Search CVE reports
1 – 6 of 6 results
CVE-2021-46828
Medium prioritySome fixes available 3 of 6
In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting...
2 affected packages
libtirpc, ntirpc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libtirpc | Not affected | Fixed | Fixed | Not affected | Not affected |
ntirpc | Not affected | Not affected | Not affected | Not affected | Vulnerable |
CVE-2018-14621
Medium priorityAn infinite loop vulnerability was found in libtirpc before version 1.0.2-rc2. With the port to using poll rather than select, exhaustion of file descriptors would cause the server to enter an infinite loop, consuming a large...
1 affected packages
libtirpc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libtirpc | — | — | — | Not affected | Not affected |
CVE-2018-14622
Medium priorityA null-pointer dereference vulnerability was found in libtirpc before version 0.3.3-rc3. The return value of makefd_xprt() was not checked in all instances, which could lead to a crash when the server exhausted the maximum number...
1 affected packages
libtirpc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libtirpc | — | — | — | Fixed | Fixed |
CVE-2017-8779
Medium prioritySome fixes available 5 of 17
rpcbind through 0.2.4, LIBTIRPC through 1.0.1 and 1.0.2-rc through 1.0.2-rc3, and NTIRPC through 1.4.3 do not consider the maximum RPC data size during memory allocation for XDR strings, which allows remote attackers to cause a...
3 affected packages
libtirpc, ntirpc, rpcbind
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libtirpc | Not affected | Not affected | Not affected | Not affected | Fixed |
ntirpc | Not affected | Not affected | Not affected | Not affected | Vulnerable |
rpcbind | Not affected | Not affected | Not affected | Fixed | Fixed |
CVE-2016-4429
Low prioritySome fixes available 5 of 13
Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of...
4 affected packages
eglibc, glibc, libtirpc, ntirpc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
eglibc | — | Not in release | Not in release | Not in release | Not in release |
glibc | — | Not affected | Not affected | Not affected | Fixed |
libtirpc | — | Not affected | Not affected | Not affected | Fixed |
ntirpc | — | Not affected | Not affected | Not affected | Not affected |
CVE-2013-1950
Medium priorityThe svc_dg_getargs function in libtirpc 0.2.3 and earlier allows remote attackers to cause a denial of service (rpcbind crash) via a Sun RPC request with crafted arguments that trigger a free of an invalid pointer.
2 affected packages
libtirpc, ntirpc
Package | 24.04 LTS | 22.04 LTS | 20.04 LTS | 18.04 LTS | 16.04 LTS |
---|---|---|---|---|---|
libtirpc | — | Not affected | Not affected | Not affected | Not affected |
ntirpc | — | Not affected | Not affected | Not affected | Not affected |