USN-3759-1: libtirpc vulnerabilities

05 September 2018

Several security issues were fixed in libtirpc.

Releases

Packages

  • libtirpc - transport-independent RPC library - development files

Details

Aldy Hernandez discovered that libtirpc incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2016-4429)

It was discovered that libtirpc incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2018-14622)

It was discovered that libtirpc incorrectly handled certain strings.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2017-8779)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04
Ubuntu 16.04
Ubuntu 14.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-3239-1: nscd, libc6-prof, libc6-dev-i386, libc6-dev-ppc64, libc6-i386, eglibc, libc6-pic, libc6-dev-s390, locales-all, libc6-ppc64, libc6-x32, multiarch-support, libc-bin, libc6-dev-x32, libnss-dns-udeb, locales, libc6-udeb, glibc-source, libc6-amd64, libc-dev-bin, libnss-files-udeb, libc6-armel, eglibc-source, libc6-dev, libc6-dev-armel, glibc, libc6-dev-amd64, libc6, libc6-s390, glibc-doc
  • USN-4986-2: rpcbind
  • USN-4986-1: rpcbind
  • USN-3759-2: libtirpc1, libtirpc-dev, libtirpc