|
Message-ID: <20171115203040.ygcpeaxl4lsgrkmo@eldamar.local> Date: Wed, 15 Nov 2017 21:30:40 +0100 From: Salvatore Bonaccorso <carnil@...ian.org> To: OSS Security Mailinglist <oss-security@...ts.openwall.com> Subject: collectd: CVE-2017-16820: snmp-plugin: double free of request PDU Hi Collectd's snmp-plugin is prone to a double free vulneability. This issue was made aware to the Debian security team, but turned out to be public already in. MITRE has assigned CVE-2017-16820 for it. The snmp plugin contains a double-free vulnerability in the snmp_sess_synch_response() function. Commit message: > snmp plugin: Fix double free of request PDU > > snmp_sess_synch_response() always frees request PDU, in both case of request > error and success. If error condition occurs inside of `while (status == 0)` > loop, double free of `req` happens. Upstream issue: https://github.com/collectd/collectd/issues/2291 Fix: https://github.com/collectd/collectd/commit/d16c24542b2f96a194d43a73c2e5778822b9cb47 (might need the followup commits to clean up) Regards, Salvatore
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.