CVE-2023-27478

Summary

CVECVE-2023-27478
StatePUBLIC
Assigner[email protected]
Source PriorityCVE Program / NVD first with legacy fallback
Published2023-03-07 18:15:00 UTC
Updated2023-03-23 16:59:00 UTC
Descriptionlibmemcached-awesome is an open source C/C++ client library and tools for the memcached server. `libmemcached` could return data for a previously requested key, if that previous request timed out due to a low `POLL_TIMEOUT`. This issue has been addressed in version 1.1.4. Users are advised to upgrade. There are several ways to workaround or lower the probability of this bug affecting a given deployment. 1: use a reasonably high `POLL_TIMEOUT` setting, like the default. 2: use separate libmemcached connections for unrelated data. 3: do not re-use libmemcached connections in an unknown state.

Risk And Classification

Problem Types: CWE-200

NVD Known Affected Configurations (CPE 2.3)

TypeVendorProductVersionUpdateEditionLanguage
Application Awesome Libmemcached All All All All
Application Libmemcached-awesome Project Libmemcached-awesome All All All All

References

ReferenceSourceLinkTags
Disclosure of unrelated data · Advisory · awesomized/libmemcached · GitHub MISC github.com
Release v 1.1.4 · awesomized/libmemcached · GitHub MISC github.com
revert most of d7a0084bf99d618d1dc26a54fd413db7ae8b8e63 · awesomized/libmemcached@48dcc61 · GitHub MISC github.com
get returns random values when lower than default OPT_POLL_TIMEOUT is set · Issue #531 · php-memcached-dev/php-memcached · GitHub MISC github.com
CVE Program record CVE.ORG www.cve.org canonical
NVD vulnerability detail NVD nvd.nist.gov canonical, analysis

Legacy QID Mappings

  • 184704 Debian Security Update for libmemcached (CVE-2023-27478)
  • 283783 Fedora Security Update for libmemcached (FEDORA-2023-7da1639d3f)
  • 283784 Fedora Security Update for libmemcached (FEDORA-2023-c9bbaadcbf)
  • 284259 Fedora Security Update for libmemcached (FEDORA-2023-fd848970c4)
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report