Update to redis-6.2.9
Security Fixes: - CVE-2022-35977: Integer overflow in the Redis SETRANGE and SORT/SORT_RO commands can drive Redis to OOM panic - CVE-2023-22458: Integer overflow in the Redis HRANDFIELD and ZRANDMEMBER commands can lead to denial-of-service
This commit is contained in:
parent
6802ac4174
commit
3c701012b6
@ -1,6 +1,6 @@
|
||||
COMMENT = persistent key-value database
|
||||
|
||||
DISTNAME = redis-6.2.8
|
||||
DISTNAME = redis-6.2.9
|
||||
CATEGORIES = databases
|
||||
HOMEPAGE = https://redis.io/
|
||||
|
||||
|
@ -1,2 +1,2 @@
|
||||
SHA256 (redis-6.2.8.tar.gz) = +RqyS8tCZzy4UykutdQ8IBfRHWWYVICO1qUpyXKX/f4=
|
||||
SIZE (redis-6.2.8.tar.gz) = 2489670
|
||||
SHA256 (redis-6.2.9.tar.gz) = lmGyxrHMm/KZlHGzek11n6XnR9QIFCwYr4eS69g4Sio=
|
||||
SIZE (redis-6.2.9.tar.gz) = 2490785
|
||||
|
@ -1,7 +1,7 @@
|
||||
Index: src/server.h
|
||||
--- src/server.h.orig
|
||||
+++ src/server.h
|
||||
@@ -108,7 +108,7 @@ typedef long long ustime_t; /* microsecond time type.
|
||||
@@ -114,7 +114,7 @@ typedef long long ustime_t; /* microsecond time type.
|
||||
#define RDB_EOF_MARK_SIZE 40
|
||||
#define CONFIG_REPL_BACKLOG_MIN_SIZE (1024*16) /* 16k */
|
||||
#define CONFIG_BGSAVE_RETRY_DELAY 5 /* Wait a few secs before trying again. */
|
||||
|
Loading…
x
Reference in New Issue
Block a user