It was discovered that libtirpc, a transport-independent RPC library, does not properly handle idle TCP connections. A remote attacker can take advantage of this flaw to cause a denial of service. For the stable distribution (bullseye), this problem has been fixed in version 1.3.1-1+deb11u1. We recommend that you upgrade your libtirpc packages. For the detailed security status of libtirpc please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libtirpc
It was discovered that libtirpc, a transport-independent RPC library, does not properly handle idle TCP connections. A remote attacker can take advantage of this flaw to cause a denial of service.
For the stable distribution (bullseye), this problem has been fixed in version 1.3.1-1+deb11u1.
We recommend that you upgrade your libtirpc packages.
For the detailed security status of libtirpc please refer to its security tracker page at: https://security-tracker.debian.org/tracker/libtirpc