Bug 1215286 (CVE-2023-4813) - VUL-0: CVE-2023-4813: glibc: potential use-after-free in gaih_inet()
Summary: VUL-0: CVE-2023-4813: glibc: potential use-after-free in gaih_inet()
Status: RESOLVED FIXED
Alias: CVE-2023-4813
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Andreas Schwab
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/377995/
Whiteboard: CVSSv3.1:SUSE:CVE-2023-4813:5.9:(AV:N...
Keywords:
Depends on:
Blocks:
 
Reported: 2023-09-13 08:05 UTC by Cathy Hu
Modified: 2024-05-13 14:38 UTC (History)
2 users (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Cathy Hu 2023-09-13 08:05:33 UTC
CVE-2023-4813

In an uncommon situation, the gaih_inet function in glibc may use memory that has already been freed, resulting in an application crash.

This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.

This flaw affects glibc versions prior to 2.36.

Reference:
https://sourceware.org/bugzilla/show_bug.cgi?id=28931

Upstream patch:
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=1c37b8022e8763fedbb3f79c02e05c6acfe5a215

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-4813
https://bugzilla.redhat.com/show_bug.cgi?id=2237798
https://www.cve.org/CVERecord?id=CVE-2023-4813
https://access.redhat.com/security/cve/CVE-2023-4813
Comment 1 Cathy Hu 2023-09-13 08:23:07 UTC
Affected:
- SUSE:Carwos:1/glibc                 2.26  
- SUSE:SLE-12-SP2:Update/glibc        2.22  
- SUSE:SLE-12-SP4:Update/glibc        2.22  
- SUSE:SLE-15-SP3:Update/glibc        2.31  
- SUSE:SLE-15:Update/glibc            2.26  

Not affected:
- SUSE:SLE-11-SP3:Update/glibc        2.11.3
- SUSE:ALP:Source:Standard:1.0/glibc  2.37  
- openSUSE:Factory/glibc              2.38
Comment 7 Maintenance Automation 2023-10-11 12:30:03 UTC
SUSE-SU-2023:4047-1: An update that solves one vulnerability, contains one feature and has one security fix can now be installed.

Category: security (moderate)
Bug References: 1215286, 1215505
CVE References: CVE-2023-4813
Jira References: PED-4908
Sources used:
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS 15-SP1 (src): glibc-2.26-150000.13.70.1
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2 (src): glibc-2.26-150000.13.70.1
SUSE Linux Enterprise Server 15 SP1 LTSS 15-SP1 (src): glibc-2.26-150000.13.70.1
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (src): glibc-2.26-150000.13.70.1
SUSE Linux Enterprise Server for SAP Applications 15 SP1 (src): glibc-2.26-150000.13.70.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2 (src): glibc-2.26-150000.13.70.1
SUSE CaaS Platform 4.0 (src): glibc-2.26-150000.13.70.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 8 Maintenance Automation 2023-10-12 12:46:18 UTC
SUSE-RU-2023:4063-1: An update that solves one vulnerability, contains one feature and has one fix can now be installed.

Category: recommended (moderate)
Bug References: 1215286, 1215504
CVE References: CVE-2023-4813
Jira References: PED-4908
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): glibc-2.22-114.31.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): glibc-2.22-114.31.1
SUSE Linux Enterprise Server 12 SP5 (src): glibc-2.22-114.31.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): glibc-2.22-114.31.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 9 Maintenance Automation 2023-10-18 12:30:08 UTC
SUSE-SU-2023:4110-1: An update that solves one vulnerability and has one security fix can now be installed.

Category: security (important)
Bug References: 1215286, 1215891
CVE References: CVE-2023-4813
Sources used:
SUSE Linux Enterprise Micro for Rancher 5.3 (src): glibc-2.31-150300.63.1
SUSE Linux Enterprise Micro 5.3 (src): glibc-2.31-150300.63.1
SUSE Linux Enterprise Micro for Rancher 5.4 (src): glibc-2.31-150300.63.1
SUSE Linux Enterprise Micro 5.4 (src): glibc-2.31-150300.63.1
SUSE Linux Enterprise Micro 5.5 (src): glibc-2.31-150300.63.1
Basesystem Module 15-SP4 (src): glibc-2.31-150300.63.1
Basesystem Module 15-SP5 (src): glibc-2.31-150300.63.1
Development Tools Module 15-SP4 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1
Development Tools Module 15-SP5 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP3 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1
SUSE Linux Enterprise Server for SAP Applications 15 SP3 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1
SUSE Manager Proxy 4.2 (src): glibc-2.31-150300.63.1
SUSE Manager Retail Branch Server 4.2 (src): glibc-2.31-150300.63.1
SUSE Manager Server 4.2 (src): glibc-2.31-150300.63.1
SUSE Enterprise Storage 7.1 (src): glibc-2.31-150300.63.1, glibc-utils-src-2.31-150300.63.1
SUSE Linux Enterprise Micro 5.1 (src): glibc-2.31-150300.63.1
SUSE Linux Enterprise Micro 5.2 (src): glibc-2.31-150300.63.1
SUSE Linux Enterprise Micro for Rancher 5.2 (src): glibc-2.31-150300.63.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 11 Maintenance Automation 2024-02-19 11:22:49 UTC
SUSE-RU-2023:4063-1: An update that solves one vulnerability, contains one feature and has one fix can now be installed.

Category: recommended (moderate)
Bug References: 1215286, 1215504
CVE References: CVE-2023-4813
Jira References: PED-4908
Sources used:
SUSE Linux Enterprise Software Development Kit 12 SP5 (src): glibc-2.22-114.31.1
SUSE Linux Enterprise High Performance Computing 12 SP5 (src): glibc-2.22-114.31.1
SUSE Linux Enterprise Server 12 SP5 (src): glibc-2.22-114.31.1
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (src): glibc-2.22-114.31.1

NOTE: This line indicates an update has been released for the listed product(s). At times this might be only a partial fix. If you have questions please reach out to maintenance coordination.
Comment 12 Marcus Meissner 2024-05-13 14:38:50 UTC
done