-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - ------------------------------------------------------------------------- Debian LTS Advisory DLA-4162-1 [email protected] https://www.debian.org/lts/security/ Adrian Bunk May 12, 2025 https://wiki.debian.org/LTS - -------------------------------------------------------------------------
Package : redis Version : 5:6.0.16-1+deb11u6 CVE ID : CVE-2025-21605 Debian Bug : 1104010 Unlimited output buffer for unauthenticated clients has been fixed in the key–value database Redis. For Debian 11 bullseye, this problem has been fixed in version 5:6.0.16-1+deb11u6. We recommend that you upgrade your redis packages. For the detailed security status of redis please refer to its security tracker page at: https://security-tracker.debian.org/tracker/redis Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEOvp1f6xuoR0v9F3wiNJCh6LYmLEFAmgh+BEACgkQiNJCh6LY mLFmuRAAvlkJIIYDAqbb4nHABjHrLJJsbQDytlMEAtxDT3vfPQok9LcQqmiM42au NXbeVjQHbGffW6nME/WXiQXw4eSvE8LYkSt6tsQAlpstmtfo05cjDh8UV4ffPYGT FMLTIsx7lMvOMi7YJ1QenmGKrrlWn0v2GBo5BWCr81AXqxj1gbiALExyuZU4R6ZA ZO/fLEl4yfjLLyP7qz9/rQVzA+9Xp/fLTpuvT/lHiPpN+dhuu/Dz00JGsSiskKhs jdITTIi6OLv29lOHuGYwKFB3A17DK8Kp8GC4KYgH9h6RI35DRwrZH+AXxNIVEgJn Hb+RlpUn2VebMMcHdlvQif0oxDOUSaTtbY6nRrkb6bemIpCBn63T8nW98oTUVUys 1sCMmebNkwUAEq/MI7y0BdK64udVO3Eyu3d1sez0SS152yRuQA30Xx5Q592aMvc6 vhBwWRSO7XxEEHnOM4nMfcpQ4kzXcn4x4Xnit30DDfxFVBIG8ypMjxwf7SEgEFj3 jP5xLFcH9Zfuahk2js8UwOfH698O39pTgoostrEppDfDfdDzbQyDkIoa2AxoqdAp 6/aWF+21jPFlradqKeNysvctaC6lTpozNQ2ZOUJ87nEjfDclwVP+LVFm8HV2q+kb kaOhq0HaUNwtgSKXbe1lvzobOUGieIahatDopufhuIeRJf6Oq70= =TSCx -----END PGP SIGNATURE-----
