Message ID | 20251006202902.2137866-1-skandigraun@gmail.com |
---|---|
State | Under Review |
Headers | show |
Series | [meta-oe] redis: upgrade 6.2.18 -> 6.2.20 | expand |
diff --git a/meta-oe/recipes-extended/redis/redis_6.2.18.bb b/meta-oe/recipes-extended/redis/redis_6.2.20.bb similarity index 96% rename from meta-oe/recipes-extended/redis/redis_6.2.18.bb rename to meta-oe/recipes-extended/redis/redis_6.2.20.bb index 171c6640f2..f2e6175462 100644 --- a/meta-oe/recipes-extended/redis/redis_6.2.18.bb +++ b/meta-oe/recipes-extended/redis/redis_6.2.20.bb @@ -18,7 +18,7 @@ SRC_URI = "http://download.redis.io/releases/${BP}.tar.gz \ file://0006-Define-correct-gregs-for-RISCV32.patch \ " -SRC_URI[sha256sum] = "470c75bac73d7390be4dd66479c6f29e86371c5d380ce0c7efb4ba2bbda3612d" +SRC_URI[sha256sum] = "7f8b8a7aed53c445a877adf9e3743cdd323518524170135a58c0702f2dba6ef4" inherit update-rc.d systemd useradd
Changelog: 6.2.19: (CVE-2025-32023) Fix out-of-bounds write in HyperLogLog commands (CVE-2025-48367) Retry accepting other connections even if the accepted connection reports an error 6.2.20: (CVE-2025-49844) A Lua script may lead to remote code execution (CVE-2025-46817) A Lua script may lead to integer overflow and potential RCE (CVE-2025-46818) A Lua script can be executed in the context of another user (CVE-2025-46819) LUA out-of-bound read Signed-off-by: Gyorgy Sarvari <skandigraun@gmail.com> --- .../recipes-extended/redis/{redis_6.2.18.bb => redis_6.2.20.bb} | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) rename meta-oe/recipes-extended/redis/{redis_6.2.18.bb => redis_6.2.20.bb} (96%)