fixed 585162 1.4.6-1
thanks

Thanks for the notice Moritz. I'm already aware of the issue, and I've
uploaded over a week ago the new upstream that fixes it.

On Wed, Jun 09, 2010 at 07:01:44PM +0200, Moritz Muehlenhoff wrote [edited]:
> please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2060

That page is wrong in stating that 1.4.6-1 is vulnerable.

> | Beanstalkd is meant to be ran in a trusted network, as it has no
> | authorisation/authentication mechanisms.
> 
> this is likely a non-issue?

Indeed, it's no big deal, but nevertheless should be fixed for squeeze. I did
the upload with urgency=medium, but it got stuck due to a random
(unreproducible) build error in a mips host. I'll give them yet another ping
to retry the build (not sure whether they missed my request, or they just have
a long backlog).

I'll close the bug as soon as 1.4.5 is gone from testing.

Cheers,
Serafeim



-- 
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected]

Reply via email to