The nss_dns implementation of getnetbyname in GNU C Library (aka glibc) before 2.21, when the DNS backend in the Name Service Switch configuration is enabled, allows remote attackers to cause a denial of service (infinite loop) by sending a positive answer while a network name is being process.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Glibc | Gnu | * | 2.20 (including) |
| Red Hat Enterprise Linux 7 | RedHat | glibc-0:2.17-222.el7 | * |
| Eglibc | Ubuntu | esm-infra-legacy/trusty | * |
| Eglibc | Ubuntu | lucid | * |
| Eglibc | Ubuntu | precise | * |
| Eglibc | Ubuntu | trusty | * |
| Eglibc | Ubuntu | trusty/esm | * |
| Glibc | Ubuntu | upstream | * |
| Glibc | Ubuntu | utopic | * |