diff options
author | Sergey A. Osokin <osa@FreeBSD.org> | 2021-02-23 14:16:03 +0000 |
---|---|---|
committer | Sergey A. Osokin <osa@FreeBSD.org> | 2021-02-23 14:16:03 +0000 |
commit | 5bc65c515a2902f61b9b3c7a47039747299b07e2 (patch) | |
tree | 987c193fb47dfe1a6377a6d97738b56b15b31d45 /databases/redis-devel/distinfo | |
parent | 0f5cc97e074940f2c225cec189da247e4b2f1f7e (diff) | |
download | ports-5bc65c515a2902f61b9b3c7a47039747299b07e2.tar.gz ports-5bc65c515a2902f61b9b3c7a47039747299b07e2.zip |
Security update if you use 32bit build of redis (see bellow), MODERATE
if you used earlier versions of Redis 6.2, LOW otherwise.
Integer overflow on 32-bit systems (CVE-2021-21309):
Redis 4.0 or newer uses a configurable limit for the maximum supported bulk
input size. By default, it is 512MB which is a safe value for all platforms.
If the limit is significantly increased, receiving a large request from a client
may trigger several integer overflow scenarios, which would result with buffer
overflow and heap corruption.
ChangeLog: https://github.com/redis/redis/releases/tag/6.2.0
Notes
Notes:
svn path=/head/; revision=566402
Diffstat (limited to 'databases/redis-devel/distinfo')
-rw-r--r-- | databases/redis-devel/distinfo | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/databases/redis-devel/distinfo b/databases/redis-devel/distinfo index 65ca0e6255e3..d6f7b6639d67 100644 --- a/databases/redis-devel/distinfo +++ b/databases/redis-devel/distinfo @@ -1,3 +1,3 @@ -TIMESTAMP = 1612280969 -SHA256 (redis-redis-6.2.0rc3-2dba1e3_GH0.tar.gz) = 40e299e465439165cbd642f1e0d0f53f6806a8fa321e805da223309b0cc51358 -SIZE (redis-redis-6.2.0rc3-2dba1e3_GH0.tar.gz) = 2444819 +TIMESTAMP = 1614089376 +SHA256 (redis-6.2.0.tar.gz) = 67d624c25d962bd68aff8812a135df85bad07556b8825f3bcd5b522a9932dbca +SIZE (redis-6.2.0.tar.gz) = 2435539 |