Package redis

Source package: redis
Version: 6.2.6-alt1
Build time:  Apr 11, 2022, 12:36 PM
Category: System/Libraries
Report package bug
Home page: http://redis.io/
License:  New BSD License
Summary:  Redis is an advanced key-value store
Description: 
Redis is an advanced key-value store. It is similar to memcached but
the dataset is not volatile, and values can be strings, exactly like in
memcached, but also lists, sets, and ordered sets. All this data types can
be manipulated with atomic operations to push/pop elements, add/remove
elements, perform server side union, intersection, difference between
sets, and so forth. Redis supports different kind of sorting abilities.

In order to be very fast but at the same time persistent the whole dataset
is taken in memory, and from time to time saved on disc asynchronously
(semi persistent mode) or alternatively every change is written into an
append only file (fully persistent mode). Redis is able to rebuild the
append only file in background when it gets too big.

Redis supports trivial to setup master-slave replication, with very
fast non-blocking first synchronization, auto reconnection on net split,
and so forth.

Redis is written in ANSI C and works in most POSIX systems like Linux,
*BSD, Mac OS X, Solaris, and so on. Redis is free software released under
the very liberal BSD license. Redis is reported to compile and work
under WIN32 if compiled with Cygwin, but there is no official support
for Windows currently.
List of rpms provided by this srpm: 
redis (e2kv6, e2kv5, e2kv4, e2k)
redis-debuginfo (e2kv6, e2kv5, e2kv4, e2k)
    1. gcc-c++
    2. git-core
    3. tcl >= 8.5
    4. tcl-devel
    5. xsltproc
Last changes:
Nov. 20, 2021 Nikolay A. Fetisov 6.2.6-alt1
- New version
- Security fixes:
  + CVE-2021-41099: buffer overflow with non-default configuration
  + CVE-2021-32762: buffer overflow issue in redis-cli and redis-sentinel
  + CVE-2021-32687: buffer overflow with non-default configuration
  + CVE-2021-32675: Denial Of Service when processing RESP request payloads
  + CVE-2021-32672: random heap reading issue with Lua Debugger
  + CVE-2021-32628: buffer overflow with non-default configuration
  + CVE-2021-32627: buffer overflow with non-default configuration
  + CVE-2021-32626: Lua scripts may result with Heap buffer overflow
  + CVE-2021-32761: integer overflow in BITFIELD on 32-bit versions
June 28, 2021 Nikolay A. Fetisov 6.2.4-alt1
- New major version (Closes: 40279)
May 16, 2021 Nikolay A. Fetisov 5.0.12-alt1
- New version
- Security fixes:
  + CVE-2021-21309: integer overflow on 32-bit systems
- Fix NMU: move local codebase changes to a patch

Back to Top