Package redis-doc-6.2.7-1.module+el8.9.0+61+d427bf6d.noarch
Name | redis-doc |
---|---|
Epoch | 0 |
Version | 6.2.7 |
Release | 1.module+el8.9.0+61+d427bf6d |
Architecture | noarch |
Website/URL | https://redis.io |
License | CC-BY-SA |
Build Time | 2024-04-14 21:50:49 |
Build Host | builder-x86-06.inferitos.ru |
Summary | Documentation for Redis including man pages |
Repositories | AppStream |
Description | Manual pages and detailed documentation for many aspects of Redis use, administration and development. |
Errata | — |
Size | 492 KiB |
Source Project | redis-6.2.7-1.module+el8.9.0+61+d427bf6d |
SHA-256 checksum | cc188a487e99c3301fa0f23c7500a1a576146cd6394b695f49fdeaaf63672e13 |
×
* Tue Dec 12 2023 MSVSphere Packaging Team <packager@msvsphere-os.ru> - 6.2.7-1 - Rebuilt for MSVSphere 8.8 * Mon May 09 2022 Remi Collet <rcollet@redhat.com> - 6.2.7-1 - rebase to 6.2.7 #1999873 * Mon Oct 11 2021 Remi Collet <rcollet@redhat.com> - 6.0.9-5 - fix denial of service via Redis Standard Protocol (RESP) request CVE-2021-32675 * Fri Oct 08 2021 Remi Collet <rcollet@redhat.com> - 6.0.9-4 - fix lua scripts can overflow the heap-based Lua stack CVE-2021-32626 - fix integer overflow issue with Streams CVE-2021-32627 - fix integer overflow bug in the ziplist data structure CVE-2021-32628 - fix integer overflow issue with intsets CVE-2021-32687 - fix integer overflow issue with strings CVE-2021-41099 * Wed May 12 2021 Remi Collet <rcollet@redhat.com> - 6.0.9-3 - fix integer overflow via STRALGO LCS command CVE-2021-29477 * Tue Nov 24 2020 Remi Collet <rcollet@redhat.com> - 6.0.9-2 - revert "simplify config rewrite file" and keep configuration in /etc * Thu Oct 29 2020 Remi Collet <rcollet@redhat.com> - 6.0.9-1 - update to 6.0.9 * Tue Oct 20 2020 Remi Collet <rcollet@redhat.com> - 6.0.8-1 - update to 6.0.8 for new stream #1862063 * Thu Jul 11 2019 Remi Collet <rcollet@redhat.com> - 5.0.3-2 - fix Heap buffer overflow in HyperLogLog triggered by malicious client CVE-2019-10192 - fix Stack buffer overflow in HyperLogLog triggered by malicious client CVE-2019-10193 * Thu Dec 13 2018 Remi Collet <rcollet@redhat.com> - 5.0.3-1 - update to 5.0.3