Back to Redis

Rs 8 0 2 17

content/operate/rs/release-notes/rs-8-0-releases/rs-8-0-2-17.md

latest54.8 KB
Original Source

​Redis Software version 8.0.2 is now available!

Highlights

This version offers:

  • Redis 8.0 and 8.2 feature set versions

  • Performance improvements and memory reduction

  • New vector set data structure

  • Redis Flex revamped engine

  • Redis Search upgrades

  • Lag-aware availability API

  • Metrics stream engine (General Availability)

  • Simplified module management

  • New REST API fields for database and cluster configuration

  • Customer-managed certificates for internode encryption

  • Smart client handoffs

New in this release

New features

Redis 8.0 and 8.2 feature sets

Redis 8.0 and 8.2 feature sets are now available when you [create]({{<relref "/operate/rs/databases/create">}}) or [upgrade]({{<relref "/operate/rs/installing-upgrading/upgrading/upgrade-database">}}) a database with database version 8.2.

Redis 8.0 feature set and enhancements
  • Preview of a new [vector set]({{<relref "/develop/data-types/vector-sets">}}) data structure that supports high-dimensional vector similarity search, ideal for AI use cases such as semantic search and recommendation systems.

  • New hash commands [HGETEX]({{<relref "/commands/hgetex">}}), [HSETEX]({{<relref "/commands/hsetex">}}), and [HGETDEL]({{<relref "/commands/hgetdel">}}), which can simplify caching and session management patterns.

  • Enhanced access control lists (ACLs) to support new data structures introduced in Redis 8.

    • Existing ACL categories such as @read and @write now include commands for JSON, time series, vector, and probabilistic data structures.

    • New ACL categories: @search, @json, @timeseries, @bloom, @cuckoo, @topk, @cms, and @tdigest.

  • Redis Search improvements.

  • Significant performance improvements, including:

    • Up to 87% lower command latency.

    • 35% memory savings for replica nodes.

    • 16x more query processing capacity with horizontal and vertical scaling.

  • See [What's new in Redis 8.0]({{<relref "/develop/whats-new/8-0">}}) and [Redis Open Source 8.0 release notes]({{<relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisce/redisos-8.0-release-notes">}}) for more details.

Redis 8.2 feature set and enhancements
  • New Redis streams commands [XDELEX]({{<relref "/commands/xdelex">}}) and [XACKDEL]({{<relref "/commands/xackdel">}}) that simplify consumer group management and stream lifecycle operations.

  • New operators DIFF, DIFF1, ANDOR, and ONE for the [BITOP]({{<relref "/commands/bitop">}}) command, which enable more complex bitmap workflows and can simplify operations that previously required multiple commands.

  • New keyspace notification event types OVERWRITTEN and TYPE_CHANGED that provide better visibility into data changes.

  • Performance optimizations and memory efficiency improvements.

  • Redis Search improvements:

    • New [SVS-VAMANA vector index]({{<relref "/develop/ai/search-and-query/vectors#svs-vamana-index">}}) type, which supports vector compression.

    • New SHARD_K_RATIO parameter for [K-nearest neighbor (KNN) vector queries]({{<relref "develop/ai/search-and-query/vectors#knn-vector-search">}}), which favors network latency over accuracy to provide faster responses when exact precision isn't critical.

  • See [What's new in Redis 8.2]({{<relref "/develop/whats-new/8-2">}}) and [Redis Open Source 8.2 release notes]({{<relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisce/redisos-8.2-release-notes">}}) for more details.

Built-in capabilities with Redis 8

Redis Software databases created with or upgraded to Redis version 8 include all the Redis capabilities, built in the database version as follows:

Database typeAutomatically enabled capabilities
RAM-only[Search and query]({{<relref "/operate/oss_and_stack/stack-with-enterprise/search">}})
[JSON]({{<relref "/operate/oss_and_stack/stack-with-enterprise/json">}})
[Time series]({{<relref "/operate/oss_and_stack/stack-with-enterprise/timeseries">}})
[Probabilistic]({{<relref "/operate/oss_and_stack/stack-with-enterprise/bloom">}})
Flash-enabled ([Redis Flex]({{<relref "/operate/rs/databases/flash">}}))[JSON]({{<relref "/operate/oss_and_stack/stack-with-enterprise/json">}})
[Probabilistic]({{<relref "/operate/oss_and_stack/stack-with-enterprise/bloom">}})
[Active-Active]({{<relref "/operate/rs/databases/active-active">}})[Search and query]({{<relref "/operate/oss_and_stack/stack-with-enterprise/search/search-active-active">}})
[JSON]({{<relref "/operate/oss_and_stack/stack-with-enterprise/json">}})

Performance improvements and memory reduction

  • More than 30 performance, resource utilization, and memory footprint improvements.

  • An improved replication mechanism that is more performant (faster) and robust and saves up to 35% memory during replication.

  • Up to 87% lower command latency.

  • Redis Search: Up to 144% higher QPS and new vector compression.

Redis Flex revamped engine

Redis Flex is getting a revamped engine with performance improvements, increased stability, and the removal of previous limitations around RAM utilization.

Redis Flex now offloads the least used keys with their values, allowing more hot data to be stored in RAM. This increases performance for most real-world use cases.

Past limitations requiring minimum RAM allocation to store all the database's keys are no longer relevant, allowing more flexibility and higher resource utilization.

  • Databases with Redis version 8.2 and later (newly created or upgraded to those versions) automatically use the new Redis Flex engine.

  • Databases with Redis version 7.4 and earlier will continue to run on the previous engine.

For more information about Redis Flex, see:

  • [Redis Flex overview]({{< relref "/operate/rs/databases/flash" >}})
  • [Redis Flex quick start]({{< relref "/operate/rs/databases/flash/quickstart" >}})

Lag-aware availability API

The [database availability API]({{<relref "/operate/rs/references/rest-api/requests/bdbs/availability">}}) now supports lag-aware availability checks that consider replication lag tolerance.

You can reduce the risk of data inconsistencies during disaster recovery by incorporating lag-aware availability checks into your disaster recovery solution and ensuring failover-failback flows only occur when databases are accessible and sufficiently synchronized.

The lag tolerance threshold is 100 milliseconds by default. Depending on factors such as workload, network conditions, and throughput, you might want to adjust the lag tolerance threshold using one of the following methods:

  • Change the default threshold for the entire cluster by setting availability_lag_tolerance_ms with an [update cluster]({{<relref "/operate/rs/references/rest-api/requests/cluster#put-cluster">}}) request.

  • Override the default threshold by adding the availability_lag_tolerance_ms query parameter to specific lag-aware [availability checks]({{<relref "/operate/rs/references/rest-api/requests/bdbs/availability">}}). For example:

    sh
    GET /v1/bdbs/<database_id>/availability?extend_check=lag&availability_lag_tolerance_ms=100
    

For more details, see [Check database availability for monitoring and load balancers]({{<relref "/operate/rs/monitoring/db-availability">}}).

Metrics stream engine GA

The [metrics stream engine]({{<relref "/operate/rs/monitoring/metrics_stream_engine">}}) is now generally available:

  • The metrics stream engine's exporter-based infrastructure provides access to more accurate, real-time data. This enhanced, scalable monitoring system allows you to set up more effective alerts and respond to issues faster.

  • Exposes a new /v2 Prometheus scraping endpoint that you can use to export metrics to external monitoring tools such as Grafana, DataDog, NewRelic, and Dynatrace.

  • Exports raw data instead of aggregated data to improve monitoring at scale and accuracy compared to v1 Prometheus metrics.

  • For a list of metrics exported by the metrics stream engine, see [Prometheus metrics v2]({{<relref "/operate/rs/references/metrics/prometheus-metrics-v2">}}).

  • To transition to the metrics stream engine, either migrate your existing dashboards using [Prometheus v1 metrics and equivalent v2 PromQL]({{<relref "/operate/rs/references/metrics/prometheus-metrics-v1-to-v2">}}) or use [new preconfigured dashboards]({{<relref "/integrate/prometheus-with-redis-enterprise#v2-metrics-dashboards">}}).

  • As part of the transition to the metrics stream engine, some internal cluster manager alerts were deprecated in favor of external monitoring solutions. See the [alerts transition plan]({{<relref "/operate/rs/references/alerts/alerts-v1-to-v2">}}) for guidance.

  • See [Best practices for monitoring]({{<relref "/operate/rs/monitoring/metrics_stream_engine#best-practices-for-monitoring">}}) for a list of recommended metrics to monitor.

Customer-managed certificates for internode encryption

Instead of using Redis Software's self-signed certificates for internode encryption, you can provide certificates generated by your Certificate Authority (CA). See [Customer-provided certificates ]({{<relref "/operate/rs/security/encryption/internode-encryption#customer-provided-certificates">}}) for details.

Smart client handoffs

Smart client handoffs enable zero-disruption maintenance for Redis databases by allowing clients to reconnect gracefully during planned operations like cluster upgrades or database version upgrades. Applications stay online with no hard disconnects or timeout errors. See [Smart client handoffs]({{<relref "/operate/rs/clusters/configure/sch">}}) for more information.

Enhancements

  • Module management enhancements:

    • Operating system (OS) upgrades no longer require manually uploading module packages compiled for the target OS version to a node in the existing cluster.

    • Copying module packages to a node in the cluster before cluster recovery is no longer required.

    • Added new REST API requests to manage custom, user-defined modules. See [Custom module management APIs]({{<relref "/operate/rs/references/rest-api/requests/modules/user-defined">}}) for details.

    • Added module configuration fields to the database configuration. Use search, query_performance_factor, timeseries, and probabilistic objects to configure Redis modules instead of the deprecated module_args field. These fields are visible in [GET /v1/bdbs]({{<relref "/operate/rs/references/rest-api/requests/bdbs">}}) requests only when using the extended=true query parameter.

    • Added --update-db-config-modules option to the [crdb-cli crdb update]({{<relref "/operate/rs/references/cli-utilities/crdb-cli/crdb/update">}}) command to streamline updating module information in the CRDB configuration after upgrading modules used by Active-Active databases. Use this option only after all CRDB database instances have upgraded their modules.

      sh
      crdb-cli crdb update --crdb-guid <guid> --update-db-config-modules true
      
  • Added a check to block new user creation after the maximum limit of 32,000 users has been reached:

    • Added a [cluster alert]({{<relref "operate/rs/references/rest-api/objects/cluster/alert_settings">}}) cluster_users_count_approaches_limit, which triggers when the number of users surpasses a threshold percentage of the maximum user limit. This alert is enabled with a 90% threshold by default on new clusters.

    • Added a users_count cluster metric to [Prometheus metrics v2]({{<relref "/operate/rs/references/metrics/prometheus-metrics-v2">}}) that shows the current number of users on the cluster.

  • Additional REST API enhancements:

    • New last_login field for [users]({{<relref "/operate/rs/references/rest-api/requests/users">}}), which stores the UNIX timestamp of the user's last successful login to the Cluster Manager UI or REST API.

    • Added [cluster configuration]({{<relref "/operate/rs/references/rest-api/requests/cluster">}}) fields:

      • disconnect_clients_on_password_removal: Controls whether client connections using removed, revoked, or rotated passwords are actively disconnected.

      • replica_sconns_on_demand: When enabled, the DMC stops holding persistent connections to replica shards and reduces the number of internode connections by half.

      • metrics_auth: If set to true, enables basic authentication for Prometheus exporters and restricts access to authenticated users with admin, cluster_member, or cluster_viewer [management roles]({{<relref "/operate/rs/references/rest-api/permissions">}}).

    • Added [database configuration]({{<relref "/operate/rs/references/rest-api/requests/bdbs">}}) fields:

      • conns_global_maximum_dedicated: Defines the maximum number of dedicated server connections for a database across all workers.

      • conns_minimum_dedicated: Defines the minimum number of dedicated server connections the DMC maintains per worker per shard.

      • disconnect_clients_on_password_removal: Controls whether client connections using removed, revoked, or rotated passwords are actively disconnected.

      • link_sconn_on_full_request: Feature flag for DMC behavior on linking client requests.

      • partial_request_timeout_seconds: Timeout for incomplete client commands that cause head-of-line blocking.

      • preemptive_drain_timeout_seconds: Timeout for preemptive drain of client connections before a shard is taken down.

      • replica_sconns_on_demand: When enabled, the DMC stops holding persistent connections to replica shards and reduces the number of internode connections by half.

      • use_selective_flush: Enables selective flush of destination shards.

  • Added action IDs to operation and state machine log entries.

  • Internal connections no longer generate new_int_conn audit records.

  • Improved control plane authentication handling for new clusters with a dedicated authentication service.

  • Improved handling of long-running read-only scripts to reduce unnecessary failovers.

Redis database versions

Redis Software version 8.0.2 includes five Redis database versions: 8.2.1, 8.0.2, 7.4.3, 7.2.7, and 6.2.13.

The [default Redis database version]({{<relref "/operate/rs/databases/configure/db-defaults#database-version">}}) is 8.2.

Redis feature sets

Redis Software includes multiple feature sets, compatible with different Redis database versions.

The following table shows which Redis modules are compatible with each Redis database version included in this release.

Redis database versionCompatible Redis modules
8.2RediSearch 8.2
RedisJSON 8.2
RedisTimeSeries 8.2
RedisBloom 8.2
See [What's new in Redis 8.2]({{<relref "/develop/whats-new/8-2">}}) and [Redis Open Source 8.2 release notes]({{<relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisce/redisos-8.2-release-notes">}})
8.0RediSearch 8.0
RedisJSON 8.0
RedisTimeSeries 8.0
RedisBloom 8.0
See [What's new in Redis 8.0]({{<relref "/develop/whats-new/8-0">}}) and [Redis Open Source 8.0 release notes]({{<relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisce/redisos-8.0-release-notes">}})
7.4[RediSearch 2.10]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisearch/redisearch-2.10-release-notes.md" >}})
[RedisJSON 2.8]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisjson/redisjson-2.8-release-notes.md" >}})
[RedisTimeSeries 1.12]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redistimeseries/redistimeseries-1.12-release-notes.md" >}})
[RedisBloom 2.8]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisbloom/redisbloom-2.8-release-notes.md" >}})
7.2[RediSearch 2.8]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisearch/redisearch-2.8-release-notes.md" >}})
[RedisJSON 2.6]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisjson/redisjson-2.6-release-notes.md" >}})
[RedisTimeSeries 1.10]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redistimeseries/redistimeseries-1.10-release-notes.md" >}})
[RedisBloom 2.6]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisbloom/redisbloom-2.6-release-notes.md" >}})
6.2[RediSearch 2.6]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisearch/redisearch-2.6-release-notes.md" >}})
[RedisJSON 2.4]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisjson/redisjson-2.4-release-notes.md" >}})
[RedisTimeSeries 1.8]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redistimeseries/redistimeseries-1.8-release-notes.md" >}})
[RedisBloom 2.4]({{< relref "/operate/oss_and_stack/stack-with-enterprise/release-notes/redisbloom/redisbloom-2.4-release-notes.md" >}})

Resolved issues

  • RS156391: Fixed an issue where the job_scheduler's memory usage could increase significantly when the diagnostic logging service was enabled.

  • RS132033: Fixed an issue where out-of-memory errors in the Lua interpreter prevented scripts from running Redis commands until the shard was restarted. This fix is included in Redis database version 7.2 and requires a database upgrade from earlier versions.

  • RS153192: Updated the installer's minimum RAM requirement to 8 GB.

  • RS159685: Fixed an issue with high DMC CPU usage after changing the primary node of a cluster that has Active-Active databases.

  • RS160546: Fixed an issue where rladmin status extra all did not show available RAM.

  • RS150592: Fixed an issue where connection errors were not automatically retried.

  • RS161945: Fixed an issue where state machine logs showed a generic state machine ID instead of the descriptive state machine name when creating a database from persistence.

  • RS160196: Fixed an issue where a node could be set as primary before completing the bootstrap process.

  • RS153736: Fixed an issue where the PUBSUB SHARDNUMSUB command would not respond when called without arguments if the OSS Cluster API was enabled.

  • RS163254: Fixed an issue where the policy update logs displayed inconsistent boolean value formats, mixing enabled/disabled and True/False.

  • RS158250: Fixed an issue with Active-Active databases with search enabled where replica shards could crash after migration to a new node.

  • RS164471: Fixed an issue where the script to generate self-signed certificates (generate_self_signed_certs.sh) failed on custom installations due to hard-coded file paths.

  • RS164218: Fixed an issue where Speedb log files were not properly rotated and archived, causing logs to accumulate and consume disk space.

  • RS162719: Fixed an issue where connection problems could prevent shards from restarting during failover and cause the failover process to become stuck.

  • RS161589: Changed the installer answers file parameter from skip_updating_env_path to update_env_path to improve clarity and accuracy.

  • RS161574: Fixed an issue where Active-Active database synchronization could fail when Lua scripts used certain read-only commands that accessed keys across multiple slots.

  • RS160347: Made optimizations to reduce the heartbeatd service's memory usage.

  • RS156394: Improved error messages when module commands are temporarily unavailable during cluster configuration changes.

  • RS154815: Improved diagnostic reporting for connection issues when the maximum number of transactions is reached.

  • RS147053: Fixed an issue where some system_reserved_ports were not displayed in the rladmin info cluster command output.

  • RS114668: Fixed an issue where setting failure_detection_sensitivity with the bootstrap API did not automatically update watchdog_profile accordingly.

  • RS163266: Fixed an issue where shard rebalancing could take excessive time when replicas were unresponsive due to high CPU load by reducing connection retry attempts from 300 to 5.

  • RS162524: Fixed an issue where the DNS backend could fail with "too many open files" errors due to socket leaks.

  • RS161547: Fixed an issue where nodes could fail to send messages related to state machines due to a timing issue between notification threads and management threads.

  • RS155990: Fixed an issue where the forwarding_state field was missing from the endpoint schema.

  • RS166307: Updated v2 Prometheus metric names to comply with naming conventions by changing the proxy_ prefix to endpoint_ for connections_rate, rate_limit_ok, rate_limit_overflows, accepted_connections, and dispatch_failures.

  • RS164703: Improved diagnostic reporting for shard restart operations by adding PID logging before shutdown.

  • RS152179: Reduced log noise by removing a harmless error message that appeared repeatedly in DMC proxy logs.

  • RS132087: Fixed inconsistent node status reports between rladmin and the REST API.

  • RS166878: Fixed legacy module_args mapping to handle boolean fields as TRUE/FALSE values instead of flags.

  • RS166825: Fixed an issue where the Sentinel service could become unresponsive while processing certain commands due to a timing issue.

  • RS162290: Fixed an issue where the node status API returned 0 instead of the actual provisional RAM and flash values if the node reached its shard limit.

  • RS158251: Added a check to block new user creation after the maximum limit of 32,000 users has been reached to prevent DMC proxy crashes.

  • RS166813: Fixed an issue where Lua incorrectly converted empty JSON arrays into empty JSON objects.

  • RS166683: Fixed an issue where FT.DROPINDEX index DD deleted indexed keys on the local Active-Active database instance but failed to sync the deletions to instances in other participating clusters.

  • RS162972: Fixed an issue where the REST API was only accessible from the primary node when certificate-based authentication was enabled.

  • RS158972: Fixed an issue where certificate verification failed during node join and replace operations when internode encryption was enabled, causing connection errors until certificates were fetched from the primary node.

  • RS123263: Fixed an issue where creating a new role with a specified UID failed with "A uid is already assigned" error.

  • RS120420: Fixed an issue where rladmin cluster config incorrectly included quotes as part of the cipher suite value when updating control_cipher_suites configuration.

  • RS170611: Fixed an issue where the generate_self_signed_certs.sh script incorrectly formatted wildcard certificate entries.

  • RS167849: Fixed an issue where rlutil check incorrectly reported that existing databases did not exist.

  • RS167199: Fixed an issue where the remove node action could become stuck during node decommissioning.

  • RS166990: Fixed an issue where install logs were not included in support packages when installation or upgrade operations failed.

  • RS166528: Improved error handling when verifying that a data file has been loaded.

  • RS162973: Fixed an issue with shard failover where the shard failed to restart because its port was not released quickly enough after it crashed.

  • RS166122: Fixed an issue where the actions API could incorrectly report state machine operations as running after they completed.

  • RS171579: Fixed an issue where the new UI incorrectly added default_user: False when the default_user field was absent, causing connection issues.

Version changes

  • [POST /v1/cluster/actions/change_master]({{<relref "/operate/rs/references/rest-api/requests/cluster/actions#post-cluster-action">}}) REST API requests will no longer allow a node that exists but is not finished bootstrapping to become the primary node. Such requests will now return the status code 406 Not Acceptable.

  • Node status now returns the actual provisional RAM and flash values even when the maximum number of shards on the node (max_redis_servers) is reached. Previously, the API returned 0 for provisional_ram_of_node and provisional_flash_of_node when a node reached its shard limit. This change affects REST API node status requests and the rladmin status nodes command's output.

Breaking changes

  • Redis Software installation script changes:

    • Changed the --skip-updating-env-path option to --update-env-path when running [install.sh]({{<relref "/operate/rs/installing-upgrading/install/install-script">}}).

    • Changed the skip_updating_env_path parameter to update_env_path in the [installation answers file]({{<relref "/operate/rs/installing-upgrading/install/manage-installation-questions#configure-file-to-answer">}}).

Redis database version 8 breaking changes {#redis-8-breaking-changes}

When new major versions of Redis Open Source change existing commands, upgrading your database to a new version can potentially break some functionality. Before you upgrade, read the provided list of breaking changes that affect Redis Software and update any applications that connect to your database to handle these changes.

ACL behavior changes

Before Redis 8, the existing [ACL]({{<relref "/operate/rs/security/access-control/redis-acl-overview">}}) categories @read, @write, @dangerous, @admin, @slow, and @fast did not include commands for Redis Search and the JSON, time series, and probabilistic data structures.

Starting with Redis 8, Redis includes all Query Engine, JSON, time series, Bloom filter, cuckoo filter, top-k, count-min sketch, and t-digest commands in these existing ACL categories.

As a result:

  • Existing ACL rules such as +@read +@write will allow access to more commands than in previous versions of Redis. Here are some examples:

    • A user with +@read access will be able to execute FT.SEARCH.

    • A user with +@write access will be able to execute JSON.SET.

  • ACL rules such as +@all -@write will allow access to fewer commands than previous versions of Redis.

    • For example, a user with +@all -@write will not be able to execute JSON.SET.

    • Explicit inclusion of new [command categories]({{<relref "/operate/oss_and_stack/management/security/acl#command-categories">}}) is required to maintain access. The new categories are: @search, @json, @timeseries, @bloom, @cuckoo, @topk, @cms, and @tdigest.

  • ACL rules such as +@read +JSON.GET can now be simplified as +@read because JSON.GET is included in the @read category.

Note that the @all category did not change, as it always included all the commands.

Redis Search changes

The following changes affect behavior and validation in Redis Search:

  • Enforces validation for LIMIT arguments (offset must be 0 if limit is 0).

  • Enforces parsing rules for FT.CURSOR READ and FT.ALIASADD.

  • Parentheses are now required for exponentiation precedence in APPLY expressions.

  • Invalid input now returns errors instead of empty results.

  • Default values revisited for reducers like AVG, COUNT, SUM, STDDEV, QUANTILE, and others.

  • Updates to scoring (BM25 is now the default instead of TF-IDF).

  • Improved handling of expired records, memory constraints, and malformed fields.

Reserved ports

Make sure the following ports are open before upgrading Redis Software.

Ports reserved as of Redis Software version 7.22.0:

PortProcess nameUsage
3346cluster_api_internalCluster API internal port
3351cluster_watchdog_grpc_apiCluster watchdog now supports gRPC
3352grpc_service_meshgRPC communication between nodes
3353local_grpc_service_meshLocal gRPC services
3354grpc_gossip_envoygRPC gossip protocol communication between nodes
3355authentication_serviceAuthentication service internal port

Ports reserved as of Redis Software version 7.8.2:

PortProcess nameUsage
3347cert_exporterReports cluster certificate metrics
3348process_exporterReports process metrics for DMC and Redis processes
3349cluster_wd_exporterReports cluster watchdog metrics
3350db_controllerInternode communication
9091node_exporterReports host node metrics related to CPU, memory, disk, and more
9125statsd_exporterReports push metrics related to the DMC and syncer, and some cluster and node metrics

See [Ports and port ranges used by Redis Software]({{<relref "/operate/rs/networking/port-configurations#ports-and-port-ranges-used-by-redis-enterprise-software">}}) for a complete list.

Deprecations

API deprecations

  • Deprecated the policy field for [bootstrap]({{<relref "/operate/rs/references/rest-api/requests/bootstrap">}}) REST API requests. Use [PUT /v1/cluster/policy]({{< relref "/operate/rs/references/rest-api/requests/cluster/policy#put-cluster-policy" >}}) to change cluster policies after cluster creation instead.

  • Deprecated the module_args field for [database]({{<relref "/operate/rs/references/rest-api/requests/bdbs">}}) REST API requests. Use the new module configuration objects search, timeseries, and probabilistic instead.

Redis Search deprecations

  • Deprecated commands: FT.ADD, FT.SAFEADD, FT.DEL, FT.GET, FT.MGET, FT.SYNADD, FT.DROP, FT._DROPIFX, and FT.CONFIG.

  • Deprecated FT.SEARCH options: GEOFILTER, FILTER, and NOSTOPWORDS.

  • Deprecated vector search options: INITIAL_CAP and BLOCK_SIZE.

  • Deprecated configuration parameters: WORKER_THREADS, MT_MODE, PRIVILEGED_THREADS_NUM, and GCSCANSIZE.

  • Deprecated dialects: DIALECT 1, DIALECT 3, and DIALECT 4.

Internal monitoring and v1 Prometheus metrics deprecation

The existing [internal monitoring engine]({{<relref "/operate/rs/monitoring/v1_monitoring">}}) is deprecated. We recommend transitioning to the new [metrics stream engine]({{<relref "/operate/rs/monitoring/metrics_stream_engine">}}) for improved performance, enhanced integration capabilities, and modernized metrics streaming.

V1 Prometheus metrics are deprecated but still available. To transition to the new metrics stream engine, either migrate your existing dashboards using [this guide]({{<relref "/operate/rs/references/metrics/prometheus-metrics-v1-to-v2">}}) or use [new preconfigured dashboards]({{<relref "/integrate/prometheus-with-redis-enterprise#v2-metrics-dashboards">}}).

As part of the transition to the metrics stream engine, some internal cluster manager alerts were deprecated in favor of external monitoring solutions. See the [alerts transition plan]({{<relref "/operate/rs/references/alerts/alerts-v1-to-v2">}}) for guidance.

Supported platforms

The following table provides a snapshot of supported platforms as of this Redis Software release. See the [supported platforms reference]({{< relref "/operate/rs/references/supported-platforms" >}}) for more details about operating system compatibility.

<span title="Check mark icon"></span> Supported – The platform is supported for this version of Redis Software and Redis Stack modules.

<span title="Warning icon" class="font-serif">:warning:</span> Deprecation warning – The platform is still supported for this version of Redis Software, but support will be removed in a future release.

| Redis Software

major versions8.07.227.87.47.26.46.2
Release dateOct 2025May 2025Nov 2024Feb 2024Aug 2023Feb 2023Aug 2021
[End-of-life date]({{< relref "/operate/rs/installing-upgrading/product-lifecycle#endoflife-schedule" >}})Determined after
next major releaseOct 2027May 2027Nov 2026Feb 2026Aug 2025Feb 2025
Platforms
RHEL 9 &
compatible distros<sup>1</sup><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span>
RHEL 9
FIPS mode<sup>5</sup><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span>
RHEL 8 &
compatible distros<sup>1</sup><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span>
RHEL 7 &
compatible distros<sup>1</sup><span title="Deprecated" class="font-serif">:warning:</span><span title="Deprecated" class="font-serif">:warning:</span><span title="Deprecated" class="font-serif">:warning:</span>
Ubuntu 22.04<sup>2</sup><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span>
Ubuntu 20.04<sup>2</sup><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span>
Ubuntu 18.04<sup>2</sup><span title="Deprecated" class="font-serif">:warning:</span><span title="Deprecated" class="font-serif">:warning:</span><span title="Deprecated" class="font-serif">:warning:</span><span title="Deprecated" class="font-serif">:warning:</span>
Ubuntu 16.04<sup>2</sup><span title="Deprecated" class="font-serif">:warning:</span><span title="Deprecated" class="font-serif">:warning:</span><span title="Deprecated" class="font-serif">:warning:</span>
Amazon Linux 2<span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span>
Amazon Linux 1<span title="Deprecated" class="font-serif">:warning:</span><span title="Deprecated" class="font-serif">:warning:</span><span title="Deprecated" class="font-serif">:warning:</span>
Kubernetes<sup>3</sup><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span>
Docker<sup>4</sup><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span><span title="Supported"></span>
  1. <a name="table-note-1"></a>The RHEL-compatible distributions CentOS, CentOS Stream, Alma, and Rocky are supported if they have full RHEL compatibility. Oracle Linux running the Red Hat Compatible Kernel (RHCK) is supported, but the Unbreakable Enterprise Kernel (UEK) is not supported.

  2. <a name="table-note-2"></a>The server version of Ubuntu is recommended for production installations. The desktop version is only recommended for development deployments.

  3. <a name="table-note-3"></a>See the [Redis Enterprise for Kubernetes documentation]({{< relref "/operate/kubernetes/reference/supported_k8s_distributions" >}}) for details about support per version and Kubernetes distribution.

  4. <a name="table-note-4"></a>[Docker images]({{< relref "/operate/rs/installing-upgrading/quickstarts/docker-quickstart" >}}) of Redis Software are certified for development and testing only.

  5. <a name="table-note-5"></a>Supported only if FIPS was enabled during RHEL installation to ensure FIPS compliance.

Downloads

The following table shows the SHA256 checksums for the available packages:

PackageSHA256 checksum (8.0.2-17 October release)
Ubuntu 20<span class="break-all">48671f14727daeb79a2e30d4f176ce2ed611641530f7f91fab4639572f7e33fc</span>
Ubuntu 22 (amd64)<span class="break-all">dd3f0fc0ac499f68b8bc155290e86ca1a6686f85312be1058ae3a05c46ec5558</span>
Ubuntu 22 (arm64)<span class="break-all">0fca0f5a365954fa062fd5b7304666bb147f1f6f63eea93b4d932faab4082edd</span>
Red Hat Enterprise Linux (RHEL) 8<span class="break-all">f707a31101598a88c64fc2cd7eee7266d51ff0e1a90c768584f88e1459d158fc</span>
Red Hat Enterprise Linux (RHEL) 9<span class="break-all">00015c18a6734d243ae82c1046bd320cbb904b78912c9835d287b17d807c1161</span>
Amazon Linux 2<span class="break-all">aaeb4c71f6ee4883213909fcface49b442b2f1c536c244159dd5acc2cafed06e</span>

Known issues

  • RS131972: Creating an ACL that contains a line break in the Cluster Manager UI can cause shard migration to fail due to ACL errors.

  • RS155734: Endpoint availability metrics do not work as expected due to a calculation error.

Known limitations

Rolling upgrade limitation for clusters with custom or deprecated modules

Due to module handling changes introduced in Redis Software version 8.0, upgrading a cluster that contains custom or deprecated modules, such as RedisGraph and RedisGears v2, can become stuck when adding a new node to the cluster during a rolling upgrade.

Module commands limitation during Active-Active database upgrades to Redis 8.0

When upgrading an Active-Active database to Redis version 8.0, you cannot use module commands until all Active-Active database instances have been upgraded. Currently, these commands are not blocked automatically.

Redis 8.0 database cannot be created with flash

You cannot create a Redis 8.0 database with flash storage enabled. Create a Redis 8.0 database with RAM-only storage instead, or use Redis 8.2 for flash-enabled (Redis Flex) databases.

New Cluster Manager UI limitations

The following legacy UI features are not yet available in the new Cluster Manager UI:

  • Purge an Active-Active instance.

    Use [crdb-cli crdb purge-instance]({{< relref "/operate/rs/references/cli-utilities/crdb-cli/crdb/purge-instance" >}}) instead.

  • Search and export the log.

Security

Redis Open Source security fixes compatibility

As part of Redis's commitment to security, Redis Software implements the latest security fixes available with Redis Open Source. Redis Software has already included the fixes for the relevant CVEs.

Some CVEs announced for Redis Open Source do not affect Redis Software due to different or additional functionality available in Redis Software that is not available in Redis Open Source.

Redis Software 8.0.2-17 supports Redis Open Source 8.2, 8.0, 7.4, 7.2, and 6.2. Below is the list of Redis Open Source CVEs and other security vulnerabilities fixed by version.

Redis 8.2.x:

  • (CVE-2025-62507) A user can run the XACKDEL command with multiple IDs and trigger a stack buffer overflow, which can potentially lead to remote code execution.

  • The HGETEX command can lead to a buffer overflow.

  • Integer overflow in hllPatLen.

  • RedisBloom: Cuckoo filter counter overflow.

  • RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.

  • RedisBloom: Reachable assert in TopK_Create

  • RedisBloom: Out-of-bounds access with empty Bloom chains.

  • RedisBloom: Division by zero in Cuckoo filter insertion.

  • (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.

  • (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.

  • (CVE-2025-46817) An authenticated user may use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution.

  • (CVE-2025-49844) An authenticated user may use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free, and potentially lead to remote code execution.

Redis 8.0.x:

  • The HGETEX command can lead to a buffer overflow.

  • Integer overflow in hllPatLen.

  • RedisBloom: Cuckoo filter counter overflow.

  • RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.

  • RedisBloom: Reachable assert in TopK_Create

  • RedisBloom: Out-of-bounds access with empty Bloom chains.

  • RedisBloom: Division by zero in Cuckoo filter insertion.

  • (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.

  • (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.

  • (CVE-2025-46817) An authenticated user may use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution.

  • (CVE-2025-49844) An authenticated user may use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free, and potentially lead to remote code execution.

Redis 7.4.x:

  • Integer overflow in hllPatLen.

  • RedisBloom: Cuckoo filter counter overflow.

  • RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.

  • RedisBloom: Reachable assert in TopK_Create

  • RedisBloom: Out-of-bounds access with empty Bloom chains.

  • RedisBloom: Division by zero in Cuckoo filter insertion.

  • (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.

  • (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.

  • (CVE-2025-46817) An authenticated user may use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution.

  • (CVE-2025-49844) An authenticated user may use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free, and potentially lead to remote code execution.

  • (CVE-2025-32023) An authenticated user can use a specially crafted string to trigger a stack/heap out-of-bounds write on HyperLogLog operations, which can lead to remote code execution.

  • (CVE-2025-21605) An unauthenticated client can cause unlimited growth of output buffers until the server runs out of memory or is terminated, which can lead to denial-of-service.

Redis 7.2.x:

  • Integer overflow in hllPatLen.

  • RedisBloom: Cuckoo filter counter overflow.

  • RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.

  • RedisBloom: Reachable assert in TopK_Create

  • RedisBloom: Out-of-bounds access with empty Bloom chains.

  • RedisBloom: Division by zero in Cuckoo filter insertion.

  • (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.

  • (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.

  • (CVE-2025-46817) An authenticated user may use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution.

  • (CVE-2025-49844) An authenticated user may use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free, and potentially lead to remote code execution.

  • (CVE-2025-32023) An authenticated user can use a specially crafted string to trigger a stack/heap out-of-bounds write on HyperLogLog operations, which can lead to remote code execution.

  • (CVE-2025-21605) An unauthenticated client can cause unlimited growth of output buffers until the server runs out of memory or is terminated, which can lead to denial-of-service.

  • (CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.

  • (CVE-2024-31228) An authenticated user can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as KEYS, SCAN, PSUBSCRIBE, FUNCTION LIST, COMMAND LIST, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.

  • (CVE-2023-41056) In some cases, Redis may incorrectly handle resizing of memory buffers, which can result in incorrect accounting of buffer sizes and lead to heap overflow and potential remote code execution.

  • (CVE-2023-41053) Redis does not correctly identify keys accessed by SORT_RO and, as a result, may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. (Redis 7.2.1)

Redis 7.0.x:

  • (CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.

  • (CVE-2024-31228) An authenticated user can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as KEYS, SCAN, PSUBSCRIBE, FUNCTION LIST, COMMAND LIST, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.

  • (CVE-2023-41056) In some cases, Redis may incorrectly handle resizing of memory buffers, which can result in incorrect accounting of buffer sizes and lead to heap overflow and potential remote code execution.

  • (CVE-2023-41053) Redis does not correctly identify keys accessed by SORT_RO and, as a result, may grant users executing this command access to keys that are not explicitly authorized by the ACL configuration. (Redis 7.0.13)

  • (CVE-2023-36824) Extracting key names from a command and a list of arguments may, in some cases, trigger a heap overflow and result in reading random heap memory, heap corruption, and potentially remote code execution. Specifically: using COMMAND GETKEYS* and validation of key names in ACL rules. (Redis 7.0.12)

  • (CVE-2023-28856) Authenticated users can use the HINCRBYFLOAT command to create an invalid hash field that will crash Redis on access. (Redis 7.0.11)

  • (CVE-2023-28425) Specially crafted MSETNX commands can lead to assertion and denial-of-service. (Redis 7.0.10)

  • (CVE-2023-25155) Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. (Redis 7.0.9)

  • (CVE-2023-22458) Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands can lead to denial-of-service. (Redis 7.0.8)

  • (CVE-2022-36021) String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack on Redis can cause it to hang and consume 100% CPU time. (Redis 7.0.9)

  • (CVE-2022-35977) Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands can drive Redis to OOM panic. (Redis 7.0.8)

  • (CVE-2022-35951) Executing an XAUTOCLAIM command on a stream key in a specific state, with a specially crafted COUNT argument, may cause an integer overflow, a subsequent heap overflow, and potentially lead to remote code execution. The problem affects Redis versions 7.0.0 or newer. (Redis 7.0.5)

  • (CVE-2022-31144) A specially crafted XAUTOCLAIM command on a stream key in a specific state may result in heap overflow and potentially remote code execution. The problem affects Redis versions 7.0.0 or newer. (Redis 7.0.4)

  • (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. (Redis 7.0.12)

  • (CVE-2022-24736) An attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result in a crash of the redis-server process. This issue affects all versions of Redis. (Redis 7.0.0)

  • (CVE-2022-24735) By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. (Redis 7.0.0)

Redis 6.2.x:

  • Integer overflow in hllPatLen.

  • RedisBloom: Cuckoo filter counter overflow.

  • RedisBloom: Invalid Bloom filters can cause arbitrary memory reads and writes.

  • RedisBloom: Reachable assert in TopK_Create

  • RedisBloom: Out-of-bounds access with empty Bloom chains.

  • RedisBloom: Division by zero in Cuckoo filter insertion.

  • (CVE-2025-46818) An authenticated user may use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user.

  • (CVE-2025-46819) An authenticated user may use a specially crafted LUA script to read out-of-bound data or crash the server and lead to subsequent denial of service.

  • (CVE-2025-46817) An authenticated user may use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution.

  • (CVE-2025-49844) An authenticated user may use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free, and potentially lead to remote code execution.

  • (CVE-2025-32023) An authenticated user can use a specially crafted string to trigger a stack/heap out-of-bounds write on HyperLogLog operations, which can lead to remote code execution.

  • (CVE-2025-21605) An unauthenticated client can cause unlimited growth of output buffers until the server runs out of memory or is terminated, which can lead to denial-of-service.

  • (CVE-2024-31449) An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution.

  • (CVE-2024-31228) An authenticated user can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as KEYS, SCAN, PSUBSCRIBE, FUNCTION LIST, COMMAND LIST, and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crashes.

  • (CVE-2023-28856) Authenticated users can use the HINCRBYFLOAT command to create an invalid hash field that will crash Redis on access. (Redis 6.2.12)

  • (CVE-2023-25155) Specially crafted SRANDMEMBER, ZRANDMEMBER, and HRANDFIELD commands can trigger an integer overflow, resulting in a runtime assertion and termination of the Redis server process. (Redis 6.2.11)

  • (CVE-2023-22458) Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands can lead to denial-of-service. (Redis 6.2.9)

  • (CVE-2022-36021) String matching commands (like SCAN or KEYS) with a specially crafted pattern to trigger a denial-of-service attack on Redis can cause it to hang and consume 100% CPU time. (Redis 6.2.11)

  • (CVE-2022-35977) Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands can drive Redis to OOM panic. (Redis 6.2.9)

  • (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of Redis with Lua scripting support, starting from 2.6, and affects only authenticated and authorized users. (Redis 6.2.13)

  • (CVE-2022-24736) An attacker attempting to load a specially crafted Lua script can cause NULL pointer dereference which will result in a crash of the redis-server process. This issue affects all versions of Redis. (Redis 6.2.7)

  • (CVE-2022-24735) By exploiting weaknesses in the Lua script execution environment, an attacker with access to Redis can inject Lua code that will execute with the (potentially higher) privileges of another Redis user. (Redis 6.2.7)

  • (CVE-2021-41099) Integer to heap buffer overflow handling certain string commands and network payloads, when proto-max-bulk-len is manually configured to a non-default, very large value. (Redis 6.2.6)

  • (CVE-2021-32762) Integer to heap buffer overflow issue in redis-cli and redis-sentinel parsing large multi-bulk replies on some older and less common platforms. (Redis 6.2.6)

  • (CVE-2021-32761) An integer overflow bug in Redis version 2.2 or newer can be exploited using the BITFIELD command to corrupt the heap and potentially result with remote code execution. (Redis 6.2.5)

  • (CVE-2021-32687) Integer to heap buffer overflow with intsets, when set-max-intset-entries is manually configured to a non-default, very large value. (Redis 6.2.6)

  • (CVE-2021-32675) Denial Of Service when processing RESP request payloads with a large number of elements on many connections. (Redis 6.2.6)

  • (CVE-2021-32672) Random heap reading issue with Lua Debugger. (Redis 6.2.6)

  • (CVE-2021-32628) Integer to heap buffer overflow handling ziplist-encoded data types, when configuring a large, non-default value for hash-max-ziplist-entries, hash-max-ziplist-value, zset-max-ziplist-entries or zset-max-ziplist-value. (Redis 6.2.6)

  • (CVE-2021-32627) Integer to heap buffer overflow issue with streams, when configuring a non-default, large value for proto-max-bulk-len and client-query-buffer-limit. (Redis 6.2.6)

  • (CVE-2021-32626) Specially crafted Lua scripts may result with Heap buffer overflow. (Redis 6.2.6)

  • (CVE-2021-32625) An integer overflow bug in Redis version 6.0 or newer can be exploited using the STRALGO LCS command to corrupt the heap and potentially result with remote code execution. This is a result of an incomplete fix by CVE-2021-29477. (Redis 6.2.4)

  • (CVE-2021-29478) An integer overflow bug in Redis 6.2 could be exploited to corrupt the heap and potentially result with remote code execution. The vulnerability involves changing the default set-max-intset-entries configuration value, creating a large set key that consists of integer values and using the COPY command to duplicate it. The integer overflow bug exists in all versions of Redis starting with 2.6, where it could result with a corrupted RDB or DUMP payload, but not exploited through COPY (which did not exist before 6.2). (Redis 6.2.3)

  • (CVE-2021-29477) An integer overflow bug in Redis version 6.0 or newer could be exploited using the STRALGO LCS command to corrupt the heap and potentially result in remote code execution. The integer overflow bug exists in all versions of Redis starting with 6.0. (Redis 6.2.3)