Bug 2249053 (CVE-2023-6246)

Summary: CVE-2023-6246 glibc: heap-based buffer overflow in __vsyslog_internal()
Product: [Other] Security Response Reporter: Pedro Sampaio <psampaio>
Component: vulnerabilityAssignee: Product Security <prodsec-ir-bot>
Status: NEW --- QA Contact:
Severity: high Docs Contact:
Priority: high    
Version: unspecifiedCC: aarif, adudiak, agarcial, aoconnor, apatel, aprice, asegurap, ashankar, bdettelb, caswilli, codonell, dfreiber, dhalasz, dj, dkuc, drow, fjansen, fweimer, ganandan, ggastald, gsuckevi, hkataria, jburrell, jmitchel, jsamir, jsherril, jtanner, kaycoth, kgaikwad, kshier, luizcosta, mpierce, nweather, omaciel, orabin, pfrankli, psegedy, sbiarozk, security-response-team, sipoyare, stcannon, sthirugn, supatil, tsasak, vkrizan, vkumar, vmugicag, yguenane
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: glibc 2.39 Doc Type: If docs needed, set a value
Doc Text:
A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2261987    
Bug Blocks: 2249054    

Description Pedro Sampaio 2023-11-10 13:17:32 UTC
A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.

Comment 1 Florian Weimer 2023-11-15 12:40:39 UTC
Isn't this a duplicate of bug 2123394?

Comment 2 Guilherme de Almeida Suckevicz 2023-11-17 18:28:59 UTC
Hi @fweimer, it's not the same issue. The comment#0 will be updated to have more details as soon as possible.

Comment 13 Guilherme de Almeida Suckevicz 2024-01-30 18:46:19 UTC
Created glibc tracking bugs for this issue:

Affects: fedora-all [bug 2261987]