A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Fedoraproject
Subscribe
|
Fedora
Subscribe
|
|
Gnu
Subscribe
|
Glibc
Subscribe
|
|
Netapp
Subscribe
|
|
|
Redhat
Subscribe
|
Codeready Linux Builder Eus
Subscribe
Codeready Linux Builder Eus For Power Little Endian
Subscribe
Codeready Linux Builder Eus For Power Little Endian Eus
Subscribe
Codeready Linux Builder For Arm64
Subscribe
Codeready Linux Builder For Arm64 Eus
Subscribe
Codeready Linux Builder For Ibm Z Systems
Subscribe
Codeready Linux Builder For Ibm Z Systems Eus
Subscribe
Enterprise Linux
Subscribe
Enterprise Linux Eus
Subscribe
Enterprise Linux For Arm 64
Subscribe
Enterprise Linux For Arm 64 Eus
Subscribe
Enterprise Linux For Ibm Z Systems
Subscribe
Enterprise Linux For Ibm Z Systems Eus
Subscribe
Enterprise Linux For Ibm Z Systems Eus S390x
Subscribe
Enterprise Linux For Ibm Z Systems S390x
Subscribe
Enterprise Linux For Power Little Endian
Subscribe
Enterprise Linux For Power Little Endian Eus
Subscribe
Enterprise Linux Server Aus
Subscribe
Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
Subscribe
Enterprise Linux Tus
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5514-1 | glibc security update |
EUVD |
EUVD-2023-54382 | A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. |
Ubuntu USN |
USN-6409-1 | GNU C Library vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
Removing the no-aaaa diagnostic option from /etc/resolv.conf will mitigate this flaw.
References
History
Tue, 03 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 22 Nov 2024 12:00:00 +0000
Mon, 16 Sep 2024 14:45:00 +0000
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-20T18:27:44.022Z
Reserved: 2023-08-24T19:36:21.484Z
Link: CVE-2023-4527
Updated: 2024-08-02T07:31:06.064Z
Status : Analyzed
Published: 2023-09-18T17:15:55.067
Modified: 2025-06-24T17:31:20.860
Link: CVE-2023-4527
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN