Processed: Re: Bug#487432 closed by Lucas Nussbaum [EMAIL PROTECTED] (Re: Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on)

2008-07-11 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 reopen 487432
Bug#487432: Missing files to build the examples
'reopen' may be inappropriate when a bug has been closed with a version;
you may need to use 'found' to remove fixed versions.
Bug reopened, originator not changed.

 notfixed 487432 1.9.0.2-2
Bug#487432: Missing files to build the examples
Bug no longer marked as fixed in version 1.9.0.2-2.

 close 488432 1.9.0.2-2
Bug#488432: ruby1.8: Arbitrary code execution vulnerability and so on
'close' is deprecated; see http://www.debian.org/Bugs/Developer#closing.
Bug marked as fixed in version 1.9.0.2-2, send any further explanations to 
Daigo Moriwaki [EMAIL PROTECTED]

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#488432: Bug#487432 closed by Lucas Nussbaum [EMAIL PROTECTED] (Re: Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on)

2008-07-11 Thread Lucas Nussbaum
reopen 487432
notfixed 487432 1.9.0.2-2
close 488432 1.9.0.2-2
thanks

On 11/07/08 at 06:38 +, Debian Bug Tracking System wrote:
 
 This is an automatic notification regarding your Bug report
 which was filed against the texpower package:
 
 #487432: Missing files to build the examples

Gasp. Wrong bug.
-- 
| Lucas Nussbaum
| [EMAIL PROTECTED]   http://www.lucas-nussbaum.net/ |
| jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F |



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#487238: ruby1.8: Arbitrary code execution vulnerability, and so on

2008-07-10 Thread Michelle Konzack
Am 2008-07-04 08:34:03, schrieb timdau:
 15 days later, still no patch.
 END OF REPLIED MESSAGE 

What about writing and submiting one?

Thanks, Greetings and nice Day/Evening
Michelle Konzack
Systemadministrator
24V Electronic Engineer
Tamay Dogan Network
Debian GNU/Linux Consultant


-- 
Linux-User #280138 with the Linux Counter, http://counter.li.org/
# Debian GNU/Linux Consultant #
Michelle Konzack   Apt. 917  ICQ #328449886
+49/177/935194750, rue de Soultz MSN LinuxMichi
+33/6/61925193 67100 Strasbourg/France   IRC #Debian (irc.icq.com)


signature.pgp
Description: Digital signature


Bug#487238: ruby1.8: Arbitrary code execution vulnerability, and so on

2008-07-04 Thread timdau
15 days later, still no patch.


Bug#487238: ruby1.8: Arbitrary code execution vulnerability, and so on

2008-06-30 Thread Stephen Young
Is there a plan to resolve this security problem in Etch, or should I 
start looking for alternative solutions?  I would like to aptitude 
update  aptitude upgrade and make this problem go aways, but if that 
is not going to happen then I would like to know this so I can start 
looking for a different solution.




--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Re: Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on

2008-06-28 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 clone 487238 -1
Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on
Bug 487238 cloned as bug 488432.

 reassign -1 ruby1.9 1.9.0.1-1
Bug#488432: ruby1.8: Arbitrary code execution vulnerability and so on
Bug reassigned from package `ruby1.8' to `ruby1.9'.

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on

2008-06-28 Thread Lucas Nussbaum
clone 487238 -1
reassign -1 ruby1.9 1.9.0.1-1
thanks

On 20/06/08 at 22:52 +0900, Daigo Moriwaki wrote:
 The upstream has announced multiple vulnerabilities in Ruby. They may lead
 to a denial of service (DoS) condition or allow execution of arbitrary code.
   * CVE-2008-2662
   * CVE-2008-2663
   * CVE-2008-2725
   * CVE-2008-2726
   * CVE-2008-2727
   * CVE-2008-2728
   * CVE-2008-2664

OK, I think that the current status on this issue is the following:

1.8.7.22-1 (in unstable) apparently fixed the problem.

1.8.7-2 (in testing) is NOT FIXED. Release team, please let the unstable
version migrate to testing.

1.8.5-4etch1 (in etch) is still not fixed. I don't think that a patch
that only fixes this issue exists.

Ruby 1.9: (there wasn't any bug filed, I cloned this one)
1.9.0.2 should be fixed, but that version FTBFS on most arches. (see
#488362)
-- 
| Lucas Nussbaum
| [EMAIL PROTECTED]   http://www.lucas-nussbaum.net/ |
| jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F |



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on

2008-06-28 Thread Lucas Nussbaum
On 28/06/08 at 22:54 +0200, Lucas Nussbaum wrote:
 1.8.5-4etch1 (in etch) is still not fixed. I don't think that a patch
 that only fixes this issue exists.

Mmmh, Ubuntu has a fixed package, which can be downloaded from
https://launchpad.net/ubuntu/+source/ruby1.8/1.8.5-4ubuntu2.2 . But
someone still has to check if the fix is correct...
-- 
| Lucas Nussbaum
| [EMAIL PROTECTED]   http://www.lucas-nussbaum.net/ |
| jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F |



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on

2008-06-25 Thread Laurent Bonnaud
Hi,

this bug has been fixed by an upload for amd64.  But for other
architectures (including i386) the fixed version is not available yet
and systems remain vulnerable.  Could somebody please fix this?

-- 
Laurent Bonnaud.
http://www.lis.inpg.fr/pages_perso/bonnaud/





-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on

2008-06-25 Thread Lucas Nussbaum
On 25/06/08 at 19:14 +0200, Laurent Bonnaud wrote:
 Hi,
 
 this bug has been fixed by an upload for amd64.  But for other
 architectures (including i386) the fixed version is not available yet
 and systems remain vulnerable.  Could somebody please fix this?

It was built everywhere except alpha, but the i386 build wasn't
uploaded. i386 buildd admin, can you upload ruby1.8 1.8.7.22-1 ?

Thank you,
-- 
| Lucas Nussbaum
| [EMAIL PROTECTED]   http://www.lucas-nussbaum.net/ |
| jabber: [EMAIL PROTECTED] GPG: 1024D/023B3F4F |



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on

2008-06-20 Thread Daigo Moriwaki
Package: ruby1.8
Version: 1.8.6.114-2
Severity: grave
Tags: security
Justification: user security hole


The upstream has announced multiple vulnerabilities in Ruby. They may lead
to a denial of service (DoS) condition or allow execution of arbitrary code.
  * CVE-2008-2662
  * CVE-2008-2663
  * CVE-2008-2725
  * CVE-2008-2726
  * CVE-2008-2727
  * CVE-2008-2728
  * CVE-2008-2664

Vulnerable versions

1.8 series
  * 1.8.4 and all prior versions
  * 1.8.5-p230 and all prior versions
  * 1.8.6-p229 and all prior versions
  * 1.8.7-p21 and all prior versions

1.9 series
  * 1.9.0-1 and all prior versions

-- System Information:
Debian Release: lenny/sid
  APT prefers testing
  APT policy: (990, 'testing'), (500, 'stable'), (90, 'unstable'), (1, 
'experimental')
Architecture: i386 (i686)

Kernel: Linux 2.6.24-1-686 (SMP w/2 CPU cores)
Locale: LANG=ja_JP.eucJP, LC_CTYPE=ja_JP.eucJP (charmap=EUC-JP)
Shell: /bin/sh linked to /bin/bash

Versions of packages ruby1.8 depends on:
ii  libc62.7-10  GNU C Library: Shared libraries
ii  libruby1.8   1.8.6.114-2 Libraries necessary to run Ruby 1.

ruby1.8 recommends no packages.

-- no debconf information



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]



Processed: Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on

2008-06-20 Thread Debian Bug Tracking System
Processing commands for [EMAIL PROTECTED]:

 tags 487238 + etch
Bug#487238: ruby1.8: Arbitrary code execution vulnerability and so on
Tags were: security
Tags added: etch

 thanks
Stopping processing here.

Please contact me if you need assistance.

Debian bug tracking system administrator
(administrator, Debian Bugs database)


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of unsubscribe. Trouble? Contact [EMAIL PROTECTED]