Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 15 Nov 2017 21:30:40 +0100
From: Salvatore Bonaccorso <>
To: OSS Security Mailinglist <>
Subject: collectd: CVE-2017-16820: snmp-plugin: double free of request PDU


Collectd's snmp-plugin is prone to a double free vulneability. This
issue was made aware to the Debian security team, but turned out to be
public already in. MITRE has assigned CVE-2017-16820 for it. The snmp
plugin contains a double-free vulnerability in the
snmp_sess_synch_response() function. Commit message:

>  snmp plugin: Fix double free of request PDU
> snmp_sess_synch_response() always frees request PDU, in both case of request
> error and success. If error condition occurs inside of `while (status == 0)`
> loop, double free of `req` happens.

Upstream issue:

(might need the followup commits to clean up)


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.