Skip to content

Commit af12f8e

Browse files
committed
Redis 3.2.7.
1 parent 3876d98 commit af12f8e

File tree

2 files changed

+96
-1
lines changed

2 files changed

+96
-1
lines changed

00-RELEASENOTES

Lines changed: 95 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,101 @@ HIGH: There is a critical bug that may affect a subset of users. Upgrade!
1010
CRITICAL: There is a critical bug affecting MOST USERS. Upgrade ASAP.
1111
--------------------------------------------------------------------------------
1212

13+
================================================================================
14+
Redis 3.2.7 Released Tue Jan 31 16:21:41 CET 2017
15+
================================================================================
16+
17+
Upgrade urgency HIGH: This release fixes important security and correctness
18+
issues. It is especially important to upgrade for Redis
19+
Cluster users and for users running Redis in their laptop
20+
since a cross-scripting attack is fixed in this release.
21+
22+
Main bugs fixes and improvements in this release:
23+
24+
1. MIGRATE could incorrectly move keys between Redis Cluster nodes by turning
25+
keys with an expire set into persisting keys. This bug was introduced with
26+
the multiple-keys migration recently. It is now fixed. Only applies to
27+
Redis Cluster users that use the resharding features of Redis Cluster.
28+
29+
2. As Redis 4.0 beta and the unstable branch already did (for some months at
30+
this point), Redis 3.2.7 also aliases the Host: and POST commands to QUIT
31+
avoiding to process the remaining pipeline if there are pending commands.
32+
This is a security protection against a "Cross Scripting" attack, that
33+
usually involves trying to feed Redis with HTTP in order to execute commands.
34+
Example: a developer is running a local copy of Redis for development
35+
purposes. She also runs a web browser in the same computer. The web browser
36+
could send an HTTP request to http://127.0.0.1:6379 in order to access the
37+
Redis instance, since a specially crafted HTTP requesta may also be partially
38+
valid Redis protocol. However if POST and Host: break the connection, this
39+
problem should be avoided. IMPORTANT: It is important to realize that it
40+
is not impossible that another way will be found to talk with a localhost
41+
Redis using a Cross Protocol attack not involving sending POST or Host: so
42+
this is only a layer of protection but not a definitive fix for this class
43+
of issues.
44+
45+
3. A ziplist bug that could cause data corruption, could crash the server and
46+
MAY ALSO HAVE SECURITY IMPLICATIONS was fixed. The bug looks complex to
47+
exploit, but attacks always get worse, never better (cit). The bug is very
48+
very hard to catch in practice, it required manual analysis of the ziplist
49+
code in order to be found. However it is also possible that rarely it
50+
happened in the wild. Upgrading is required if you use LINSERT and other
51+
in-the-middle list manipulation commands.
52+
53+
4. We upgraded to Jemalloc 4.4.0 since the version we used to ship with Redis
54+
was an early 4.0 release of Jemalloc. This version may have several
55+
improvements including the ability to better reclaim/use the memory of
56+
system.
57+
58+
The following is the list of commits:
59+
60+
antirez in commit 3876d98:
61+
Ziplist: insertion bug under particular conditions fixed.
62+
1 file changed, 9 insertions(+), 1 deletion(-)
63+
64+
antirez in commit 153f2f0:
65+
Jemalloc updated to 4.4.0.
66+
150 files changed, 17271 insertions(+), 6356 deletions(-)
67+
68+
miter in commit ca532c9:
69+
Change switch statment to if statment
70+
1 file changed, 2 insertions(+), 4 deletions(-)
71+
72+
oranagra in commit a735035:
73+
fix rare assertion in DEBUG DIGEST
74+
1 file changed, 1 insertion(+), 1 deletion(-)
75+
76+
Itamar Haber in commit b917e3f:
77+
Verify pairs are provided after subcommands
78+
1 file changed, 1 insertion(+), 1 deletion(-)
79+
80+
antirez in commit 1177cf6:
81+
Avoid geo.c warning in initialization.
82+
1 file changed, 1 insertion(+), 1 deletion(-)
83+
84+
antirez in commit 874804d:
85+
Security: Cross Protocol Scripting protection.
86+
3 files changed, 27 insertions(+), 2 deletions(-)
87+
88+
antirez in commit 273cd7f:
89+
Ziplist: remove static from functions, they prevent good crash reports.
90+
1 file changed, 14 insertions(+), 14 deletions(-)
91+
92+
Jan-Erik Rediger in commit 389b9f5:
93+
Initialize help only in repl mode
94+
1 file changed, 5 insertions(+), 5 deletions(-)
95+
96+
Yossi Gottlieb in commit 1370a88:
97+
Fix redis-cli rare crash.
98+
1 file changed, 4 insertions(+)
99+
100+
antirez in commit 68aab8e:
101+
MIGRATE: Remove upfront ttl initialization.
102+
1 file changed, 3 insertions(+), 4 deletions(-)
103+
104+
Jan-Erik Rediger in commit 788e892:
105+
Reset the ttl for additional keys
106+
1 file changed, 1 insertion(+)
107+
13108
================================================================================
14109
Redis 3.2.6 Released Tue Dec 06 09:33:29 CET 2016
15110
================================================================================

src/version.h

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
#define REDIS_VERSION "3.2.6"
1+
#define REDIS_VERSION "3.2.7"

0 commit comments

Comments
 (0)