Revisions of redis

buildservice-autocommit accepted request 1157013 from Factory Maintainer's avatar Factory Maintainer (factory-maintainer) (revision 241)
baserev update by copy to link target
Danilo Spinella's avatar Danilo Spinella (dspinella) accepted request 1154883 from Danilo Spinella's avatar Danilo Spinella (dspinella) (revision 240)
  * redis-CVE-2023-45145.patch
Danilo Spinella's avatar Danilo Spinella (dspinella) accepted request 1154879 from Danilo Spinella's avatar Danilo Spinella (dspinella) (revision 238)
- The following issue has been fixed in TW but has not been
  mentioned before:
  * bsc#1208235
  * redis-CVE-2022-24834.patch
  * redis-CVE-2022-36021.patch
  * redis-CVE-2023-25155.patch
  * redis-CVE-2023-45145.patch
Danilo Spinella's avatar Danilo Spinella (dspinella) accepted request 1154125 from Danilo Spinella's avatar Danilo Spinella (dspinella) (revision 237)
- The following patch was removed from SLE:
Martin Pluskal's avatar Martin Pluskal (pluskalm) accepted request 1153845 from Danilo Spinella's avatar Danilo Spinella (dspinella) (revision 236)
- The following patches were removed from SLE:
  * bsc1198952.patch
  * bsc1198952-1.patch
  * bsc1198952-2.patch
  * bsc1198952-3.patch
  * bsc1198952-4.patch
  * cve-2022-3647.patch
  * redis-CVE-2022-35977.patch
  * redis-CVE-2023-22458.patch
  * redis-CVE-2023-28856.patch
buildservice-autocommit accepted request 1137732 from Danilo Spinella's avatar Danilo Spinella (dspinella) (revision 235)
baserev update by copy to link target
Danilo Spinella's avatar Danilo Spinella (dspinella) accepted request 1137728 from Marcus Rueckert's avatar Marcus Rueckert (darix) (revision 234)
- redis 7.2.4: (boo#1218646)
  - Security fixes
    - (CVE-2023-41056) In some cases, Redis may incorrectly handle
      resizing of memory buffers which can result in incorrect
      accounting of buffer sizes and lead to heap overflow and
      potential remote code execution.
  - Bug fixes
    - Fix crashes of cluster commands clusters with mixed versions
      of 7.0 and 7.2 (#12805, #12832)
    - Fix slot ownership not being properly handled when deleting a
      slot from a node (#12564)
    - Fix atomicity issues with the RedisModuleEvent_Key module API
      event (#12733)
buildservice-autocommit accepted request 1123282 from Marcus Rueckert's avatar Marcus Rueckert (darix) (revision 233)
baserev update by copy to link target
Marcus Rueckert's avatar Marcus Rueckert (darix) committed (revision 232)
- redis 7.2.3:
  - Fix file descriptor leak preventing deleted files from freeing
    disk space on replicas (#12693)
  - Fix a possible crash after cluster node removal (#12702)
buildservice-autocommit accepted request 1119656 from Marcus Rueckert's avatar Marcus Rueckert (darix) (revision 231)
baserev update by copy to link target
Marcus Rueckert's avatar Marcus Rueckert (darix) accepted request 1119207 from Danilo Spinella's avatar Danilo Spinella (dspinella) (revision 230)
- redis 7.2.2:
  * (CVE-2023-45145) The wrong order of listen(2) and chmod(2) calls creates a
    race condition that can be used by another process to bypass desired Unix
    socket permissions on startup, bsc#1216376
  * WAITAOF could timeout in the absence of write traffic in case a new AOF is
    created and an AOF rewrite can't immediately start
  * Fix crash when running rebalance command in a mixed cluster of 7.0 and 7.2
    nodes
  * Fix the return type of the slot number in cluster shards to integer, which
    makes it consistent with past behavior 
  * Fix CLUSTER commands are called from modules or scripts to return TLS info
    appropriately 
    redis-cli, fix crash on reconnect when in SUBSCRIBE mode 
  * Fix overflow calculation for next timer event
Danilo Spinella's avatar Danilo Spinella (dspinella) accepted request 1109571 from Danilo Spinella's avatar Danilo Spinella (dspinella) (revision 229)
- redis 7.2.1:
  * (CVE-2023-41053) Redis does not correctly identify keys accessed by SORT_RO and,
    as a result, may grant users executing this command access to keys that are not
    explicitly authorized by the ACL configuration. (bsc#1215094)
  * Fix crashes when joining a node to an existing 7.0 Redis Cluster
  * Correct request_policy and response_policy command tips on for some admin /
    configuration commands
- Refresh redis.hashes
Martin Pluskal's avatar Martin Pluskal (pluskalm) accepted request 1104035 from Marcus Rueckert's avatar Marcus Rueckert (darix) (revision 228)
- redis 7.2.0
  - Bug Fixes
    - redis-cli in cluster mode handles unknown-endpoint (#12273)
    - Update request / response policy hints for a few commands
      (#12417)
    - Ensure that the function load timeout is disabled during
      loading from RDB/AOF and on replicas. (#12451)
    - Fix false success and a memory leak for ACL selector with bad
      parenthesis combination (#12452)
    - Fix the assertion when script timeout occurs after it
      signaled a blocked client (#12459)
  - Fixes for issues in previous releases of Redis 7.2
    - Update MONITOR client's memory correctly for INFO and
      client-eviction (#12420)
    - The response of cluster nodes was unnecessarily adding an
      extra comma when no hostname was present. (#12411)
- refreshed redis-conf.patch:
- switch to autosetup now that we switched the last patch to patch
  level 1
buildservice-autocommit accepted request 1098399 from Martin Pluskal's avatar Martin Pluskal (pluskalm) (revision 227)
baserev update by copy to link target
Martin Pluskal's avatar Martin Pluskal (pluskalm) accepted request 1098376 from Danilo Spinella's avatar Danilo Spinella (dspinella) (revision 226)
- redis 7.0.12:
  * (CVE-2022-24834) A specially crafted Lua script executing in Redis can trigger
    a heap overflow in the cjson and cmsgpack libraries, and result in heap
    corruption and potentially remote code execution. The problem exists in all
    versions of Redis with Lua scripting support, starting from 2.6, and affects
    only authenticated and authorized users. (bsc#1213193)
  * (CVE-2023-36824) Extracting key names from a command and a list of arguments
    may, in some cases, trigger a heap overflow and result in reading random heap
    memory, heap corruption and potentially remote code execution. Specifically:
    using COMMAND GETKEYS* and validation of key names in ACL rules. (bsc#1213249)
  * Re-enable downscale rehashing while there is a fork child
  * Fix possible hang in HRANDFIELD, SRANDMEMBER, ZRANDMEMBER when used with <count>
  * Improve fairness issue in RANDOMKEY, HRANDFIELD, SRANDMEMBER, ZRANDMEMBER,
    SPOP, and eviction
  * Fix WAIT to be effective after a blocked module command being unblocked
  * Avoid unnecessary full sync after master restart in a rare case
buildservice-autocommit accepted request 1087948 from Martin Pluskal's avatar Martin Pluskal (pluskalm) (revision 225)
baserev update by copy to link target
Martin Pluskal's avatar Martin Pluskal (pluskalm) accepted request 1087941 from Jiri Srain's avatar Jiri Srain (jsrain) (revision 224)
- refresh redis-hashes from upstream source
buildservice-autocommit accepted request 1080241 from Martin Pluskal's avatar Martin Pluskal (pluskalm) (revision 223)
baserev update by copy to link target
Martin Pluskal's avatar Martin Pluskal (pluskalm) accepted request 1080084 from Andreas Stieger's avatar Andreas Stieger (AndreasStieger) (revision 222)
boo#1210548 reference
Displaying revisions 1 - 20 of 241
openSUSE Build Service is sponsored by