Your message dated Wed, 24 Feb 2021 11:33:48 +0000
with message-id <e1lesqo-000d4f...@fasolo.debian.org>
and subject line Bug#983446: fixed in redis 5:6.0.11-1
has caused the Debian Bug report #983446,
regarding redis: CVE-2021-21309
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
983446: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983446
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: redis
Version: 3:3.2.6-3+deb9u3
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for redis.

CVE-2021-21309:
https://groups.google.com/g/redis-db/c/fV7cI3GSgoQ/m/ocwV-MlzAgAJ

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-21309
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21309


Regards,

-- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      la...@debian.org / chris-lamb.co.uk
       `-

--- End Message ---
--- Begin Message ---
Source: redis
Source-Version: 5:6.0.11-1
Done: Chris Lamb <la...@debian.org>

We believe that the bug you reported is fixed in the latest version of
redis, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 983...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chris Lamb <la...@debian.org> (supplier of updated redis package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Wed, 24 Feb 2021 11:05:06 +0000
Source: redis
Built-For-Profiles: nocheck
Architecture: source
Version: 5:6.0.11-1
Distribution: unstable
Urgency: medium
Maintainer: Chris Lamb <la...@debian.org>
Changed-By: Chris Lamb <la...@debian.org>
Closes: 983446
Changes:
 redis (5:6.0.11-1) unstable; urgency=medium
 .
   * New upstream release, incorporating security issues. (Closes: #983446)
     - Refresh patches.
Checksums-Sha1:
 1fb312eeddd75a3df833e3b712e048a4c24c9f45 2264 redis_6.0.11-1.dsc
 7946a3ffdecba4927a24a21656a102898762ffd0 2298399 redis_6.0.11.orig.tar.gz
 ddf50f935b71872aae9bf3f6248f05ccbce82c14 28984 redis_6.0.11-1.debian.tar.xz
 565e314e360d0f07690cf162ff8c9c551acb3b5a 7313 redis_6.0.11-1_amd64.buildinfo
Checksums-Sha256:
 3de2e169a7fc28df59604189a64fbd1198e542dfadd1aeac7f3b6acbb6b39f7f 2264 
redis_6.0.11-1.dsc
 5a03491bcf93f7717ea804a85b19e59994f80eac49eedc2ff6ac498e3071d225 2298399 
redis_6.0.11.orig.tar.gz
 f644037007f02bdd4b5b33d3d1fddd89e55f30c9bf0a829f4c56b083cbe159fb 28984 
redis_6.0.11-1.debian.tar.xz
 abb221b6cf75f0473b41fd73050ddae2f27df53585d6a76c2d6e1c7ca4628b9f 7313 
redis_6.0.11-1_amd64.buildinfo
Files:
 a06029ab3753b6552089e28259ae712d 2264 database optional redis_6.0.11-1.dsc
 61450b4af29380b64d5119218e9fa599 2298399 database optional 
redis_6.0.11.orig.tar.gz
 2f4baf7681df37390a8e69eeba963350 28984 database optional 
redis_6.0.11-1.debian.tar.xz
 a43315c40c5847950d34f591bdf2a29e 7313 database optional 
redis_6.0.11-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=8sok
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to