First published: Wed Dec 17 2014(Updated: )
It was reported [1] that getnetbyname function in glibc 2.21 in earlier will enter an infinite loop if the DNS backend is activated in the system Name Service Switch configuration, and the DNS resolver receives a positive answer while processing the network name. Upstream commit that fixes this issue: <a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=11e3417af6e354f1942c68a271ae51e892b2814d">https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=11e3417af6e354f1942c68a271ae51e892b2814d</a> [1]: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=17630">https://sourceware.org/bugzilla/show_bug.cgi?id=17630</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | <2.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1175369 is critical due to the potential for an infinite loop in the getnetbyname function affecting system responsiveness.
To fix REDHAT-BUG-1175369, upgrade your GNU glibc version to a later version than 2.21 where the issue has been resolved.
REDHAT-BUG-1175369 affects GNU glibc versions earlier than 2.21.
The issue in REDHAT-BUG-1175369 is caused by the getnetbyname function entering an infinite loop when the DNS backend is activated and a positive DNS response is received.
A potential workaround for REDHAT-BUG-1175369 is to disable the DNS backend in the Name Service Switch configuration.