- Issued:
- 2013-10-23
- Updated:
- 2013-10-23
RHBA-2013:1453 - Bug Fix Advisory
Synopsis
rpcbind bug fix
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated rpcbind packages that fix one bug are now available for Red Hat
Enterprise Linux 6 Extended Update Support.
Description
The rpcbind utility maps RPC (Remote Procedure Call) services to the ports on
which the services listen and allows the host to make RPC calls to the RPC
server.
This update fixes the following bug:
- Previously, in the insecure mode, which enables non-root users to set or unset
ports, a privileged port was required. As only root users can obtain a
privileged port, non-root users could not set or unset ports. To fix this bug,
the privileged port has been removed, and thus non-root users are now allowed to
set or unset ports on the loopback interface. (BZ#858573)
All users of rpcbind are advised to upgrade to these updated packages, which fix
this bug.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3 ppc64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3 i386
- Red Hat Enterprise Linux EUS Compute Node 6.3 x86_64
Fixes
- BZ - 858573 - rpcbind without -i restricts set/unset to root user on localhost, so pmap_set fails for non-root users unless -i is used
CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.3
SRPM | |
---|---|
rpcbind-0.2.0-9.el6_3.src.rpm | SHA-256: 58bcd5c307bce5321d3040df9a679e20269b0e9a370153121071d1e6c4112ef0 |
x86_64 | |
rpcbind-0.2.0-9.el6_3.x86_64.rpm | SHA-256: 175e48399b695e62d0e7b05753656614eed10589f1171604249620b60e8a758d |
rpcbind-debuginfo-0.2.0-9.el6_3.x86_64.rpm | SHA-256: 052de81f2da1aa19f5cf59f8733cf4683a045b470e6f6c2c524b6680834e4694 |
i386 | |
rpcbind-0.2.0-9.el6_3.i686.rpm | SHA-256: f2def2050e7f322934635f50876334e48fda1d7bf59830ed77c0b93a20f64387 |
rpcbind-debuginfo-0.2.0-9.el6_3.i686.rpm | SHA-256: e36c9024717c79afb2ae7e1800adaa7262c57a685b0466e1e7ece618117fc38a |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.3
SRPM | |
---|---|
rpcbind-0.2.0-9.el6_3.src.rpm | SHA-256: 58bcd5c307bce5321d3040df9a679e20269b0e9a370153121071d1e6c4112ef0 |
s390x | |
rpcbind-0.2.0-9.el6_3.s390x.rpm | SHA-256: 1ad05dc469776baae221a093474d0fea10ef7fcb5b28b67541f67239a68010d0 |
rpcbind-debuginfo-0.2.0-9.el6_3.s390x.rpm | SHA-256: a4c8d5aea0d6b384458825d1357d44c1790b28db33a1578c428697eeb7c14b17 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.3
SRPM | |
---|---|
rpcbind-0.2.0-9.el6_3.src.rpm | SHA-256: 58bcd5c307bce5321d3040df9a679e20269b0e9a370153121071d1e6c4112ef0 |
ppc64 | |
rpcbind-0.2.0-9.el6_3.ppc64.rpm | SHA-256: ca48dd7dc848c4ca285b56af805d0b303a261dce7c935cc52818e312bded1ffd |
rpcbind-debuginfo-0.2.0-9.el6_3.ppc64.rpm | SHA-256: 77e2f768e3674d6a318c7850927eb8f81f7b178bc394117e494113b99619fe86 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.3
SRPM | |
---|---|
rpcbind-0.2.0-9.el6_3.src.rpm | SHA-256: 58bcd5c307bce5321d3040df9a679e20269b0e9a370153121071d1e6c4112ef0 |
x86_64 | |
rpcbind-0.2.0-9.el6_3.x86_64.rpm | SHA-256: 175e48399b695e62d0e7b05753656614eed10589f1171604249620b60e8a758d |
rpcbind-debuginfo-0.2.0-9.el6_3.x86_64.rpm | SHA-256: 052de81f2da1aa19f5cf59f8733cf4683a045b470e6f6c2c524b6680834e4694 |
i386 | |
rpcbind-0.2.0-9.el6_3.i686.rpm | SHA-256: f2def2050e7f322934635f50876334e48fda1d7bf59830ed77c0b93a20f64387 |
rpcbind-debuginfo-0.2.0-9.el6_3.i686.rpm | SHA-256: e36c9024717c79afb2ae7e1800adaa7262c57a685b0466e1e7ece618117fc38a |
Red Hat Enterprise Linux EUS Compute Node 6.3
SRPM | |
---|---|
rpcbind-0.2.0-9.el6_3.src.rpm | SHA-256: 58bcd5c307bce5321d3040df9a679e20269b0e9a370153121071d1e6c4112ef0 |
x86_64 | |
rpcbind-0.2.0-9.el6_3.x86_64.rpm | SHA-256: 175e48399b695e62d0e7b05753656614eed10589f1171604249620b60e8a758d |
rpcbind-debuginfo-0.2.0-9.el6_3.x86_64.rpm | SHA-256: 052de81f2da1aa19f5cf59f8733cf4683a045b470e6f6c2c524b6680834e4694 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.