oss-sec mailing list archives

Re: CVE Request: remote triggerable use-after-free in rpcbind


From: Marcus Meissner <meissner () suse de>
Date: Thu, 17 Sep 2015 21:00:47 +0200

On Thu, Sep 17, 2015 at 02:58:11PM -0400, Steve Dickson wrote:


On 09/17/2015 02:54 PM, Marcus Meissner wrote:
On Thu, Sep 17, 2015 at 02:51:26PM -0400, Steve Dickson wrote:


On 09/17/2015 12:20 PM, cve-assign () mitre org wrote:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

http://www.spinics.net/lists/linux-nfs/msg53045.html
https://bugzilla.suse.com/show_bug.cgi?id=946204

frees the netbuf caller_addr and caller_addr.buf. However, it does not
clear xp_rtaddr, so xp_rtaddr.buf now refers to memory region A, which
is free.

... It will reuse the buffer inside xp_rtaddr

Use CVE-2015-7236.
Will there be a bz opened up? 

Where should I open it? kernel.org?
IDK... Aren't CVE suppose to be keep under wrap until
they are fixed... I know there are some rules around CVEs...

Security issues can be either predisclosed in a smaller circle (the term
is "responsible disclosure"), or published directly.

As Olaf mailed the issue to the linux-nfs list a while ago, and SUSE evaluated
and found the security impact only afterwards, the issue is considered already
"public" and so gets no embargo.

If the impact would be more obvious before it might have get a predisclosure.

There are no strict rules though, just common understanding.

Ciao, Marcus


Current thread: