First published: Wed Sep 06 2023(Updated: )
A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementing the _nss_*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/glibc | <0:2.28-225.el8_8.6 | 0:2.28-225.el8_8.6 |
redhat/glibc | <0:2.34-60.el9_2.7 | 0:2.34-60.el9_2.7 |
ubuntu/glibc | <2.27-3ubuntu1.6+ | 2.27-3ubuntu1.6+ |
ubuntu/glibc | <2.31-0ubuntu9.14 | 2.31-0ubuntu9.14 |
ubuntu/glibc | <2.35-0ubuntu3.5 | 2.35-0ubuntu3.5 |
ubuntu/glibc | <2.37-0ubuntu2.2 | 2.37-0ubuntu2.2 |
ubuntu/glibc | <2.38-1ubuntu5 | 2.38-1ubuntu5 |
ubuntu/glibc | <2.38-1ubuntu5 | 2.38-1ubuntu5 |
ubuntu/glibc | <2.23-0ubuntu11.3+ | 2.23-0ubuntu11.3+ |
debian/glibc | <=2.31-13+deb11u10 | 2.36-9+deb12u7 2.39-6 |
GNU C Library | =2.33 | |
Red Hat Enterprise Linux | =7.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
GNU C Library (glibc) | =2.33 | |
Red Hat CodeReady Linux Builder | =9.2 | |
Red Hat CodeReady Linux Builder for Power, little endian | =9.0_ppc64le | |
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support | =9.2_ppc64le | |
Red Hat CodeReady Linux Builder for ARM 64 | =9.0_aarch64 | |
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | =9.2_aarch64 | |
Red Hat CodeReady Linux Builder for IBM z Systems | =9.0_s390x | |
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support | =9.2_s390x | |
Red Hat Enterprise Linux Server EUS | =8.8 | |
Red Hat Enterprise Linux Server EUS | =9.2 | |
Red Hat Enterprise Linux | =9.0_aarch64 | |
Red Hat Enterprise Linux for ARM64 EUS | =9.2_aarch64 | |
Red Hat Enterprise Linux for IBM Z Systems | =8.0_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.8_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =9.2 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =9.2 | |
Red Hat Enterprise Linux for Power, little endian | =8.0_ppc64le | |
Red Hat Enterprise Linux for Power, little endian | =9.2_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.8_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =9.2_ppc64le | |
Red Hat Enterprise Linux Server | =9.2 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =9.2_ppc64le | |
Red Hat Enterprise Linux | =8.8 | |
Red Hat Fedora | =37 | |
Red Hat Fedora | =38 | |
Red Hat Fedora | =39 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-4806 is a vulnerability found in glibc that allows the getaddrinfo function to access freed memory, causing application crashes.
CVE-2023-4806 has a severity level of high (7.5).
CVE-2023-4806 affects GNU glibc version 2.33, Redhat Enterprise Linux versions 7.0, 8.0, and 9.0.
CVE-2023-4806 can be exploited when an NSS module implements only the _nss_*_gethostbyname2_r and _nss_*_getcanonname_r hooks without implementation.
To fix CVE-2023-4806, it is recommended to upgrade to the patched version of GNU glibc or Redhat Enterprise Linux.