Commit Graph

230 Commits

Author SHA256 Message Date
Dominique Leuenberger
65e88ff54b Accepting request 1098399 from server:database
OBS-URL: https://build.opensuse.org/request/show/1098399
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=90
2023-07-14 13:35:43 +00:00
Martin Pluskal
ce9b309603 Accepting request 1098376 from home:dspinella:branches:server:database
- redis 7.0.12:
  * (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger
    a heap overflow in the cjson and cmsgpack libraries, and result in heap
    corruption and potentially remote code execution. The problem exists in all
    versions of Redis with Lua scripting support, starting from 2.6, and affects
    only authenticated and authorized users. (bsc#1213193)
  * (CVE-2023-36824) Extracting key names from a command and a list of arguments
    may, in some cases, trigger a heap overflow and result in reading random heap
    memory, heap corruption and potentially remote code execution. Specifically:
    using COMMAND GETKEYS* and validation of key names in ACL rules. (bsc#1213249)
  * Re-enable downscale rehashing while there is a fork child
  * Fix possible hang in HRANDFIELD, SRANDMEMBER, ZRANDMEMBER when used with <count>
  * Improve fairness issue in RANDOMKEY, HRANDFIELD, SRANDMEMBER, ZRANDMEMBER,
    SPOP, and eviction
  * Fix WAIT to be effective after a blocked module command being unblocked
  * Avoid unnecessary full sync after master restart in a rare case

OBS-URL: https://build.opensuse.org/request/show/1098376
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=226
2023-07-12 16:56:39 +00:00
Dominique Leuenberger
49102e9874 Accepting request 1087948 from server:database
OBS-URL: https://build.opensuse.org/request/show/1087948
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=89
2023-05-21 17:08:15 +00:00
Martin Pluskal
74bf12d703 Accepting request 1087941 from home:jsrain:branches:server:database
- refresh redis-hashes from upstream source

OBS-URL: https://build.opensuse.org/request/show/1087941
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=224
2023-05-19 12:56:14 +00:00
Dominique Leuenberger
e289c08a9a Accepting request 1080241 from server:database
OBS-URL: https://build.opensuse.org/request/show/1080241
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=88
2023-04-20 13:13:38 +00:00
Martin Pluskal
b4aa434701 Accepting request 1080084 from home:AndreasStieger:branches:server:database
boo#1210548 reference

OBS-URL: https://build.opensuse.org/request/show/1080084
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=222
2023-04-19 07:04:34 +00:00
Danilo Spinella
a988d43d70 Accepting request 1079989 from home:darix:apps
- redis 7.0.11
  - (CVE-2023-28856) Authenticated users can use the HINCRBYFLOAT
    command to create an invalid hash field that will crash Redis
    on access
  - Add a missing fsync of AOF file in rare cases (#11973)
  - Disconnect pub-sub subscribers when revoking allchannels
    permission (#11992)
  - Fix a compiler fortification induced crash when used with link
    time optimizations (#11982)
- Drop get-old-size-calculations.patch:
  replaced with proper fix

- Added get-old-size-calculations.patch:
  my workaround for https://github.com/redis/redis/issues/11965

OBS-URL: https://build.opensuse.org/request/show/1079989
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=221
2023-04-18 07:30:27 +00:00
Danilo Spinella
659d0e4677 Accepting request 1073382 from home:AndreasStieger:branches:server:database
redis 7.0.10 CVE-2023-28425 boo#1209528

OBS-URL: https://build.opensuse.org/request/show/1073382
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=220
2023-03-21 13:39:55 +00:00
Dominique Leuenberger
6de5be9357 Accepting request 1068706 from server:database
OBS-URL: https://build.opensuse.org/request/show/1068706
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=87
2023-03-03 21:24:30 +00:00
Martin Pluskal
536e279934 Accepting request 1068515 from home:vlefebvre:branches:server:database
Fix CVE-2022-36021 (bsc#1208790) & Fix CVE-2023-25155 (bsc#1208793)

OBS-URL: https://build.opensuse.org/request/show/1068515
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=218
2023-03-02 13:49:31 +00:00
Dominique Leuenberger
875ba65d4c Accepting request 1058816 from server:database
OBS-URL: https://build.opensuse.org/request/show/1058816
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=86
2023-01-18 12:08:16 +00:00
Martin Pluskal
b27cec9b30 Accepting request 1058769 from home:AndreasStieger:branches:server:database
redis 7.0.8
CVE-2022-35977 boo#1207202
CVE-2023-22458 boo#1207203

OBS-URL: https://build.opensuse.org/request/show/1058769
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=216
2023-01-17 07:53:17 +00:00
Dominique Leuenberger
10a0a97a76 Accepting request 1043788 from server:database
OBS-URL: https://build.opensuse.org/request/show/1043788
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=85
2022-12-20 19:19:57 +00:00
Martin Pluskal
096a801a0e Accepting request 1043784 from home:AndreasStieger:branches:server:database
cl fixup

OBS-URL: https://build.opensuse.org/request/show/1043784
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=214
2022-12-19 15:13:50 +00:00
Danilo Spinella
e3cdaee3f6 Accepting request 1043406 from home:AndreasStieger:branches:server:database
redis 7.0.7

OBS-URL: https://build.opensuse.org/request/show/1043406
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=213
2022-12-19 14:41:51 +00:00
Martin Pluskal
a17c45169d Accepting request 1043342 from home:stroeder:sys
- Update to version 7.0.7
  * Fix regression from Redis 7.0.6 in distance replies
    of Geo commands (#11631)

OBS-URL: https://build.opensuse.org/request/show/1043342
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=212
2022-12-19 10:24:36 +00:00
Martin Pluskal
9b69b46588 Accepting request 1043227 from home:AndreasStieger:branches:server:database
redis 7.0.6

OBS-URL: https://build.opensuse.org/request/show/1043227
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=211
2022-12-16 09:39:25 +00:00
Dominique Leuenberger
9e25983b62 Accepting request 1032521 from server:database
OBS-URL: https://build.opensuse.org/request/show/1032521
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=84
2022-11-01 12:41:16 +00:00
Danilo Spinella
472b89bba2 Accepting request 1030903 from home:dspinella:branches:server:database
- Fix CVE-2022-3647, crash in sigsegvHandler debug function
  (CVE-2022-3647, bsc#1204633)
  * cve-2022-3647.patch

OBS-URL: https://build.opensuse.org/request/show/1030903
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=209
2022-10-31 13:47:56 +00:00
Fabian Vogt
55a6789cdf Accepting request 1008369 from server:database
OBS-URL: https://build.opensuse.org/request/show/1008369
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=83
2022-10-10 16:44:27 +00:00
Danilo Spinella
884bc87e3d Accepting request 1003795 from home:schubi2:logrotate
- Migration to /usr/etc: Saving user changed configuration files
  in /etc and restoring them while an RPM update.

OBS-URL: https://build.opensuse.org/request/show/1003795
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=207
2022-10-06 09:53:23 +00:00
Dominique Leuenberger
3280935099 Accepting request 1005332 from server:database
OBS-URL: https://build.opensuse.org/request/show/1005332
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=82
2022-09-23 12:14:45 +00:00
Danilo Spinella
48297b11e7 Accepting request 1005288 from home:stroeder:sys
- Update to version 7.0.5 (boo#1203638)
  + Security Fixes:
    * (CVE-2022-35951) Executing a XAUTOCLAIM command on a stream key in a specific
      state, with a specially crafted COUNT argument, may cause an integer overflow,
      a subsequent heap overflow, and potentially lead to remote code execution.
      The problem affects Redis versions 7.0.0 or newer
      [reported by Xion (SeungHyun Lee) of KAIST GoN].
  + Module API changes
    * Fix RM_Call execution of scripts when used with M/W/S flags to properly
      handle script flags (#11159)
    * Fix RM_SetAbsExpire and RM_GetAbsExpire API registration (#11025, #8564)
  + Bug Fixes
    * Fix a hang when eviction is combined with lazy-free and maxmemory-eviction-tenacity is set to 100 (#11237)
    * Fix a crash when a replica may attempt to set itself as its master as a result of a manual failover (#11263)
    * Fix a bug where a cluster-enabled replica node may permanently set its master's hostname to '?' (#10696)
    * Fix a crash when a Lua script returns a meta-table (#11032)
  + Fixes for issues in previous releases of Redis 7.0
    * Fix redis-cli to do DNS lookup before sending CLUSTER MEET (#11151)
    * Fix crash when a key is lazy expired during cluster key migration (#11176)
    * Fix AOF rewrite to fsync the old AOF file when a new one is created (#11004)
    * Fix some crashes involving a list containing entries larger than 1GB (#11242)
    * Correctly handle scripts with a non-read-only shebang on a cluster replica (#11223)
    * Fix memory leak when unloading a module (#11147)
    * Fix bug with scripts ignoring client tracking NOLOOP (#11052)
    * Fix client-side tracking breaking protocol when FLUSHDB / FLUSHALL / SWAPDB is used inside MULTI-EXEC (#11038)
    * Fix ACL: BITFIELD with GET and also SET / INCRBY can be executed with read-only key permission (#11086)
    * Fix missing sections for INFO ALL when also requesting a module info section (#11291)

OBS-URL: https://build.opensuse.org/request/show/1005288
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=205
2022-09-22 07:54:56 +00:00
Fabian Vogt
23a8aa27d0 Accepting request 990008 from server:database
OBS-URL: https://build.opensuse.org/request/show/990008
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=81
2022-07-31 21:00:33 +00:00
Danilo Spinella
e5646695a9 Accepting request 989997 from home:stroeder:branches:server:database
Security update to version 7.0.4 (CVE-2022-31144)

OBS-URL: https://build.opensuse.org/request/show/989997
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=203
2022-07-18 15:26:40 +00:00
Dominique Leuenberger
d3eae72f6f Accepting request 988701 from server:database
OBS-URL: https://build.opensuse.org/request/show/988701
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=80
2022-07-13 11:44:45 +00:00
Martin Pluskal
6ab47f9b1e Accepting request 988416 from home:stroeder:branches:server:database
Update to version 7.0.3

OBS-URL: https://build.opensuse.org/request/show/988416
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=201
2022-07-12 15:53:38 +00:00
Dominique Leuenberger
b300ae0a52 Accepting request 987499 from server:database
OBS-URL: https://build.opensuse.org/request/show/987499
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=79
2022-07-09 14:58:56 +00:00
Danilo Spinella
06e4ad573a Accepting request 986598 from home:dspinella:branches:server:database
- Use bundled jemalloc to fix active defragmentation, fixes bsc#1200913.
- Remove patch:
  * Add-support-for-USE_SYSTEM_JEMALLOC-flag.patch

OBS-URL: https://build.opensuse.org/request/show/986598
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=199
2022-07-07 17:00:57 +00:00
Dominique Leuenberger
8f011451b5 Accepting request 985927 from server:database
OBS-URL: https://build.opensuse.org/request/show/985927
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=78
2022-07-01 11:43:47 +00:00
Lars Vogdt
c8db686502 Accepting request 985767 from home:schubi2
- Moved logrotate files from user specific directory /etc/logrotate.d
  to vendor specific directory /usr/etc/logrotate.d.

OBS-URL: https://build.opensuse.org/request/show/985767
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=197
2022-06-29 17:57:26 +00:00
Dominique Leuenberger
ea0be1191c Accepting request 982484 from server:database
OBS-URL: https://build.opensuse.org/request/show/982484
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=77
2022-06-20 13:36:51 +00:00
Martin Pluskal
3a299c7f83 Accepting request 982226 from home:stroeder:branches:server:database
Update to version 7.0.2

OBS-URL: https://build.opensuse.org/request/show/982226
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=195
2022-06-13 14:46:11 +00:00
Martin Pluskal
f41549a2ad Accepting request 981377 from home:stroeder:branches:server:database
Update to version 7.0.1

OBS-URL: https://build.opensuse.org/request/show/981377
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=194
2022-06-09 06:07:20 +00:00
Danilo Spinella
8e08e0b1b1 Accepting request 976688 from home:AndreasStieger:branches:server:database
I think this may breaks the following macro

OBS-URL: https://build.opensuse.org/request/show/976688
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=193
2022-05-12 17:08:30 +00:00
Martin Pluskal
20ccd06069 Accepting request 976074 from home:dspinella:branches:server:database
- Unbundle jemalloc, fixes bsc#199164
  * Add-support-for-USE_SYSTEM_JEMALLOC-flag.patch

OBS-URL: https://build.opensuse.org/request/show/976074
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=192
2022-05-11 06:37:08 +00:00
Martin Pluskal
349be1dcf8 Accepting request 976028 from home:jsegitz:branches:server:database
- Add ReadWritePaths=/etc/redis to redis-sentinel@.service (bsc#1199198)

OBS-URL: https://build.opensuse.org/request/show/976028
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=191
2022-05-11 06:36:28 +00:00
Martin Pluskal
f306911a84 Accepting request 975847 from home:dspinella:branches:server:database
- Update to version 7.0.0:
  https://raw.githubusercontent.com/redis/redis/7.0/00-RELEASENOTES
- Remove upstreamed patch:
  * getMcontextEip-return-value.patch

OBS-URL: https://build.opensuse.org/request/show/975847
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=190
2022-05-10 07:17:27 +00:00
Dominique Leuenberger
e433f9274e Accepting request 973561 from server:database
OBS-URL: https://build.opensuse.org/request/show/973561
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=76
2022-04-29 22:44:10 +00:00
Martin Pluskal
4c926e08c4 Accepting request 973269 from home:AndreasStieger:branches:server:database
redis 6.2.7
CVE-2022-24736 boo#1198953
CVE-2022-24735 boo#1198952

OBS-URL: https://build.opensuse.org/request/show/973269
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=188
2022-04-28 06:51:05 +00:00
Dominique Leuenberger
cc0d7fc380 Accepting request 932987 from server:database
OBS-URL: https://build.opensuse.org/request/show/932987
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=75
2021-11-24 22:54:12 +00:00
Danilo Spinella
430cbb6739 Accepting request 932205 from home:jsegitz:branches:systemdhardening:server:database
Automatic systemd hardening effort by the security team. This has not been tested. For details please see https://en.opensuse.org/openSUSE:Security_Features#Systemd_hardening_effort

OBS-URL: https://build.opensuse.org/request/show/932205
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=187
2021-11-22 10:20:26 +00:00
Richard Brown
5dfc1c1d47 Accepting request 923194 from server:database
OBS-URL: https://build.opensuse.org/request/show/923194
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=74
2021-10-08 20:04:47 +00:00
Danilo Spinella
97948553d5 Accepting request 923169 from home:stroeder:sys
OBS-URL: https://build.opensuse.org/request/show/923169
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=186
2021-10-05 09:57:51 +00:00
Dominique Leuenberger
2950ff009c Accepting request 907772 from server:database
OBS-URL: https://build.opensuse.org/request/show/907772
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=73
2021-07-25 18:09:11 +00:00
Danilo Spinella
1a8fa3482d Accepting request 907768 from home:AndreasStieger:branches:server:database
redis 6.2.5 CVE-2021-32761 boo#1188598

OBS-URL: https://build.opensuse.org/request/show/907768
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=185
2021-07-22 14:14:31 +00:00
Dominique Leuenberger
8a87649ac0 Accepting request 899886 from server:database
OBS-URL: https://build.opensuse.org/request/show/899886
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=72
2021-06-14 21:10:21 +00:00
Martin Pluskal
f2af886a8b Accepting request 899019 from home:dirkmueller:Factory
- replaced /var/run with /run for all PID file paths (bsc#1185072)

OBS-URL: https://build.opensuse.org/request/show/899019
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=183
2021-06-14 07:08:16 +00:00
Dominique Leuenberger
3e39a85335 Accepting request 896856 from server:database
OBS-URL: https://build.opensuse.org/request/show/896856
OBS-URL: https://build.opensuse.org/package/show/openSUSE:Factory/redis?expand=0&rev=71
2021-06-04 20:42:32 +00:00
Martin Pluskal
da554e8480 Accepting request 896855 from home:AndreasStieger:branches:server:database
redis 6.2.4 CVE-2021-32625 (boo#1186722)

OBS-URL: https://build.opensuse.org/request/show/896855
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=181
2021-06-02 08:13:15 +00:00