First published: Wed Jul 20 2022(Updated: )
In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/libtirpc | <=1.3.2-2<=1.1.4-0.4<=1.3.1-1 | 1.3.2-2.1 1.3.1-1+deb11u1 |
debian/libtirpc | <=1.1.4-0.4 | 1.1.4-0.4+deb10u1 1.3.1-1+deb11u1 1.3.3+ds-1 |
libtirpc | <1.3.3 | |
Debian GNU/Linux | =10.0 | |
Debian GNU/Linux | =11.0 |
http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=86529758570cef4c73fb9b9c4104fdc510f701ed
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-46828 is considered a high severity vulnerability due to its potential to exhaust file descriptors and cause denial of service.
To fix CVE-2021-46828, upgrade libtirpc to version 1.3.3rc1 or later.
Versions of libtirpc prior to 1.3.3 are affected by CVE-2021-46828.
An attacker can exploit CVE-2021-46828 to exhaust the file descriptors of a process using libtirpc, leading to a denial of service.
Debian systems using libtirpc versions up to 1.3.2 are impacted by CVE-2021-46828.