Arch Linux Security Advisory ASA-201509-10
=========================================
Severity: High
Date    : 2015-09-25
CVE-ID  : CVE-2015-7236
Package : rpcbind
Type    : denial of service
Remote  : Yes
Link    : https://wiki.archlinux.org/title/CVE

Summary
======
The package rpcbind before version 0.2.3-2 is vulnerable to denial of
service.

Resolution
=========
Upgrade to 0.2.3-2.

# pacman -Syu "rpcbind>=0.2.3-2"

The problem has not been fixed upstream yet.

Workaround
=========
None.

Description
==========
A use-after-free vulnerability has been found in rpcbind, leading to
memory corruption then crash in the svc_dodestroy() function while
trying to free a corrupted xprt->xp_netid pointer.

Impact
=====
A remote unauthenticated attacker can crash the rpcbind process, causing
a denial of service of RPC-based services.

References
=========
https://access.redhat.com/security/cve/CVE-2015-7236
https://bugs.archlinux.org/task/46341
https://seclists.org/oss-sec/2015/q3/561

ArchLinux: 201509-10: rpcbind: denial of service

September 25, 2015

Summary

A use-after-free vulnerability has been found in rpcbind, leading to memory corruption then crash in the svc_dodestroy() function while trying to free a corrupted xprt->xp_netid pointer.

Resolution

Upgrade to 0.2.3-2. # pacman -Syu "rpcbind>=0.2.3-2"
The problem has not been fixed upstream yet.

References

https://access.redhat.com/security/cve/CVE-2015-7236 https://bugs.archlinux.org/task/46341 https://seclists.org/oss-sec/2015/q3/561

Severity
Package : rpcbind
Type : denial of service
Remote : Yes
Link : https://wiki.archlinux.org/title/CVE

Workaround

None.

Related News