Your message dated Tue, 01 Jun 2021 16:49:14 +0000
with message-id <e1lo7zq-00098w...@fasolo.debian.org>
and subject line Bug#989351: fixed in redis 5:6.0.14-1
has caused the Debian Bug report #989351,
regarding redis: CVE-2021-32625
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
989351: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989351
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: redis
Version: 5:6.0.11-1
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerability was published for redis.
CVE-2021-32625 [0]
If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2021-32625
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32625
Regards,
--
,''`.
: :' : Chris Lamb
`. `'` la...@debian.org / chris-lamb.co.uk
`-
--- End Message ---
--- Begin Message ---
Source: redis
Source-Version: 5:6.0.14-1
Done: Chris Lamb <la...@debian.org>
We believe that the bug you reported is fixed in the latest version of
redis, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 989...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Chris Lamb <la...@debian.org> (supplier of updated redis package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Format: 1.8
Date: Tue, 01 Jun 2021 17:35:19 +0100
Source: redis
Built-For-Profiles: nocheck
Architecture: source
Version: 5:6.0.14-1
Distribution: unstable
Urgency: medium
Maintainer: Chris Lamb <la...@debian.org>
Changed-By: Chris Lamb <la...@debian.org>
Closes: 989351
Changes:
redis (5:6.0.14-1) unstable; urgency=medium
.
* CVE-2021-32625: Fix a vulnerability in the STRALGO LCS command.
(Closes: #989351)
Checksums-Sha1:
758f6aa7424154da12c548e2e483eda5ea2e4d89 2264 redis_6.0.14-1.dsc
c9492ebdc10c9dc8989b05289a24b4c3c601f81d 2297367 redis_6.0.14.orig.tar.gz
72f266f728f7e6b30a79b4d9a988c752f1c4f08f 29088 redis_6.0.14-1.debian.tar.xz
5594df59462321e1e16eb181adf47cb84cbb991b 7301 redis_6.0.14-1_amd64.buildinfo
Checksums-Sha256:
6c15b9f195e487434c03d6d8ead536074e79cdb16fd03a491c3b3572c944c374 2264
redis_6.0.14-1.dsc
c88dcfd2a7f21136ff96d363f5acf53753513ed00ac8a58e289700f57f46854e 2297367
redis_6.0.14.orig.tar.gz
d9a11dca7770469f8277d8eb33496401fe422ad73233b72f967a109a4b125c51 29088
redis_6.0.14-1.debian.tar.xz
172949fc734c0bd0da0456690ad6a614351ab43bf3575407e0896c5351eff393 7301
redis_6.0.14-1_amd64.buildinfo
Files:
839b9a7bb27c365648c7374cd1c44b34 2264 database optional redis_6.0.14-1.dsc
10dc3e331619e44744637bf6b3ee1ce6 2297367 database optional
redis_6.0.14.orig.tar.gz
b85010ad1a61aeac9dbf71c96ce7f26c 29088 database optional
redis_6.0.14-1.debian.tar.xz
d8c2bdb2e62930faed4234ea9ddf75d8 7301 database optional
redis_6.0.14-1_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----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=vEoS
-----END PGP SIGNATURE-----
--- End Message ---