First published: Wed Jan 05 2011(Updated: )
Emmanuel Bouillon reported a double-free flaw in scsi-target-utils that could cause the tgtd daemon to crash with memory corruption on receipt of certain network traffic, leading to a denial of service condition. Acknowledgements: Red Hat would like to thank Emmanuel Bouillon of NATO C3 Agency for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
scsi-target-utils |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-667261 is significant as it involves a double-free flaw that leads to a denial of service condition.
To fix REDHAT-BUG-667261, update the scsi-target-utils package to the latest version provided by Red Hat.
REDHAT-BUG-667261 affects systems running the scsi-target-utils package in Red Hat distributions.
A double-free flaw in REDHAT-BUG-667261 refers to a vulnerability where a piece of memory is freed more than once, potentially leading to memory corruption.
REDHAT-BUG-667261 can facilitate a denial of service attack due to the crashing of the tgtd daemon on specific network traffic.