rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a denial of service (memory consumption with no subsequent free) via a crafted UDP packet to port 111, aka rpcbomb.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libtirpc-dev", "binary_version": "0.2.2-5ubuntu2.1" }, { "binary_name": "libtirpc1", "binary_version": "0.2.2-5ubuntu2.1" }, { "binary_name": "libtirpc1-dbgsym", "binary_version": "0.2.2-5ubuntu2.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libtirpc-dev", "binary_version": "0.2.5-1ubuntu0.1" }, { "binary_name": "libtirpc1", "binary_version": "0.2.5-1ubuntu0.1" }, { "binary_name": "libtirpc1-dbgsym", "binary_version": "0.2.5-1ubuntu0.1" } ] }