Debian Package Tracker
Register | Log in
Subscribe

redis

Persistent key-value database with network interface (metapackage)

Choose email to subscribe with

general
  • source: redis (main)
  • version: 5:8.0.6-1
  • maintainer: Chris Lamb (DMD)
  • arch: all any
  • std-ver: 4.7.2
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 5:6.0.16-1+deb11u2
  • o-o-sec: 5:6.0.16-1+deb11u8
  • oldstable: 5:7.0.15-1~deb12u6
  • old-sec: 5:7.0.15-1~deb12u6
  • stable: 5:8.0.2-3+deb13u1
  • stable-sec: 5:8.0.2-3+deb13u1
  • testing: 5:8.0.6-1
  • unstable: 5:8.0.6-1
  • exp: 5:8.6.2-1
versioned links
  • 5:6.0.16-1+deb11u2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5:6.0.16-1+deb11u8: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5:7.0.15-1~deb12u6: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5:8.0.2-3+deb13u1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5:8.0.6-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5:8.4.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 5:8.6.2-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • redis
  • redis-sentinel
  • redis-server (6 bugs: 0, 6, 0, 0)
  • redis-tools
action needed
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2025-67733: Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.
  • CVE-2026-21863: Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the clusterbus packet before attempting to read it. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation, don't expose the cluster bus connection directly to end users, and protect the connection with its own network ACLs.
Created: 2026-02-24 Last update: 2026-04-14 23:02
2 security issues in bookworm high

There are 2 open security issues in bookworm.

2 important issues:
  • CVE-2025-67733: Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious user can use scripting commands to inject arbitrary information into the response stream for the given client, potentially corrupting or returning tampered data to other users on the same connection. The error handling code for lua scripts does not properly handle null characters. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue.
  • CVE-2026-21863: Valkey is a distributed key-value database. Prior to versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12, a malicious actor with access to the Valkey clusterbus port can send an invalid packet that may cause an out bound read, which might result in the system crashing. The Valkey clusterbus packet processing code does not validate that a clusterbus ping extension packet is located within buffer of the clusterbus packet before attempting to read it. Versions 9.0.2, 8.1.6, 8.0.7, and 7.2.12 fix the issue. As an additional mitigation, don't expose the cluster bus connection directly to end users, and protect the connection with its own network ACLs.
Created: 2026-02-24 Last update: 2026-04-14 23:02
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2026-04-11 Last update: 2026-04-11 03:01
1 new commit since last upload, is it time to release? normal
vcswatch reports that this package seems to have new commits in its VCS but has not yet updated debian/changelog. You should consider updating the Debian changelog and uploading this new version into the archive.

Here are the relevant commit logs:
commit 4a3575a15667a694daa9e72c75ecba768e934f64
Author: Chris Lamb <lamby@debian.org>
Date:   Mon Apr 6 15:17:52 2026 -0400

    Update debian/watch.
Created: 2026-04-01 Last update: 2026-04-10 18:04
3 open merge requests in Salsa normal
There are 3 open merge requests for this package on Salsa. You should consider reviewing and/or merging these merge requests.
Created: 2025-08-19 Last update: 2025-08-19 06:28
debian/patches: 4 patches to forward upstream low

Among the 7 debian patches available in version 5:8.0.6-1 of the package, we noticed the following issues:

  • 4 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2026-04-11 08:00
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.7.4 instead of 4.7.2).
Created: 2025-12-23 Last update: 2026-04-10 22:32
testing migrations
  • This package will soon be part of the auto-openssl transition. You might want to ensure that your package is ready for it. You can probably find supplementary information in the debian-release archives or in the corresponding release.debian.org bug.
news
[rss feed]
  • [2026-04-15] redis 5:8.0.6-1 MIGRATED to testing (Debian testing watch)
  • [2026-04-10] Accepted redis 5:8.0.6-1 (source) into unstable (Chris Lamb)
  • [2026-03-31] Accepted redis 5:8.6.2-1 (source) into experimental (Chris Lamb)
  • [2026-03-11] Accepted redis 5:8.6.1-1 (source) into experimental (Chris Lamb)
  • [2026-01-14] Accepted redis 5:8.4.0-1 (source) into experimental (Chris Lamb)
  • [2025-11-06] redis 5:8.0.5-1 MIGRATED to testing (Debian testing watch)
  • [2025-11-03] Accepted redis 5:8.0.5-1 (source) into unstable (Chris Lamb)
  • [2025-10-19] Accepted redis 5:7.0.15-1~deb12u6 (source) into oldstable-proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2025-10-13] Accepted redis 5:8.0.2-3+deb13u1 (source) into proposed-updates (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2025-10-09] Accepted redis 5:6.0.16-1+deb11u8 (source) into oldoldstable-security (Chris Lamb)
  • [2025-10-08] Accepted redis 5:7.0.15-1~deb12u6 (source) into oldstable-security (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2025-10-08] Accepted redis 5:8.0.2-3+deb13u1 (source) into stable-security (Debian FTP Masters) (signed by: Moritz Mühlenhoff)
  • [2025-10-08] redis 5:8.0.4-1 MIGRATED to testing (Debian testing watch)
  • [2025-10-04] Accepted redis 5:8.0.4-1 (source) into unstable (Chris Lamb)
  • [2025-08-02] Accepted redis 5:7.0.15-1~deb12u5 (source amd64 all) into proposed-updates (Debian FTP Masters) (signed by: Chris Lamb)
  • [2025-07-31] Accepted redis 5:7.0.15-1~deb12u5 (source amd64 all) into stable-security (Debian FTP Masters) (signed by: Chris Lamb)
  • [2025-07-23] redis 5:8.0.2-3 MIGRATED to testing (Debian testing watch)
  • [2025-07-17] Accepted redis 5:8.0.2-3 (source) into unstable (Chris Lamb)
  • [2025-07-12] Accepted redis 5:6.0.16-1+deb11u7 (source) into oldstable-security (Chris Lamb)
  • [2025-07-12] Accepted redis 5:8.0.2-2 (source) into unstable (Chris Lamb)
  • [2025-06-06] redis 5:8.0.0-2 MIGRATED to testing (Debian testing watch)
  • [2025-05-13] Accepted redis 5:8.0.0-2 (source) into unstable (Chris Lamb)
  • [2025-05-12] Accepted redis 5:8.0.0-1 (source) into experimental (Chris Lamb)
  • [2025-05-11] Accepted redis 5:6.0.16-1+deb11u6 (source) into oldstable-security (Adrian Bunk)
  • [2025-05-10] Accepted redis 5:7.0.15-1~deb12u4 (source) into proposed-updates (Debian FTP Masters) (signed by: Adrian Bunk)
  • [2025-05-09] Accepted redis 5:7.0.15-3.1 (source) into unstable (Adrian Bunk)
  • [2025-02-01] Accepted redis 5:7.0.15-1~deb12u3 (source) into proposed-updates (Debian FTP Masters) (signed by: Adrian Bunk)
  • [2025-01-30] Accepted redis 5:7.0.15-1~deb12u3 (source) into stable-security (Debian FTP Masters) (signed by: Adrian Bunk)
  • [2025-01-26] redis 5:7.0.15-3 MIGRATED to testing (Debian testing watch)
  • [2025-01-21] Accepted redis 5:7.2.5-3 (source) into experimental (Chris Lamb)
  • 1
  • 2
bugs [bug history graph]
  • all: 8
  • RC: 1
  • I&N: 7
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, exp, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 5:8.0.5-1
  • 23 bugs

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing