Description
An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5611-1 | glibc security update |
EUVD |
EUVD-2023-58991 | An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer. |
Ubuntu USN |
USN-6620-1 | GNU C Library vulnerabilities |
References
History
Fri, 13 Jun 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-06-13T16:08:42.227Z
Reserved: 2023-12-13T14:37:37.111Z
Link: CVE-2023-6779
Updated: 2024-08-02T08:42:07.403Z
Status : Modified
Published: 2024-01-31T14:15:48.700
Modified: 2024-11-21T08:44:32.693
Link: CVE-2023-6779
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Ubuntu USN