7.5
CWE
252 476
Advisory Published
CVE Published
Updated

CVE-2018-14622: Null Pointer Dereference

First published: Wed Aug 22 2018(Updated: )

A flaw was found in libtirpc. The return value of makefd_xprt was used without checking for NULL in svc_vc.c, leading to a null pointer dereference / segfault if the maximum number of available file descriptors was exhausted. References: <a href="https://bugzilla.novell.com/show_bug.cgi?id=968175">https://bugzilla.novell.com/show_bug.cgi?id=968175</a> Upstream Patch: <a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1c77f7a869bdea2a34799d774460d1f9983d45f0">http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1c77f7a869bdea2a34799d774460d1f9983d45f0</a>

Credit: secalert@redhat.com

Affected SoftwareAffected VersionHow to fix
redhat/libtirpc<0.3.3
0.3.3
debian/libtirpc
1.3.1-1+deb11u1
1.3.3+ds-1
1.3.4+ds-1.3
libtirpc<0.3.3
Ubuntu Linux=14.04
Ubuntu Linux=16.04
Ubuntu Linux=18.04
Debian GNU/Linux=8.0
Red Hat Enterprise Linux=7.0
redhat enterprise Linux desktop=7.0
redhat enterprise Linux server aus=7.4
redhat enterprise Linux server eus=7.4
redhat enterprise Linux server eus=7.5
redhat enterprise Linux server eus=7.6
redhat enterprise Linux workstation=7.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2018-14622?

    CVE-2018-14622 has a moderate severity level due to its potential to cause a null pointer dereference leading to application crashes.

  • How do I fix CVE-2018-14622?

    To fix CVE-2018-14622, update the libtirpc package to version 0.3.4 or later for Red Hat systems and to 1.3.1-1+deb11u1 or later for Debian systems.

  • Which software is affected by CVE-2018-14622?

    CVE-2018-14622 affects the libtirpc package across various versions of Red Hat, Debian, and Ubuntu operating systems.

  • Is CVE-2018-14622 exploitable on all systems?

    CVE-2018-14622 is exploitable on systems where the maximum number of available file descriptors is exhausted, leading to a null pointer dereference.

  • What is the impact of CVE-2018-14622?

    The impact of CVE-2018-14622 includes potential application crashes due to segmentation faults resulting from null pointer dereferences.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203