Change logs for redis source package in Jammy

  • redis (5:6.0.16-1ubuntu1) jammy; urgency=medium
    
      * SECURITY UPDATE: Lua sandbox escape
        - debian/rules: Ensure arbitrary Lua functionality is not permitted by
          specifying a nil package
        - CVE-2022-0543
    
     -- Alex Murray <email address hidden>  Fri, 04 Mar 2022 15:44:35 +1030
  • redis (5:6.0.16-1build1) jammy; urgency=medium
    
      * No-change rebuild against libssl3
    
     -- Steve Langasek <email address hidden>  Thu, 09 Dec 2021 00:16:26 +0000
  • redis (5:6.0.16-1) unstable; urgency=medium
    
      * New upstream security release:
    
        - CVE-2021-32762: Integer to heap buffer overflow issue in redis-cli and
          redis-sentinel parsing large multi-bulk replies on some older and less
          common platforms.
    
        - CVE-2021-32687: Integer to heap buffer overflow with intsets, when
          set-max-intset-entries is manually configured to a non-default, very
          large value.
    
        - CVE-2021-32675: Denial Of Service when processing RESP request payloads
          with a large number of elements on many connections.
    
        - CVE-2021-32672: Random heap reading issue with Lua Debugger.
    
        - CVE-2021-32628: Integer to heap buffer overflow handling ziplist-encoded
          data types, when configuring a large, non-default value for
          hash-max-ziplist-entries, hash-max-ziplist-value,
          zset-max-ziplist-entries or zset-max-ziplist-value.
    
        - CVE-2021-32627: Integer to heap buffer overflow issue with streams, when
          configuring a non-default, large value for proto-max-bulk-len and
          client-query-buffer-limit.
    
        - CVE-2021-32626: Specially crafted Lua scripts may result with Heap
          buffer overflow.
    
        - CVE-2021-41099: Integer to heap buffer overflow handling certain string
          commands and network payloads, when proto-max-bulk-len is manually
          configured to a non-default, very large value.
    
      * Refresh patches.
      * Bump Standards-Version to 4.6.0.
    
     -- Chris Lamb <email address hidden>  Mon, 04 Oct 2021 14:37:24 +0100
  • redis (5:6.0.15-1) unstable; urgency=medium
    
      * New upstream security release.
        - CVE-2021-32761: Integer overflow issues with BITFIELD command
          on 32-bit systems.
      * Bump Standards-Version to 4.5.1.
    
     -- Chris Lamb <email address hidden>  Wed, 21 Jul 2021 22:21:54 +0100