-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Format: 3.0 (quilt) Source: redis Binary: redis-server, redis-tools Architecture: any Version: 2:2.8.17-1+deb8u3 Maintainer: Chris Lamb <[email protected]> Homepage: http://redis.io/ Standards-Version: 3.9.5 Vcs-Browser: https://github.com/lamby/pkg-redis Vcs-Git: git://github.com/lamby/pkg-redis.git Build-Depends: debhelper (>= 7.0.50), libjemalloc-dev [linux-any], dh-systemd (>= 1.5) Package-List: redis-server deb database optional arch=any redis-tools deb database optional arch=any Checksums-Sha1: 913479f9d2a283bfaadd1444e17e7bab560e5d1e 1234543 redis_2.8.17.orig.tar.gz bf5c1eaecc7363a32ea1284c3b9ec70ff1bea106 23040 redis_2.8.17-1+deb8u3.debian.tar.xz Checksums-Sha256: 53c7cc639571729fa57d7baa7f81aec1d5886f86bac9c66f6ad06dbdaee236a7 1234543 redis_2.8.17.orig.tar.gz aa0219318b983087ecef85ac5bdb9fbac11f62c806f820fc7f338e8d82fb700e 23040 redis_2.8.17-1+deb8u3.debian.tar.xz Files: 69023c3005664602268a5e2dbe23425c 1234543 redis_2.8.17.orig.tar.gz 26582a104bbaf934b0bdd6c2c774c0a7 23040 redis_2.8.17-1+deb8u3.debian.tar.xz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJWXI+DAAoJEAVMuPMTQ89EzkUP/j6O1s1YyGxKqSXI7qwDITKe YF9xZCdzr/hq5AA8XbE6MwHZppLE7W6PC3LWzLj1PA6Bur9JXbdPDbHFjjI0MSb/ lLnTq4k2J1belkg0LibJXKuNftBpCK0Rn4mRCPf8iMABPmmQerFYEScG7JykJJ5F LbuVRklr9gjAJ/FnXaFVoXm3AJ0YkxhCg0DPQIodc1V1eUHATd95pIRwnUrGLRog gcwtWjZSJFFy+3z84tTTfbmeHTUvKm2RMwgmtgsY8M3tu144essH9jvOaTPtbXhs FFmPurZGrnvLvZcguZkVImOTERfOAx3eErZ7ssbA8eZiq89W4Ii3IuGhDPVSPtRL 7RwFK9JcPuy3US+FPl5HeRxoLVXNm0QDBmpTHi+BI/+NrEa1/PpG4kw1WQ6l9Zsm YJL+46qpjxUum08ocB5XK0KGqjLIEC7E4fNc73Pnqf1BFmmGLvTHUnOi5bSzt6iO bhvKpL+KgSWwhNZYmUZh8TmodUUDeLMr3UOCFhtMFRK7FsiTlUOghRntIUAvvXAm gXX63gWJcJSvh9a7/SidfRyrNfAvQ2D+sDxahK3xZEYpdg0PetByztNir6vfZWnr UL7Je88NpaIpaQTS9p9FKt6FJci7ue23R663OYlGlVkRXAT/LSTT7zJ6lvYegMii iPwl9kDYfM3FrvgdoAgr =9onx -----END PGP SIGNATURE----- Changes: redis (2:2.8.17-1+deb8u3) jessie-security; urgency=high * Non-maintainer upload by the Security Team. * Add 06-CVE-2015-8080-Integer-wraparound-in-lua_struct.c-cau.patch patch. CVE-2015-8080: Integer wraparound in lua_struct.c causing stack-based buffer overflow. (Closes: #804419) -- Salvatore Bonaccorso <[email protected]> Sat, 28 Nov 2015 16:12:05 +0100