CVE-2020-12658

gssproxy (aka gss-proxy) before 0.8.3 does not unlock cond_mutex before pthread exit in gp_worker_main() in gp_workers.c. NOTE: An upstream comment states "We are already on a shutdown path when running the code in question, so a DoS there doesn't make any sense, and there has been no additional information provided us (as upstream) to indicate why this would be a problem.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gssproxy_project:gssproxy:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:00

Type Values Removed Values Added
References () https://github.com/gssapi/gssproxy/commit/cb761412e299ef907f22cd7c4146d50c8a792003 - Patch, Third Party Advisory () https://github.com/gssapi/gssproxy/commit/cb761412e299ef907f22cd7c4146d50c8a792003 - Patch, Third Party Advisory
References () https://github.com/gssapi/gssproxy/compare/v0.8.2...v0.8.3 - Third Party Advisory () https://github.com/gssapi/gssproxy/compare/v0.8.2...v0.8.3 - Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2021/01/msg00004.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2021/01/msg00004.html - Mailing List, Third Party Advisory
References () https://pagure.io/gssproxy/c/cb761412e299ef907f22cd7c4146d50c8a792003?branch=master - Third Party Advisory () https://pagure.io/gssproxy/c/cb761412e299ef907f22cd7c4146d50c8a792003?branch=master - Third Party Advisory

07 Nov 2023, 03:15

Type Values Removed Values Added
Summary ** DISPUTED ** gssproxy (aka gss-proxy) before 0.8.3 does not unlock cond_mutex before pthread exit in gp_worker_main() in gp_workers.c. NOTE: An upstream comment states "We are already on a shutdown path when running the code in question, so a DoS there doesn't make any sense, and there has been no additional information provided us (as upstream) to indicate why this would be a problem." gssproxy (aka gss-proxy) before 0.8.3 does not unlock cond_mutex before pthread exit in gp_worker_main() in gp_workers.c. NOTE: An upstream comment states "We are already on a shutdown path when running the code in question, so a DoS there doesn't make any sense, and there has been no additional information provided us (as upstream) to indicate why this would be a problem.

Information

Published : 2020-12-31 01:15

Updated : 2024-11-21 05:00


NVD link : CVE-2020-12658

Mitre link : CVE-2020-12658

CVE.ORG link : CVE-2020-12658


JSON object : View

Products Affected

debian

  • debian_linux

gssproxy_project

  • gssproxy
CWE
CWE-667

Improper Locking