First published: Wed Jan 28 2015(Updated: )
An Invalid-free() flaw was found in the getaddrinfo() syscall of glibc. The bug only materializes if the getaddrinfo functions is called with the AI_IDN flag, and if glibc has been compiled with libidn support. This flaw was fixed in glibc-2.15 via the following commit: <a href="https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=2e96f1c7">https://sourceware.org/git/gitweb.cgi?p=glibc.git;a=commitdiff;h=2e96f1c7</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) | >2.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1186614 is rated as high due to the potential for denial of service.
To fix REDHAT-BUG-1186614, update glibc to version 2.15 or later where the flaw is resolved.
Glibc versions prior to 2.15 are affected by REDHAT-BUG-1186614.
REDHAT-BUG-1186614 can be exploited when the getaddrinfo() function is called with the AI_IDN flag.
Yes, REDHAT-BUG-1186614 is specifically related to the GNU C Library (glibc) when compiled with libidn support.