First published: Fri Aug 25 2023(Updated: )
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/glibc | <=2.36-9+deb12u2 | 2.28-10+deb10u1 2.28-10+deb10u2 2.31-13+deb11u6 2.31-13+deb11u7 2.36-9+deb12u3 2.37-12 |
ubuntu/glibc | <2.37-0ubuntu2.1 | 2.37-0ubuntu2.1 |
ubuntu/glibc | <2.38-1ubuntu5 | 2.38-1ubuntu5 |
GNU C Library | <2.39 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =9.0 | |
GNU C Library (glibc) | <2.39 | |
Red Hat CodeReady Linux Builder | =9.2 | |
Red Hat CodeReady Linux Builder for Power, little endian | =9.0_ppc64le | |
Red Hat CodeReady Linux Builder for Power, little endian - Extended Update Support | =9.2_ppc64le | |
Red Hat CodeReady Linux Builder for ARM 64 | =9.0_aarch64 | |
Red Hat CodeReady Linux Builder for ARM 64 - Extended Update Support | =9.2_aarch64 | |
Red Hat CodeReady Linux Builder for IBM z Systems | =9.0_s390x | |
Red Hat CodeReady Linux Builder for IBM z Systems - Extended Update Support | =9.2_s390x | |
Red Hat Enterprise Linux Server EUS | =8.8 | |
Red Hat Enterprise Linux Server EUS | =9.2 | |
Red Hat Enterprise Linux | =9.0_aarch64 | |
Red Hat Enterprise Linux for ARM64 EUS | =9.2_aarch64 | |
Red Hat Enterprise Linux for IBM Z Systems | =8.0_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =8.8_s390x | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =9.2 | |
Red Hat Enterprise Linux for IBM Z Systems (s390x) | =9.2 | |
Red Hat Enterprise Linux for Power, little endian | =8.0_ppc64le | |
Red Hat Enterprise Linux for Power, little endian | =9.2_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.8_ppc64le | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =9.2_ppc64le | |
Red Hat Enterprise Linux Server | =9.2 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =9.2_ppc64le | |
Red Hat Enterprise Linux | =8.8 | |
Red Hat Fedora | =37 | |
Red Hat Fedora | =38 | |
Red Hat Fedora | =39 | |
All of | ||
NetApp H300S Firmware | ||
NetApp H300S Firmware | ||
All of | ||
NetApp H500e Firmware | ||
NetApp H500e Firmware | ||
All of | ||
NetApp H700S | ||
NetApp H700S | ||
All of | ||
NetApp H410S | ||
NetApp H410S Firmware | ||
All of | ||
NetApp H410C | ||
NetApp H410C Firmware | ||
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 | |
IBM Security Verify Governance - Identity Manager | <=ISVG 10.0.2 |
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=4ea972b7edd7e36610e8cde18bf7a8149d7bac4f (2.36)
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=b7529346025a130fee483d42178b5c118da971bb (2.37)
https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=b25508dd774b617f99419bdc3cf2ace4560cd2d6 (2.38)
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-4527 is a vulnerability found in glibc that allows for a stack read overflow in the getaddrinfo function.
CVE-2023-4527 has a severity score of 8.2, indicating a high severity.
CVE-2023-4527 affects GNU glibc up to version 2.39.
CVE-2023-4527 affects Redhat Enterprise Linux versions 8.0 and 9.0.
Updating to a version of glibc that is not affected by CVE-2023-4527 is recommended.