Graham Barr reported that beanstalkd v1.4.5 and earlier, improperly sanitized job data, sent together with put command from client. A remote attacker, providing a specially-crafted job data in request, could use this flaw to bypass intended beanstalk client commands dispatch mechanism, leading to unauthorized execution of beanstalk client commands. References: [1] http://kr.github.com/beanstalkd/2010/05/23/1.4.6-release-notes.html Upstream changeset: [2] http://github.com/kr/beanstalkd/commit/2e8e8c6387ecdf5923dfc4d7718d18eba1b0873d CVE Request: [3] http://www.openwall.com/lists/oss-security/2010/06/02/4
This issue affects the versions of the beanstalkd package, as shipped with Fedora release of 11, 12, and 13. This issue affects the version of the beanstalkd package, as present within EPEL-5 repository. Please fix.
beanstalkd-1.4.6-1.fc13 has been submitted as an update for Fedora 13. http://admin.fedoraproject.org/updates/beanstalkd-1.4.6-1.fc13
beanstalkd-1.4.6-1.fc12 has been submitted as an update for Fedora 12. http://admin.fedoraproject.org/updates/beanstalkd-1.4.6-1.fc12
beanstalkd-1.4.6-1.el5 has been submitted as an update for Fedora EPEL 5. http://admin.fedoraproject.org/updates/beanstalkd-1.4.6-1.el5
This is CVE-2010-2060.
beanstalkd-1.4.6-1.fc13 has been pushed to the Fedora 13 stable repository. If problems still persist, please make note of it in this bug report.
beanstalkd-1.4.6-1.fc12 has been pushed to the Fedora 12 stable repository. If problems still persist, please make note of it in this bug report.
beanstalkd-1.4.6-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
I believe this should have been marked as closed, doing so.