First published: Wed Dec 13 2023(Updated: )
An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/glibc | <2.39 | 2.39 |
ubuntu/glibc | <2.38-1ubuntu6.1 | 2.38-1ubuntu6.1 |
ubuntu/glibc | <2.37-15 | 2.37-15 |
debian/glibc | 2.28-10+deb10u1 2.28-10+deb10u2 2.31-13+deb11u8 2.31-13+deb11u7 2.36-9+deb12u4 2.37-15 2.37-17 | |
GNU C Library | =2.37 | |
GNU C Library | =2.36 | |
GNU C Library | >=2.37<2.39 | |
Fedora | =38 | |
Fedora | =39 | |
GNU C Library | <2.39 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-6779 has a high severity rating due to its potential to allow remote code execution via a heap-based buffer overflow.
To fix CVE-2023-6779, upgrade to glibc version 2.39 or later, or apply patches provided by your operating system vendor.
CVE-2023-6779 affects glibc versions 2.36 and 2.37, and prior versions before 2.39.
Yes, CVE-2023-6779 is present in various Linux distributions that utilize vulnerable versions of the glibc library.
Exploiting CVE-2023-6779 can lead to unauthorized access and the ability to execute arbitrary code with elevated privileges.