From 34ca9d19567b08327fdfe632b89c26154c90d8db7de02ec36f7da9b6f57340fb Mon Sep 17 00:00:00 2001 From: Martin Pluskal Date: Fri, 7 May 2021 07:49:51 +0000 Subject: [PATCH] Accepting request 891111 from home:AndreasStieger:branches:server:database redis 6.2.3 changelog OBS-URL: https://build.opensuse.org/request/show/891111 OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=177 --- redis.changes | 17 ++++++++--------- 1 file changed, 8 insertions(+), 9 deletions(-) diff --git a/redis.changes b/redis.changes index b9ea68c..5d8495d 100644 --- a/redis.changes +++ b/redis.changes @@ -2,15 +2,14 @@ Tue May 4 06:23:15 UTC 2021 - Michael Ströder - redis 6.2.3 - * Security fixes for - - Integer overflow in STRALGO LCS command (CVE-2021-29477) - - Integer overflow in COPY command for large intsets (CVE-2021-29478) - * Fix memory leak in moduleDefragGlobals (#8853) - * Fix memory leak when doing lazy freeing client tracking table (#8822) - * Block abusive replicas from sending command that could assert and crash redis (#8868) - * Use a monotonic clock to check for Lua script timeout (#8812) - * redis-cli: Do not use unix socket when we got redirected in cluster mode (#8870) - * Fix RM_GetClusterNodeInfo() to correctly populate master id (#8846) + * CVE-2021-29477: Integer overflow in STRALGO LCS command (boo#1185729) + * CVE-2021-29478: Integer overflow in COPY command for large intsets (boo#1185730) + * Fix memory leak in moduleDefragGlobals + * Fix memory leak when doing lazy freeing client tracking table + * Block abusive replicas from sending command that could assert and crash redis + * Use a monotonic clock to check for Lua script timeout + * redis-cli: Do not use unix socket when we got redirected in cluster mode + * Fix RM_GetClusterNodeInfo() to correctly populate master id ------------------------------------------------------------------- Tue Apr 20 09:08:06 UTC 2021 - Andreas Stieger