Your message dated Fri, 19 Mar 2021 23:02:10 +0000
with message-id <e1lno8a-000gcu...@fasolo.debian.org>
and subject line Bug#983446: fixed in redis 5:5.0.3-4+deb10u3
has caused the Debian Bug report #983446,
regarding redis: CVE-2021-21309
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
983446: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=983446
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: redis
Version: 3:3.2.6-3+deb9u3
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for redis.

CVE-2021-21309:
https://groups.google.com/g/redis-db/c/fV7cI3GSgoQ/m/ocwV-MlzAgAJ

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-21309
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21309


Regards,

-- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      la...@debian.org / chris-lamb.co.uk
       `-

--- End Message ---
--- Begin Message ---
Source: redis
Source-Version: 5:5.0.3-4+deb10u3
Done: Chris Lamb <la...@debian.org>

We believe that the bug you reported is fixed in the latest version of
redis, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 983...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chris Lamb <la...@debian.org> (supplier of updated redis package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Thu, 25 Feb 2021 17:46:45 +0000
Source: redis
Binary: redis redis-sentinel redis-server redis-tools redis-tools-dbgsym
Built-For-Profiles: nocheck
Architecture: source amd64 all
Version: 5:5.0.3-4+deb10u3
Distribution: buster
Urgency: medium
Maintainer: Chris Lamb <la...@debian.org>
Changed-By: Chris Lamb <la...@debian.org>
Description:
 redis      - Persistent key-value database with network interface (metapackage
 redis-sentinel - Persistent key-value database with network interface 
(monitoring)
 redis-server - Persistent key-value database with network interface
 redis-tools - Persistent key-value database with network interface (client)
Closes: 983446
Changes:
 redis (5:5.0.3-4+deb10u3) buster; urgency=medium
 .
   * CVE-2021-21309: Fix a series of integer overflow issues on 32-bit systems.
     (Closes: #983446)
Checksums-Sha1:
 d5373002f3a1deb9022831c17c6478f18b1471be 2183 redis_5.0.3-4+deb10u3.dsc
 f38800839cb85492da9bc5299507299dd54f726c 1977218 redis_5.0.3.orig.tar.gz
 36d53254d1e89acdf5dae32b257a74789811b874 29168 
redis_5.0.3-4+deb10u3.debian.tar.xz
 08074aabdc89be4e155d17b61627d188ff559790 52648 
redis-sentinel_5.0.3-4+deb10u3_amd64.deb
 0b464a0c0617887d079c5549a464d8da3d6cea2e 78524 
redis-server_5.0.3-4+deb10u3_amd64.deb
 5b4801ae4fedd07b4d1039d98862360818c4d52d 1235380 
redis-tools-dbgsym_5.0.3-4+deb10u3_amd64.deb
 7d1631155672c0628ee74d71c325aedf88cf2caf 523160 
redis-tools_5.0.3-4+deb10u3_amd64.deb
 0adbe645d1a88cf3b4c7c144e89860b365cefec8 45256 redis_5.0.3-4+deb10u3_all.deb
 8af11e7d26052ac6bc36d1c2bde3789958390fbf 7001 
redis_5.0.3-4+deb10u3_amd64.buildinfo
Checksums-Sha256:
 91be7eb2110809a2aa02af27cc26b0671d27368b56f972c80c8beef0deea138e 2183 
redis_5.0.3-4+deb10u3.dsc
 7084e8bd9e5dedf2dbb2a1e1d862d0c46e66cc0872654bdc677f4470d28d84c5 1977218 
redis_5.0.3.orig.tar.gz
 ace500eef79f6f442f6a5d57e368e613bd1033d217a1b358f84fe66940f5c188 29168 
redis_5.0.3-4+deb10u3.debian.tar.xz
 681d347207d3d1f936592effa7dbb72cc8c6b947a1698fdd4be63d12e7027a90 52648 
redis-sentinel_5.0.3-4+deb10u3_amd64.deb
 5fda2d1cfdc9786bc6a411e34de550f22e80dec92ba63ae65f9fe30ee2947617 78524 
redis-server_5.0.3-4+deb10u3_amd64.deb
 c8fda388e14c9af5de230e29a1716622469ae25fe8f875940fdf5cfc6d17fa32 1235380 
redis-tools-dbgsym_5.0.3-4+deb10u3_amd64.deb
 6a73f25e071abf7783e42c323016b642866c7d5e6036fb0cc7b2fb616fee5aba 523160 
redis-tools_5.0.3-4+deb10u3_amd64.deb
 c10eaab8ed0e661298247c4e8e19ec37f031d8699843ade2e6a01f8eca65756b 45256 
redis_5.0.3-4+deb10u3_all.deb
 766145dbbe0e34443586ba70272677ea644f94585b3608ea434ff01e4f585289 7001 
redis_5.0.3-4+deb10u3_amd64.buildinfo
Files:
 66aa08118329c1f3f0813b2b68d9305f 2183 database optional 
redis_5.0.3-4+deb10u3.dsc
 f2a79cdec792e7c58dd5cad3b6ce47ad 1977218 database optional 
redis_5.0.3.orig.tar.gz
 ba0ae9535c66a34b6fd8bc4d3bcd93b0 29168 database optional 
redis_5.0.3-4+deb10u3.debian.tar.xz
 10f9bac02ab56e605ff9832219575663 52648 database optional 
redis-sentinel_5.0.3-4+deb10u3_amd64.deb
 293ad1fab512c91d7eb39d9b5ba7181b 78524 database optional 
redis-server_5.0.3-4+deb10u3_amd64.deb
 67d6b37577a45bedccbe83ed05339644 1235380 debug optional 
redis-tools-dbgsym_5.0.3-4+deb10u3_amd64.deb
 7cfded419a27bba1a427fbcd13b169a0 523160 database optional 
redis-tools_5.0.3-4+deb10u3_amd64.deb
 a741640bd30476bfef24631ec5e063d3 45256 database optional 
redis_5.0.3-4+deb10u3_all.deb
 565fa15a6f17c77e793d72dd2d2a83c9 7001 database optional 
redis_5.0.3-4+deb10u3_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----
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=qKnx
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to