Vulnerability Description
A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | < 2.36 |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux Eus | 8.8 |
| Redhat | Enterprise Linux For Ibm Z Systems Eus S390X | 9.2 |
| Redhat | Enterprise Linux For Ibm Z Systems S390X | 9.2 |
| Redhat | Enterprise Linux For Power Little Endian | 9.2_ppc64le |
| Redhat | Enterprise Linux For Power Little Endian Eus | 9.2_ppc64le |
| Redhat | Enterprise Linux Server Aus | 9.2 |
| Redhat | Enterprise Linux Server Tus | 8.8 |
| Fedoraproject | Fedora | 38 |
| Netapp | Active Iq Unified Manager | - |
| Netapp | H300S Firmware | - |
| Netapp | H300S | - |
| Netapp | H500S Firmware | - |
| Netapp | H500S | - |
| Netapp | H700S Firmware | - |
| Netapp | H700S | - |
| Netapp | H410S Firmware | - |
| Netapp | H410S | - |
| Netapp | H410C Firmware | - |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHBA-2024:2413
- https://access.redhat.com/errata/RHSA-2023:5453Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:5455Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:7409Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-4813Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2237798Issue TrackingPatchThird Party Advisory
- http://www.openwall.com/lists/oss-security/2023/10/03/8
- https://access.redhat.com/errata/RHSA-2023:5453Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:5455Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:7409Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-4813Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2237798Issue TrackingPatchThird Party Advisory
- https://security.netapp.com/advisory/ntap-20231110-0003/
FAQ
What is CVE-2023-4813?
CVE-2023-4813 is a vulnerability with a CVSS score of 5.9 (MEDIUM). A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the get...
How severe is CVE-2023-4813?
CVE-2023-4813 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4813?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc, Redhat Enterprise Linux, Redhat Enterprise Linux Eus, Redhat Enterprise Linux For Ibm Z Systems Eus S390X, Redhat Enterprise Linux For Ibm Z Systems S390X.