You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Name: glibc CVEs: CVE-2023-4527, CVE-2023-4806 CVSSs: 8.2, 7.5 Action Needed: update to >= 2.37-r5 or >= 2.38-r2
Summary:
CVE-2023-4527: A flaw was found in glibc. When the getaddrinfo function is called with the AF_UNSPEC address family and the system is configured with no-aaaa mode via /etc/resolv.conf, a DNS response via TCP larger than 2048 bytes can potentially disclose stack contents through the function returned address data, and may cause a crash.
CVE-2023-4806: A flaw was found in glibc. In an extremely rare situation, the getaddrinfo function may access memory that has been freed, resulting in an application crash. This issue is only exploitable when a NSS module implements only the nss_gethostbyname2_r and nss_getcanonname_r hooks without implementing the nss*_gethostbyname3_r hook. The resolved name should return a large number of IPv6 and IPv4, and the call to the getaddrinfo function should have the AF_INET6 address family with AI_CANONNAME, AI_ALL and AI_V4MAPPED as flags.
Name: glibc
CVEs: CVE-2023-4527, CVE-2023-4806
CVSSs: 8.2, 7.5
Action Needed: update to >= 2.37-r5 or >= 2.38-r2
Summary:
refmap.gentoo: https://bugs.gentoo.org/914281
The text was updated successfully, but these errors were encountered: