Package: release.debian.org
User: [email protected]
Usertags: unblock

Dear Release Team,

Please consider unblocking redis 5:6.0.14-1 in order to a) incorporate
a number of security issues, and b) to harmonise with the upstream's
stable branch. This latter change will greatly help the maintenance of
this package over the lifetime of bullseye.

'b' does involve incorporating a "New upstream release." (5:6.0.12-1).
However, this is actually a release containing a single bugfix related
to the build system.

  redis (5:6.0.14-1) unstable; urgency=medium

    * CVE-2021-32625: Fix a vulnerability in the STRALGO LCS command.
      (Closes: #989351)

  redis (5:6.0.14-1) unstable; urgency=medium

    * CVE-2021-32625: Fix a vulnerability in the STRALGO LCS command.
      (Closes: #989351)

   -- Chris Lamb <[email protected]>  Tue, 01 Jun 2021 17:35:19 +0100

  redis (5:6.0.13-1) unstable; urgency=medium

    * New upstream security release:
      - CVE-2021-29477: Vulnerability in the STRALGO LCS command.
      - CVE-2021-29478: Vulnerability in the COPY command for large intsets.
      (Closes: #988045)
    * Refresh patches.

   -- Chris Lamb <[email protected]>  Tue, 04 May 2021 11:06:14 +0100

  redis (5:6.0.12-1) unstable; urgency=medium

    * New upstream release.

   -- Chris Lamb <[email protected]>  Sat, 06 Mar 2021 11:03:47 +0000


The full debdiff is attached.


Regards,

--
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      [email protected] / chris-lamb.co.uk
       `-

Attachment: debdiff
Description: Binary data

Reply via email to