-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2576-1 [email protected] https://www.debian.org/lts/security/ Chris Lamb February 25, 2021 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : redis Version : 3:3.2.6-3+deb9u4 CVE ID : CVE-2021-21309 Debian Bug : #983446 It was discovered that there were a number of integer overflow issues in Redis, a persistent "NoSQL"-style key-value database. It is currently believed that the issues only affect 32-bit based systems. For Debian 9 "Stretch", this problem has been fixed in version 3:3.2.6-3+deb9u4. We recommend that you upgrade your redis packages. For the detailed security status of redis please refer to its security tracker page at: https://security-tracker.debian.org/tracker/redis Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCAAdFiEEwv5L0nHBObhsUz5GHpU+J9QxHlgFAmA34NYACgkQHpU+J9Qx HljnSg/+L48Orpbmc56NKGhs092gOTdmhgpTi2pwtgQvkRguGpz0f8hLWsFpsdEJ TI9dVNW7031/9gzWFSqIbSot8vBLfFUj/A83kYY1RTa/9HOGGK7AZT/svS6KTojQ azWVu7OGD62SY23vMBROT/BWDml1AB9lQWWdaCq5pQW/o35YfW6We4YhMygXglQq /tfGeI/RyAM+DD0HYpoavGN1kuCwjPip0FuaXJM6Cv4/ZOiF9OCkh7uveFAy50Ro mxwKe1xgxeT5AKYgNMH1NOWvl8C1BQEkEoBl/di71poCF/OE0jAJbC4hB1TOHj3L vdWKRh1FAsgspKRcOHQIO6ufXJHLsQ2l1ZOsj3PAN98+B/X5uoRx5CdXC+T5e0l6 YWziyyG8HgnIr6t6rDHtN7eqexFt4C7qvHsQnTnnVKXRhrLdH/+DEUxSIzCPb+pz 8+f6q0WcNo9zdFjUQEAawalaTNGU9UY2wB7FSnWhRGrhM7A86Vj3Z2xH4GsQ0YY2 XXkwNkjRlZF3Or0ZpH7JlKID9jrqr8mEBpfP8iN9r9m3HskRerAAuCwN5LzV3oXL 21PSvyMP/qMlqBbNv2IOGor7sp3OUcWItabnFG/U5nqTBgSEjTpLJmnS3TSu62oc NoUh7Rg4fJlrOeJp7ZE3Di8owQtnHnAc7EOIVTqoBcV1Ee6Sh0I= =pMoF -----END PGP SIGNATURE-----
