Bug 1216699 (CVE-2023-46852) - VUL-0: CVE-2023-46852: memcached: buffer overflow when processing multiget requests in proxy mode
Summary: VUL-0: CVE-2023-46852: memcached: buffer overflow when processing multiget re...
Status: RESOLVED FIXED
Alias: CVE-2023-46852
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Major
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/383351/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-46852:7.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-10-30 09:51 UTC by SMASH SMASH
Modified: 2024-05-03 17:56 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2023-10-30 09:51:50 UTC
In Memcached before 1.6.22, a buffer overflow exists when processing multiget
requests in proxy mode, if there are many spaces after the "get" substring.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-46852
https://github.com/memcached/memcached/commit/76a6c363c18cfe7b6a1524ae64202ac9db330767
Comment 1 Thomas Leroy 2023-10-30 09:54:31 UTC
proxy component has been introduced in v1.6.13, so only SUSE:ALP:Source:Standard:1.0 is affected.
Comment 2 Petr Gajdos 2023-11-13 12:03:17 UTC
Thanks Thomas.

I have submitted 1.6.22 into devel project:
https://build.opensuse.org/request/show/1125479
Comment 4 Petr Gajdos 2023-11-30 10:30:53 UTC
1.6.22 is now in TW,ALP/memcached.
I believe all fixed.
Comment 5 OBSbugzilla Bot 2024-01-29 19:35:04 UTC
This is an autogenerated message for OBS integration:
This bug (1216699) was mentioned in
https://build.opensuse.org/request/show/1142602 Factory / memcached