loop so that slaves requesting votes can't be served before we re-enter the event loop in the next iteration, so clusterBeforeSleep() will fsync to disk in time. Also add the call to explicitly fsync, given that we modified the last vote epoch variable.
* ae.c: introduce the concept of read->write barrier.antirez2018-02-272-6/+29
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | AOF fsync=always, and certain Redis Cluster bus operations, require to fsync data on disk before replying with an acknowledge. In such case, in order to implement Group Commits, we want to be sure that queries that are read in a given cycle of the event loop, are never served to clients in the same event loop iteration. This way, by using the event loop "before sleep" callback, we can fsync the information just one time before returning into the event loop for the next cycle. This is much more efficient compared to calling fsync() multiple times. Unfortunately because of a bug, this was not always guaranteed: the actual way the events are installed was the sole thing that could control. Normally this problem is hard to trigger when AOF is enabled with fsync=always, because we try to flush the output buffers to the socekt directly in the beforeSleep() function of Redis. However if the output buffers are full, we actually install a write event, and in such a case, this bug could happen. This change to ae.c modifies the event loop implementation to make this concept explicit. Write events that are registered with: AE_WRITABLE|AE_BARRIER Are guaranteed to never fire after the readable event was fired for the same file descriptor. In this way we are sure that data is persisted to disk before the client performing the operation receives an acknowledged. However note that this semantics does not provide all the guarantees that one may believe are automatically provided. Take the example of the blocking list operations in Redis. With AOF and fsync=always we could have: Client A doing: BLPOP myqueue 0 Client B doing: RPUSH myqueue a b c In this scenario, Client A will get the "a" elements immediately after the Client B RPUSH will be executed, even before the operation is persisted. However when Client B will get the acknowledge, it can be sure that "b,c" are already safe on disk inside the list. What to note here is that it cannot be assumed that Client A receiving the element is a guaranteed that the operation succeeded from the point of view of Client B. This is due to the fact that the barrier exists within the same socket, and not between different sockets. However in the case above, the element "a" was not going to be persisted regardless, so it is a pretty synthetic argument.
* rehash: handle one db until finishedzhaozhao.zz2017-11-211-2/+5
|
* fix boundary case for _dictNextPowerkmiku72017-11-081-1/+1
|
* Fix saving of zero-length lists.antirez2017-11-061-2/+3
| | | | | | | | | | | | | | | Normally in modern Redis you can't create zero-len lists, however it's possible to load them from old RDB files generated, for instance, using Redis 2.8 (see issue #4409). The "Right Thing" would be not loading such lists at all, but this requires to hook in rdb.c random places in a not great way, for a problem that is at this point, at best, minor. Here in this commit instead I just fix the fact that zero length lists, materialized as quicklists with the first node set to NULL, were iterated in the wrong way while they are saved, leading to a crash. The other parts of the list implementation are apparently able to deal with empty lists correctly, even if they are no longer a thing.
* Fix buffer overflows occurring reading redis.conf.antirez2017-10-311-0/+3
| | | | | | | | | | | | | | | | | | | There was not enough sanity checking in the code loading the slots of Redis Cluster from the nodes.conf file, this resulted into the attacker's ability to write data at random addresses in the process memory, by manipulating the index of the array. The bug seems exploitable using the following techique: the config file may be altered so that one of the nodes gets, as node ID (which is the first field inside the structure) some data that is actually executable: then by writing this address in selected places, this node ID part can be executed after a jump. So it is mostly just a matter of effort in order to exploit the bug. In practice however the issue is not very critical because the bug requires an unprivileged user to be able to modify the Redis cluster nodes configuration, and at the same time this should result in some gain. However Redis normally is unprivileged as well. Yet much better to have this fixed indeed. Fix #4278.
* Redis 3.2.11.3.2.11antirez2017-09-212-1/+16
|
* Flush append only buffers before existing.Oran Agra2017-09-181-1/+2
| | | | | | when SHUTDOWN command is recived it is possible that some of the recent command were not yet flushed from the AOF buffer, and the server experiences data loss at shutdown.
* Redis 3.2.10.3.2.10antirez2017-07-282-1/+136
|
* Check that the whole first argument is a numberJan-Erik Rediger2017-07-241-2/+3
| | | | Fixes #2258
* fix rewrite config: auto-aof-rewrite-min-sizeWuYunlong2017-07-241-2/+2
|
* Fixed issue #1996 (Missing '-' in help message for redis-benchmark)Byron Grobe2017-07-241-1/+1
|
* Don't use extended Regexp SyntaxJan-Erik Rediger2017-07-241-6/+6
| | | | | | It's not POSIX (BSD systems have -E instead) and we don't actually need it. Closes #1922
* fix return wrong value of clusterDelNodeSlotsLeon Chen2017-07-241-2/+4
|
* fix mismatch argumentLeon Chen2017-07-241-1/+1
|
* Fix lua ldb command logliangsijian2017-07-241-0/+1
|
* Make representClusterNodeFlags() more robust.antirez2017-07-241-16/+17
| | | | | | | | | This function failed when an internal-only flag was set as an only flag in a node: the string was trimmed expecting a final comma before exiting the function, causing a crash. See issue #4142. Moreover generation of flags representation only needed at DEBUG log level was always performed: a waste of CPU time. This is fixed as well by this commit.
* Fix isHLLObjectOrReply() to handle integer encoded strings.antirez2017-07-111-0/+1
| | | | Close #3766.
* Fix abort typo in Lua debugger help screen.antirez2017-06-301-1/+1
|
* Added GEORADIUS(BYMEMBER)_RO variants for read-only operations.antirez2017-06-303-11/+32
| | | | | | | | | | | | | | | | | | | Issue #4084 shows how for a design error, GEORADIUS is a write command because of the STORE option. Because of this it does not work on readonly slaves, gets redirected to masters in Redis Cluster even when the connection is in READONLY mode and so forth. To break backward compatibility at this stage, with Redis 4.0 to be in advanced RC state, is problematic for the user base. The API can be fixed into the unstable branch soon if we'll decide to do so in order to be more consistent, and reease Redis 5.0 with this incompatibility in the future. This is still unclear. However, the ability to scale GEO queries in slaves easily is too important so this commit adds two read-only variants to the GEORADIUS and GEORADIUSBYMEMBER command: GEORADIUS_RO and GEORADIUSBYMEMBER_RO. The commands are exactly as the original commands, but they do not accept the STORE and STOREDIST options.
* Fix following issues in blocking commands:Suraj Narkhede2017-06-271-0/+1
| | | | | | 1. brpop last key index, thus checking all keys for slots. 2. Memory leak in clusterRedirectBlockedClientIfNeeded. 3. Remove while loop in clusterRedirectBlockedClientIfNeeded.
* Fix brpop command table entry and redirect blocked clients.Suraj Narkhede2017-06-272-2/+3
|
* Fix PERSIST expired key resuscitation issue #4048.antirez2017-06-271-7/+4
|
* Removed duplicate 'sys/socket.h' includeAntonio Mallia2017-06-271-1/+0
|
* Prevent expirations and evictions while pausedZachary Marquez2017-06-271-0/+10
| | | | Proposed fix to https://github.com/antirez/redis/issues/4027
* Collect fork() timing info only if fork succeeded.antirez2017-06-271-3/+4
|
* Aesthetic changes to #4068 PR to conform to Redis coding standard.antirez2017-06-221-7/+6
| | | | | 1. Inline if ... statement if short. 2. No lines over 80 columns.
* Optimize set command with ex/px when updating aof.xuzhou2017-06-221-3/+3
|
* redis-benchmark: add -t hset target.antirez2017-06-221-0/+7
|
* Fix set with ex/px option when propagated to aofxuzhou2017-06-224-1/+36
|
* fix server.stat_net_output_bytes calc bugminghang.zmh2017-06-201-1/+1
|
* Fixed comments of slowlog durationxuchengxuan2017-06-201-1/+1
|
* cli: Only print elapsed time on OUTPUT_STANDARDcbgbt2017-06-201-1/+3
|
* (fix) Update create-cluster READMEAric Huang2017-06-201-4/+4
| | | Fix a few typos/adjust wording in `create-cluster` README
* Merge pull request #3926 from QuChen88/3.2Salvatore Sanfilippo2017-06-143-2/+41
|\ | | | | Implement getKeys procedure for georadius and georadiusbymember commands