First published: Wed Sep 06 2023(Updated: )
In an extremely rare situation, the getaddrinfo function in glibc may access memory that has already been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r hook without implementing the _nss_*_gethostbyname3_r hook. There are no known modules that are implemented in this way. In addition to that condition, the resolved name should return a large number of IPv6 as well as IPv4 and the call to the getaddrinfo function should have AF_INET6 with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags. Reference: <a href="https://sourceware.org/bugzilla/show_bug.cgi?id=30843">https://sourceware.org/bugzilla/show_bug.cgi?id=30843</a>
Affected Software | Affected Version | How to fix |
---|---|---|
GNU C Library (glibc) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2237782 is classified as high due to the potential for application crashes.
To fix REDHAT-BUG-2237782, ensure that the NSS module implements both the _nss_*_gethostbyname2_r and _nss_*_gethostbyname3_r hooks appropriately.
REDHAT-BUG-2237782 can lead to application crashes under specific conditions when using the getaddrinfo function.
REDHAT-BUG-2237782 affects the GNU C Library (glibc) when certain NSS module implementations are used.
While REDHAT-BUG-2237782 may not be easily exploitable, it poses a significant risk of instability in affected applications.