First published: Wed Jul 20 2022(Updated: )
In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Libtirpc Project Libtirpc | <1.3.3 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/libtirpc | <=1.1.4-0.4 | 1.1.4-0.4+deb10u1 1.3.1-1+deb11u1 1.3.3+ds-1 |
http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=86529758570cef4c73fb9b9c4104fdc510f701ed
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.