Date: Thu, 17 Sep 2015 14:23:33 +0200 From: Marcus Meissner <meissner@...e.de> To: OSS Security List <oss-security@...ts.openwall.com> Cc: steved@...hat.com Subject: CVE Request: remote triggerable use-after-free in rpcbind Hi, One of our customers saw rpcbind crashing on a remote security scan. Olaf Kirch identified and fixed the problem: http://www.spinics.net/lists/linux-nfs/msg53045.html https://bugzilla.suse.com/show_bug.cgi?id=946204 It so far has not been integrated into rpcbind upstream. This is a use-after-free, so at least remote denial of service. We have not researched further exploitability. Ciao, Marcus
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.