Description
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
Published: 2023-09-18
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

Removing the no-aaaa diagnostic option from /etc/resolv.conf will mitigate this flaw.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-5514-1 glibc security update
EUVD EUVD EUVD-2023-54382 A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
Ubuntu USN Ubuntu USN USN-6409-1 GNU C Library vulnerabilities

Subscriptions

Fedoraproject Fedora
Gnu Glibc
Netapp H300s H300s Firmware H410c H410c Firmware H410s H410s Firmware H500s H500s Firmware H700s H700s Firmware
Redhat Codeready Linux Builder Eus Codeready Linux Builder Eus For Power Little Endian Codeready Linux Builder Eus For Power Little Endian Eus Codeready Linux Builder For Arm64 Codeready Linux Builder For Arm64 Eus Codeready Linux Builder For Ibm Z Systems Codeready Linux Builder For Ibm Z Systems Eus Enterprise Linux Enterprise Linux Eus Enterprise Linux For Arm 64 Enterprise Linux For Arm 64 Eus Enterprise Linux For Ibm Z Systems Enterprise Linux For Ibm Z Systems Eus Enterprise Linux For Ibm Z Systems Eus S390x Enterprise Linux For Ibm Z Systems S390x Enterprise Linux For Power Little Endian Enterprise Linux For Power Little Endian Eus Enterprise Linux Server Aus Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Enterprise Linux Tus
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-11-20T18:27:44.022Z

Reserved: 2023-08-24T19:36:21.484Z

Link: CVE-2023-4527

cve-icon Vulnrichment

Updated: 2024-08-02T07:31:06.064Z

cve-icon NVD

Status : Analyzed

Published: 2023-09-18T17:15:55.067

Modified: 2025-06-24T17:31:20.860

Link: CVE-2023-4527

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-09-12T00:00:00Z

Links: CVE-2023-4527 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses