Package: release.debian.org
User: release.debian.org@packages.debian.org
Usertags: unblock
Dear Release Team,
Please consider unblocking redis 5:6.0.14-1 in order to a) incorporate
a number of security issues, and b) to harmonise with the upstream's
stable branch. This latter change will greatly help the maintenance of
this package over the lifetime of bullseye.
'b' does involve incorporating a "New upstream release." (5:6.0.12-1).
However, this is actually a release containing a single bugfix related
to the build system.
redis (5:6.0.14-1) unstable; urgency=medium
* CVE-2021-32625: Fix a vulnerability in the STRALGO LCS command.
(Closes: #989351)
redis (5:6.0.14-1) unstable; urgency=medium
* CVE-2021-32625: Fix a vulnerability in the STRALGO LCS command.
(Closes: #989351)
-- Chris Lamb <lamby@debian.org> Tue, 01 Jun 2021 17:35:19 +0100
redis (5:6.0.13-1) unstable; urgency=medium
* New upstream security release:
- CVE-2021-29477: Vulnerability in the STRALGO LCS command.
- CVE-2021-29478: Vulnerability in the COPY command for large intsets.
(Closes: #988045)
* Refresh patches.
-- Chris Lamb <lamby@debian.org> Tue, 04 May 2021 11:06:14 +0100
redis (5:6.0.12-1) unstable; urgency=medium
* New upstream release.
-- Chris Lamb <lamby@debian.org> Sat, 06 Mar 2021 11:03:47 +0000
The full debdiff is attached.
Regards,
--
,''`.
: :' : Chris Lamb
`. `'` lamby@debian.org / chris-lamb.co.uk
`-Attachment:
debdiff
Description: Binary data