News for package redis

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 3.0 (quilt)
Source: redis
Binary: redis-server, redis-tools
Architecture: any
Version: 2:2.8.17-1+deb8u3
Maintainer: Chris Lamb <[email protected]>
Homepage: http://redis.io/
Standards-Version: 3.9.5
Vcs-Browser: https://github.com/lamby/pkg-redis
Vcs-Git: git://github.com/lamby/pkg-redis.git
Build-Depends: debhelper (>= 7.0.50), libjemalloc-dev [linux-any], dh-systemd (>= 1.5)
Package-List:
 redis-server deb database optional arch=any
 redis-tools deb database optional arch=any
Checksums-Sha1:
 913479f9d2a283bfaadd1444e17e7bab560e5d1e 1234543 redis_2.8.17.orig.tar.gz
 bf5c1eaecc7363a32ea1284c3b9ec70ff1bea106 23040 redis_2.8.17-1+deb8u3.debian.tar.xz
Checksums-Sha256:
 53c7cc639571729fa57d7baa7f81aec1d5886f86bac9c66f6ad06dbdaee236a7 1234543 redis_2.8.17.orig.tar.gz
 aa0219318b983087ecef85ac5bdb9fbac11f62c806f820fc7f338e8d82fb700e 23040 redis_2.8.17-1+deb8u3.debian.tar.xz
Files:
 69023c3005664602268a5e2dbe23425c 1234543 redis_2.8.17.orig.tar.gz
 26582a104bbaf934b0bdd6c2c774c0a7 23040 redis_2.8.17-1+deb8u3.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=9onx
-----END PGP SIGNATURE-----

Changes:
redis (2:2.8.17-1+deb8u3) jessie-security; urgency=high

  * Non-maintainer upload by the Security Team.
  * Add 06-CVE-2015-8080-Integer-wraparound-in-lua_struct.c-cau.patch patch.
    CVE-2015-8080: Integer wraparound in lua_struct.c causing stack-based
    buffer overflow. (Closes: #804419)

 -- Salvatore Bonaccorso <[email protected]>  Sat, 28 Nov 2015 16:12:05 +0100