[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#989379: unblock: redis/5:6.0.14-1



Package: release.debian.org
User: release.debian.org@packages.debian.org
Usertags: unblock

Dear Release Team,

Please consider unblocking redis 5:6.0.14-1 in order to a) incorporate
a number of security issues, and b) to harmonise with the upstream's
stable branch. This latter change will greatly help the maintenance of
this package over the lifetime of bullseye.

'b' does involve incorporating a "New upstream release." (5:6.0.12-1).
However, this is actually a release containing a single bugfix related
to the build system.

  redis (5:6.0.14-1) unstable; urgency=medium

    * CVE-2021-32625: Fix a vulnerability in the STRALGO LCS command.
      (Closes: #989351)

  redis (5:6.0.14-1) unstable; urgency=medium

    * CVE-2021-32625: Fix a vulnerability in the STRALGO LCS command.
      (Closes: #989351)

   -- Chris Lamb <lamby@debian.org>  Tue, 01 Jun 2021 17:35:19 +0100

  redis (5:6.0.13-1) unstable; urgency=medium

    * New upstream security release:
      - CVE-2021-29477: Vulnerability in the STRALGO LCS command.
      - CVE-2021-29478: Vulnerability in the COPY command for large intsets.
      (Closes: #988045)
    * Refresh patches.

   -- Chris Lamb <lamby@debian.org>  Tue, 04 May 2021 11:06:14 +0100

  redis (5:6.0.12-1) unstable; urgency=medium

    * New upstream release.

   -- Chris Lamb <lamby@debian.org>  Sat, 06 Mar 2021 11:03:47 +0000


The full debdiff is attached.


Regards,

--
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      lamby@debian.org / chris-lamb.co.uk
       `-

Attachment: debdiff
Description: Binary data


Reply to: