Bug 2109352 (CVE-2021-46828) - CVE-2021-46828 libtirpc: DoS vulnerability with lots of connections
Summary: CVE-2021-46828 libtirpc: DoS vulnerability with lots of connections
Keywords:
Status: CLOSED DUPLICATE of bug 2118157
Alias: CVE-2021-46828
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact: Zhi Li
URL:
Whiteboard:
Depends On: 1940341 2109364 2109403 2109404 2109405 2118157
Blocks: 2109353
TreeView+ depends on / blocked
 
Reported: 2022-07-21 03:36 UTC by Avinash Hanwate
Modified: 2022-11-15 11:07 UTC (History)
3 users (show)

Fixed In Version: libtirpc 1.3.3rc1
Doc Type: If docs needed, set a value
Doc Text:
A denial of service (DoS) vulnerability was found in libtirpc. This flaw allows a remote attacker to exhaust the file descriptors of a process that uses libtirpc due to mishandling idle TCP connections. This issue leads to a svc_run infinite loop without accepting new connections.
Clone Of:
Environment:
Last Closed: 2022-09-23 12:44:57 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2022:8400 0 None None None 2022-11-15 11:07:12 UTC

Description Avinash Hanwate 2022-07-21 03:36:31 UTC
In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.

http://git.linux-nfs.org/?p=steved/libtirpc.git;a=commit;h=86529758570cef4c73fb9b9c4104fdc510f701ed

Comment 1 Sandipan Roy 2022-07-21 04:35:45 UTC
Created libtirpc tracking bugs for this issue:

Affects: fedora-all [bug 2109364]

Comment 4 Zhi Li 2022-09-23 12:44:57 UTC
I will take it since I have processed the duplicated one bz2118157, close as duplicated.

*** This bug has been marked as a duplicate of bug 2118157 ***

Comment 5 errata-xmlrpc 2022-11-15 11:07:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:8400 https://access.redhat.com/errata/RHSA-2022:8400


Note You need to log in before you can comment on or make changes to this bug.