|
|
Message-ID: <27184e15-28ab-4017-997e-1e4c3f9bf63e@oracle.com>
Date: Sun, 24 May 2026 10:59:03 -0700
From: Alan Coopersmith <alan.coopersmith@...cle.com>
To: oss-security@...ts.openwall.com
Subject: Re: Memcached 1.6.42 is a "major security focused
release" with CVE's TBD
On 5/19/26 10:14, Alan Coopersmith wrote:
> https://github.com/memcached/memcached/wiki/ReleaseNotes1642 reveals:
>> Similarly I have not created CVE's for any of these as that requires
>> understanding the severity of each bug. In most cases these submissions
>> vastly overstated the severity of the bug. I leave it up to the submitters
>> to request their own CVE's if they wish.
MITRE has issued two CVE's now:
CVE-2026-47783
--------------
In memcached before 1.6.42, username data for SASL password database
authentication has a timing side channel because a loop exits as soon
as a valid username is found by sasl_server_userdb_checkpass.
https://github.com/memcached/memcached/commit/d13f282b4bce33a9c33b8a1bbf07f12114160fed
CVE-2026-47784
--------------
In memcached before 1.6.42, password data for SASL password database
authentication has a timing side channel because memcmp is used by
sasl_server_userdb_checkpass.
https://github.com/memcached/memcached/commit/d13f282b4bce33a9c33b8a1bbf07f12114160fed
--
-Alan Coopersmith- alan.coopersmith@...cle.com
Oracle Solaris Engineering - https://blogs.oracle.com/solaris
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.