rpcbind-0.2.0-11.AXS4
エラータID: AXSA:2016-006:01
Release date:
Friday, January 8, 2016 - 00:47
Subject:
rpcbind-0.2.0-11.AXS4
Affected Channels:
Asianux Server 4 for x86_64
Asianux Server 4 for x86
Severity:
Moderate
Description:
The rpcbind utility is a server that converts RPC program numbers into
universal addresses. It must be running on the host to be able to make
RPC calls on a server on that machine.
Security issues fixed with this release:
CVE-2015-7236
Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in
rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of
service (daemon crash) via crafted packets, involving a PMAP_CALLIT
code.
Solution:
Update packages.
CVEs:
CVE-2015-7236
Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.
Use-after-free vulnerability in xprt_set_caller in rpcb_svc_com.c in rpcbind 0.2.1 and earlier allows remote attackers to cause a denial of service (daemon crash) via crafted packets, involving a PMAP_CALLIT code.
Additional Info:
N/A
Download:
SRPMS
- rpcbind-0.2.0-11.AXS4.src.rpm
MD5: 443983a867ad044ca28e85595a2c94d8
SHA-256: 27020b6a835ff8e76b746fd2f80c09634e781129585fdd9520caf5374e21f7c8
Size: 282.28 kB
Asianux Server 4 for x86
- rpcbind-0.2.0-11.AXS4.i686.rpm
MD5: a871ca558b39e9ef6e83b5293053eacb
SHA-256: 893e5a702405d2ee8147b8db201d0a9f19b3e3c02fe0923321e4528b7201dff3
Size: 50.47 kB
Asianux Server 4 for x86_64
- rpcbind-0.2.0-11.AXS4.x86_64.rpm
MD5: 72853d46935f0805bc9ef480e0181563
SHA-256: 52f153c798d003a5c97539137e3eb31acf468d16eb09e7688300b2883a3ac2c1
Size: 50.34 kB