On Fri, Jan 23, 2009 at 11:52 PM, Brad Nicholes <bnicho...@novell.com> wrote:

>>>  * http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0242
>>>
>>> "Ganglia 3.1.1 allows remote attackers to cause a denial of service via
>>> a request to the gmetad service with a path does not exist, which causes
>>> Ganglia to (1) perform excessive CPU computation and (2) send the entire
>>> tree, which consumes network bandwidth."
>>
>> this one is IMHO invalid as the CPU and bandwith costs for this in the
>> current code are constant and the wording quoted was most likely taken
>> out of context as it referred originally to a contribution proposal
>> which has not been yet committed.
>>

agreed, all the advisories I've seen around have misquoted my original
report and missed the link to the feature proposal. As it stands this
CVE is invalid.

>
> Are we finished hashing this whole patch out yet?  Are we ready to apply the 
> current patch to 3.1.2 and release or is there still more discussion going on?

as far as I'm concerned #223 is resolved and good to go.

thanks everybody.

-- 
"Behind every great man there's a great backpack" - B.

------------------------------------------------------------------------------
This SF.net email is sponsored by:
SourcForge Community
SourceForge wants to tell your story.
http://p.sf.net/sfu/sf-spreadtheword
_______________________________________________
Ganglia-developers mailing list
Ganglia-developers@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ganglia-developers

Reply via email to