Your message dated Wed, 2 Jan 2008 15:13:51 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Bug#398457: version 1.8.5-3 already includes patch for this
issue
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: libruby1.8
Version: 1.8.5-3
Severity: grave
Tags: security
Justification: user security hole
A vulnerability has been found in ruby's cgi.rb (or rather
a previous fix was incomplete). From CVE-2006-5467:
The cgi.rb CGI library for Ruby 1.8 allows remote attackers to cause a
dneial of service (infinite loop and CPU consumption) via an HTTP
request with a multipart MIME body that contains an invalid boundary
specifier, as demonstrated using a specifier that begins with a "-"
instead of "--" and contains an inconsistent ID.
See
http://www.ruby-lang.org/en/news/2006/11/03/CVE-2006-5467/
http://secunia.com/advisories/22624
for more info.
Please mention the CVE-id in the changelog and also check ruby 1.9.
--- End Message ---
--- Begin Message ---
Version: 1.8.5-3
On 24/11/06 at 14:48 -0300, Antonio S. de A. Terceiro wrote:
> The fix for this issue, as mentioned in
> http://www.ruby-lang.org/en/news/2006/11/03/CVE-2006-5467/, is already
> included in the package:
Indeed, marking as such.
Thank you!
--
| Lucas Nussbaum
| [EMAIL PROTECTED] http://www.lucas-nussbaum.net/ |
| jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F |
--- End Message ---