Search for packages
| purl | pkg:deb/debian/libtirpc@1.1.4-0.4 |
| Next non-vulnerable version | 1.3.1-1+deb11u1 |
| Latest non-vulnerable version | 1.3.1-1+deb11u1 |
| Risk | 3.4 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-4zzj-t3b7-qkbj
Aliases: CVE-2021-46828 |
In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-vhz3-5g4z-bkdw | A null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number of available file descriptors. A remote attacker could cause an rpc-based application to crash by flooding it with new connections. |
CVE-2018-14622
|
| Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
|---|---|---|---|---|---|
| 2025-08-01T18:57:02.972639+00:00 | Debian Oval Importer | Affected by | VCID-4zzj-t3b7-qkbj | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 37.0.0 |
| 2025-08-01T15:43:08.886842+00:00 | Debian Oval Importer | Fixing | VCID-vhz3-5g4z-bkdw | https://www.debian.org/security/oval/oval-definitions-bullseye.xml.bz2 | 37.0.0 |