An update for libtirpc is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS Security Advisory openeuler-security@openeuler.org openEuler security committee openEuler-SA-2022-1795 Final 1.0 1.0 2022-07-30 Initial 2022-07-30 2022-07-30 openEuler SA Tool V1.0 2022-07-30 libtirpc security update An update for libtirpc is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. Libtirpc is a Transport-Independent RPC library for Linux Security Fix(es): In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections.(CVE-2021-46828) An update for libtirpc is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS. openEuler Security has rated this update as having a security impact of high. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section. High libtirpc https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1795 https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2021-46828 https://nvd.nist.gov/vuln/detail/CVE-2021-46828 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS libtirpc-devel-1.2.6-2.oe1.aarch64.rpm libtirpc-debuginfo-1.2.6-2.oe1.aarch64.rpm libtirpc-1.2.6-2.oe1.aarch64.rpm libtirpc-debugsource-1.2.6-2.oe1.aarch64.rpm libtirpc-1.2.6-2.oe1.aarch64.rpm libtirpc-devel-1.2.6-2.oe1.aarch64.rpm libtirpc-debuginfo-1.2.6-2.oe1.aarch64.rpm libtirpc-debugsource-1.2.6-2.oe1.aarch64.rpm libtirpc-debugsource-1.3.2-2.oe2203.aarch64.rpm libtirpc-1.3.2-2.oe2203.aarch64.rpm libtirpc-debuginfo-1.3.2-2.oe2203.aarch64.rpm libtirpc-devel-1.3.2-2.oe2203.aarch64.rpm libtirpc-help-1.2.6-2.oe1.noarch.rpm libtirpc-help-1.2.6-2.oe1.noarch.rpm libtirpc-help-1.3.2-2.oe2203.noarch.rpm libtirpc-1.2.6-2.oe1.src.rpm libtirpc-1.2.6-2.oe1.src.rpm libtirpc-1.3.2-2.oe2203.src.rpm libtirpc-debugsource-1.2.6-2.oe1.x86_64.rpm libtirpc-debuginfo-1.2.6-2.oe1.x86_64.rpm libtirpc-1.2.6-2.oe1.x86_64.rpm libtirpc-devel-1.2.6-2.oe1.x86_64.rpm libtirpc-debuginfo-1.2.6-2.oe1.x86_64.rpm libtirpc-1.2.6-2.oe1.x86_64.rpm libtirpc-debugsource-1.2.6-2.oe1.x86_64.rpm libtirpc-devel-1.2.6-2.oe1.x86_64.rpm libtirpc-devel-1.3.2-2.oe2203.x86_64.rpm libtirpc-debugsource-1.3.2-2.oe2203.x86_64.rpm libtirpc-1.3.2-2.oe2203.x86_64.rpm libtirpc-debuginfo-1.3.2-2.oe2203.x86_64.rpm In libtirpc before 1.3.3rc1, remote attackers could exhaust the file descriptors of a process that uses libtirpc because idle TCP connections are mishandled. This can, in turn, lead to an svc_run infinite loop without accepting new connections. 2022-07-30 CVE-2021-46828 openEuler-20.03-LTS-SP1 openEuler-20.03-LTS-SP3 openEuler-22.03-LTS High 7.5 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H libtirpc security update 2022-07-30 https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1795