Your submission was sent successfully! Close

USN-3759-1: libtirpc vulnerabilities

05 September 2018

Several security issues were fixed in libtirpc.

Releases

Packages

  • libtirpc - transport-independent RPC library - development files

Details

Aldy Hernandez discovered that libtirpc incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2016-4429)

It was discovered that libtirpc incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2018-14622)

It was discovered that libtirpc incorrectly handled certain strings.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2017-8779)

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 18.04
Ubuntu 16.04
Ubuntu 14.04

After a standard system update you need to reboot your computer to make
all the necessary changes.

Related notices

  • USN-3239-1: libc6-dev, glibc-doc, libc6-s390, glibc, libc6-x32, multiarch-support, locales, nscd, eglibc, libc6-dev-amd64, libnss-files-udeb, libc6-dev-armel, libc-dev-bin, libc6-prof, libc6-dev-x32, glibc-source, libc6-i386, libc6-pic, libc6-udeb, libc6-dev-i386, libc6-dev-s390, eglibc-source, libc6-ppc64, libc6-amd64, locales-all, libc6, libnss-dns-udeb, libc6-dev-ppc64, libc6-armel, libc-bin
  • USN-4986-2: rpcbind
  • USN-4986-1: rpcbind
  • USN-3759-2: libtirpc-dev, libtirpc, libtirpc1