First published: Thu Feb 01 2024(Updated: )
It was discovered that the GNU C Library incorrectly handled the syslog() function call. A local attacker could use this issue to execute arbitrary code and possibly escalate privileges.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libc6 | <2.38-1ubuntu6.1 | 2.38-1ubuntu6.1 |
Ubuntu | =23.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of USN-6620-1 is high due to the potential for local code execution and privilege escalation.
To fix USN-6620-1, update the GNU C Library package to version 2.38-1ubuntu6.1 on Ubuntu 23.10.
USN-6620-1 affects Ubuntu 23.10 systems that use libc6 version prior to 2.38-1ubuntu6.1.
No, USN-6620-1 requires local access to the system to exploit the vulnerability.
USN-6620-1 involves risks of arbitrary code execution which can lead to privilege escalation on the affected system.