Package: release.debian.org User: release.debian....@packages.debian.org Usertags: unblock
Dear Release Team, Please consider unblocking redis 5:6.0.14-1 in order to a) incorporate a number of security issues, and b) to harmonise with the upstream's stable branch. This latter change will greatly help the maintenance of this package over the lifetime of bullseye. 'b' does involve incorporating a "New upstream release." (5:6.0.12-1). However, this is actually a release containing a single bugfix related to the build system. redis (5:6.0.14-1) unstable; urgency=medium * CVE-2021-32625: Fix a vulnerability in the STRALGO LCS command. (Closes: #989351) redis (5:6.0.14-1) unstable; urgency=medium * CVE-2021-32625: Fix a vulnerability in the STRALGO LCS command. (Closes: #989351) -- Chris Lamb <la...@debian.org> Tue, 01 Jun 2021 17:35:19 +0100 redis (5:6.0.13-1) unstable; urgency=medium * New upstream security release: - CVE-2021-29477: Vulnerability in the STRALGO LCS command. - CVE-2021-29478: Vulnerability in the COPY command for large intsets. (Closes: #988045) * Refresh patches. -- Chris Lamb <la...@debian.org> Tue, 04 May 2021 11:06:14 +0100 redis (5:6.0.12-1) unstable; urgency=medium * New upstream release. -- Chris Lamb <la...@debian.org> Sat, 06 Mar 2021 11:03:47 +0000 The full debdiff is attached. Regards, -- ,''`. : :' : Chris Lamb `. `'` la...@debian.org / chris-lamb.co.uk `-
debdiff
Description: Binary data