SHA256
1
0
forked from pool/redis
Commit Graph

22 Commits

Author SHA256 Message Date
Danilo Spinella
1be7f74178 Accepting request 1005288 from home:stroeder:sys
- Update to version 7.0.5 (boo#1203638)
  + Security Fixes:
    * (CVE-2022-35951) Executing a XAUTOCLAIM command on a stream key in a specific
      state, with a specially crafted COUNT argument, may cause an integer overflow,
      a subsequent heap overflow, and potentially lead to remote code execution.
      The problem affects Redis versions 7.0.0 or newer
      [reported by Xion (SeungHyun Lee) of KAIST GoN].
  + Module API changes
    * Fix RM_Call execution of scripts when used with M/W/S flags to properly
      handle script flags (#11159)
    * Fix RM_SetAbsExpire and RM_GetAbsExpire API registration (#11025, #8564)
  + Bug Fixes
    * Fix a hang when eviction is combined with lazy-free and maxmemory-eviction-tenacity is set to 100 (#11237)
    * Fix a crash when a replica may attempt to set itself as its master as a result of a manual failover (#11263)
    * Fix a bug where a cluster-enabled replica node may permanently set its master's hostname to '?' (#10696)
    * Fix a crash when a Lua script returns a meta-table (#11032)
  + Fixes for issues in previous releases of Redis 7.0
    * Fix redis-cli to do DNS lookup before sending CLUSTER MEET (#11151)
    * Fix crash when a key is lazy expired during cluster key migration (#11176)
    * Fix AOF rewrite to fsync the old AOF file when a new one is created (#11004)
    * Fix some crashes involving a list containing entries larger than 1GB (#11242)
    * Correctly handle scripts with a non-read-only shebang on a cluster replica (#11223)
    * Fix memory leak when unloading a module (#11147)
    * Fix bug with scripts ignoring client tracking NOLOOP (#11052)
    * Fix client-side tracking breaking protocol when FLUSHDB / FLUSHALL / SWAPDB is used inside MULTI-EXEC (#11038)
    * Fix ACL: BITFIELD with GET and also SET / INCRBY can be executed with read-only key permission (#11086)
    * Fix missing sections for INFO ALL when also requesting a module info section (#11291)

OBS-URL: https://build.opensuse.org/request/show/1005288
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=205
2022-09-22 07:54:56 +00:00
Danilo Spinella
65723e8e97 Accepting request 989997 from home:stroeder:branches:server:database
Security update to version 7.0.4 (CVE-2022-31144)

OBS-URL: https://build.opensuse.org/request/show/989997
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=203
2022-07-18 15:26:40 +00:00
Martin Pluskal
cd30b3c68c Accepting request 988416 from home:stroeder:branches:server:database
Update to version 7.0.3

OBS-URL: https://build.opensuse.org/request/show/988416
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=201
2022-07-12 15:53:38 +00:00
Martin Pluskal
fd18857a95 Accepting request 982226 from home:stroeder:branches:server:database
Update to version 7.0.2

OBS-URL: https://build.opensuse.org/request/show/982226
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=195
2022-06-13 14:46:11 +00:00
Martin Pluskal
962129d107 Accepting request 981377 from home:stroeder:branches:server:database
Update to version 7.0.1

OBS-URL: https://build.opensuse.org/request/show/981377
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=194
2022-06-09 06:07:20 +00:00
Martin Pluskal
cd6af81f26 Accepting request 973269 from home:AndreasStieger:branches:server:database
redis 6.2.7
CVE-2022-24736 boo#1198953
CVE-2022-24735 boo#1198952

OBS-URL: https://build.opensuse.org/request/show/973269
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=188
2022-04-28 06:51:05 +00:00
Danilo Spinella
31a9681e63 Accepting request 923169 from home:stroeder:sys
OBS-URL: https://build.opensuse.org/request/show/923169
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=186
2021-10-05 09:57:51 +00:00
Danilo Spinella
4de6b48e75 Accepting request 907768 from home:AndreasStieger:branches:server:database
redis 6.2.5 CVE-2021-32761 boo#1188598

OBS-URL: https://build.opensuse.org/request/show/907768
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=185
2021-07-22 14:14:31 +00:00
Martin Pluskal
1ca5869704 Accepting request 896855 from home:AndreasStieger:branches:server:database
redis 6.2.4 CVE-2021-32625 (boo#1186722)

OBS-URL: https://build.opensuse.org/request/show/896855
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=181
2021-06-02 08:13:15 +00:00
Martin Pluskal
7dd39d8d34 Accepting request 890241 from home:stroeder:branches:server:database
redis 6.2.3 with security fixes

OBS-URL: https://build.opensuse.org/request/show/890241
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=176
2021-05-04 08:23:54 +00:00
Martin Pluskal
8eaaab7f5c Accepting request 886894 from home:stroeder:branches:server:database
redis 6.2.2

OBS-URL: https://build.opensuse.org/request/show/886894
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=173
2021-04-20 08:19:36 +00:00
Martin Pluskal
cfb0e5acdd Accepting request 876262 from home:AndreasStieger:branches:server:database
redis 6.0.12

OBS-URL: https://build.opensuse.org/request/show/876262
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=167
2021-03-03 07:12:30 +00:00
Martin Pluskal
60b40902c0 Accepting request 874857 from home:AndreasStieger:branches:server:database
redis 6.0.11 CVE-2021-21309 boo#1182657

OBS-URL: https://build.opensuse.org/request/show/874857
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=164
2021-02-25 06:40:00 +00:00
Martin Pluskal
7e6755b7bc Accepting request 862707 from home:stroeder:branches:server:database
- HTTPS download link for source
- redis 6.0.10

OBS-URL: https://build.opensuse.org/request/show/862707
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=160
2021-01-13 06:23:01 +00:00
ae648284a9 Accepting request 844547 from home:AndreasStieger:branches:server:database
redis 6.0.9

OBS-URL: https://build.opensuse.org/request/show/844547
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=158
2020-10-28 13:13:44 +00:00
Martin Pluskal
b9069d4452 Accepting request 833670 from home:AndreasStieger:branches:server:database
redis 6.0.8

OBS-URL: https://build.opensuse.org/request/show/833670
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=154
2020-09-11 09:12:35 +00:00
Lars Vogdt
035521204a Accepting request 822886 from home:AndreasStieger:branches:server:database
redis 6.0.6

OBS-URL: https://build.opensuse.org/request/show/822886
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=152
2020-07-27 19:38:03 +00:00
Lars Vogdt
2c45f34107 Accepting request 813274 from home:AndreasStieger:branches:server:database
redis 6.0.5

OBS-URL: https://build.opensuse.org/request/show/813274
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=150
2020-06-10 18:15:04 +00:00
Lars Vogdt
544071eb8f Accepting request 810027 from home:AndreasStieger:branches:server:database
redis 6.0.4

OBS-URL: https://build.opensuse.org/request/show/810027
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=148
2020-05-28 22:43:04 +00:00
Martin Pluskal
9ed0b9567c Accepting request 806158 from home:AndreasStieger:branches:server:database
redis 6.0.3

OBS-URL: https://build.opensuse.org/request/show/806158
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=147
2020-05-17 12:52:53 +00:00
Martin Pluskal
f1b7afa805 Accepting request 800054 from home:darix:apps
- add BR pkgconfig(libsystemd) for the rewritten systemd support
  and force building with it

- Update to 6.0.1
  * https://raw.githubusercontent.com/antirez/redis/6.0.1/00-RELEASENOTES
  * XCLAIM AOF/replicas propagation fixed.
  * Client side caching: new NOLOOP option to avoid getting
    notified about changes performed by ourselves.
  * ACL GENPASS now uses HMAC-SHA256 and have an optional
    "bits" argument.  It means you can use it as a general purpose
    "secure random strings" primitive!
  * Cluster "SLOTS" subcommand memory optimization.
  * The LCS command is now a subcommand of STRALGO.
  * Meaningful offset for replicas as well. More successful
    partial resynchronizations.
  * Optimize memory usage of deferred replies.
  * Faster CRC64 algorithm for faster RDB loading.
  * XINFO STREAM FULL, a new subcommand to get the whole stream
    state.
  * CLIENT KILL USER <username>.
  * MIGRATE AUTH2 option, for ACL style authentication support.
  * Other random bugfixes.

OBS-URL: https://build.opensuse.org/request/show/800054
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=143
2020-05-04 14:42:41 +00:00
Martin Pluskal
c5b6f52ad7 Accepting request 799414 from home:AndreasStieger:branches:server:database
- add hash file from redis-hashes and verify it during build

OBS-URL: https://build.opensuse.org/request/show/799414
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=140
2020-05-01 08:17:12 +00:00