|
|
Subscribe / Log in / New account

Ubuntu alert USN-4986-2 (rpcbind)

From:  "Leonidas S. Barbosa" <leo.barbosa@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-4986-2] rpcbind vulnerability
Date:  Wed, 09 Jun 2021 16:02:19 -0300
Message-ID:  <20210609190219.GA3931601@d4rkl41n>

========================================================================== Ubuntu Security Notice USN-4986-2 June 09, 2021 rpcbind vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM - Ubuntu 14.04 ESM Summary: rpcbind could be made to consume resources and crash if it received specially crafted network traffic. Software Description: - rpcbind: converts RPC program numbers into universal addresses Details: USN-4986-1 fixed a vulnerability in rpcbind. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. Original advisory details: It was discovered that rpcbind incorrectly handled certain large data sizes. A remote attacker could use this issue to cause rpcbind to consume resources, leading to a denial of service. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: rpcbind 0.2.3-0.2ubuntu0.16.04.1+esm1 Ubuntu 14.04 ESM: rpcbind 0.2.1-2ubuntu2.2+esm1 After a standard system update you need to reboot your computer to make all the necessary changes. References: https://ubuntu.com/security/notices/USN-4986-2 https://ubuntu.com/security/notices/USN-4986-1 CVE-2017-8779 -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds