In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.
{ "binaries": [ { "binary_version": "1.3.1-1", "binary_name": "libntirpc1.3" } ] }
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2021/UBUNTU-CVE-2021-46828.json"
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.2.5-1ubuntu0.1", "binary_name": "libtirpc-common" }, { "binary_version": "1.2.5-1ubuntu0.1", "binary_name": "libtirpc3" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "1.3.2-2ubuntu0.1", "binary_name": "libtirpc-common" }, { "binary_version": "1.3.2-2ubuntu0.1", "binary_name": "libtirpc3" } ] }