Package: release.debian.org User: release.debian....@packages.debian.org Usertags: unblock
Dear Release Team, Please consider unblocking redis 5:7.0.11-1 for testing. It fixes a single a CVE; the refreshing of patches listed in the changelog below are merely changes to the "index 80a95aa..e8ffe7d 100644" in order to keep gbp-pq happy: § redis (5:7.0.11-1) unstable; urgency=high * New upstream security release: - CVE-2023-28856: Authenticated users could have used the HINCRBYFLOAT command to create an invalid hash field that would have crashed the Redis server on access. (Closes: #1034613) For more information, please see: https://raw.githubusercontent.com/redis/redis/7.0/00-RELEASENOTES * Refresh patches. § The full debdiff is attached. Regards, -- ,''`. : :' : Chris Lamb `. `'` la...@debian.org / chris-lamb.co.uk `-
debdiff
Description: Binary data