First published: Thu Aug 30 2018(Updated: )
An infinite loop vulnerability was found in libtirpc before version 1.0.2-rc2. With the port to using poll rather than select, exhaustion of file descriptors would cause the server to enter an infinite loop, consuming a large amount of CPU time and denying service to other clients until restarted.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
libtirpc | <=1.0.1 | |
libtirpc | =1.0.2-rc1 |
http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=fce98161d9815ea016855d9f00274276452c2c4b
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-14621 has a moderate severity rating due to its potential to cause denial of service through an infinite loop.
To fix CVE-2018-14621, upgrade libtirpc to version 1.0.2-rc2 or later.
CVE-2018-14621 affects libtirpc versions prior to 1.0.2-rc2, including 1.0.1 and 1.0.2-rc1.
The consequences of CVE-2018-14621 include excessive CPU usage and denial of service to clients.
CVE-2018-14621 is not specified as remotely exploitable, but can affect accessibility to services on the server.