[arch-security] [ASA-201509-10] rpcbind: denial of service
Arch Linux Security Advisory ASA-201509-10 ========================================== Severity: High Date : 2015-09-25 CVE-ID : CVE-2015-7236 Package : rpcbind Type : denial of service Remote : Yes Link : https://wiki.archlinux.org/index.php/CVE Summary ======= The package rpcbind before version 0.2.3-2 is vulnerable to denial of service. Resolution ========== Upgrade to 0.2.3-2. # pacman -Syu "rpcbind>=0.2.3-2" The problem has not been fixed upstream yet. Workaround ========== None. Description =========== A use-after-free vulnerability has been found in rpcbind, leading to memory corruption then crash in the svc_dodestroy() function while trying to free a corrupted xprt->xp_netid pointer. Impact ====== A remote unauthenticated attacker can crash the rpcbind process, causing a denial of service of RPC-based services. References ========== https://access.redhat.com/security/cve/CVE-2015-7236 https://bugs.archlinux.org/task/46341 http://seclists.org/oss-sec/2015/q3/561
participants (1)
-
Remi Gacogne