Your message dated Fri, 10 May 2019 14:35:09 +0000
with message-id <[email protected]>
and subject line Bug#928205: fixed in memcached 1.5.6-1.1
has caused the Debian Bug report #928205,
regarding memcached: CVE-2019-11596
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
928205: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928205
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: memcached
Version: 1.5.6-1
Severity: important
Tags: security upstream
Forwarded: https://github.com/memcached/memcached/issues/474

Hi,

The following vulnerability was published for memcached.

CVE-2019-11596[0]:
| In memcached before 1.5.14, a NULL pointer dereference was found in
| the "lru mode" and "lru temp_ttl" commands. This causes a denial of
| service when parsing crafted lru command messages in
| process_lru_command in memcached.c.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2019-11596
    https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11596
[1] https://github.com/memcached/memcached/issues/474
[2] 
https://github.com/memcached/memcached/commit/d35334f368817a77a6bd1f33c6a5676b2c402c02

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
Source: memcached
Source-Version: 1.5.6-1.1

We believe that the bug you reported is fixed in the latest version of
memcached, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Salvatore Bonaccorso <[email protected]> (supplier of updated memcached package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Sun, 05 May 2019 13:36:30 +0200
Source: memcached
Architecture: source
Version: 1.5.6-1.1
Distribution: unstable
Urgency: medium
Maintainer: Guillaume Delacour <[email protected]>
Changed-By: Salvatore Bonaccorso <[email protected]>
Closes: 928205
Changes:
 memcached (1.5.6-1.1) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Fix NULL pointer dereference in the "lru mode" and "lru temp_ttl" commands
     (CVE-2019-11596) (Closes: #928205)
Checksums-Sha1: 
 440aed104c0a392cc84933bfecea7052ddc57dfb 2103 memcached_1.5.6-1.1.dsc
 d308e4fbc94ed502f9e3eebe46dca92ce0c388a0 14276 
memcached_1.5.6-1.1.debian.tar.xz
Checksums-Sha256: 
 208078951caf85afee362c30bb16843aca8bbb3c458d235f38c136e40072b28a 2103 
memcached_1.5.6-1.1.dsc
 1ab61dca83c5cbc7e7a6aaecfeb37684556316cf689523eee9e001e328a7c946 14276 
memcached_1.5.6-1.1.debian.tar.xz
Files: 
 124b4e0ad39cb85c80b3ee52b7da8e06 2103 web optional memcached_1.5.6-1.1.dsc
 48e4c0cc7b3c095571eadf823b670239 14276 web optional 
memcached_1.5.6-1.1.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
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=HPRi
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to