Description
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
No analysis available yet.
Remediation
Vendor Workaround
Removing the no-aaaa diagnostic option from /etc/resolv.conf will mitigate this flaw.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5514-1 | glibc security update |
EUVD |
EUVD-2023-54382 | A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. |
Ubuntu USN |
USN-6409-1 | GNU C Library vulnerabilities |
References
History
Tue, 03 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 22 Nov 2024 12:00:00 +0000
Mon, 16 Sep 2024 14:45:00 +0000
Subscriptions
Fedoraproject
Subscribe
Fedora
Subscribe
Gnu
Subscribe
Glibc
Subscribe
Netapp
Subscribe
H300s
Subscribe
H300s Firmware
Subscribe
H410c
Subscribe
H410c Firmware
Subscribe
H410s
Subscribe
H410s Firmware
Subscribe
H500s
Subscribe
H500s Firmware
Subscribe
H700s
Subscribe
H700s Firmware
Subscribe
Redhat
Subscribe
Codeready Linux Builder Eus
Subscribe
Codeready Linux Builder Eus For Power Little Endian
Subscribe
Codeready Linux Builder Eus For Power Little Endian Eus
Subscribe
Codeready Linux Builder For Arm64
Subscribe
Codeready Linux Builder For Arm64 Eus
Subscribe
Codeready Linux Builder For Ibm Z Systems
Subscribe
Codeready Linux Builder For Ibm Z Systems Eus
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Arm 64
Subscribe
Enterprise Linux For Arm 64 Eus
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Ibm Z Systems Eus S390x
Subscribe
Enterprise Linux For Ibm Z Systems S390x
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Subscribe
Enterprise Linux Tus
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-20T18:27:44.022Z
Reserved: 2023-08-24T19:36:21.484Z
Link: CVE-2023-4527
Updated: 2024-08-02T07:31:06.064Z
Status : Analyzed
Published: 2023-09-18T17:15:55.067
Modified: 2025-06-24T17:31:20.860
Link: CVE-2023-4527
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN