First published: Tue Jan 18 2022(Updated: )
The deprecated compatibility function clnt_create in the sunrpc module of the GNU C Library (aka glibc) through 2.34 copies its hostname argument on the stack without validating its length, which may result in a buffer overflow, potentially resulting in a denial of service or (if an application is not built with a stack protector enabled) arbitrary code execution. Reference: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=22542">https://sourceware.org/bugzilla/show_bug.cgi?id=22542</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library | <=2.34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2042017 is classified as high due to the potential for buffer overflow leading to denial of service.
To fix REDHAT-BUG-2042017, you should upgrade the GNU C Library to version 2.35 or later.
REDHAT-BUG-2042017 affects the GNU C Library up to and including version 2.34.
REDHAT-BUG-2042017 is associated with a buffer overflow vulnerability in the sunrpc module.
The consequences of REDHAT-BUG-2042017 may include denial of service and possible application crash.