-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- ------------------------------------------------------------------------- Debian Security Advisory DSA-5067-1
security@debian.org https://www.debian.org/security/ Moritz Muehlenhoff February 03, 2022
https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : ruby2.7
CVE ID : CVE-2021-41816 CVE-2021-41817 CVE-2021-41819
Several vulnerabilities have been discovered in the interpreter for
the Ruby language and the Rubygems included, which may result on
result in information disclosure or denial of service.
For the stable distribution (bullseye), these problems have been fixed in version 2.7.4-1+deb11u1.
We recommend that you upgrade your ruby2.7 packages.
For the detailed security status of ruby2.7 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/ruby2.7
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at:
https://www.debian.org/security/
Mailing list:
debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmH8Kn4ACgkQEMKTtsN8 TjbTxRAAuUOw3o3ErLuVtbb215FdUNe9F0ENKk9PMwc2Na3cF+Nvg3Vo5+G54g8V VhcJw/3rTohAdmwvPwmLiQ6rgWRXNgKGx7Bf9qXaBzD9mdPcQ5A1VoiK61mtgh0n 2Ax93kWJ/gDK0xYK7haIRXe1TQQEkg4hjAegsP1yWCBn/axXTOKSNIaRj4iuSkfD PUcTfKQiH+PoRkAOd8+gOVDej2uYFsvkeQJzNMWzJuLLym96Hs5IAOUigpFImDTc L+QzEBbyPdW6T9nh1ED5/lR/X6avah1nm7wFnSsaaDZhFj9OXXY5tWpQytHC32nG F10WvcfY6t786pO7ckZv+C0XqXfoN0mBrh6LR1CXl/B9dKRRii8b2QuoEPwKY5KA l5cdvF33DWmNaH6z9XiGhOrqkYmFuPGxGyXyXZ48eKb+GgJJT9ARNQw3243kxedj lZ+FlL8C+3mqsZKShTKb1zQmGun1945/qJ6VdGLZEEfhEkBGr9EhJHdzM97O6YV9 XDP2QdalTeQXGVya1DeWkdIP/6mwcZNbS/N2LLV2qnjSfgesiYlkXYhuwKjbtLrd KV+An5grnoyKNwnWiaDlKFvoIOsI+WgimfcY8zMek+Icjui9bnnNAlGbM/2Ch1TN i74G3y+xdqcZYKR0z7MigISX1X8EFDOKI3x6P3X9rOaHiInISbU=
=Lzsl
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)