First published: Tue Nov 18 2014(Updated: )
IssueDescription: The "files" backend for the Name Service Switch (NSS) in glibc does not properly isolate iteration over the entire database from key-based lookups. As a result, an application which performs lookups on a database while iterating over it could enter an infinite loop, leading to a denial of service. Acknowledgements: This issue was discovered by Robin Hack of Red Hat.
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1165192 is considered critical due to the potential for infinite loops in applications.
To fix REDHAT-BUG-1165192, users should update to the latest patched version of GNU glibc.
Applications that utilize the 'files' backend for Name Service Switch (NSS) in GNU glibc may be affected by REDHAT-BUG-1165192.
Yes, REDHAT-BUG-1165192 can lead to a Denial of Service due to applications potentially entering infinite loops.
REDHAT-BUG-1165192 was reported in 2023.