| Summary | A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags. |
|---|---|
| Publication Date | Sept. 19, 2023, 2:15 a.m. |
| Registration Date | Sept. 19, 2023, 4 p.m. |
| Last Update | Nov. 21, 2024, 5:36 p.m. |
| CVSS3.1 : MEDIUM | |
| スコア | 5.9 |
|---|---|
| Vector | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 高 |
| 攻撃に必要な特権レベル(PR) | 不要 |
| 利用者の関与(UI) | 不要 |
| 影響の想定範囲(S) | 変更なし |
| 機密性への影響(C) | なし |
| 完全性への影響(I) | なし |
| 可用性への影響(A) | 高 |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:gnu:glibc:2.33:*:*:*:*:*:*:* | |||||
| Configuration2 | or higher | or less | more than | less than | |
| cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.2_ppc64le:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_s390x:9.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:9.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_tus:8.8:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:redhat:codeready_linux_builder_eus:9.2:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2_aarch64:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:* | |||||
| Configuration3 | or higher | or less | more than | less than | |
| cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:* | |||||
| cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:* | |||||
| Title | GNU Project の GNU C Library 等複数ベンダの製品における解放済みメモリの使用に関する脆弱性 |
|---|---|
| Summary | GNU Project の GNU C Library 等複数ベンダの製品には、解放済みメモリの使用に関する脆弱性が存在します。 |
| Possible impacts | サービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution | 参考情報を参照して適切な対策を実施してください。 |
| Publication Date | Sept. 18, 2023, midnight |
| Registration Date | Dec. 19, 2023, 4:25 p.m. |
| Last Update | June 16, 2025, 3:34 p.m. |
| レッドハット |
| codeready linux builder eus 9.2 |
| codeready linux builder eus for power little endian 9.0 ppc64le |
| codeready linux builder eus for power little endian eus 9.2 ppc64le |
| codeready linux builder for arm64 9.0 aarch64 |
| codeready linux builder for arm64 eus 9.2 aarch64 |
| codeready linux builder for ibm z systems 9.0 s390x |
| codeready linux builder for ibm z systems eus 9.2 s390x |
| enterprise linux for arm 64 9.0 aarch64 |
| enterprise linux for arm 64 eus 9.2 aarch64 |
| enterprise linux for ibm z systems eus s390x 9.2 |
| enterprise linux for ibm z systems s390x 9.2 |
| Red Hat Enterprise Linux 7.0 |
| Red Hat Enterprise Linux 8.0 |
| Red Hat Enterprise Linux 9.0 |
| Red Hat Enterprise Linux EUS 8.8 |
| Red Hat Enterprise Linux EUS 9.2 |
| Red Hat Enterprise Linux for IBM z Systems 8.0 s390x |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x |
| Red Hat Enterprise Linux for Power Little Endian Update Services for SAP Solutions |
| Red Hat Enterprise Linux for Power, little endian 8.0 ppc64le |
| Red Hat Enterprise Linux for Power, little endian 9.2 ppc64le |
| Red Hat Enterprise Linux for Power, little endian - Extended Update Support |
| Red Hat Enterprise Linux Server AUS |
| Red Hat Enterprise Linux TUS |
| GNU Project |
| GNU C Library 2.33 |
| Fedora Project |
| Fedora 37 |
| Fedora 38 |
| Fedora 39 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2023年12月19日] 掲載 |
Dec. 19, 2023, 4:25 p.m. |
| 2 | [2025年06月16日] 参考情報:JVN (JVNVU#96443907) を追加 参考情報:ICS-CERT ADVISORY (ICSA-25-162-05) を追加 |
June 16, 2025, 12:07 p.m. |