{"id":"CVE-2023-6779","details":"An off-by-one heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when these functions are called with a message bigger than INT_MAX bytes, leading to an incorrect calculation of the buffer size to store the message, resulting in an application crash. This issue affects glibc 2.37 and newer.","modified":"2026-04-11T12:46:56.259280Z","published":"2024-01-31T14:15:48.700Z","related":["CGA-99fv-6vgf-mmr2","MGASA-2024-0026","USN-6620-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"38"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*"},{"extracted_events":[{"last_affected":"39"}],"source":"CPE_FIELD","cpe":"cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*"}]},"references":[{"type":"ADVISORY","url":"https://access.redhat.com/security/cve/CVE-2023-6779"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202402-01"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240223-0006/"},{"type":"ADVISORY","url":"https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2254395"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D2FIH77VHY3KCRROCXOT6L27WMZXSJ2G/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWQ6BZJ6CV5UAW4VZSKJ6TO4KIW2KWAQ/"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/176932/glibc-syslog-Heap-Based-Buffer-Overflow.html"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2024/Feb/3"},{"type":"EVIDENCE","url":"https://www.openwall.com/lists/oss-security/2024/01/30/6"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://sourceware.org/git/glibc.git","events":[{"introduced":"a704fd9a133bfb10510e18702f48a6a9c88dbbd5"},{"fixed":"ef321e23c20eebc6d6fb4044425c00e6df27b05f"}],"database_specific":{"extracted_events":[{"introduced":"2.37"},{"fixed":"2.39"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:gnu:glibc:*:*:*:*:*:*:*:*"}}],"versions":["glibc-2.37","glibc-2.37.9000","glibc-2.38","glibc-2.38.9000"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-6779.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}