USN-4986-2: rpcbind vulnerability
9 June 2021
rpcbind could be made to consume resources and crash if it received specially crafted network traffic.
Releases
Packages
- rpcbind - converts RPC program numbers into universal addresses
Details
USN-4986-1 fixed a vulnerability in rpcbind. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
It was discovered that rpcbind incorrectly handled certain large data
sizes. A remote attacker could use this issue to cause rpcbind to consume
resources, leading to a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.04
-
rpcbind
-
0.2.3-0.2ubuntu0.16.04.1+esm1
Available with Ubuntu Pro
Ubuntu 14.04
-
rpcbind
-
0.2.1-2ubuntu2.2+esm1
Available with Ubuntu Pro
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-3759-1: libtirpc, libtirpc-dev, libtirpc1
- USN-3759-2: libtirpc, libtirpc-dev, libtirpc1
- USN-4986-1: rpcbind