CVE-2019-15026

NameCVE-2019-15026
Descriptionmemcached 1.5.16, when UNIX sockets are used, has a stack-based buffer over-read in conn_to_str in memcached.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1913-1
NVD severitymedium
Debian Bugs939337

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
memcached (PTS)stretch (security), stretch1.4.33-1+deb9u1vulnerable
buster1.5.6-1.1vulnerable
bullseye, sid1.6.7+dfsg-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
memcachedsourcejessie1.4.21-1.1+deb8u3DLA-1913-1
memcachedsource(unstable)1.5.17-1939337

Notes

[buster] - memcached <no-dsa> (Minor issue)
[stretch] - memcached <no-dsa> (Minor issue)
Fixed by: https://github.com/memcached/memcached/commit/554b56687a19300a75ec24184746b5512580c819

Search for package or bug name: Reporting problems