First published: Mon Apr 29 2019(Updated: )
In memcached before 1.5.14, a NULL pointer dereference was found in the "lru mode" and "lru temp_ttl" commands. This causes a denial of service when parsing crafted lru command messages in process_lru_command in memcached.c.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Memcached Memcached | <1.5.14 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
Canonical Ubuntu Linux | =19.04 | |
ubuntu/memcached | <1.5.6-0ubuntu1.1 | 1.5.6-0ubuntu1.1 |
ubuntu/memcached | <1.5.10-0ubuntu1.18.10.1 | 1.5.10-0ubuntu1.18.10.1 |
ubuntu/memcached | <1.5.10-0ubuntu1.19.04.1 | 1.5.10-0ubuntu1.19.04.1 |
ubuntu/memcached | <1.5.14 | 1.5.14 |
debian/memcached | 1.6.9+dfsg-1 1.6.18-1 1.6.29-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this memcached vulnerability is CVE-2019-11596.
The severity of CVE-2019-11596 is high (7.5).
Versions of memcached before 1.5.14 are affected by CVE-2019-11596.
You can fix CVE-2019-11596 by upgrading memcached to version 1.5.14 or later.
You can find more information about CVE-2019-11596 at the following references: [1](http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00060.html), [2](https://github.com/memcached/memcached/commit/d35334f368817a77a6bd1f33c6a5676b2c402c02), [3](https://github.com/memcached/memcached/compare/ee1cfe3...50bdc9f).