CVE-2024-33599
06.05.2024, 20:15
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | glibc | 2.15 ≤ 𝑥 < 2.40 |
debian | debian_linux | 10.0 |
netapp | h300s_firmware | - |
netapp | h500s_firmware | - |
netapp | h700s_firmware | - |
netapp | h410s_firmware | - |
netapp | h410c_firmware | - |
netapp | hci_bootstrap_os | - |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
eglibc |
| ||||||||||||||||
glibc |
|
Common Weakness Enumeration
References