Summary: | <net-libs/libtirpc-0.2.4-r1: "svc_dg_getargs()" Denial of Service Vulnerability (CVE-2013-1950) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | minor | CC: | base-system |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | https://secunia.com/advisories/53026/ | ||
Whiteboard: | B3 [noglsa cve] | ||
Package list: | Runtime testing required: | --- |
Description
Agostino Sarubbo
2013-04-23 13:49:51 UTC
Fix available at http://git.infradead.org/users/steved/libtirpc.git/commitdiff/a9f437119d79a438cb12e510f3cadd4060102c9f CVE-2013-1950 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1950): The svc_dg_getargs function in libtirpc 0.2.3 and earlier allows remote attackers to cause a denial of service (rpcbind crash) via a Sun RPC request with crafted arguments that trigger a free of an invalid pointer. 0.2.4-r1 is in the tree (In reply to SpanKY from comment #3) > 0.2.4-r1 is in the tree Good. Can we stable it? (In reply to Sergey Popov from comment #4) should be fine 0.2.5 is stable now for everyone Per previous comment 0.2.5 is stable. Please remove vulnerable 0.1.10 ebuild. GLSA Vote: No Cleaned up: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=0d635f65afc6c69f0a8ebacfc3caf873f4bb28c8 |