==========================================================================
Ubuntu Security Notice USN-4125-1
September 09, 2019
memcached vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
– Ubuntu 19.04
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
Summary:
Memcached could be made to expose sensitive information if it
received a specially crafted UNIX socket.
Software Description:
– memcached: high-performance memory object caching system
Details:
It was discovered that Memcached incorrectly handled certain UNIX sockets.
An attacker could possibly use this issue to access sensitive information.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 19.04:
memcached 1.5.10-0ubuntu1.19.04.2
Ubuntu 18.04 LTS:
memcached 1.5.6-0ubuntu1.2
Ubuntu 16.04 LTS:
memcached 1.4.25-2ubuntu1.5
In general, a standard system update will make all the necessary changes.
References:
https://usn.ubuntu.com/4125-1
CVE-2019-15026
Package Information:
https://launchpad.net/ubuntu/+source/memcached/1.5.10-0ubuntu1.19.04.2
https://launchpad.net/ubuntu/+source/memcached/1.5.6-0ubuntu1.2
https://launchpad.net/ubuntu/+source/memcached/1.4.25-2ubuntu1.5
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1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=e4wi
—–END PGP SIGNATURE—–
—