MGASA-2024-0173

Source
https://advisories.mageia.org/MGASA-2024-0173.html
Import Source
https://advisories.mageia.org/MGASA-2024-0173.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0173
Related
Published
2024-05-10T16:09:48Z
Modified
2024-05-10T15:29:05Z
Summary
Updated glibc packages fix security vulnerabilities
Details

Stack-based buffer overflow in netgroup cache: If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. (CVE-2024-33599) Null pointer crashes after notfound response: If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. (CVE-2024-33600) Netgroup cache may terminate daemon on memory allocation failure: The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients. (CVE-2024-33601) Netgroup cache assumes NSS callback uses in-buffer strings: The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. (CVE-2024-33602)

References
Credits

Affected packages

Mageia:9 / glibc

Package

Name
glibc
Purl
pkg:rpm/mageia/glibc?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.36-54.mga9

Ecosystem specific

{
    "section": "core"
}