USN-4986-1: rpcbind vulnerability
9 June 2021
rpcbind could be made to consume resources and crash if it received specially crafted network traffic.
Releases
Packages
- rpcbind - converts RPC program numbers into universal addresses
Details
It was discovered that rpcbind incorrectly handled certain large data
sizes. A remote attacker could use this issue to cause rpcbind to consume
resources, leading to a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-3759-1: libtirpc, libtirpc-dev, libtirpc1
- USN-3759-2: libtirpc, libtirpc-dev, libtirpc1
- USN-4986-2: rpcbind