There is no mechanism to verify the length of "extlen" when calling memcpy function, It will cause buffer overflow if large value is assigned to the extlen variable. This may result in DoS. Upstream Issue: https://github.com/memcached/memcached/issues/629
Created memcached tracking bugs for this issue: Affects: fedora-all [bug 1816632] Affects: openstack-rdo [bug 1816634]
Upstream fix: https://github.com/memcached/memcached/commit/02c6a2b62ddcb6fa4569a591d3461a156a636305
Vulnerability introduced in commit https://github.com/memcached/memcached/commit/8e59147cba140aa7d592b483806a2a8fadb562a2, released in upstream version 1.6.0.
Statement: This issue did not affect the versions of memcached as shipped with Red Hat Enterprise Linux 6, 7, and 8 as they did not include the vulnerable code.
*** Bug 1817472 has been marked as a duplicate of this bug. ***
External References: https://github.com/memcached/memcached/wiki/ReleaseNotes162
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2020-10931