First published: Wed Aug 22 2018(Updated: )
A flaw was found in libtirpc. The return value of makefd_xprt was used without checking for NULL in svc_vc.c, leading to a null pointer dereference / segfault if the maximum number of available file descriptors was exhausted. References: <a href="https://bugzilla.novell.com/show_bug.cgi?id=968175">https://bugzilla.novell.com/show_bug.cgi?id=968175</a> Upstream Patch: <a href="http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1c77f7a869bdea2a34799d774460d1f9983d45f0">http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1c77f7a869bdea2a34799d774460d1f9983d45f0</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libtirpc | <0.3.3 | 0.3.3 |
debian/libtirpc | 1.3.1-1+deb11u1 1.3.3+ds-1 1.3.4+ds-1.3 | |
libtirpc | <0.3.3 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Debian GNU/Linux | =8.0 | |
Red Hat Enterprise Linux | =7.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server eus | =7.4 | |
redhat enterprise Linux server eus | =7.5 | |
redhat enterprise Linux server eus | =7.6 | |
redhat enterprise Linux workstation | =7.0 |
http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=1c77f7a869bdea2a34799d774460d1f9983d45f0
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14622 has a moderate severity level due to its potential to cause a null pointer dereference leading to application crashes.
To fix CVE-2018-14622, update the libtirpc package to version 0.3.4 or later for Red Hat systems and to 1.3.1-1+deb11u1 or later for Debian systems.
CVE-2018-14622 affects the libtirpc package across various versions of Red Hat, Debian, and Ubuntu operating systems.
CVE-2018-14622 is exploitable on systems where the maximum number of available file descriptors is exhausted, leading to a null pointer dereference.
The impact of CVE-2018-14622 includes potential application crashes due to segmentation faults resulting from null pointer dereferences.