9.8
CVSSv3

CVE-2020-12658

Published: 31/12/2020 Updated: 17/05/2024
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

gssproxy (aka gss-proxy) prior to 0.8.3 does not unlock cond_mutex before pthread exit in gp_worker_main() in gp_workers.c. NOTE: An upstream comment states "We are already on a shutdown path when running the code in question, so a DoS there doesn't make any sense, and there has been no additional information provided us (as upstream) to indicate why this would be a problem.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

gssproxy project gssproxy

debian debian linux 9.0

Vendor Advisories

Debian Bug report logs - #978931 gssproxy: CVE-2020-12658 Package: src:gssproxy; Maintainer for src:gssproxy is Robbie Harwood (frozencemetery) <rharwood@clubcccmuedu>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Thu, 31 Dec 2020 15:51:01 UTC Severity: minor Tags: upstream Found in version gssprox ...