ArchLinux: 201509-10: rpcbind: denial of service
Summary
A use-after-free vulnerability has been found in rpcbind, leading to memory corruption then crash in the svc_dodestroy() function while trying to free a corrupted xprt->xp_netid pointer.
Resolution
Upgrade to 0.2.3-2.
# pacman -Syu "rpcbind>=0.2.3-2"
The problem has not been fixed upstream yet.
References
https://access.redhat.com/security/cve/CVE-2015-7236 https://bugs.archlinux.org/task/46341 https://seclists.org/oss-sec/2015/q3/561
![Dist Arch](/images/distros/dist-arch.png)
Workaround
None.