rails_6.0.3.7+dfsg.orig.tar.xz has incorrect size; deleting it
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
___
Pkg-ruby-extras-maintainers mailing list
Pkg-ruby-extras-maintainers@alioth-lists.debian.net
rails_6.0.3.7+dfsg.orig.tar.xz has incorrect size; deleting it
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
___
Pkg-ruby-extras-maintainers mailing list
Pkg-ruby-extras-maintainers@alioth-lists.debian.net
Your message dated Thu, 08 Jul 2021 20:17:56 +
with message-id
and subject line Bug#990815: fixed in ruby2.7 2.7.4-1
has caused the Debian Bug report #990815,
regarding ruby2.7: CVE-2021-31799 CVE-2021-31810 CVE-2021-32066
to be marked as done.
This means that you claim that the problem has
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Fri, 09 Jul 2021 00:40:58 +0530
Source: ruby2.7
Architecture: source
Version: 2.7.4-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Ruby Team
Changed-By: Utkarsh Gupta
Closes: 990815
Changes:
ruby2.7
ruby2.7_2.7.4-1_source.changes uploaded successfully to localhost
along with the files:
ruby2.7_2.7.4-1.dsc
ruby2.7_2.7.4.orig.tar.xz
ruby2.7_2.7.4-1.debian.tar.xz
ruby2.7_2.7.4-1_source.buildinfo
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
rails_6.0.3.7+dfsg.orig.tar.xz has incorrect size; deleting it
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
___
Pkg-ruby-extras-maintainers mailing list
Pkg-ruby-extras-maintainers@alioth-lists.debian.net
Processing commands for cont...@bugs.debian.org:
> tags 990815 + upstream
Bug #990815 [src:ruby2.7] ruby2.7: CVE-2021-31799 CVE-2021-31810 CVE-2021-32066
Added tag(s) upstream.
> found 990815 2.7.3-2
Bug #990815 [src:ruby2.7] ruby2.7: CVE-2021-31799 CVE-2021-31810 CVE-2021-32066
Marked as found
Source: ruby2.7
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security
Hi,
The following vulnerabilities were published for ruby2.7.
CVE-2021-31799[0]:
A command injection vulnerability in RDoc
https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/