Source: memcached
Version: 1.6.41-1
Severity: grave
Tags: security upstream
Justification: user security hole
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerabilities were published for memcached.

CVE-2026-47783[0]:
| In memcached before 1.6.42, username data for SASL password database
| authentication has a timing side channel because a loop exits as
| soon as a valid username is found by sasl_server_userdb_checkpass.


CVE-2026-47784[1]:
| In memcached before 1.6.42, password data for SASL password database
| authentication has a timing side channel because memcmp is used by
| sasl_server_userdb_checkpass.


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2026-47783
    https://www.cve.org/CVERecord?id=CVE-2026-47783
    
https://github.com/memcached/memcached/commit/d13f282b4bce33a9c33b8a1bbf07f12114160fed
[1] https://security-tracker.debian.org/tracker/CVE-2026-47784
    https://www.cve.org/CVERecord?id=CVE-2026-47784
    
https://github.com/memcached/memcached/commit/d13f282b4bce33a9c33b8a1bbf07f12114160fed

Please adjust the affected versions in the BTS as needed.

Regards,
Salvatore

Reply via email to