Project Subscriptions
| Vendors | Products |
|---|---|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Gnu
Subscribe
|
Glibc
Subscribe
|
|
Netapp
Subscribe
|
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Ibm Z Systems Eus S390x
Subscribe
Enterprise Linux For Ibm Z Systems S390x
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server Tus
Subscribe
Rhel Eus
Subscribe
Rhev Hypervisor
Subscribe
|
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-54657 | A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge. |
Ubuntu USN |
USN-6541-1 | GNU C Library vulnerabilities |
Solution
No solution given by the vendor.
Workaround
Removing the "SUCCESS=continue" or "SUCCESS=merge" configuration from the hosts database in /etc/nsswitch.conf will mitigate this vulnerability. Note that, these options are not supported by the hosts database, if they were working before it was because of this bug.
Fri, 26 Sep 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge. | A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge. |
Wed, 30 Apr 2025 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 22 Nov 2024 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 16 Sep 2024 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-11T19:29:11.106Z
Reserved: 2023-09-07T01:12:09.809Z
Link: CVE-2023-4813
No data.
Status : Modified
Published: 2023-09-12T22:15:08.277
Modified: 2025-09-26T12:15:34.583
Link: CVE-2023-4813
OpenCVE Enrichment
No data.
EUVD
Ubuntu USN