A buffer overflow in RPCBind might allow remote attackers to cause a Denial of Service.
|Package||net-nds/rpcbind on all architectures|
|Affected versions||< 0.2.3-r1|
|Unaffected versions||>= 0.2.3-r1|
The RPCBind utility is a server that converts RPC program numbers into universal addresses.
A use-after-free vulnerability was discovered in RPCBind’s svc_dodestroy function when trying to free a corrupted xprt->xp_netid pointer.
A remote attacker could possibly cause a Denial of Service condition.
There is no known workaround at this time.
All RPCBind users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-nds/rpcbind-0.2.3-r1"
November 22, 2016
November 22, 2016: 2