USN-3759-1: libtirpc vulnerabilities
5 September 2018
Several security issues were fixed in libtirpc.
Releases
Packages
- libtirpc - transport-independent RPC library - development files
Details
Aldy Hernandez discovered that libtirpc incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2016-4429)
It was discovered that libtirpc incorrectly handled certain inputs.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2018-14622)
It was discovered that libtirpc incorrectly handled certain strings.
An attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 LTS and Ubuntu 16.04 LTS.
(CVE-2017-8779)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
Ubuntu 16.04
Ubuntu 14.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-3239-1: libc-dev-bin, libc6-dev-ppc64, eglibc-source, libc6-pic, libc6-i386, libc6-ppc64, libc6-dev-x32, glibc-doc, libc6-armel, locales-all, nscd, libc6-s390, libc6-amd64, libc6-x32, libc6-dev-armel, libc6-prof, eglibc, locales, libc6-dev, libnss-files-udeb, libc6-udeb, multiarch-support, libc-bin, glibc, libnss-dns-udeb, libc6-dev-amd64, libc6-dev-i386, libc6, libc6-dev-s390, glibc-source
- USN-3759-2: libtirpc, libtirpc-dev, libtirpc1
- USN-4986-1: rpcbind
- USN-4986-2: rpcbind