Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 17 Sep 2015 14:23:33 +0200
From: Marcus Meissner <meissner@...e.de>
To: OSS Security List <oss-security@...ts.openwall.com>
Cc: steved@...hat.com
Subject: CVE Request: remote triggerable use-after-free in rpcbind

Hi,

One of our customers saw rpcbind crashing on a remote security scan.
Olaf Kirch identified and fixed the problem:

http://www.spinics.net/lists/linux-nfs/msg53045.html
https://bugzilla.suse.com/show_bug.cgi?id=946204

It so far has not been integrated into rpcbind upstream.

This is a use-after-free, so at least remote denial of service.
We have not researched further exploitability.

Ciao, Marcus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.