SHA256
1
0
forked from pool/redis
Commit Graph

31 Commits

Author SHA256 Message Date
Danilo Spinella
8b2bf3dac8 Accepting request 1109571 from home:dspinella:branches:server:database
- redis 7.2.1:
  * (CVE-2023-41053) Redis does not correctly identify keys accessed by SORT_RO and,
    as a result, may grant users executing this command access to keys that are not
    explicitly authorized by the ACL configuration. (bsc#1215094)
  * Fix crashes when joining a node to an existing 7.0 Redis Cluster
  * Correct request_policy and response_policy command tips on for some admin /
    configuration commands
- Refresh redis.hashes

OBS-URL: https://build.opensuse.org/request/show/1109571
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=229
2023-09-07 15:05:44 +00:00
Martin Pluskal
1afa5bfe4b Accepting request 1104035 from home:darix:apps
- redis 7.2.0
  - Bug Fixes
    - redis-cli in cluster mode handles unknown-endpoint (#12273)
    - Update request / response policy hints for a few commands
      (#12417)
    - Ensure that the function load timeout is disabled during
      loading from RDB/AOF and on replicas. (#12451)
    - Fix false success and a memory leak for ACL selector with bad
      parenthesis combination (#12452)
    - Fix the assertion when script timeout occurs after it
      signaled a blocked client (#12459)
  - Fixes for issues in previous releases of Redis 7.2
    - Update MONITOR client's memory correctly for INFO and
      client-eviction (#12420)
    - The response of cluster nodes was unnecessarily adding an
      extra comma when no hostname was present. (#12411)
- refreshed redis-conf.patch:
- switch to autosetup now that we switched the last patch to patch
  level 1

OBS-URL: https://build.opensuse.org/request/show/1104035
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=228
2023-08-21 08:20:31 +00:00
Martin Pluskal
165dbec1e9 Accepting request 1098376 from home:dspinella:branches:server:database
- redis 7.0.12:
  * (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger
    a heap overflow in the cjson and cmsgpack libraries, and result in heap
    corruption and potentially remote code execution. The problem exists in all
    versions of Redis with Lua scripting support, starting from 2.6, and affects
    only authenticated and authorized users. (bsc#1213193)
  * (CVE-2023-36824) Extracting key names from a command and a list of arguments
    may, in some cases, trigger a heap overflow and result in reading random heap
    memory, heap corruption and potentially remote code execution. Specifically:
    using COMMAND GETKEYS* and validation of key names in ACL rules. (bsc#1213249)
  * Re-enable downscale rehashing while there is a fork child
  * Fix possible hang in HRANDFIELD, SRANDMEMBER, ZRANDMEMBER when used with <count>
  * Improve fairness issue in RANDOMKEY, HRANDFIELD, SRANDMEMBER, ZRANDMEMBER,
    SPOP, and eviction
  * Fix WAIT to be effective after a blocked module command being unblocked
  * Avoid unnecessary full sync after master restart in a rare case

OBS-URL: https://build.opensuse.org/request/show/1098376
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=226
2023-07-12 16:56:39 +00:00
Martin Pluskal
a7531a32d2 Accepting request 1087941 from home:jsrain:branches:server:database
- refresh redis-hashes from upstream source

OBS-URL: https://build.opensuse.org/request/show/1087941
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=224
2023-05-19 12:56:14 +00:00
Danilo Spinella
037bb9e55f Accepting request 1079989 from home:darix:apps
- redis 7.0.11
  - (CVE-2023-28856) Authenticated users can use the HINCRBYFLOAT
    command to create an invalid hash field that will crash Redis
    on access
  - Add a missing fsync of AOF file in rare cases (#11973)
  - Disconnect pub-sub subscribers when revoking allchannels
    permission (#11992)
  - Fix a compiler fortification induced crash when used with link
    time optimizations (#11982)
- Drop get-old-size-calculations.patch:
  replaced with proper fix

- Added get-old-size-calculations.patch:
  my workaround for https://github.com/redis/redis/issues/11965

OBS-URL: https://build.opensuse.org/request/show/1079989
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=221
2023-04-18 07:30:27 +00:00
Danilo Spinella
f703ac4735 Accepting request 1073382 from home:AndreasStieger:branches:server:database
redis 7.0.10 CVE-2023-28425 boo#1209528

OBS-URL: https://build.opensuse.org/request/show/1073382
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=220
2023-03-21 13:39:55 +00:00
Martin Pluskal
580642cadf Accepting request 1058769 from home:AndreasStieger:branches:server:database
redis 7.0.8
CVE-2022-35977 boo#1207202
CVE-2023-22458 boo#1207203

OBS-URL: https://build.opensuse.org/request/show/1058769
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=216
2023-01-17 07:53:17 +00:00
Martin Pluskal
dfaff87b91 Accepting request 1043342 from home:stroeder:sys
- Update to version 7.0.7
  * Fix regression from Redis 7.0.6 in distance replies
    of Geo commands (#11631)

OBS-URL: https://build.opensuse.org/request/show/1043342
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=212
2022-12-19 10:24:36 +00:00
Martin Pluskal
0144920764 Accepting request 1043227 from home:AndreasStieger:branches:server:database
redis 7.0.6

OBS-URL: https://build.opensuse.org/request/show/1043227
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=211
2022-12-16 09:39:25 +00:00
Danilo Spinella
1be7f74178 Accepting request 1005288 from home:stroeder:sys
- Update to version 7.0.5 (boo#1203638)
  + Security Fixes:
    * (CVE-2022-35951) Executing a XAUTOCLAIM command on a stream key in a specific
      state, with a specially crafted COUNT argument, may cause an integer overflow,
      a subsequent heap overflow, and potentially lead to remote code execution.
      The problem affects Redis versions 7.0.0 or newer
      [reported by Xion (SeungHyun Lee) of KAIST GoN].
  + Module API changes
    * Fix RM_Call execution of scripts when used with M/W/S flags to properly
      handle script flags (#11159)
    * Fix RM_SetAbsExpire and RM_GetAbsExpire API registration (#11025, #8564)
  + Bug Fixes
    * Fix a hang when eviction is combined with lazy-free and maxmemory-eviction-tenacity is set to 100 (#11237)
    * Fix a crash when a replica may attempt to set itself as its master as a result of a manual failover (#11263)
    * Fix a bug where a cluster-enabled replica node may permanently set its master's hostname to '?' (#10696)
    * Fix a crash when a Lua script returns a meta-table (#11032)
  + Fixes for issues in previous releases of Redis 7.0
    * Fix redis-cli to do DNS lookup before sending CLUSTER MEET (#11151)
    * Fix crash when a key is lazy expired during cluster key migration (#11176)
    * Fix AOF rewrite to fsync the old AOF file when a new one is created (#11004)
    * Fix some crashes involving a list containing entries larger than 1GB (#11242)
    * Correctly handle scripts with a non-read-only shebang on a cluster replica (#11223)
    * Fix memory leak when unloading a module (#11147)
    * Fix bug with scripts ignoring client tracking NOLOOP (#11052)
    * Fix client-side tracking breaking protocol when FLUSHDB / FLUSHALL / SWAPDB is used inside MULTI-EXEC (#11038)
    * Fix ACL: BITFIELD with GET and also SET / INCRBY can be executed with read-only key permission (#11086)
    * Fix missing sections for INFO ALL when also requesting a module info section (#11291)

OBS-URL: https://build.opensuse.org/request/show/1005288
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=205
2022-09-22 07:54:56 +00:00
Danilo Spinella
65723e8e97 Accepting request 989997 from home:stroeder:branches:server:database
Security update to version 7.0.4 (CVE-2022-31144)

OBS-URL: https://build.opensuse.org/request/show/989997
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=203
2022-07-18 15:26:40 +00:00
Martin Pluskal
cd30b3c68c Accepting request 988416 from home:stroeder:branches:server:database
Update to version 7.0.3

OBS-URL: https://build.opensuse.org/request/show/988416
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=201
2022-07-12 15:53:38 +00:00
Martin Pluskal
fd18857a95 Accepting request 982226 from home:stroeder:branches:server:database
Update to version 7.0.2

OBS-URL: https://build.opensuse.org/request/show/982226
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=195
2022-06-13 14:46:11 +00:00
Martin Pluskal
962129d107 Accepting request 981377 from home:stroeder:branches:server:database
Update to version 7.0.1

OBS-URL: https://build.opensuse.org/request/show/981377
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=194
2022-06-09 06:07:20 +00:00
Martin Pluskal
cd6af81f26 Accepting request 973269 from home:AndreasStieger:branches:server:database
redis 6.2.7
CVE-2022-24736 boo#1198953
CVE-2022-24735 boo#1198952

OBS-URL: https://build.opensuse.org/request/show/973269
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=188
2022-04-28 06:51:05 +00:00
Danilo Spinella
31a9681e63 Accepting request 923169 from home:stroeder:sys
OBS-URL: https://build.opensuse.org/request/show/923169
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=186
2021-10-05 09:57:51 +00:00
Danilo Spinella
4de6b48e75 Accepting request 907768 from home:AndreasStieger:branches:server:database
redis 6.2.5 CVE-2021-32761 boo#1188598

OBS-URL: https://build.opensuse.org/request/show/907768
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=185
2021-07-22 14:14:31 +00:00
Martin Pluskal
1ca5869704 Accepting request 896855 from home:AndreasStieger:branches:server:database
redis 6.2.4 CVE-2021-32625 (boo#1186722)

OBS-URL: https://build.opensuse.org/request/show/896855
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=181
2021-06-02 08:13:15 +00:00
Martin Pluskal
7dd39d8d34 Accepting request 890241 from home:stroeder:branches:server:database
redis 6.2.3 with security fixes

OBS-URL: https://build.opensuse.org/request/show/890241
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=176
2021-05-04 08:23:54 +00:00
Martin Pluskal
8eaaab7f5c Accepting request 886894 from home:stroeder:branches:server:database
redis 6.2.2

OBS-URL: https://build.opensuse.org/request/show/886894
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=173
2021-04-20 08:19:36 +00:00
Martin Pluskal
cfb0e5acdd Accepting request 876262 from home:AndreasStieger:branches:server:database
redis 6.0.12

OBS-URL: https://build.opensuse.org/request/show/876262
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=167
2021-03-03 07:12:30 +00:00
Martin Pluskal
60b40902c0 Accepting request 874857 from home:AndreasStieger:branches:server:database
redis 6.0.11 CVE-2021-21309 boo#1182657

OBS-URL: https://build.opensuse.org/request/show/874857
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=164
2021-02-25 06:40:00 +00:00
Martin Pluskal
7e6755b7bc Accepting request 862707 from home:stroeder:branches:server:database
- HTTPS download link for source
- redis 6.0.10

OBS-URL: https://build.opensuse.org/request/show/862707
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=160
2021-01-13 06:23:01 +00:00
ae648284a9 Accepting request 844547 from home:AndreasStieger:branches:server:database
redis 6.0.9

OBS-URL: https://build.opensuse.org/request/show/844547
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=158
2020-10-28 13:13:44 +00:00
Martin Pluskal
b9069d4452 Accepting request 833670 from home:AndreasStieger:branches:server:database
redis 6.0.8

OBS-URL: https://build.opensuse.org/request/show/833670
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=154
2020-09-11 09:12:35 +00:00
Lars Vogdt
035521204a Accepting request 822886 from home:AndreasStieger:branches:server:database
redis 6.0.6

OBS-URL: https://build.opensuse.org/request/show/822886
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=152
2020-07-27 19:38:03 +00:00
Lars Vogdt
2c45f34107 Accepting request 813274 from home:AndreasStieger:branches:server:database
redis 6.0.5

OBS-URL: https://build.opensuse.org/request/show/813274
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=150
2020-06-10 18:15:04 +00:00
Lars Vogdt
544071eb8f Accepting request 810027 from home:AndreasStieger:branches:server:database
redis 6.0.4

OBS-URL: https://build.opensuse.org/request/show/810027
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=148
2020-05-28 22:43:04 +00:00
Martin Pluskal
9ed0b9567c Accepting request 806158 from home:AndreasStieger:branches:server:database
redis 6.0.3

OBS-URL: https://build.opensuse.org/request/show/806158
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=147
2020-05-17 12:52:53 +00:00
Martin Pluskal
f1b7afa805 Accepting request 800054 from home:darix:apps
- add BR pkgconfig(libsystemd) for the rewritten systemd support
  and force building with it

- Update to 6.0.1
  * https://raw.githubusercontent.com/antirez/redis/6.0.1/00-RELEASENOTES
  * XCLAIM AOF/replicas propagation fixed.
  * Client side caching: new NOLOOP option to avoid getting
    notified about changes performed by ourselves.
  * ACL GENPASS now uses HMAC-SHA256 and have an optional
    "bits" argument.  It means you can use it as a general purpose
    "secure random strings" primitive!
  * Cluster "SLOTS" subcommand memory optimization.
  * The LCS command is now a subcommand of STRALGO.
  * Meaningful offset for replicas as well. More successful
    partial resynchronizations.
  * Optimize memory usage of deferred replies.
  * Faster CRC64 algorithm for faster RDB loading.
  * XINFO STREAM FULL, a new subcommand to get the whole stream
    state.
  * CLIENT KILL USER <username>.
  * MIGRATE AUTH2 option, for ACL style authentication support.
  * Other random bugfixes.

OBS-URL: https://build.opensuse.org/request/show/800054
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=143
2020-05-04 14:42:41 +00:00
Martin Pluskal
c5b6f52ad7 Accepting request 799414 from home:AndreasStieger:branches:server:database
- add hash file from redis-hashes and verify it during build

OBS-URL: https://build.opensuse.org/request/show/799414
OBS-URL: https://build.opensuse.org/package/show/server:database/redis?expand=0&rev=140
2020-05-01 08:17:12 +00:00