954509fb84
CVE-2017-8779: rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb. For more details, see: https://guidovranken.wordpress.com/2017/05/03/rpcbomb-remote-rpcbind-denial-of-service-patches/ Backport upstream fix to version 0.2.3 and unconditionally include syslog.h to fix a build issue when RPCBIND_DEBUG is disabled (which it is in Buildroot). Signed-off-by: Peter Korsgaard <peter@korsgaard.com> Signed-off-by: Thomas Petazzoni <thomas.petazzoni@free-electrons.com> |
||
---|---|---|
.. | ||
0001-Remove-yellow-pages-support.patch | ||
0002-handle_reply-Don-t-use-the-xp_auth-pointer-directly.patch | ||
0003-src-remove-use-of-the-__P-macro.patch | ||
0004-rpcbind-pair-all-svc_getargs-calls-with-svc_freeargs.patch | ||
Config.in | ||
rpcbind.hash | ||
rpcbind.mk | ||
rpcbind.service | ||
rpcbind.socket | ||
S30rpcbind |