Package: release.debian.org
User: release.debian.org@packages.debian.org
Usertags: unblock
Dear Release Team,
Please consider unblocking redis 5:7.0.11-1 for testing. It fixes a
single a CVE; the refreshing of patches listed in the changelog below
are merely changes to the "index 80a95aa..e8ffe7d 100644" in order to
keep gbp-pq happy:
§
redis (5:7.0.11-1) unstable; urgency=high
* New upstream security release:
- CVE-2023-28856: Authenticated users could have used the HINCRBYFLOAT
command to create an invalid hash field that would have crashed the Redis
server on access. (Closes: #1034613)
For more information, please see:
https://raw.githubusercontent.com/redis/redis/7.0/00-RELEASENOTES
* Refresh patches.
§
The full debdiff is attached.
Regards,
--
,''`.
: :' : Chris Lamb
`. `'` lamby@debian.org / chris-lamb.co.uk
`-
Attachment:
debdiff
Description: Binary data