CVE-2023-6779

Updated: 2024-02-27 20:24:34.777254

Description:

An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0
CVSS Version 3.x HIGH 7.5

Status

OS name Project name Version Score Severity Status Errata Last updated
AlmaLinux 9.2 ESU glibc 2.34 7.5 HIGH Not Vulnerable 2024-02-12 04:08:44
CentOS 6 ELS glibc 2.12 7.5 HIGH Not Vulnerable 2024-02-16 03:36:02
CentOS 7 ELS glibc 2.17 7.5 HIGH Not Vulnerable 2024-02-28 08:39:45
CentOS 8.4 ELS glibc 2.28 7.5 HIGH Not Vulnerable 2024-02-12 04:08:44
CentOS 8.5 ELS glibc 2.28 7.5 HIGH Not Vulnerable 2024-02-12 04:08:44
CloudLinux 6 ELS glibc 2.12 7.5 HIGH Not Vulnerable 2024-02-23 08:38:19
Oracle Linux 6 ELS glibc 2.12 7.5 HIGH Not Vulnerable 2024-02-23 08:38:19
Ubuntu 16.04 ELS glibc 2.23-0 7.5 HIGH Not Vulnerable 2024-02-12 10:08:32
Ubuntu 18.04 ELS glibc 2.27-3 7.5 HIGH Not Vulnerable 2024-02-12 10:08:33