Your message dated Fri, 25 Apr 2025 06:48:29 +0000
with message-id <e1u8crn-003den...@fasolo.debian.org>
and subject line Bug#1095937: Removed package(s) from unstable
has caused the Debian Bug report #1103791,
regarding ruby3.1: CVE-2025-25186
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1103791: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1103791
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Source: ruby3.1
Version: 3.1.2-8.5
Severity: important
Tags: security upstream
X-Debbugs-Cc: car...@debian.org, Debian Security Team <t...@security.debian.org>

Hi,

The following vulnerability was published for ruby3.1.

CVE-2025-25186[0]:
| Net::IMAP implements Internet Message Access Protocol (IMAP) client
| functionality in Ruby. Starting in version 0.3.2 and prior to
| versions 0.3.8, 0.4.19, and 0.5.6, there is a possibility for denial
| of service by memory exhaustion in `net-imap`'s response parser.  At
| any time while the client is connected, a malicious server can send
| can send highly compressed `uid-set` data which is automatically
| read by the client's receiver thread. The response parser uses
| `Range#to_a` to convert the `uid-set` data into arrays of integers,
| with no limitation on the expanded size of the ranges. Versions
| 0.3.8, 0.4.19, 0.5.6, and higher fix this issue. Additional details
| for proper configuration of fixed versions and backward
| compatibility are available in the GitHub Security Advisory.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-25186
    https://www.cve.org/CVERecord?id=CVE-2025-25186

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Version: 3.1.2-8.5+rm

Dear submitter,

as the package ruby3.1 has just been removed from the Debian archive
unstable we hereby close the associated bug reports.  We are sorry
that we couldn't deal with your issue properly.

For details on the removal, please see https://bugs.debian.org/1095937

The version of this package that was in Debian prior to this removal
can still be found using https://snapshot.debian.org/.

Please note that the changes have been done on the master archive and
will not propagate to any mirrors until the next dinstall run at the
earliest.

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
ftpmas...@ftp-master.debian.org.

Debian distribution maintenance software
pp.
Thorsten Alteholz (the ftpmaster behind the curtain)

--- End Message ---

Reply via email to