[DRE-maint] Bug#1011940: marked as done (rails: CVE-2022-21831 code injection vulnerability exists in Active Storage)

Debian Bug Tracking System owner at bugs.debian.org
Mon Jun 20 20:33:03 BST 2022


Your message dated Mon, 20 Jun 2022 21:31:57 +0200
with message-id <YrDLLTcRDbGrwWBj at eldamar.lan>
and subject line Accepted rails 2:6.1.4.7+dfsg-1 (source) into unstable
has caused the Debian Bug report #1011940,
regarding rails: CVE-2022-21831 code injection vulnerability exists in Active Storage
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner at bugs.debian.org
immediately.)


-- 
1011940: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1011940
Debian Bug Tracking System
Contact owner at bugs.debian.org with problems
-------------- next part --------------
An embedded message was scrubbed...
From: Neil Williams <codehelp at debian.org>
Subject: rails: CVE-2022-21831 code injection vulnerability exists in Active Storage
Date: Fri, 27 May 2022 12:51:52 +0100
Size: 2629
URL: <http://alioth-lists.debian.net/pipermail/pkg-ruby-extras-maintainers/attachments/20220620/607a4c4c/attachment.eml>
-------------- next part --------------
An embedded message was scrubbed...
From: Salvatore Bonaccorso <carnil at debian.org>
Subject: Accepted rails 2:6.1.4.7+dfsg-1 (source) into unstable
Date: Mon, 20 Jun 2022 21:31:57 +0200
Size: 6500
URL: <http://alioth-lists.debian.net/pipermail/pkg-ruby-extras-maintainers/attachments/20220620/607a4c4c/attachment-0001.eml>


More information about the Pkg-ruby-extras-maintainers mailing list