Package redis: Information
- Source package:
- redis
- Version:
- 6.2.8-alt1
- Build time:
- Jan 15, 2023, 02:35 AM in the task #313485
- Category:
- Home page:
- License:
- New BSD License
- Summary:
- Redis is an advanced key-value store
- Description:
Redis is an advanced key-value store. It is similar to memcached but the dataset is not volatile, and values can be strings, exactly like in memcached, but also lists, sets, and ordered sets. All this data types can be manipulated with atomic operations to push/pop elements, add/remove elements, perform server side union, intersection, difference between sets, and so forth. Redis supports different kind of sorting abilities. In order to be very fast but at the same time persistent the whole dataset is taken in memory, and from time to time saved on disc asynchronously (semi persistent mode) or alternatively every change is written into an append only file (fully persistent mode). Redis is able to rebuild the append only file in background when it gets too big. Redis supports trivial to setup master-slave replication, with very fast non-blocking first synchronization, auto reconnection on net split, and so forth. Redis is written in ANSI C and works in most POSIX systems like Linux, *BSD, Mac OS X, Solaris, and so on. Redis is free software released under the very liberal BSD license. Redis is reported to compile and work under WIN32 if compiled with Cygwin, but there is no official support for Windows currently.
- List of rpms provided by this srpm:
- Maintainer:
- List of contributors:
- ACL:
- @everybody
Last changed
Jan. 14, 2023 Nikolay A. Fetisov 6.2.8-alt1
- New version - Security fixes: + CVE-2022-24736: server crash by a specially crafted Lua script + CVE-2022-24735: overcome ACL rules via Lua scripts manipulation
Nov. 20, 2021 Nikolay A. Fetisov 6.2.6-alt1
- New version - Security fixes: + CVE-2021-41099: buffer overflow with non-default configuration + CVE-2021-32762: buffer overflow issue in redis-cli and redis-sentinel + CVE-2021-32687: buffer overflow with non-default configuration + CVE-2021-32675: Denial Of Service when processing RESP request payloads + CVE-2021-32672: random heap reading issue with Lua Debugger + CVE-2021-32628: buffer overflow with non-default configuration + CVE-2021-32627: buffer overflow with non-default configuration + CVE-2021-32626: Lua scripts may result with Heap buffer overflow + CVE-2021-32761: integer overflow in BITFIELD on 32-bit versions
June 28, 2021 Nikolay A. Fetisov 6.2.4-alt1
- New major version (Closes: 40279)