Skip to main content
Version: latest

CVE-2023-0687

CVE Details

Visit the official vulnerability details page for CVE-2023-0687 to learn more.

Initial Publication

01/27/2025

Last Update

02/21/2025

Third Party Dependency

glibc

NIST CVE Summary

A vulnerability was found in GNU C Library 2.38. It has been declared as critical. This vulnerability affects the function __monstartup of the file gmon.c of the component Call Graph Monitor. The manipulation leads to buffer overflow. It is recommended to apply a patch to fix this issue. VDB-220246 is the identifier assigned to this vulnerability. NOTE: The real existence of this vulnerability is still doubted at the moment. The inputs that induce this vulnerability are basically addresses of the running application that is built with gmon enabled. It's basically trusted input or input that needs an actual security flaw to be compromised or controlled.

CVE Severity

9.8

Our Official Summary

This CVE identifies a potential buffer overflow vulnerability in the GNU C Library's __monstartup function within gmon.c. However, its exploitability is disputed due to the requirement of trusted inputs and specific conditions. Upstream maintainers have disputed the CVE's validity, and several distributions, including Ubuntu, have marked it as not affecting their systems.

The risk for our products is low. A upstream fix when available for the third party images will be adopted.

Status

Ongoing

Affected Products & Versions

VersionPalette EnterprisePalette Enterprise AirgapVerteXVerteX Airgap
4.6.7⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.6.6⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.5.22⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.5.21⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact
4.5.20⚠️ Impacted✅ No Impact⚠️ Impacted✅ No Impact

Revision History

DateRevision
02/21/2025Impacted versions changed from 4.5.20, 4.5.21, 4.5.22, 4.6.6 to 4.5.20, 4.5.21, 4.5.22, 4.6.6, 4.6.7
02/17/2025Impacted versions changed from 4.5.20, 4.5.21, 4.5.22 to 4.5.20, 4.5.21, 4.5.22, 4.6.6
02/14/2025Status changed from Open to Ongoing
02/14/2025Official summary added
02/14/2025Impacted versions changed from 4.5.20, 4.5.21 to 4.5.20, 4.5.21, 4.5.22
02/05/2025Impacted versions changed from 4.5.20 to 4.5.20, 4.5.21