A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-5514-1 | glibc security update |
![]() |
EUVD-2023-54382 | A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. |
![]() |
USN-6409-1 | GNU C Library vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
Removing the no-aaaa diagnostic option from /etc/resolv.conf will mitigate this flaw.
References
History
Tue, 03 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 22 Nov 2024 12:00:00 +0000
Mon, 16 Sep 2024 14:45:00 +0000

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-08-21T08:25:22.065Z
Reserved: 2023-08-24T19:36:21.484Z
Link: CVE-2023-4527

Updated: 2024-08-02T07:31:06.064Z

Status : Analyzed
Published: 2023-09-18T17:15:55.067
Modified: 2025-06-24T17:31:20.860
Link: CVE-2023-4527


No data.