CVE-2024-33599
Published: April 26, 2024Last modified: April 27, 2024
Description
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | glibc | Fixed (2.37.0-r13) |
Stream | glibc | Fixed (2.37.0-r13) |
References
- http://www.openwall.com/lists/oss-security/2024/07/22/5
- https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html
- https://security.netapp.com/advisory/ntap-20240524-0011/
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005