Package: release.debian.org
User: release.debian....@packages.debian.org
Usertags: unblock

Dear Release Team,

Please consider unblocking redis 5:7.0.11-1 for testing. It fixes a
single a CVE; the refreshing of patches listed in the changelog below
are merely changes to the "index 80a95aa..e8ffe7d 100644" in order to
keep gbp-pq happy:

§
  
  redis (5:7.0.11-1) unstable; urgency=high
  
    * New upstream security release: 
      - CVE-2023-28856: Authenticated users could have used the HINCRBYFLOAT
        command to create an invalid hash field that would have crashed the 
Redis
        server on access. (Closes: #1034613)  

      For more information, please see:  
        https://raw.githubusercontent.com/redis/redis/7.0/00-RELEASENOTES
  
    * Refresh patches.

§

The full debdiff is attached.


Regards,

-- 
      ,''`.
     : :'  :     Chris Lamb
     `. `'`      la...@debian.org / chris-lamb.co.uk
       `-

Attachment: debdiff
Description: Binary data

Reply via email to