Пакет redis: Информация

  • Default inline alert: Версия в репозитории: 7.2.3-alt1

Исходный пакет: redis
Версия: 6.2.6-alt1
Собран:  20 ноября 2021 г. 18:41
Сообщить об ошибке в пакете
Домашняя страница: http://redis.io/

Лицензия: New BSD License
О пакете: Redis is an advanced key-value store
Описание: 
Redis is an advanced key-value store. It is similar to memcached but
the dataset is not volatile, and values can be strings, exactly like in
memcached, but also lists, sets, and ordered sets. All this data types can
be manipulated with atomic operations to push/pop elements, add/remove
elements, perform server side union, intersection, difference between
sets, and so forth. Redis supports different kind of sorting abilities.

In order to be very fast but at the same time persistent the whole dataset
is taken in memory, and from time to time saved on disc asynchronously
(semi persistent mode) or alternatively every change is written into an
append only file (fully persistent mode). Redis is able to rebuild the
append only file in background when it gets too big.

Redis supports trivial to setup master-slave replication, with very
fast non-blocking first synchronization, auto reconnection on net split,
and so forth.

Redis is written in ANSI C and works in most POSIX systems like Linux,
*BSD, Mac OS X, Solaris, and so on. Redis is free software released under
the very liberal BSD license. Redis is reported to compile and work
under WIN32 if compiled with Cygwin, but there is no official support
for Windows currently.

Список rpm-пакетов, предоставляемых данным srpm-пакетом:
redis (mipsel)
redis-debuginfo (mipsel)

Сопровождающий: Vitaly Lipatov


    1. git-core
    2. gcc-c++
    3. tcl >= 8.5
    4. tcl-devel
    5. xsltproc

Последнее изменение


20 ноября 2021 г. Nikolay A. Fetisov 6.2.6-alt1
- New version
- Security fixes:
  + CVE-2021-41099: buffer overflow with non-default configuration
  + CVE-2021-32762: buffer overflow issue in redis-cli and redis-sentinel
  + CVE-2021-32687: buffer overflow with non-default configuration
  + CVE-2021-32675: Denial Of Service when processing RESP request payloads
  + CVE-2021-32672: random heap reading issue with Lua Debugger
  + CVE-2021-32628: buffer overflow with non-default configuration
  + CVE-2021-32627: buffer overflow with non-default configuration
  + CVE-2021-32626: Lua scripts may result with Heap buffer overflow
  + CVE-2021-32761: integer overflow in BITFIELD on 32-bit versions
28 июня 2021 г. Nikolay A. Fetisov 6.2.4-alt1
- New major version (Closes: 40279)
16 мая 2021 г. Nikolay A. Fetisov 5.0.12-alt1
- New version
- Security fixes:
  + CVE-2021-21309: integer overflow on 32-bit systems
- Fix NMU: move local codebase changes to a patch