Skip to content

Commit b987380

Browse files
authored
DOC-5833 RS: Added Emily, Irene, and Joyce fixes to the release notes (#2333)
1 parent 8c1fed7 commit b987380

File tree

7 files changed

+243
-7
lines changed

7 files changed

+243
-7
lines changed

content/operate/rs/release-notes/rs-6-4-2-releases/rs-6-4-2-131.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -92,10 +92,20 @@ As part of Redis's commitment to security, Redis Enterprise Software implements
9292

9393
Some CVEs announced for open source Redis do not affect Redis Enterprise due to different or additional functionality available in Redis Enterprise that is not available in open source Redis.
9494

95-
Redis Enterprise 6.4.2-131 supports open source Redis 6.2 and 6.0. Below is the list of open source Redis CVEs fixed by version.
95+
Redis Enterprise 6.4.2-131 supports open source Redis 6.2 and 6.0. Below is the list of open source Redis CVEs and other security vulnerabilities fixed by version.
9696

9797
Redis 6.2.x:
9898

99+
- RedisBloom: Cuckoo filter counter overflow.
100+
101+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
102+
103+
- RedisBloom: Reachable assert in `TopK_Create`
104+
105+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
106+
107+
- RedisBloom: Division by zero in Cuckoo filter insertion.
108+
99109
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
100110

101111
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.
@@ -158,6 +168,16 @@ socket permissions on startup. (Redis 6.2.14)
158168

159169
Redis 6.0.x:
160170

171+
- RedisBloom: Cuckoo filter counter overflow.
172+
173+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
174+
175+
- RedisBloom: Reachable assert in `TopK_Create`
176+
177+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
178+
179+
- RedisBloom: Division by zero in Cuckoo filter insertion.
180+
161181
- (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. (Redis 6.0.20)
162182

163183
- (CVE-2023-28856) Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access. (Redis 6.0.19)

content/operate/rs/release-notes/rs-7-2-4-releases/rs-7-2-4-138.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -91,10 +91,20 @@ As part of Redis's commitment to security, Redis Enterprise Software implements
9191

9292
Some CVEs announced for open source Redis do not affect Redis Enterprise due to different or additional functionality available in Redis Enterprise that is not available in open source Redis.
9393

94-
Redis Enterprise 7.2.4-138 supports open source Redis 7.2, 6.2, and 6.0. Below is the list of open source Redis CVEs fixed by version.
94+
Redis Enterprise 7.2.4-138 supports open source Redis 7.2, 6.2, and 6.0. Below is the list of open source Redis CVEs and other security vulnerabilities fixed by version.
9595

9696
Redis 7.2.x:
9797

98+
- RedisBloom: Cuckoo filter counter overflow.
99+
100+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
101+
102+
- RedisBloom: Reachable assert in `TopK_Create`
103+
104+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
105+
106+
- RedisBloom: Division by zero in Cuckoo filter insertion.
107+
98108
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
99109

100110
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.
@@ -151,6 +161,16 @@ Redis 7.0.x:
151161

152162
Redis 6.2.x:
153163

164+
- RedisBloom: Cuckoo filter counter overflow.
165+
166+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
167+
168+
- RedisBloom: Reachable assert in `TopK_Create`
169+
170+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
171+
172+
- RedisBloom: Division by zero in Cuckoo filter insertion.
173+
154174
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
155175

156176
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.
@@ -213,6 +233,16 @@ socket permissions on startup. (Redis 6.2.14)
213233

214234
Redis 6.0.x:
215235

236+
- RedisBloom: Cuckoo filter counter overflow.
237+
238+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
239+
240+
- RedisBloom: Reachable assert in `TopK_Create`
241+
242+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
243+
244+
- RedisBloom: Division by zero in Cuckoo filter insertion.
245+
216246
- (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. (Redis 6.0.20)
217247

218248
- (CVE-2023-28856) Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access. (Redis 6.0.19)

content/operate/rs/release-notes/rs-7-22-releases/rs-7-22-2-14.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -159,10 +159,20 @@ As part of Redis's commitment to security, Redis Enterprise Software implements
159159

160160
Some CVEs announced for open source Redis do not affect Redis Enterprise Software due to different or additional functionality available in Redis Enterprise Software that is not available in open source Redis.
161161

162-
Redis Enterprise Software 7.22.2-14 supports open source Redis 7.4, 7.2, and 6.2. Below is the list of open source Redis CVEs fixed by version.
162+
Redis Enterprise Software 7.22.2-14 supports open source Redis 7.4, 7.2, and 6.2. Below is the list of open source Redis CVEs and other security vulnerabilities fixed by version.
163163

164164
Redis 7.4.x:
165165

166+
- RedisBloom: Cuckoo filter counter overflow.
167+
168+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
169+
170+
- RedisBloom: Reachable assert in `TopK_Create`
171+
172+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
173+
174+
- RedisBloom: Division by zero in Cuckoo filter insertion.
175+
166176
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
167177

168178
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.
@@ -175,6 +185,16 @@ Redis 7.4.x:
175185

176186
Redis 7.2.x:
177187

188+
- RedisBloom: Cuckoo filter counter overflow.
189+
190+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
191+
192+
- RedisBloom: Reachable assert in `TopK_Create`
193+
194+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
195+
196+
- RedisBloom: Division by zero in Cuckoo filter insertion.
197+
178198
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
179199

180200
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.
@@ -229,6 +249,16 @@ Redis 7.0.x:
229249

230250
Redis 6.2.x:
231251

252+
- RedisBloom: Cuckoo filter counter overflow.
253+
254+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
255+
256+
- RedisBloom: Reachable assert in `TopK_Create`
257+
258+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
259+
260+
- RedisBloom: Division by zero in Cuckoo filter insertion.
261+
232262
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
233263

234264
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.

content/operate/rs/release-notes/rs-7-22-releases/rs-7-22-2-20.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -149,10 +149,20 @@ As part of Redis's commitment to security, Redis Enterprise Software implements
149149

150150
Some CVEs announced for open source Redis do not affect Redis Enterprise Software due to different or additional functionality available in Redis Enterprise Software that is not available in open source Redis.
151151

152-
Redis Enterprise Software 7.22.2-20 supports open source Redis 7.4, 7.2, and 6.2. Below is the list of open source Redis CVEs fixed by version.
152+
Redis Enterprise Software 7.22.2-20 supports open source Redis 7.4, 7.2, and 6.2. Below is the list of open source Redis CVEs and other security vulnerabilities fixed by version.
153153

154154
Redis 7.4.x:
155155

156+
- RedisBloom: Cuckoo filter counter overflow.
157+
158+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
159+
160+
- RedisBloom: Reachable assert in `TopK_Create`
161+
162+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
163+
164+
- RedisBloom: Division by zero in Cuckoo filter insertion.
165+
156166
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
157167

158168
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.
@@ -167,6 +177,16 @@ Redis 7.4.x:
167177

168178
Redis 7.2.x:
169179

180+
- RedisBloom: Cuckoo filter counter overflow.
181+
182+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
183+
184+
- RedisBloom: Reachable assert in `TopK_Create`
185+
186+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
187+
188+
- RedisBloom: Division by zero in Cuckoo filter insertion.
189+
170190
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
171191

172192
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.
@@ -223,6 +243,16 @@ Redis 7.0.x:
223243

224244
Redis 6.2.x:
225245

246+
- RedisBloom: Cuckoo filter counter overflow.
247+
248+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
249+
250+
- RedisBloom: Reachable assert in `TopK_Create`
251+
252+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
253+
254+
- RedisBloom: Division by zero in Cuckoo filter insertion.
255+
226256
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
227257

228258
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.

content/operate/rs/release-notes/rs-7-4-2-releases/rs-7-4-6-272.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -212,10 +212,20 @@ As part of Redis's commitment to security, Redis Enterprise Software implements
212212

213213
Some CVEs announced for open source Redis do not affect Redis Enterprise due to different or additional functionality available in Redis Enterprise that is not available in open source Redis.
214214

215-
Redis Enterprise 7.4.6-272 supports open source Redis 7.2, 6.2, and 6.0. Below is the list of open source Redis CVEs fixed by version.
215+
Redis Enterprise 7.4.6-272 supports open source Redis 7.2, 6.2, and 6.0. Below is the list of open source Redis CVEs and other security vulnerabilities fixed by version.
216216

217217
Redis 7.2.x:
218218

219+
- RedisBloom: Cuckoo filter counter overflow.
220+
221+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
222+
223+
- RedisBloom: Reachable assert in `TopK_Create`
224+
225+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
226+
227+
- RedisBloom: Division by zero in Cuckoo filter insertion.
228+
219229
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
220230

221231
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.
@@ -272,6 +282,16 @@ Redis 7.0.x:
272282

273283
Redis 6.2.x:
274284

285+
- RedisBloom: Cuckoo filter counter overflow.
286+
287+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
288+
289+
- RedisBloom: Reachable assert in `TopK_Create`
290+
291+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
292+
293+
- RedisBloom: Division by zero in Cuckoo filter insertion.
294+
275295
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
276296

277297
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.
@@ -330,6 +350,16 @@ Redis 6.2.x:
330350

331351
Redis 6.0.x:
332352

353+
- RedisBloom: Cuckoo filter counter overflow.
354+
355+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
356+
357+
- RedisBloom: Reachable assert in `TopK_Create`
358+
359+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
360+
361+
- RedisBloom: Division by zero in Cuckoo filter insertion.
362+
333363
- (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. (Redis 6.0.20)
334364

335365
- (CVE-2023-28856) Authenticated users can use the `HINCRBYFLOAT` command to create an invalid hash field that will crash Redis on access. (Redis 6.0.19)

content/operate/rs/release-notes/rs-7-8-releases/rs-7-8-6-207.md

Lines changed: 31 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -141,10 +141,20 @@ As part of Redis's commitment to security, Redis Software implements the latest
141141

142142
Some CVEs announced for open source Redis do not affect Redis Software due to different or additional functionality available in Redis Software that is not available in open source Redis.
143143

144-
Redis Software 7.8.6-207 supports open source Redis 7.4, 7.2, and 6.2. Below is the list of open source Redis CVEs fixed by version.
144+
Redis Software 7.8.6-207 supports open source Redis 7.4, 7.2, and 6.2. Below is the list of open source Redis CVEs and other security vulnerabilities fixed by version.
145145

146146
Redis 7.4.x:
147147

148+
- RedisBloom: Cuckoo filter counter overflow.
149+
150+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
151+
152+
- RedisBloom: Reachable assert in `TopK_Create`
153+
154+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
155+
156+
- RedisBloom: Division by zero in Cuckoo filter insertion.
157+
148158
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
149159

150160
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.
@@ -159,6 +169,16 @@ Redis 7.4.x:
159169

160170
Redis 7.2.x:
161171

172+
- RedisBloom: Cuckoo filter counter overflow.
173+
174+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
175+
176+
- RedisBloom: Reachable assert in `TopK_Create`
177+
178+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
179+
180+
- RedisBloom: Division by zero in Cuckoo filter insertion.
181+
162182
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
163183

164184
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.
@@ -215,6 +235,16 @@ Redis 7.0.x:
215235

216236
Redis 6.2.x:
217237

238+
- RedisBloom: Cuckoo filter counter overflow.
239+
240+
- RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.
241+
242+
- RedisBloom: Reachable assert in `TopK_Create`
243+
244+
- RedisBloom: Out-of-bounds access with empty Bloom chains.
245+
246+
- RedisBloom: Division by zero in Cuckoo filter insertion.
247+
218248
- (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.
219249

220250
- (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.

0 commit comments

Comments
 (0)