redis/tests
Tom Levy 8b565570f2 String pattern matching had exponential time complexity on pathological patterns (CVE-2022-36021)
Authenticated users can use string matching commands with a
specially crafted pattern to trigger a denial-of-service attack on Redis,
causing it to hang and consume 100% CPU time.

(cherry picked from commit e75f92047c22e659d49bba3a083cd0c9935f21e6)
(cherry picked from commit e8a9d3f63aebf6065d69bd0125d4b9c367f88def)
2023-02-28 18:31:58 +02:00
..
assets Tests: Add aclfile load and save tests (#7765) 2020-09-10 14:09:00 +03:00
cluster fix race in cluster transactions test (#8312) 2021-01-12 16:25:37 +02:00
helpers revert an accidental test code change done as part of the tls project 2019-12-01 16:10:09 +02:00
integration fflush stdout after responses partial backport from (#9136) 2023-01-17 14:59:41 +02:00
modules Fix test modules build issue on OS X 11. (#9658) 2023-01-17 14:59:41 +02:00
sentinel Recalculate hardcoded variables from $::instances_count in sentinel tests (#7561) 2020-10-27 09:12:01 +02:00
support Fix TLS tests on newer tcl-tls/OpenSSL. (#10910) 2023-01-17 14:59:41 +02:00
tmp minor fixes to the new test suite, html doc updated 2010-05-14 18:48:33 +02:00
unit String pattern matching had exponential time complexity on pathological patterns (CVE-2022-36021) 2023-02-28 18:31:58 +02:00
instances.tcl Allow blocked XREAD on a cluster replica (#7881) 2020-10-27 09:12:01 +02:00
test_helper.tcl Add a --no-latency tests flag. (#7939) 2020-10-27 09:12:01 +02:00