Vulnerability Description
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gnu | Glibc | >= 2.36, < 2.36.113 |
| Redhat | Codeready Linux Builder Eus | 9.2 |
| Redhat | Codeready Linux Builder Eus For Power Little Endian | 9.0_ppc64le |
| Redhat | Codeready Linux Builder Eus For Power Little Endian Eus | 9.2_ppc64le |
| Redhat | Codeready Linux Builder For Arm64 | 9.0_aarch64 |
| Redhat | Codeready Linux Builder For Arm64 Eus | 9.2_aarch64 |
| Redhat | Codeready Linux Builder For Ibm Z Systems | 9.0_s390x |
| Redhat | Codeready Linux Builder For Ibm Z Systems Eus | 9.2_s390x |
| Redhat | Enterprise Linux | 8.0 |
| Redhat | Enterprise Linux Eus | 8.8 |
| Redhat | Enterprise Linux For Arm 64 | 9.0_aarch64 |
| Redhat | Enterprise Linux For Arm 64 Eus | 9.2_aarch64 |
| Redhat | Enterprise Linux For Ibm Z Systems | 8.0_s390x |
| Redhat | Enterprise Linux For Ibm Z Systems Eus | 8.8_s390x |
| Redhat | Enterprise Linux For Ibm Z Systems Eus S390X | 9.2 |
| Redhat | Enterprise Linux For Ibm Z Systems S390X | 9.2 |
| Redhat | Enterprise Linux For Power Little Endian | 8.0_ppc64le |
| Redhat | Enterprise Linux For Power Little Endian Eus | 8.8_ppc64le |
| Redhat | Enterprise Linux Server Aus | 9.2 |
| Redhat | Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | 9.2_ppc64le |
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2023:5453Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:5455Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-4527Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2234712ExploitIssue TrackingThird Party Advisory
- http://www.openwall.com/lists/oss-security/2023/09/25/1Mailing ListThird Party Advisory
- https://access.redhat.com/errata/RHSA-2023:5453Third Party Advisory
- https://access.redhat.com/errata/RHSA-2023:5455Third Party Advisory
- https://access.redhat.com/security/cve/CVE-2023-4527Third Party Advisory
- https://bugzilla.redhat.com/show_bug.cgi?id=2234712ExploitIssue TrackingThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202310-03Third Party Advisory
- https://security.netapp.com/advisory/ntap-20231116-0012/Third Party Advisory
- https://cert-portal.siemens.com/productcert/html/ssa-082556.html
FAQ
What is CVE-2023-4527?
CVE-2023-4527 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger ...
How severe is CVE-2023-4527?
CVE-2023-4527 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-4527?
Check the references section above for vendor advisories and patch information. Affected products include: Gnu Glibc, Redhat Codeready Linux Builder Eus, Redhat Codeready Linux Builder Eus For Power Little Endian, Redhat Codeready Linux Builder Eus For Power Little Endian Eus, Redhat Codeready Linux Builder For Arm64.