Your message dated Tue, 01 Jun 2021 16:49:21 +0000
with message-id <e1lo7zx-00099d...@fasolo.debian.org>
and subject line Bug#989351: fixed in redis 5:6.2.4-1
has caused the Debian Bug report #989351,
regarding redis: CVE-2021-32625
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
989351: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=989351
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: redis
Version: 5:6.0.11-1
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerability was published for redis.

  CVE-2021-32625 [0]

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2021-32625
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32625


Regards,

-- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      la...@debian.org / chris-lamb.co.uk
       `-

--- End Message ---
--- Begin Message ---
Source: redis
Source-Version: 5:6.2.4-1
Done: Chris Lamb <la...@debian.org>

We believe that the bug you reported is fixed in the latest version of
redis, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 989...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chris Lamb <la...@debian.org> (supplier of updated redis package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Tue, 01 Jun 2021 17:33:02 +0100
Source: redis
Built-For-Profiles: nocheck
Architecture: source
Version: 5:6.2.4-1
Distribution: experimental
Urgency: medium
Maintainer: Chris Lamb <la...@debian.org>
Changed-By: Chris Lamb <la...@debian.org>
Closes: 989351
Changes:
 redis (5:6.2.4-1) experimental; urgency=medium
 .
   * CVE-2021-32625: Fix a vulnerability in the STRALGO LCS command.
     (Closes: #989351)
   * Refresh patches.
Checksums-Sha1:
 142a700f558ac2a3c500f4f5f345c9216f4ad9a8 2266 redis_6.2.4-1.dsc
 ec5e7b62158a4970310252c555e14ce9a3695096 2480860 redis_6.2.4.orig.tar.gz
 1a6e22d869fec6c50d7535ad1b510e13e9293fe4 27284 redis_6.2.4-1.debian.tar.xz
 435a95d541004c1f7f4840adfad3d528faff7a4f 7282 redis_6.2.4-1_amd64.buildinfo
Checksums-Sha256:
 611009dc0f9194ebd6f513c641de9be9c8be89bdbbaafd252680010d2f11bc80 2266 
redis_6.2.4-1.dsc
 d53bb1f3e31c8893cbeda20195fa64132e35354d633231939c47b640fd401098 2480860 
redis_6.2.4.orig.tar.gz
 8228495118b3067f8028fe641f98445e5171cb805a3c74be223fd45a789a4a14 27284 
redis_6.2.4-1.debian.tar.xz
 1bade8e009a088d67535c9a8506ae5ed45a4fc6a3dc1e22a8d32a96f62c174c5 7282 
redis_6.2.4-1_amd64.buildinfo
Files:
 d2bc42df5b028e44c2c880f068814403 2266 database optional redis_6.2.4-1.dsc
 b70a087b21582c15120ed0923f259019 2480860 database optional 
redis_6.2.4.orig.tar.gz
 34a8440a6534ab6d45e54d7a9dfcc1e4 27284 database optional 
redis_6.2.4-1.debian.tar.xz
 ccb9090697fb60d29ef51891e27cdf34 7282 database optional 
redis_6.2.4-1_amd64.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmC2YXkACgkQHpU+J9Qx
HliN+Q//WrKH1ARjwxj1kGA1fz9rpkPAWkVi6X8NY66MToMJMqa81m1pU54JI2FC
2e6gDRcLjZQqSZkxVKlv/rNQxV2/c+pDfiTt96OaMjlItncq176ZF1I+k3Mz/YTj
4srK8LEPJ1rRO20rUmLPUK06OdwNYgY7XW2FRXrlOWWdATrjitPZzrphoMVV1P1p
aHZn3eBVGl7fnboRbv6L4cRjD9aEqnN/wYR7noKbfRWew7TQhHL+jbXK8kVE/NYZ
ITJ/mYWjHM+K49poIkeRm4244KYy1t6RZ+FdNqNiUuyOvBw9QiFHj4UFfU3cBn73
G1g8+QGdXv6FeMi6m8MKMmmAMgj7fNz+ZqU5t4LtxuvOGljDi5z3vCYnaQ/N0qf7
NzRMgeasEXnEQHbUghhRuIXJepnrw9Khr4TQkXl5GS3aXLvCkdfGWNzLgVB2wJp1
olcyjL90v0TDfsywnyRdfuoUPgFzMO6BLYluhJ6JaXuNI2L575vA1fsGjqBEZly6
EnKTpdjuF9M8JE5geSkx0PDH7AstyapGe0RLqDMwODVVUFyXdZGLyawJyj3X7ziY
BFmYUDCbx3NBj4qA+49fJKBOt9ouEMthAEom0r4pHHAkqtKC2nvcLNHVo3t0cbJF
J+VYnQAlYzL8yxaWo/9ngKVHP7//MQbKRrOq/qxocmeLS1G2/co=
=rXbo
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to