Description
A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
Published: 2023-09-12
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Removing the "SUCCESS=continue" or "SUCCESS=merge" configuration from the hosts database in /etc/nsswitch.conf will mitigate this vulnerability. Note that, these options are not supported by the hosts database, if they were working before it was because of this bug.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-54657 A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
Ubuntu USN Ubuntu USN USN-6541-1 GNU C Library vulnerabilities
History

Fri, 26 Sep 2025 12:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge. A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

Wed, 30 Apr 2025 20:45:00 +0000

Type Values Removed Values Added
References

Fri, 22 Nov 2024 12:00:00 +0000


Mon, 16 Sep 2024 14:45:00 +0000


Subscriptions

Fedoraproject Fedora
Gnu Glibc
Netapp Active Iq Unified Manager H300s H300s Firmware H410c H410c Firmware H410s H410s Firmware H500s H500s Firmware H700s H700s Firmware
Redhat Enterprise Linux Enterprise Linux Eus Enterprise Linux For Ibm Z Systems Eus S390x Enterprise Linux For Ibm Z Systems S390x Enterprise Linux For Power Little Endian Enterprise Linux For Power Little Endian Eus Enterprise Linux Server Aus Enterprise Linux Server Tus Rhel Eus Rhev Hypervisor
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-11T19:29:11.106Z

Reserved: 2023-09-07T01:12:09.809Z

Link: CVE-2023-4813

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-09-12T22:15:08.277

Modified: 2025-09-26T12:15:34.583

Link: CVE-2023-4813

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-03-01T00:00:00Z

Links: CVE-2023-4813 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses