Bugzilla – Bug 1167522
VUL-0: CVE-2020-10931: memcached: buffer overflow vulnerability may cause DoS in memcached.c:6156-6187
Last modified: 2020-03-25 12:43:27 UTC
Recently, I revealed a buffer overflow vulnerability which may cause DOS attack. The exploit details can be found as following. Affect Version memcached-1.6.0 memcached-1.6.1 Root cause file location: memcached.c:6156-6187 image Code Audit 6178 char extbuf[sizeof(c->binary_header) + BIN_MAX_EXTLEN]; 6179 memcpy(extbuf + sizeof(c->binary_header), c->rcurr + sizeof(c->binary_header), **extlen**); in line 6179, since there is no mechanism to verify the parameter's length, in this case, the length of "extlen" when calling memcpy function, It will cause buffer overflow if large value assigned to the extlen variable. https://github.com/memcached/memcached/issues/629
patch: https://github.com/memcached/memcached/commit/02c6a2b62ddcb6fa4569a591d3461a156a636305
We do not have 1.6.x anywhere. I have looked on 1.5.17 what we have in Tumbleweed and memcpy in question is not there.
(In reply to Petr Gajdos from comment #3) > We do not have 1.6.x anywhere. I have looked on 1.5.17 what we have in > Tumbleweed and memcpy in question is not there. Thank you, re-assigning to darix so he can decide what to do for openSUSE.
There is nothing urgent to do for openSUSE aside an version update which I am currently working on.
(Nevertheless TW/memcached nor any other version is affected by this CVE, as I wrote.)
We are not affected by CVE-2020-10931. darix is working on version update for Tumbleweed yet, but this is unrelated to this bug.