Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Nov 2017 21:30:40 +0100
From: Salvatore Bonaccorso <>
To: OSS Security Mailinglist <>
Subject: collectd: CVE-2017-16820: snmp-plugin: double free of request PDU


Collectd's snmp-plugin is prone to a double free vulneability. This
issue was made aware to the Debian security team, but turned out to be
public already in. MITRE has assigned CVE-2017-16820 for it. The snmp
plugin contains a double-free vulnerability in the
snmp_sess_synch_response() function. Commit message:

>  snmp plugin: Fix double free of request PDU
> snmp_sess_synch_response() always frees request PDU, in both case of request
> error and success. If error condition occurs inside of `while (status == 0)`
> loop, double free of `req` happens.

Upstream issue:

(might need the followup commits to clean up)


Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ