Name: | redis |
---|---|
Version: | 5.0.3 |
Release: | 5.module+el8.4.0+20382+7694043a |
Architecture: | aarch64 |
Module: | redis:5:8040020211011074037:9f9e2e7e |
Group: | Unspecified |
Size: | 3193041 |
License: | BSD and MIT |
RPM: | redis-5.0.3-5.module+el8.4.0+20382+7694043a.aarch64.rpm |
Source RPM: | redis-5.0.3-5.module+el8.4.0+20382+7694043a.src.rpm |
Build Date: | Tue Oct 19 2021 |
Build Host: | build-ol8-aarch64.oracle.com |
Vendor: | Oracle America |
URL: | http://redis.io |
Summary: | A persistent key-value database |
Description: | Redis is an advanced key-value store. It is often referred to as a data structure server since keys can contain strings, hashes, lists, sets and sorted sets. You can run atomic operations on these types, like appending to a string; incrementing the value in a hash; pushing to a list; computing set intersection, union and difference; or getting the member with highest ranking in a sorted set. In order to achieve its outstanding performance, Redis works with an in-memory dataset. Depending on your use case, you can persist it either by dumping the dataset to disk every once in a while, or by appending each command to a log. Redis also supports trivial-to-setup master-slave replication, with very fast non-blocking first synchronization, auto-reconnection on net split and so forth. Other features include Transactions, Pub/Sub, Lua scripting, Keys with a limited time-to-live, and configuration settings to make Redis behave like a cache. You can use Redis from most programming languages also. |
- fix denial of service via Redis Standard Protocol (RESP) request CVE-2021-32675
- fix lua scripts can overflow the heap-based Lua stack CVE-2021-32626 - fix integer overflow issue with Streams CVE-2021-32627 - fix integer overflow bug in the ziplist data structure CVE-2021-32628 - fix integer overflow issue with intsets CVE-2021-32687 - fix integer overflow issue with strings CVE-2021-41099
- fix Heap buffer overflow in HyperLogLog triggered by malicious client CVE-2019-10192 - fix Stack buffer overflow in HyperLogLog triggered by malicious client CVE-2019-10193
- update to 5.0.3
- drop build dependency on pandoc - drop dependency on jemalloc #1591762 - fix License (BSD and MIT) - add bundled libraries licences - cleanup conditions from spec file
- Upstream 4.0.10 release.
- rebuild (#1571197)
- Upstream 4.0.9 release.
- Escape macros in %changelog
- Upstream 4.0.8 release.