An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5611-1 | glibc security update |
EUVD |
EUVD-2023-58991 | An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer. |
Ubuntu USN |
USN-6620-1 | GNU C Library vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 13 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-06-13T16:08:42.227Z
Reserved: 2023-12-13T14:37:37.111Z
Link: CVE-2023-6779
Updated: 2024-08-02T08:42:07.403Z
Status : Modified
Published: 2024-01-31T14:15:48.700
Modified: 2024-11-21T08:44:32.693
Link: CVE-2023-6779
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN