A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.

Project Subscriptions

Vendors Products
Fedoraproject Subscribe
H300s Firmware Subscribe
H410c Firmware Subscribe
H410s Firmware Subscribe
H500s Firmware Subscribe
H700s Firmware Subscribe
Codeready Linux Builder Eus Subscribe
Codeready Linux Builder Eus For Power Little Endian Subscribe
Codeready Linux Builder Eus For Power Little Endian Eus Subscribe
Codeready Linux Builder For Arm64 Subscribe
Codeready Linux Builder For Arm64 Eus Subscribe
Codeready Linux Builder For Ibm Z Systems Subscribe
Codeready Linux Builder For Ibm Z Systems Eus Subscribe
Enterprise Linux Subscribe
Enterprise Linux Eus Subscribe
Enterprise Linux For Arm 64 Subscribe
Enterprise Linux For Arm 64 Eus Subscribe
Enterprise Linux For Ibm Z Systems Subscribe
Enterprise Linux For Ibm Z Systems Eus Subscribe
Enterprise Linux For Ibm Z Systems Eus S390x Subscribe
Enterprise Linux For Ibm Z Systems S390x Subscribe
Enterprise Linux For Power Little Endian Subscribe
Enterprise Linux For Power Little Endian Eus Subscribe
Enterprise Linux Server Aus Subscribe
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Subscribe
Enterprise Linux Tus Subscribe
Advisories
Source ID Title
Debian DSA Debian DSA DSA-5514-1 glibc security update
EUVD EUVD EUVD-2023-54382 A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
Ubuntu USN Ubuntu USN USN-6409-1 GNU C Library vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

Removing the no-aaaa diagnostic option from /etc/resolv.conf will mitigate this flaw.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-20T18:27:44.022Z

Reserved: 2023-08-24T19:36:21.484Z

Link: CVE-2023-4527

cve-icon Vulnrichment

Updated: 2024-08-02T07:31:06.064Z

cve-icon NVD

Status : Analyzed

Published: 2023-09-18T17:15:55.067

Modified: 2025-06-24T17:31:20.860

Link: CVE-2023-4527

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-09-12T00:00:00Z

Links: CVE-2023-4527 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses