Update to redis-6.2.9

Security Fixes:
- CVE-2022-35977: Integer overflow in the Redis SETRANGE and
  SORT/SORT_RO commands can drive Redis to OOM panic
- CVE-2023-22458: Integer overflow in the Redis HRANDFIELD and
  ZRANDMEMBER commands can lead to denial-of-service
This commit is contained in:
danj 2023-01-17 00:30:17 +00:00
parent 6802ac4174
commit 3c701012b6
3 changed files with 4 additions and 4 deletions

View File

@ -1,6 +1,6 @@
COMMENT = persistent key-value database
DISTNAME = redis-6.2.8
DISTNAME = redis-6.2.9
CATEGORIES = databases
HOMEPAGE = https://redis.io/

View File

@ -1,2 +1,2 @@
SHA256 (redis-6.2.8.tar.gz) = +RqyS8tCZzy4UykutdQ8IBfRHWWYVICO1qUpyXKX/f4=
SIZE (redis-6.2.8.tar.gz) = 2489670
SHA256 (redis-6.2.9.tar.gz) = lmGyxrHMm/KZlHGzek11n6XnR9QIFCwYr4eS69g4Sio=
SIZE (redis-6.2.9.tar.gz) = 2490785

View File

@ -1,7 +1,7 @@
Index: src/server.h
--- src/server.h.orig
+++ src/server.h
@@ -108,7 +108,7 @@ typedef long long ustime_t; /* microsecond time type.
@@ -114,7 +114,7 @@ typedef long long ustime_t; /* microsecond time type.
#define RDB_EOF_MARK_SIZE 40
#define CONFIG_REPL_BACKLOG_MIN_SIZE (1024*16) /* 16k */
#define CONFIG_BGSAVE_RETRY_DELAY 5 /* Wait a few secs before trying again. */