[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-5611-1 glibc -- glibc

ID: oval:org.secpod.oval:def:97878Date: (C)2024-02-09   (M)2024-04-03
Class: PATCHFamily: unix




The Qualys Research Labs discovered several vulnerabilities in the GNU C Library"s __vsyslog_internal function . A heap-based buffer overflow , an off-by-one heap overflow and an integer overflow can be exploited for privilege escalation or denial of service. Details can be found in the Qualys advisory at https://www.qualys.com/2024/01/30/syslog Additionally a memory corruption was discovered in the glibc"s qsort function, due to missing bounds check and when called by a program with a non-transitive comparison function and a large number of attacker-controlled elements. As the use of qsort with a non-transitive comparison function is undefined according to POSIX and ISO C standards, this is not considered a vulnerability in the glibc itself. However the qsort implementation was hardened against misbehaving callers. Details can be found in the Qualys advisory at https://www.qualys.com/2024/01/30/qsort

Platform:
Linux Mint 6
Product:
glibc-doc
libc-l10n
libc6
libc-devtools
glibc-source
locales
libc-bin
libc-dev-bin
nscd
Reference:
DSA-5611-1
CVE-2023-6246
CVE-2023-6779
CVE-2023-6780
CVE    3
CVE-2023-6780
CVE-2023-6779
CVE-2023-6246
CPE    7
cpe:/a:gnu:libc-bin
cpe:/a:gnu:glibc-source
cpe:/a:gnu:libc6
cpe:/a:libc-dev-bin:libc-dev-bin
...

© SecPod Technologies