vulnerability
Ubuntu: (CVE-2023-27478): libmemcached vulnerability
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | Mar 7, 2023 | Nov 19, 2024 | Mar 27, 2026 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Mar 7, 2023
Added
Nov 19, 2024
Modified
Mar 27, 2026
Description
libmemcached-awesome is an open source C/C++ client library and tools for the memcached server. `libmemcached` could return data for a previously requested key, if that previous request timed out due to a low `POLL_TIMEOUT`. This issue has been addressed in version 1.1.4. Users are advised to upgrade. There are several ways to workaround or lower the probability of this bug affecting a given deployment. 1: use a reasonably high `POLL_TIMEOUT` setting, like the default. 2: use separate libmemcached connections for unrelated data. 3: do not re-use libmemcached connections in an unknown state.
Solution
ubuntu-upgrade-libmemcached
References
- CVE-2023-27478
- https://attackerkb.com/topics/CVE-2023-27478
- CWE-200
- EUVD-EUVD-2023-31250
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2023-31250
- https://github.com/awesomized/libmemcached/releases/tag/1.1.4
- https://github.com/awesomized/libmemcached/security/advisories/GHSA-wwmh-39wj-fx59
- https://www.cve.org/CVERecord?id=CVE-2023-27478
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.