Index | index by Group | index by Distribution | index by Vendor | index by creation date | index by Name | Mirrors | Help | Search |
Name: libhiredis1_1_0 | Distribution: SUSE Linux Enterprise 15 SP6 |
Version: 1.1.0 | Vendor: openSUSE |
Release: bp156.2.7 | Build date: Mon May 13 12:37:14 2024 |
Group: Productivity/Databases/Clients | Build host: h02-ch1b |
Size: 91852 | Source RPM: hiredis-1.1.0-bp156.2.7.src.rpm |
Packager: https://bugs.opensuse.org | |
Url: https://github.com/redis/hiredis | |
Summary: Shared library for hiredis |
Shared library for hiredis. The hiredis-example and hiredis-test are in hiredis package.
BSD-3-Clause
* Mon Jan 02 2023 Andreas Stieger <andreas.stieger@gmx.de> - hiredis 1.1.0: * better SSL convenience * new async adapters * can now return nan in addition to -inf and inf in a REDIS_REPLY_DOUBLE. Applications that deal with RESP3 doubles should make sure to account for this. * Thu Oct 07 2021 Paul Fee <paul.fee@jci.com> - hiredis 1.0.2 * Hiredis v1.0.2 is a security release with a fix for CVE-2021-32765. [boo#1191331] v1.0.1 erroneously bumped the SONAME so should be skipped. * Wed Oct 06 2021 Andreas Stieger <andreas.stieger@gmx.de> - hiredis 1.0.1: * CVE-2021-32765: integer overflow if provided maliciously crafted or corrupted RESP mult-bulk protocol data boo#1191331 * Tue Oct 06 2020 Paul Fee <paul.fee@jci.com> - Enable TLS * Fri Oct 02 2020 Martin Pluskal <mpluskal@suse.com> - Cleanup spec file with spec-cleaner * Mon Sep 28 2020 paul.fee@jci.com - Update to 1.0.0 * The first stable release of Hiredis. * RESP3 support, TLS connections, allocator injection. * Connect and command timeouts. * API breaking changes, recompilation required. - Update to 0.14.1 * CVE-2020-7105 (failure to check for NULL return when allocating memory). - Update to 0.14.0 * ABI changes. Upstream "changes are numerous". - Add relocatable_executable.patch * Sun Nov 22 2015 mpluskal@suse.com - Update to 0.13.3 * Revert "Clear `REDIS_CONNECTED` flag when connection is closed". * Make tests pass on FreeBSD - Changes for 0.13.2 * Prevent crash on pending replies in async code * Clear `REDIS_CONNECTED` flag when connection is closed * Add MacOS X addapter * Add Qt adapter * Add Ivykis adapter - Changes for 0.13.1 * Fix memory leak in async reply handling * Rename struct member to avoid name clash with pre-c99 code - Changes for 0.13.0 * Windows compatibility layer for parser code * Properly escape data printed to PKGCONF file * Fix tests when assert() undefined * Implement a reconnect method for the client context, this changes the structure of `redisContext` - Drop hiredis-pkgconfig.patch * fixed in upstream * Tue Mar 03 2015 dimstar@opensuse.org - Add hiredis-pkgconfig.patch: Fix generation of .pc file. - Pass PREFIX and LIBRARY_PATH (lib/lib64) to make (and make install): the build phase needs this info for the .pc file generation. - Make use of the new DESTDIR support. * Mon Mar 02 2015 mpluskal@suse.com - Update to 0.12.1 * Fix `make install`: DESTDIR support, install all required files, install PKGCONF in proper location * Fix `make test` as 32 bit build on 64 bit platform - Changes for 0.12.0 * Add optional KeepAlive support * Try again on EINTR errors * Add libuv adapter * Add IPv6 support * Remove possiblity of multiple close on same fd * Add ability to bind source address on connect * Add redisConnectFd() and redisFreeKeepFd() * Fix getaddrinfo() memory leak * Free string if it is unused (fixes memory leak) * Improve redisAppendCommandArgv performance 2.5x * Add support for SO_REUSEADDR * Fix redisvFormatCommand format parsing * Add GLib 2.0 adapter * Refactor reading code into read.c * Fix errno error buffers to not clobber errors * Generate pkgconf during build * Silence _BSD_SOURCE warnings * Improve digit counting for multibulk creation * Tue Aug 20 2013 mvyskocil@suse.com - Package hiredis 0.11.0 for openSUSE
/usr/lib64/libhiredis.so.1.1.0 /usr/lib64/libhiredis_ssl.so.1.1.0 /usr/share/licenses/libhiredis1_1_0 /usr/share/licenses/libhiredis1_1_0/COPYING
Generated by rpm2html 1.8.1
Fabrice Bellet, Tue Jul 9 20:06:21 2024