CVE-2017-8779

Priority
Description
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through
1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data
size during memory allocation for XDR strings, which allows remote
attackers to cause a denial of service (memory consumption with no
subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
Assigned-to
mdeslaur
Notes
mdeslaurpatch used by Debian in 0.2.3-0.6 isn't the correct one and
the reproducer still works against rpcbind
Package
Upstream:released (0.2.5-1.2)
Ubuntu 18.04 LTS:not-affected (0.2.5-1.2)
Ubuntu 20.04 LTS:not-affected (0.2.5-1.2)
Ubuntu 21.10:not-affected (0.2.5-1.2)
Ubuntu 16.04 ESM:released (0.2.5-1ubuntu0.1)
Ubuntu 22.04 LTS:not-affected (0.2.5-1.2)
Ubuntu 14.04 ESM:released (0.2.2-5ubuntu2.1)
Patches:
Package
Upstream:released (1.4.4-1)
Ubuntu 18.04 LTS:not-affected (1.6.1-1)
Ubuntu 20.04 LTS:not-affected (1.6.1-1)
Ubuntu 21.10:not-affected (1.6.1-1)
Ubuntu 22.04 LTS:not-affected (1.6.1-1)
Ubuntu 14.04 ESM:DNE
Patches:
Package
Upstream:needs-triage
Ubuntu 18.04 LTS:released (0.2.3-0.6ubuntu0.18.04.2)
Ubuntu 20.04 LTS:not-affected (1.2.5-8)
Ubuntu 21.10:not-affected (1.2.5-9)
Ubuntu 16.04 ESM:released (0.2.3-0.2ubuntu0.16.04.1+esm1)
Ubuntu 22.04 LTS:not-affected (1.2.5-9)
Ubuntu 14.04 ESM:released (0.2.1-2ubuntu2.2+esm1)
Patches:
Upstream:https://git.linux-nfs.org/?p=steved/rpcbind.git;a=commit;h=7ea36eeece56b59f98e469934e4c20b4da043346
More Information

Updated: 2022-04-25 00:22:37 UTC (commit ecc1009cb19540b950de59270950018900f37f15)