Ehh fine. I guess I'll cut a 1.2.9. It'll contain this single patch and there won't be a lot of fanfare to it. I'll get this out ASAP.
This bug is definitely not serious, and anyone claiming it as a root hole should be strangled. Please don't run this thing as root in a place where people can put whatever random trash they want into the system. The only reason why we consider this a notable bug is due to the potential for deliberate memory corruption. There are still many ways to DoS memcached if you have full and unfettered access to it. -Dormando On Tue, 11 Aug 2009, Paul Lindner wrote: > I haven't seen this mentioned on the mailing list... Is there a 1.2.9 in > the works or should I just patch up my builds with the attached patch. > > ---------- Forwarded message ---------- > From: <bugzi...@redhat.com> > Date: Mon, Aug 10, 2009 at 12:54 AM > Subject: [Bug 516489] CVE-2009-2415 memcached: heap-based buffer overflow > To: lind...@inuus.com > > > Please do not reply directly to this email. All additional > comments should be made in the comments box of this bug. > > > https://bugzilla.redhat.com/show_bug.cgi?id=516489 > > > > > > --- Comment #1 from Tomas Hoger <tho...@redhat.com> 2009-08-10 03:54:22 EDT > --- > Created an attachment (id=356858) > --> (https://bugzilla.redhat.com/attachment.cgi?id=356858) > Debian patch > > Patch extracted from Debian update for 1.2.2. > > Upstream fix for 1.2.8 should be this: > > http://consoleninja.net/code/memcached/memcached-1.2.8_proper_vlen_fix.patch > > -- > Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email > ------- You are receiving this mail because: ------- > You are on the CC list for the bug. >