{"id":"MGASA-2017-0441","summary":"Updated memcached packages fix security vulnerability","details":"The try_read_command function in memcached.c in memcached before 1.4.39\nallows remote attackers to cause a denial of service (segmentation\nfault) via a request to add/set a key, which makes a comparison between\nsigned and unsigned int and triggers a heap-based buffer over-read\n(CVE-2017-9951).\n","modified":"2026-04-16T06:25:53.780324404Z","published":"2017-12-01T23:13:21Z","upstream":["CVE-2017-9951"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2017-0441.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=22068"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/EGQ5CRXRSHTKFUB5MCASDOTTZT7YR6IR/"}],"affected":[{"package":{"name":"memcached","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/memcached?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.39-1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0441.json"}},{"package":{"name":"memcached","ecosystem":"Mageia:6","purl":"pkg:rpm/mageia/memcached?arch=source&distro=mageia-6"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1.4.39-1.mga6"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2017-0441.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}