Your message dated Tue, 18 Dec 2012 20:09:07 +0100
with message-id
<CADk7b0Noa=qrrvvk-ls0h0e3tgg4xnm0m8kdhvhpm5jcaor...@mail.gmail.com>
and subject line Package removed
has caused the Debian Bug report #572817,
regarding ruby1.9: CVE-2009-4124 buffer overflow
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
572817: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=572817
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ruby1.9
Version: 1.9.0.5-1
Severity: serious
Tags: security
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for ruby1.9. Note this was fixed in 1.9.1, and it isn't
really clear whether it affects 1.9. I can't find enough info to say
either way. Please check.
CVE-2009-4124[0]:
| Heap-based buffer overflow in the rb_str_justify function in string.c
| in Ruby 1.9.1 before 1.9.1-p376 allows context-dependent attackers to
| execute arbitrary code via unspecified vectors involving (1)
| String#ljust, (2) String#center, or (3) String#rjust. NOTE: some of
| these details are obtained from third party information.
If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.
For further information see:
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4124
http://security-tracker.debian.org/tracker/CVE-2009-4124
--- End Message ---
--- Begin Message ---
Version: 1.9.0.5-1+rm
Dear submitter,
as this package has been removed from the Debian archive unstable
we hereby close the associated bug reports. We are sorry that we
couldn't deal with your issue properly.
The version of this package that was in Debian prior to this removal
can still be found using http://snapshot.debian.org/.
--- End Message ---