BDU:2024-00852

Vulnerability from fstec - Published: 18.09.2023
VLAI Severity ?
Title
Уязвимость функции getaddrinfo библиотеки GNU C (glibc), позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость функции getaddrinfo библиотеки GNU C (glibc) связана с использованием памяти после её освобождения. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании
Vendor
Red Hat Inc., Canonical Ltd., Сообщество свободного программного обеспечения, NetApp Inc., Novell Inc., Fedora Project, АО «НТЦ ИТ РОСА», The GNU Project, Project Harbor
Software Name
Red Hat Enterprise Linux, Ubuntu, Debian GNU/Linux, ONTAP Select Deploy, openSUSE Tumbleweed, Red Hat Virtualization, Active IQ Unified Manager for VMware vSphere, NetApp HCI Baseboard Management Controller H410C, NetApp HCI Baseboard Management Controller H300S, NetApp HCI Baseboard Management Controller H500S, NetApp HCI Baseboard Management Controller H700S, NetApp HCI Baseboard Management Controller H410S, Fedora, AFF Baseboard Management Controller A700s, FAS/AFF Baseboard Management Controller A320, FAS/AFF Baseboard Management Controller C190, FAS/AFF Baseboard Management Controller A220, FAS/AFF Baseboard Management Controller FAS2720, FAS/AFF Baseboard Management Controller FAS2750, FAS/AFF Baseboard Management Controller A800, РОСА ХРОМ (запись в едином реестре российских программ №1607), NetApp SolidFire & HCI Storage Node, NetApp SolidFire & HCI Management Node, ATTO FibreBridge 7500N, ATTO FibreBridge 7600N, Brocade Fabric Operating System Firmware, Cloud Volumes ONTAP Mediator, FAS/AFF Baseboard Management Controller A250, FAS/AFF Baseboard Management Controller 500f, FAS/AFF Baseboard Management Controller C250, FAS/AFF Baseboard Management Controller C800, FAS/AFF Baseboard Management Controller A150, NetApp HCI Baseboard Management Controller H610C, NetApp HCI Baseboard Management Controller H610S, NetApp HCI Baseboard Management Controller H615C, NetApp HCI Compute Node BIOS, SUSE Liberty Linux, glibc, FAS/AFF Baseboard Management Controller A900, FAS/AFF Baseboard Management Controller 9500, FAS/AFF Baseboard Management Controller FAS2820, FAS/AFF Service Processor A300, FAS/AFF Service Processor 8200, FAS/AFF Service Processor 2650, FAS/AFF Service Processor 2620, FAS/AFF Service Processor A700, FAS/AFF Service Processor 9000, NetApp NFS Plug-in for VMware VAAI, ONTAP Tools for VMware vSphere, SnapCenter Plug-in for VMware vSphere/BlueXP backup and Recovery for Virtual Machine, harbor
Software Version
6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 16.04 LTS (Ubuntu), 8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), - (ONTAP Select Deploy), - (openSUSE Tumbleweed), 20.04 LTS (Ubuntu), 4 for RHEL 8 (Red Hat Virtualization), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), - (Active IQ Unified Manager for VMware vSphere), 22.04 LTS (Ubuntu), 9 (Red Hat Enterprise Linux), - (NetApp HCI Baseboard Management Controller H410C), - (NetApp HCI Baseboard Management Controller H300S), - (NetApp HCI Baseboard Management Controller H500S), - (NetApp HCI Baseboard Management Controller H700S), - (NetApp HCI Baseboard Management Controller H410S), 37 (Fedora), - (AFF Baseboard Management Controller A700s), - (FAS/AFF Baseboard Management Controller A320), - (FAS/AFF Baseboard Management Controller C190), - (FAS/AFF Baseboard Management Controller A220), - (FAS/AFF Baseboard Management Controller FAS2720), - (FAS/AFF Baseboard Management Controller FAS2750), - (FAS/AFF Baseboard Management Controller A800), 8.6 Extended Update Support (Red Hat Enterprise Linux), 38 (Fedora), 39 (Fedora), 18.04 ESM (Ubuntu), 23.04 (Ubuntu), 12.4 (РОСА ХРОМ), - (NetApp SolidFire & HCI Storage Node), - (NetApp SolidFire & HCI Management Node), - (ATTO FibreBridge 7500N), - (ATTO FibreBridge 7600N), - (Brocade Fabric Operating System Firmware), - (Cloud Volumes ONTAP Mediator), - (FAS/AFF Baseboard Management Controller A250), - (FAS/AFF Baseboard Management Controller 500f), - (FAS/AFF Baseboard Management Controller C250), - (FAS/AFF Baseboard Management Controller C800), - (FAS/AFF Baseboard Management Controller A150), - (NetApp HCI Baseboard Management Controller H610C), - (NetApp HCI Baseboard Management Controller H610S), - (NetApp HCI Baseboard Management Controller H615C), - (NetApp HCI Compute Node BIOS), 9 (SUSE Liberty Linux), 2.33 (glibc), - (FAS/AFF Baseboard Management Controller A900), - (FAS/AFF Baseboard Management Controller 9500), - (FAS/AFF Baseboard Management Controller FAS2820), - (FAS/AFF Service Processor A300), - (FAS/AFF Service Processor 8200), - (FAS/AFF Service Processor 2650), - (FAS/AFF Service Processor 2620), - (FAS/AFF Service Processor A700), - (FAS/AFF Service Processor 9000), - (NetApp NFS Plug-in for VMware VAAI), 9 (ONTAP Tools for VMware vSphere), - (SnapCenter Plug-in for VMware vSphere/BlueXP backup and Recovery for Virtual Machine), 8 (SUSE Liberty Linux), 2.7.0 (harbor)
Possible Mitigations
Использование рекомендаций: Для библиотеки GNU C: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=973fe93a5675c42798b2161c6f29c01b0e243994 Для Fedora: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/ Для программных продуктов NetApp Inc.: https://security.netapp.com/advisory/ntap-20240125-0008/ Для Debian GNU/Linux: https://security-tracker.debian.org/tracker/CVE-2023-4806 Для программных продуктов Red Hat Inc.: https://access.redhat.com/security/cve/CVE-2023-4806 Для программных продуктов Novell Inc.: https://www.suse.com/security/cve/CVE-2023-4806.html Для Ubuntu: https://ubuntu.com/security/notices/USN-6541-2 https://ubuntu.com/security/notices/USN-6541-1 Компенсирующие меры для Harbor : - отключение/удаление неиспользуемых учетных записей пользователей; - минимизация пользовательских привилегий; - использование антивирусных средств защиты; - контроль действий пользователей. Для операционной системы РОСА ХРОМ: https://abf.rosa.ru/advisories/ROSA-SA-2025-2637
Reference
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/ https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/ https://security.netapp.com/advisory/ntap-20240125-0008/ https://security-tracker.debian.org/tracker/CVE-2023-4806 https://access.redhat.com/security/cve/CVE-2023-4806 https://www.suse.com/security/cve/CVE-2023-4806.html https://ubuntu.com/security/notices/USN-6541-2 https://ubuntu.com/security/notices/USN-6541-1 https://abf.rosa.ru/advisories/ROSA-SA-2025-2637
CWE
CWE-416

{
  "CVSS 2.0": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
  "CVSS 3.0": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, NetApp Inc., Novell Inc., Fedora Project, \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb, The GNU Project, Project Harbor",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "6 (Red Hat Enterprise Linux), 7 (Red Hat Enterprise Linux), 16.04 LTS (Ubuntu), 8 (Red Hat Enterprise Linux), 10 (Debian GNU/Linux), - (ONTAP Select Deploy), - (openSUSE Tumbleweed), 20.04 LTS (Ubuntu), 4 for RHEL 8 (Red Hat Virtualization), 11 (Debian GNU/Linux), 12 (Debian GNU/Linux), - (Active IQ Unified Manager for VMware vSphere), 22.04 LTS (Ubuntu), 9 (Red Hat Enterprise Linux), - (NetApp HCI Baseboard Management Controller H410C), - (NetApp HCI Baseboard Management Controller H300S), - (NetApp HCI Baseboard Management Controller H500S), - (NetApp HCI Baseboard Management Controller H700S), - (NetApp HCI Baseboard Management Controller H410S), 37 (Fedora), - (AFF Baseboard Management Controller A700s), - (FAS/AFF Baseboard Management Controller A320), - (FAS/AFF Baseboard Management Controller C190), - (FAS/AFF Baseboard Management Controller A220), - (FAS/AFF Baseboard Management Controller FAS2720), - (FAS/AFF Baseboard Management Controller FAS2750), - (FAS/AFF Baseboard Management Controller A800), 8.6 Extended Update Support (Red Hat Enterprise Linux), 38 (Fedora), 39 (Fedora), 18.04 ESM (Ubuntu), 23.04 (Ubuntu), 12.4 (\u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c), - (NetApp SolidFire \u0026 HCI Storage Node), - (NetApp SolidFire \u0026 HCI Management Node), - (ATTO FibreBridge 7500N), - (ATTO FibreBridge 7600N), - (Brocade Fabric Operating System Firmware), - (Cloud Volumes ONTAP Mediator), - (FAS/AFF Baseboard Management Controller A250), - (FAS/AFF Baseboard Management Controller 500f), - (FAS/AFF Baseboard Management Controller C250), - (FAS/AFF Baseboard Management Controller C800), - (FAS/AFF Baseboard Management Controller A150), - (NetApp HCI Baseboard Management Controller H610C), - (NetApp HCI Baseboard Management Controller H610S), - (NetApp HCI Baseboard Management Controller H615C), - (NetApp HCI Compute Node BIOS), 9 (SUSE Liberty Linux), 2.33 (glibc), - (FAS/AFF Baseboard Management Controller A900), - (FAS/AFF Baseboard Management Controller 9500), - (FAS/AFF Baseboard Management Controller FAS2820), - (FAS/AFF Service Processor A300), - (FAS/AFF Service Processor 8200), - (FAS/AFF Service Processor 2650), - (FAS/AFF Service Processor 2620), - (FAS/AFF Service Processor A700), - (FAS/AFF Service Processor 9000), - (NetApp NFS Plug-in for VMware VAAI), 9 (ONTAP Tools for VMware vSphere), - (SnapCenter Plug-in for VMware vSphere/BlueXP backup and Recovery for Virtual Machine), 8 (SUSE Liberty Linux), 2.7.0 (harbor)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 GNU C:\nhttps://sourceware.org/git/gitweb.cgi?p=glibc.git;h=973fe93a5675c42798b2161c6f29c01b0e243994\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 NetApp Inc.:\nhttps://security.netapp.com/advisory/ntap-20240125-0008/\n\n\u0414\u043b\u044f Debian GNU/Linux:\nhttps://security-tracker.debian.org/tracker/CVE-2023-4806\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2023-4806\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/security/cve/CVE-2023-4806.html\n\n\u0414\u043b\u044f Ubuntu:\nhttps://ubuntu.com/security/notices/USN-6541-2\nhttps://ubuntu.com/security/notices/USN-6541-1\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b \u0434\u043b\u044f Harbor :\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435/\u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u043d\u0435\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439;\n- \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0430\u0446\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0437\u0430\u0449\u0438\u0442\u044b;\n- \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439.\n\n\u0414\u043b\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c: https://abf.rosa.ru/advisories/ROSA-SA-2025-2637",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "18.09.2023",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "05.03.2025",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "31.01.2024",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-00852",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-4806",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat Enterprise Linux, Ubuntu, Debian GNU/Linux, ONTAP Select Deploy, openSUSE Tumbleweed, Red Hat Virtualization, Active IQ Unified Manager for VMware vSphere, NetApp HCI Baseboard Management Controller H410C, NetApp HCI Baseboard Management Controller H300S, NetApp HCI Baseboard Management Controller H500S, NetApp HCI Baseboard Management Controller H700S, NetApp HCI Baseboard Management Controller H410S, Fedora, AFF Baseboard Management Controller A700s, FAS/AFF Baseboard Management Controller A320, FAS/AFF Baseboard Management Controller C190, FAS/AFF Baseboard Management Controller A220, FAS/AFF Baseboard Management Controller FAS2720, FAS/AFF Baseboard Management Controller FAS2750, FAS/AFF Baseboard Management Controller A800, \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607), NetApp SolidFire \u0026 HCI Storage Node, NetApp SolidFire \u0026 HCI Management Node, ATTO FibreBridge 7500N, ATTO FibreBridge 7600N, Brocade Fabric Operating System Firmware, Cloud Volumes ONTAP Mediator, FAS/AFF Baseboard Management Controller A250, FAS/AFF Baseboard Management Controller 500f, FAS/AFF Baseboard Management Controller C250, FAS/AFF Baseboard Management Controller C800, FAS/AFF Baseboard Management Controller A150, NetApp HCI Baseboard Management Controller H610C, NetApp HCI Baseboard Management Controller H610S, NetApp HCI Baseboard Management Controller H615C, NetApp HCI Compute Node BIOS, SUSE Liberty Linux, glibc, FAS/AFF Baseboard Management Controller A900, FAS/AFF Baseboard Management Controller 9500, FAS/AFF Baseboard Management Controller FAS2820, FAS/AFF Service Processor A300, FAS/AFF Service Processor 8200, FAS/AFF Service Processor 2650, FAS/AFF Service Processor 2620, FAS/AFF Service Processor A700, FAS/AFF Service Processor 9000, NetApp NFS Plug-in for VMware VAAI, ONTAP Tools for VMware vSphere, SnapCenter Plug-in for VMware vSphere/BlueXP backup and Recovery for Virtual Machine, harbor",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 6 , Red Hat Inc. Red Hat Enterprise Linux 7 , Canonical Ltd. Ubuntu 16.04 LTS , Red Hat Inc. Red Hat Enterprise Linux 8 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 10 , Novell Inc. openSUSE Tumbleweed - , Canonical Ltd. Ubuntu 20.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 11 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 12 , Canonical Ltd. Ubuntu 22.04 LTS , Red Hat Inc. Red Hat Enterprise Linux 9 , Fedora Project Fedora 37 , Red Hat Inc. Red Hat Enterprise Linux 8.6 Extended Update Support , Fedora Project Fedora 38 , Fedora Project Fedora 39 , Canonical Ltd. Ubuntu 18.04 ESM , Canonical Ltd. Ubuntu 23.04 , \u0410\u041e \u00ab\u041d\u0422\u0426 \u0418\u0422 \u0420\u041e\u0421\u0410\u00bb \u0420\u041e\u0421\u0410 \u0425\u0420\u041e\u041c 12.4  (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21161607), Novell Inc. SUSE Liberty Linux 9 , Novell Inc. SUSE Liberty Linux 8 ",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 getaddrinfo \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 GNU C (glibc), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e  \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0444\u0443\u043d\u043a\u0446\u0438\u0438 getaddrinfo \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 GNU C (glibc) \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u0435\u0451 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4DBUQRRPB47TC3NJOUIBVWUGFHBJAFDL/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DFG4P76UHHZEWQ26FWBXG76N2QLKKPZA/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NDAQWHTSVOCOZ5K6KPIWKRT3JX4RTZUR/\nhttps://security.netapp.com/advisory/ntap-20240125-0008/\nhttps://security-tracker.debian.org/tracker/CVE-2023-4806\nhttps://access.redhat.com/security/cve/CVE-2023-4806\nhttps://www.suse.com/security/cve/CVE-2023-4806.html\nhttps://ubuntu.com/security/notices/USN-6541-2\nhttps://ubuntu.com/security/notices/USN-6541-1\nhttps://abf.rosa.ru/advisories/ROSA-SA-2025-2637",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0410\u0421\u0423 \u0422\u041f, \u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,9)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…