Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171115203040.ygcpeaxl4lsgrkmo@eldamar.local>
Date: Wed, 15 Nov 2017 21:30:40 +0100
From: Salvatore Bonaccorso <carnil@...ian.org>
To: OSS Security Mailinglist <oss-security@...ts.openwall.com>
Subject: collectd: CVE-2017-16820: snmp-plugin: double free of request PDU

Hi

Collectd's snmp-plugin is prone to a double free vulneability. This
issue was made aware to the Debian security team, but turned out to be
public already in. MITRE has assigned CVE-2017-16820 for it. The snmp
plugin contains a double-free vulnerability in the
snmp_sess_synch_response() function. Commit message:

>  snmp plugin: Fix double free of request PDU
>
> snmp_sess_synch_response() always frees request PDU, in both case of request
> error and success. If error condition occurs inside of `while (status == 0)`
> loop, double free of `req` happens.

Upstream issue:
https://github.com/collectd/collectd/issues/2291

Fix:
https://github.com/collectd/collectd/commit/d16c24542b2f96a194d43a73c2e5778822b9cb47
(might need the followup commits to clean up)

Regards,
Salvatore

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.