aboutsummaryrefslogtreecommitdiff
path: root/databases/redis-devel/distinfo
diff options
context:
space:
mode:
authorSergey A. Osokin <osa@FreeBSD.org>2021-02-23 14:16:03 +0000
committerSergey A. Osokin <osa@FreeBSD.org>2021-02-23 14:16:03 +0000
commit5bc65c515a2902f61b9b3c7a47039747299b07e2 (patch)
tree987c193fb47dfe1a6377a6d97738b56b15b31d45 /databases/redis-devel/distinfo
parent0f5cc97e074940f2c225cec189da247e4b2f1f7e (diff)
downloadports-5bc65c515a2902f61b9b3c7a47039747299b07e2.tar.gz
ports-5bc65c515a2902f61b9b3c7a47039747299b07e2.zip
Security update if you use 32bit build of redis (see bellow), MODERATE
if you used earlier versions of Redis 6.2, LOW otherwise. Integer overflow on 32-bit systems (CVE-2021-21309): Redis 4.0 or newer uses a configurable limit for the maximum supported bulk input size. By default, it is 512MB which is a safe value for all platforms. If the limit is significantly increased, receiving a large request from a client may trigger several integer overflow scenarios, which would result with buffer overflow and heap corruption. ChangeLog: https://github.com/redis/redis/releases/tag/6.2.0
Notes
Notes: svn path=/head/; revision=566402
Diffstat (limited to 'databases/redis-devel/distinfo')
-rw-r--r--databases/redis-devel/distinfo6
1 files changed, 3 insertions, 3 deletions
diff --git a/databases/redis-devel/distinfo b/databases/redis-devel/distinfo
index 65ca0e6255e3..d6f7b6639d67 100644
--- a/databases/redis-devel/distinfo
+++ b/databases/redis-devel/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1612280969
-SHA256 (redis-redis-6.2.0rc3-2dba1e3_GH0.tar.gz) = 40e299e465439165cbd642f1e0d0f53f6806a8fa321e805da223309b0cc51358
-SIZE (redis-redis-6.2.0rc3-2dba1e3_GH0.tar.gz) = 2444819
+TIMESTAMP = 1614089376
+SHA256 (redis-6.2.0.tar.gz) = 67d624c25d962bd68aff8812a135df85bad07556b8825f3bcd5b522a9932dbca
+SIZE (redis-6.2.0.tar.gz) = 2435539