Your message dated Wed, 24 Feb 2021 11:04:08 +0000
with message-id <e1lerxg-0009yo...@fasolo.debian.org>
and subject line Bug#983446: fixed in redis 5:6.2.0-1
has caused the Debian Bug report #983446,
regarding redis: CVE-2021-21309
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
983446: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983446
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: redis
Version: 3:3.2.6-3+deb9u3
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerability was published for redis.
CVE-2021-21309:
https://groups.google.com/g/redis-db/c/fV7cI3GSgoQ/m/ocwV-MlzAgAJ
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2021-21309
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21309
Regards,
--
,''`.
: :' : Chris Lamb
`. `'` la...@debian.org / chris-lamb.co.uk
`-
--- End Message ---
--- Begin Message ---
Source: redis
Source-Version: 5:6.2.0-1
Done: Chris Lamb <la...@debian.org>
We believe that the bug you reported is fixed in the latest version of
redis, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 983...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Chris Lamb <la...@debian.org> (supplier of updated redis package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Wed, 24 Feb 2021 10:52:50 +0000
Source: redis
Built-For-Profiles: nocheck
Architecture: source
Version: 5:6.2.0-1
Distribution: experimental
Urgency: medium
Maintainer: Chris Lamb <la...@debian.org>
Changed-By: Chris Lamb <la...@debian.org>
Closes: 983446
Changes:
redis (5:6.2.0-1) experimental; urgency=medium
.
* New upstream release, incorporating some security fixes. (Closes: 983446)
* Refresh patches.
Checksums-Sha1:
c81e48de0fed402655d4984dd294db145a69dfb3 2266 redis_6.2.0-1.dsc
065df86c87684faa8339d934d590f5610de2a1cb 2457301 redis_6.2.0.orig.tar.gz
578073fa86db9a39be9981442ba403b7e802662c 27212 redis_6.2.0-1.debian.tar.xz
17850de9a4e14f5ced55d81e4d109fa1d33a8140 7294 redis_6.2.0-1_amd64.buildinfo
Checksums-Sha256:
7bcaa5b3c60054f1a1b811a6ec3d6f90811102349051e11580dd688a4cb1eb68 2266
redis_6.2.0-1.dsc
71163ef85471e40d787b4c68c6aa87abd12f2b4d05653cd7c0d8783be4a6814b 2457301
redis_6.2.0.orig.tar.gz
ea122719dac7ae388e5b4b8bb26327b29822413ee8f48985a3a8a41f6742695d 27212
redis_6.2.0-1.debian.tar.xz
2b56a4ddc947d28346f64cbe3e9f962331e8bf8c40b6ac21637a2b184831e10e 7294
redis_6.2.0-1_amd64.buildinfo
Files:
cbf7d64cf80988a58c13a2f2615a02e7 2266 database optional redis_6.2.0-1.dsc
946c2676e574c25fb3f03d34e92fbf48 2457301 database optional
redis_6.2.0.orig.tar.gz
124683a127c8ffdc17fc2aeb0382c828 27212 database optional
redis_6.2.0-1.debian.tar.xz
09221097001a105aab1375e2e90d9cb7 7294 database optional
redis_6.2.0-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=9BZV
-----END PGP SIGNATURE-----
--- End Message ---