Debian Package Tracker
Register | Log in
Subscribe

ruby-git

Ruby interface to the Git revision control system

Choose email to subscribe with

general
  • source: ruby-git (main)
  • version: 1.9.1-1
  • maintainer: Debian Ruby Extras Maintainers (archive) (DMD)
  • uploaders: Paul van Tilburg [DMD] – Michael Schutte [DMD]
  • arch: all
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • o-o-stable: 1.2.8-1
  • oldstable: 1.2.8-1
  • old-bpo: 1.6.0-1~bpo10+1
  • stable: 1.7.0-1
  • testing: 1.9.1-1
  • unstable: 1.9.1-1
versioned links
  • 1.2.8-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.6.0-1~bpo10+1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.7.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 1.9.1-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • ruby-git
action needed
Marked for autoremoval on 10 August: #1009926 high
Version 1.9.1-1 of ruby-git is marked for autoremoval from testing on Wed 10 Aug 2022. It is affected by #1009926. The removal of ruby-git will also cause the removal of (transitive) reverse dependencies: ruby-jeweler, ticgit. You should try to prevent the removal by fixing these RC bugs.
Created: 2022-07-11 Last update: 2022-08-09 04:03
A new upstream version is available: 1.11.0 high
A new upstream version 1.11.0 is available, you should consider packaging it.
Created: 2021-12-23 Last update: 2022-08-08 22:01
1 security issue in sid high

There is 1 open security issue in sid.

1 important issue:
  • CVE-2022-25648: The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Created: 2022-07-04 Last update: 2022-08-01 13:40
1 security issue in buster high

There is 1 open security issue in buster.

1 important issue:
  • CVE-2022-25648: The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Created: 2022-07-04 Last update: 2022-08-01 13:40
1 security issue in bullseye high

There is 1 open security issue in bullseye.

1 important issue:
  • CVE-2022-25648: The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Created: 2022-07-04 Last update: 2022-08-01 13:40
1 security issue in bookworm high

There is 1 open security issue in bookworm.

1 important issue:
  • CVE-2022-25648: The package git before 1.11.0 are vulnerable to Command Injection via git argument injection. When calling the fetch(remote = 'origin', opts = {}) function, the remote parameter is passed to the git fetch subcommand in a way that additional flags can be set. The additional flags can be used to perform a command injection.
Created: 2022-07-04 Last update: 2022-08-01 13:40
version in VCS is newer than in repository, is it time to upload? normal
vcswatch reports that this package seems to have a new changelog entry (version 1.9.1-2, distribution UNRELEASED) and new commits in its VCS. You should consider whether it's time to make an upload.

Here are the relevant commit messages:
commit 5bda2733d1dfd77d49ed3211d9ff81579775e931
Author: Daniel Leidert <dleidert@debian.org>
Date:   Fri Nov 26 06:51:39 2021 +0100

    Fix watch file

commit 3effc1164dbaea2063e107382eafa90f1c54a653
Author: Debian Janitor <janitor@jelmer.uk>
Date:   Fri Sep 10 12:30:01 2021 +0000

    Bump debhelper from old 12 to 13.
    
    Changes-By: lintian-brush
    Fixes: lintian: package-uses-old-debhelper-compat-version
    See-also: https://lintian.debian.org/tags/package-uses-old-debhelper-compat-version.html

commit 73fe11d60fa7634f377fc3759d96db7affe54845
Author: Daniel Leidert <dleidert@debian.org>
Date:   Fri Sep 10 13:38:58 2021 +0200

    Try fixing tests with LC_ALL

commit dc63afc3c75d3f3a081f4068e8f5b3ed19d18215
Author: Daniel Leidert <dleidert@debian.org>
Date:   Fri Sep 10 02:55:09 2021 +0200

    Try to fix reprotest issue by setting locale to C.UTF-8
Created: 2020-12-24 Last update: 2022-08-08 14:36
lintian reports 1 warning normal
Lintian reports 1 warning about this package. You should make the package lintian clean getting rid of them.
Created: 2022-07-30 Last update: 2022-07-30 12:16
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.1 instead of 4.5.1).
Created: 2020-11-17 Last update: 2022-05-11 23:25
news
[rss feed]
  • [2021-09-12] ruby-git 1.9.1-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-10] Accepted ruby-git 1.9.1-1 (source) into unstable (Daniel Leidert)
  • [2020-11-03] ruby-git 1.7.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-11-01] Accepted ruby-git 1.7.0-1 (source) into unstable (Daniel Leidert)
  • [2020-04-07] ruby-git 1.6.0+0-1 MIGRATED to testing (Debian testing watch)
  • [2020-04-04] Accepted ruby-git 1.6.0+0-1 (source) into unstable (Antonio Terceiro)
  • [2020-03-20] Accepted ruby-git 1.6.0-1~bpo10+1 (source all) into buster-backports, buster-backports (Debian FTP Masters) (signed by: Hans-Christoph Steiner)
  • [2020-03-19] ruby-git 1.6.0-1 MIGRATED to testing (Debian testing watch)
  • [2020-03-13] Accepted ruby-git 1.6.0-1 (source) into unstable (Hans-Christoph Steiner)
  • [2014-11-05] ruby-git 1.2.8-1 MIGRATED to testing (Britney)
  • [2014-10-25] Accepted ruby-git 1.2.8-1 (source all) into unstable (Michael Schutte)
  • [2013-12-07] ruby-git 1.2.6-1 MIGRATED to testing (Debian testing watch)
  • [2013-12-01] Accepted ruby-git 1.2.6-1 (source all) (Michael Schutte)
  • [2011-06-27] ruby-git 1.2.5-2 MIGRATED to testing (Debian testing watch)
  • [2011-06-14] Accepted ruby-git 1.2.5-2 (source all) (Michael Schutte)
bugs [bug history graph]
  • all: 1
  • RC: 1
  • I&N: 0
  • M&W: 0
  • F&P: 0
  • patch: 0
links
  • homepage
  • lintian (0, 1)
  • buildd: logs, clang, reproducibility
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 1.9.1-1

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing