Debian Package Tracker
Register | Log in
Subscribe

ruby3.1

Interpreter of object-oriented scripting language Ruby

Choose email to subscribe with

general
  • source: ruby3.1 (main)
  • version: 3.1.2-7
  • maintainer: Debian Ruby Team (archive) (DMD)
  • uploaders: Lucas Kanashiro [DMD] – Antonio Terceiro [DMD] – Utkarsh Gupta [DMD]
  • arch: all any
  • std-ver: 4.5.1
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • stable: 3.1.2-7
  • testing: 3.1.2-7
  • unstable: 3.1.2-7
versioned links
  • 3.1.2-7: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • libruby3.1 (1 bugs: 0, 0, 1, 0)
  • ruby3.1
  • ruby3.1-dev (1 bugs: 0, 1, 0, 0)
  • ruby3.1-doc
action needed
Multiarch hinter reports 1 issue(s) high
There are issues with the multiarch metadata for this package.
  • libruby3.1 conflicts on 4 files starting with /usr/lib/ruby/gems/3.1.0/extensions/arm-linux/3.1.0/ on armel <-> armhf
Created: 2022-04-29 Last update: 2023-10-03 21:07
A new upstream version is available: 3.1.4 high
A new upstream version 3.1.4 is available, you should consider packaging it.
Created: 2022-11-26 Last update: 2023-10-03 21:06
lintian reports 14 errors and 28 warnings high
Lintian reports 14 errors and 28 warnings about this package. You should make the package lintian clean getting rid of them.
Created: 2023-01-27 Last update: 2023-09-03 06:06
2 security issues in trixie high

There are 2 open security issues in trixie.

2 important issues:
  • CVE-2023-28755: A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
  • CVE-2023-28756: A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
Created: 2023-06-11 Last update: 2023-07-05 14:30
2 security issues in sid high

There are 2 open security issues in sid.

2 important issues:
  • CVE-2023-28755: A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
  • CVE-2023-28756: A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
Created: 2023-04-02 Last update: 2023-07-05 14:30
2 security issues in bookworm high

There are 2 open security issues in bookworm.

2 important issues:
  • CVE-2023-28755: A ReDoS issue was discovered in the URI component through 0.12.0 in Ruby through 3.2.1. The URI parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to URI objects. The fixed versions are 0.12.1, 0.11.1, 0.10.2 and 0.10.0.1.
  • CVE-2023-28756: A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
Created: 2023-04-02 Last update: 2023-07-05 14:30
debian/patches: 1 patch with invalid metadata, 15 patches to forward upstream high

Among the 17 debian patches available in version 3.1.2-7 of the package, we noticed the following issues:

  • 1 patch with invalid metadata that ought to be fixed.
  • 15 patches where the metadata indicates that the patch has not yet been forwarded upstream. You should either forward the patch upstream or update the metadata to document its real status.
Created: 2023-02-26 Last update: 2023-03-28 07:07
Fails to build during reproducibility testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2022-07-30 Last update: 2023-10-03 23:44
Build log checks report 2 warnings low
Build log checks report 2 warnings
Created: 2023-01-26 Last update: 2023-01-26 23:06
Standards version of the package is outdated. wishlist
The package should be updated to follow the last version of Debian Policy (Standards-Version 4.6.2 instead of 4.5.1).
Created: 2022-04-29 Last update: 2023-04-04 08:32
news
[rss feed]
  • [2023-04-14] ruby3.1 3.1.2-7 MIGRATED to testing (Debian testing watch)
  • [2023-03-27] Accepted ruby3.1 3.1.2-7 (source) into unstable (Antonio Terceiro)
  • [2023-03-05] Accepted ruby3.1 3.1.2-7~exp (source) into experimental (Antonio Terceiro)
  • [2023-01-29] ruby3.1 3.1.2-6 MIGRATED to testing (Debian testing watch)
  • [2023-01-26] Accepted ruby3.1 3.1.2-6 (source) into unstable (Antonio Terceiro)
  • [2023-01-25] Accepted ruby3.1 3.1.2-5 (source) into unstable (Antonio Terceiro)
  • [2023-01-19] ruby3.1 3.1.2-4 MIGRATED to testing (Debian testing watch)
  • [2023-01-15] Accepted ruby3.1 3.1.2-4 (source) into unstable (Antonio Terceiro)
  • [2022-09-15] ruby3.1 3.1.2-3 MIGRATED to testing (Debian testing watch)
  • [2022-09-11] Accepted ruby3.1 3.1.2-3 (source) into unstable (Antonio Terceiro)
  • [2022-07-30] ruby3.1 3.1.2-2 MIGRATED to testing (Debian testing watch)
  • [2022-07-27] Accepted ruby3.1 3.1.2-2 (source) into unstable (Antonio Terceiro)
  • [2022-04-28] Accepted ruby3.1 3.1.2-1 (source amd64 all) into unstable, unstable (Debian FTP Masters) (signed by: Antonio Terceiro)
bugs [bug history graph]
  • all: 5 6
  • RC: 2 3
  • I&N: 2
  • M&W: 1
  • F&P: 0
  • patch: 0
links
  • homepage
  • buildd: logs, checks, reproducibility, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debian patches
  • debci
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 3.1.2-7ubuntu3
  • 1 bug
  • patches for 3.1.2-7ubuntu3

Debian Package Tracker — Copyright 2013-2018 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing