mirror of
https://sourceware.org/git/glibc.git
synced 2024-11-21 12:30:06 +00:00
d4d9a805a5
This commit adds advisory data for the above CVE(s). Reviewed-by: Siddhesh Poyarekar <siddhesh@sourceware.org>
23 lines
1.1 KiB
Plaintext
23 lines
1.1 KiB
Plaintext
nscd: Stack-based buffer overflow in netgroup cache
|
|
|
|
If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
|
|
by client requests then a subsequent client request for netgroup data
|
|
may result in a stack-based buffer overflow. This flaw was introduced
|
|
in glibc 2.15 when the cache was added to nscd.
|
|
|
|
This vulnerability is only present in the nscd binary.
|
|
|
|
CVE-Id: CVE-2024-33599
|
|
Public-Date: 2024-04-23
|
|
Vulnerable-Commit: 684ae515993269277448150a1ca70db3b94aa5bd (2.15)
|
|
Fix-Commit: 69c58d5ef9f584ea198bd00f7964d364d0e6b921 (2.31-155)
|
|
Fix-Commit: a77064893bfe8a701770e2f53a4d33805bc47a5a (2.32-141)
|
|
Fix-Commit: 5c75001a96abcd50cbdb74df24c3f013188d076e (2.33-264)
|
|
Fix-Commit: 52f73e5c4e29b14e79167272297977f360ae1e97 (2.34-460)
|
|
Fix-Commit: 7a95873543ce225376faf13bb71c43dea6d24f86 (2.35-316)
|
|
Fix-Commit: caa3151ca460bdd9330adeedd68c3112d97bffe4 (2.36-165)
|
|
Fix-Commit: f75c298e747b2b8b41b1c2f551c011a52c41bfd1 (2.37-91)
|
|
Fix-Commit: 5968aebb86164034b8f8421b4abab2f837a5bdaf (2.38-72)
|
|
Fix-Commit: 1263d583d2e28afb8be53f8d6922f0842036f35d (2.39-35)
|
|
Fix-Commit: 87801a8fd06db1d654eea3e4f7626ff476a9bdaa (2.40)
|