CVE-2023-6779: glibc syslog heap-overflow through secondary buffer expansion
763ba396-8e14-4ab5-9def-3c8af6c24e62
Heap overflow vulnerability in glibc's syslog logging subsystem (version 2.37 and earlier). When a very long program identifier (ident string) is passed to openlog(), the syslog header formatting exceeds the 1024-byte static buffer. The code fails to properly track the required buffer size when the header exceeds the static buffer limit, leading to malloc(1) being called instead of the correct size. Subsequent snprintf() calls write the full header and message into this undersized heap buffer, causing a heap overflow that can lead to memory corruption and potential code execution.",