CVE-2023-4527
18.09.2023, 17:15
A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | glibc | 𝑥 < 2.39 |
redhat | codeready_linux_builder_eus | 9.2 |
redhat | codeready_linux_builder_eus_for_power_little_endian | 9.0_ppc64le:_ppc64le |
redhat | codeready_linux_builder_eus_for_power_little_endian_eus | 9.2_ppc64le:_ppc64le |
redhat | codeready_linux_builder_for_arm64 | 9.0_aarch64:_aarch64 |
redhat | codeready_linux_builder_for_arm64_eus | 9.2_aarch64:_aarch64 |
redhat | codeready_linux_builder_for_ibm_z_systems | 9.0_s390x:_s390x |
redhat | codeready_linux_builder_for_ibm_z_systems_eus | 9.2_s390x:_s390x |
redhat | enterprise_linux | 8.0 |
redhat | enterprise_linux | 9.0 |
redhat | enterprise_linux_eus | 8.8 |
redhat | enterprise_linux_eus | 9.2 |
redhat | enterprise_linux_for_arm_64 | 9.0_aarch64:_aarch64 |
redhat | enterprise_linux_for_arm_64_eus | 9.2_aarch64:_aarch64 |
redhat | enterprise_linux_for_ibm_z_systems | 8.0_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus | 8.8_s390x:_s390x |
redhat | enterprise_linux_for_ibm_z_systems_eus_s390x | 9.2 |
redhat | enterprise_linux_for_ibm_z_systems_s390x | 9.2 |
redhat | enterprise_linux_for_power_little_endian | 8.0_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian | 9.2_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 8.8_ppc64le:_ppc64le |
redhat | enterprise_linux_for_power_little_endian_eus | 9.2_ppc64le:_ppc64le |
redhat | enterprise_linux_server_aus | 9.2 |
redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 9.2_ppc64le:_ppc64le |
redhat | enterprise_linux_tus | 8.8 |
netapp | h300s_firmware | - |
netapp | h500s_firmware | - |
netapp | h700s_firmware | - |
netapp | h410s_firmware | - |
netapp | h410c_firmware | - |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-121 - Stack-based Buffer OverflowA stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
- CWE-125 - Out-of-bounds ReadThe software reads data past the end, or before the beginning, of the intended buffer.
References