Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Workaround
Removing the no-aaaa diagnostic option from /etc/resolv.conf will mitigate this flaw.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5514-1 | glibc security update |
EUVD |
EUVD-2023-54382 | A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash. |
Ubuntu USN |
USN-6409-1 | GNU C Library vulnerabilities |
Tue, 12 May 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Dec 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 22 Nov 2024 12:00:00 +0000
Mon, 16 Sep 2024 14:45:00 +0000
Subscriptions
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-05-12T10:12:39.832Z
Reserved: 2023-08-24T19:36:21.484Z
Link: CVE-2023-4527
Updated: 2024-08-02T07:31:06.064Z
Status : Modified
Published: 2023-09-18T17:15:55.067
Modified: 2026-05-12T11:16:15.747
Link: CVE-2023-4527
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN