ruby-minitar_0.5.4-3.1_multi.changes uploaded successfully to localhost
along with the files:
ruby-archive-tar-minitar_0.5.4-3.1_all.deb
ruby-minitar_0.5.4-3.1_all.deb
ruby-minitar_0.5.4-3.1.dsc
ruby-minitar_0.5.4-3.1.debian.tar.xz
Greetings,
Your Debian queue daemon (running on h
Processing control commands:
> tags 853075 + pending
Bug #853075 [src:ruby-minitar] ruby-minitar: CVE-2016-10173: directory
traversal vulnerability
Added tag(s) pending.
--
853075: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=853075
Debian Bug Tracking System
Contact ow...@bugs.debian.org w
Control: tags 853075 + pending
Dear Markus,
I've prepared an NMU for ruby-minitar (versioned as 0.5.4-3.1) and
uploaded it to DELAYED/5. Please feel free to tell me if I
should delay it longer.
Regards,
Salvatore
diff -Nru ruby-minitar-0.5.4/debian/changelog ruby-minitar-0.5.4/debian/changelog
-
Accepted:
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Format: 1.8
Date: Sun, 29 Jan 2017 12:39:40 +0530
Source: ruby-paranoia
Binary: ruby-paranoia
Architecture: source
Version: 2.2.0-1
Distribution: experimental
Urgency: medium
Maintainer: Debian Ruby Extras Maintainers
Changed-By: Pirat
ruby-paranoia_2.2.0-1_source.changes uploaded successfully to localhost
along with the files:
ruby-paranoia_2.2.0-1.dsc
ruby-paranoia_2.2.0.orig.tar.gz
ruby-paranoia_2.2.0-1.debian.tar.xz
Greetings,
Your Debian queue daemon (running on host usper.debian.org)
___
FYI: The status of the gitlab source package
in Debian's testing distribution has changed.
Previous version: 8.13.6+dfsg2-2
Current version: 8.13.11+dfsg-1
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you
FYI: The status of the gitlab-shell source package
in Debian's testing distribution has changed.
Previous version: 3.6.6-1
Current version: 3.6.6-2
--
This email is automatically generated once a day. As the installation of
new packages into testing happens multiple times a day you will re
Source: ruby-minitar
Version: 0.5.4-3
Severity: grave
Tags: security upstream patch
Forwarded: https://github.com/halostatue/minitar/issues/16
Hi,
the following vulnerability was published for ruby-minitar.
CVE-2016-10173[0]:
directory traversal vulnerability
There is an upstream bug for it at
Source: ruby-minitar
Version: 0.5.4-3
Severity: normal
Hi
/usr/bin/minitar as shipped in ruby-minitar is not working. Trying to
extract a tar.gz with it raises:
$ minitar extract test.tar.gz
/usr/bin/minitar:19:in `': undefined method `require_gem' for main:Object
(NoMethodError)
Did you mean?
binary:ruby-sidekiq-limit-fetch is NEW.
binary:ruby-sidekiq-limit-fetch is NEW.
source:ruby-sidekiq-limit-fetch is NEW.
Your package has been put into the NEW queue, which requires manual action
from the ftpteam to process. The upload was otherwise valid (it had a good
OpenPGP signature and file h
ruby-sidekiq-limit-fetch_3.4.0-1_amd64.changes uploaded successfully to
localhost
along with the files:
ruby-sidekiq-limit-fetch_3.4.0-1.dsc
ruby-sidekiq-limit-fetch_3.4.0.orig.tar.gz
ruby-sidekiq-limit-fetch_3.4.0-1.debian.tar.xz
ruby-sidekiq-limit-fetch_3.4.0-1_all.deb
ruby-sidekiq-lim
11 matches
Mail list logo