Accepting request 891111 from home:AndreasStieger:branches:server:database
redis 6.2.3 changelog OBS-URL: https://build.opensuse.org/request/show/891111 OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=177
This commit is contained in:
parent
5dff38b6ba
commit
34ca9d1956
@ -2,15 +2,14 @@
|
||||
Tue May 4 06:23:15 UTC 2021 - Michael Ströder <michael@stroeder.com>
|
||||
|
||||
- redis 6.2.3
|
||||
* Security fixes for
|
||||
- Integer overflow in STRALGO LCS command (CVE-2021-29477)
|
||||
- Integer overflow in COPY command for large intsets (CVE-2021-29478)
|
||||
* Fix memory leak in moduleDefragGlobals (#8853)
|
||||
* Fix memory leak when doing lazy freeing client tracking table (#8822)
|
||||
* Block abusive replicas from sending command that could assert and crash redis (#8868)
|
||||
* Use a monotonic clock to check for Lua script timeout (#8812)
|
||||
* redis-cli: Do not use unix socket when we got redirected in cluster mode (#8870)
|
||||
* Fix RM_GetClusterNodeInfo() to correctly populate master id (#8846)
|
||||
* CVE-2021-29477: Integer overflow in STRALGO LCS command (boo#1185729)
|
||||
* CVE-2021-29478: Integer overflow in COPY command for large intsets (boo#1185730)
|
||||
* Fix memory leak in moduleDefragGlobals
|
||||
* Fix memory leak when doing lazy freeing client tracking table
|
||||
* Block abusive replicas from sending command that could assert and crash redis
|
||||
* Use a monotonic clock to check for Lua script timeout
|
||||
* redis-cli: Do not use unix socket when we got redirected in cluster mode
|
||||
* Fix RM_GetClusterNodeInfo() to correctly populate master id
|
||||
|
||||
-------------------------------------------------------------------
|
||||
Tue Apr 20 09:08:06 UTC 2021 - Andreas Stieger <andreas.stieger@gmx.de>
|
||||
|
Loading…
Reference in New Issue
Block a user