Ubuntu 4986-2: rpcbind vulnerability

Advisories

==========================================================================
Ubuntu Security Notice USN-4986-2
June 09, 2021

rpcbind vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM

Summary:

rpcbind could be made to consume resources and crash if it received
specially crafted network traffic.

Software Description:
- rpcbind: converts RPC program numbers into universal addresses

Details:

USN-4986-1 fixed a vulnerability in rpcbind. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.

Original advisory details:

 It was discovered that rpcbind incorrectly handled certain large data
 sizes. A remote attacker could use this issue to cause rpcbind to consume
 resources, leading to a denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 ESM:
  rpcbind                         0.2.3-0.2ubuntu0.16.04.1+esm1

Ubuntu 14.04 ESM:
  rpcbind                         0.2.1-2ubuntu2.2+esm1

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-4986-2
  https://ubuntu.com/security/notices/USN-4986-1
  CVE-2017-8779

Ubuntu 4986-2: rpcbind vulnerability

June 9, 2021

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: rpcbind could be made to consume resources and crash if it received specially crafted network traffic. Software Description: - rpcbind: converts RPC program numbers into universal addresses Details: USN-4986-1 fixed a vulnerability in rpcbind. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Original advisory details: It was discovered that rpcbind incorrectly handled certain large data sizes. A remote attacker could use this issue to cause rpcbind to consume resources, leading to a denial of service.

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: rpcbind 0.2.3-0.2ubuntu0.16.04.1+esm1 Ubuntu 14.04 ESM: rpcbind 0.2.1-2ubuntu2.2+esm1 After a standard system update you need to reboot your computer to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-4986-2

https://ubuntu.com/security/notices/USN-4986-1

CVE-2017-8779

Severity
Ubuntu Security Notice USN-4986-2

Package Information

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.