Bug 40023 - rpcbind: Denial of Service (4.1)
rpcbind: Denial of Service (4.1)
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 4.1
Other Linux
: P3 normal (vote)
: UCS 4.1-0-errata
Assigned To: Philipp Hahn
Daniel Tröder
Depends on:
Blocks: 39548
  Show dependency treegraph
Reported: 2015-11-18 18:32 CET by Arvid Requate
Modified: 2016-10-05 12:46 CEST (History)
2 users (show)

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional): Security
Max CVSS v3 score:
requate: Patch_Available+


Note You need to log in before you can comment on or make changes to this bug.
Description Arvid Requate univentionstaff 2015-11-18 18:32:40 CET
+++ This bug was initially created as a clone of Bug #39548 +++

Upstream Debian package version 0.2.0-8+deb7u1 fixes this issue:

* A remotely triggerable use-after-free vulnerability was found in rpcbind, a server that converts RPC program numbers into universal addresses. A remote attacker can take advantage of this flaw to mount a denial of service (rpcbind crash) (CVE-2015-7236)

nfs-common depends on this process in UCS 4.0-x.
Comment 1 Philipp Hahn univentionstaff 2015-11-23 12:24:52 CET
repo_admin.py --cherrypick -r 4.0 -s errata4.0-4 --releasedest 4.1 --dest errata4.1-0 -p rpcbind

Package: rpcbind
Version: 0.2.0-8.8.201511231144
Branch: ucs_4.1-0
Scope: errata4.1-0

r65843 | Bug #40023. rpcbind YAML
Comment 2 Daniel Tröder univentionstaff 2015-12-03 11:24:57 CET
OK: DEBIAN_FRONTEND=noninteractive apt-get install --reinstall -y rpcbind
OK: advisory
OK: Tests:
 # rpcinfo
 # rpcinfo -b 100003 2
Comment 3 Janek Walkenhorst univentionstaff 2015-12-09 16:44:35 CET