On Thu, 22 Apr 2010 17:48:28 +0200 Lucas Nussbaum wrote:

> On 06/03/10 at 15:47 -0500, Michael Gilbert wrote:
> > Package: ruby1.9
> > Version: 1.9.0.5-1
> > Severity: serious
> > Tags: security
> > 
> > Hi,
> > the following CVE (Common Vulnerabilities & Exposures) id was
> > published for ruby1.9.  Note this was fixed in 1.9.1, and it isn't
> > really clear whether it affects 1.9.  I can't find enough info to say
> > either way.  Please check.
> > 
> > CVE-2009-4124[0]:
> > | Heap-based buffer overflow in the rb_str_justify function in string.c
> > | in Ruby 1.9.1 before 1.9.1-p376 allows context-dependent attackers to
> > | execute arbitrary code via unspecified vectors involving (1)
> > | String#ljust, (2) String#center, or (3) String#rjust.  NOTE: some of
> > | these details are obtained from third party information.
> > 
> > If you fix the vulnerability please also make sure to include the
> > CVE id in your changelog entry.
> > 
> > For further information see:
> > 
> > [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-4124
> >     http://security-tracker.debian.org/tracker/CVE-2009-4124
> 
> Hi Michael,
> 
> The version of ruby1.9 in lenny seems to be affected. Ruby1.9 is no
> longer available in unstable. I'm tempted to just ignore that bug (the
> patch from 1.9.1 doesn't apply to 1.9.0).


this seems like a rather severe bug to ignore (arbitrary code
execution).  do you have a link to the patch?  i still don't see it, but
i've only quickly scanned mitre's links.  perhaps someone else would be
able to backport it.

> Ruby 1.9 is a development branch of Ruby, I don't think that anybody
> uses it for anything serious.

should it be removed from lenny also?

cc'ing security team for their input.

mike



-- 
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to