NVD Vulnerability Detail
Search Exploit, PoC
CVE-2023-4806
Summary

A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.

Publication Date Sept. 19, 2023, 2:15 a.m.
Registration Date Sept. 19, 2023, 4 p.m.
Last Update Nov. 21, 2024, 5:36 p.m.
CVSS3.1 : MEDIUM
スコア 5.9
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
攻撃元区分(AV) ネットワーク
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更なし
機密性への影響(C) なし
完全性への影響(I) なし
可用性への影響(A)
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:a:gnu:glibc:2.33:*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_s390x:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus_s390x:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_tus:8.8:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.2_aarch64:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.2_s390x:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_for_arm64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_eus_for_power_little_endian_eus:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:a:redhat:codeready_linux_builder_eus:9.2:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.2_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.2_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:8.8_ppc64le:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:8.8_s390x:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*
Configuration3 or higher or less more than less than
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
GNU Project の GNU C Library 等複数ベンダの製品における解放済みメモリの使用に関する脆弱性
Title GNU Project の GNU C Library 等複数ベンダの製品における解放済みメモリの使用に関する脆弱性
Summary

GNU Project の GNU C Library 等複数ベンダの製品には、解放済みメモリの使用に関する脆弱性が存在します。

Possible impacts サービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

参考情報を参照して適切な対策を実施してください。

Publication Date Sept. 18, 2023, midnight
Registration Date Dec. 19, 2023, 4:25 p.m.
Last Update June 16, 2025, 3:34 p.m.
Affected System
レッドハット
codeready linux builder eus 9.2
codeready linux builder eus for power little endian 9.0 ppc64le
codeready linux builder eus for power little endian eus 9.2 ppc64le
codeready linux builder for arm64 9.0 aarch64
codeready linux builder for arm64 eus 9.2 aarch64
codeready linux builder for ibm z systems 9.0 s390x
codeready linux builder for ibm z systems eus 9.2 s390x
enterprise linux for arm 64 9.0 aarch64
enterprise linux for arm 64 eus 9.2 aarch64
enterprise linux for ibm z systems eus s390x 9.2
enterprise linux for ibm z systems s390x 9.2
Red Hat Enterprise Linux 7.0
Red Hat Enterprise Linux 8.0
Red Hat Enterprise Linux 9.0
Red Hat Enterprise Linux EUS 8.8
Red Hat Enterprise Linux EUS 9.2
Red Hat Enterprise Linux for IBM z Systems 8.0 s390x
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.8 s390x
Red Hat Enterprise Linux for Power Little Endian Update Services for SAP Solutions 
Red Hat Enterprise Linux for Power, little endian 8.0 ppc64le
Red Hat Enterprise Linux for Power, little endian 9.2 ppc64le
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 
Red Hat Enterprise Linux Server AUS 
Red Hat Enterprise Linux TUS 
GNU Project
GNU C Library 2.33
Fedora Project
Fedora 37
Fedora 38
Fedora 39
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
その他
Change Log
No Changed Details Date of change
1 [2023年12月19日]
  掲載
Dec. 19, 2023, 4:25 p.m.
2 [2025年06月16日]
  参考情報:JVN (JVNVU#96443907) を追加
  参考情報:ICS-CERT ADVISORY (ICSA-25-162-05) を追加
June 16, 2025, 12:07 p.m.