[ubuntu/jammy-security] glibc 2.35-0ubuntu3.8 (Accepted)
Paulo Flabiano Smorigo
pfsmorigo at canonical.com
Wed May 29 15:21:01 UTC 2024
glibc (2.35-0ubuntu3.8) jammy-security; urgency=medium
* SECURITY UPDATE: Stack-based buffer overflow
- debian/patches/CVE-2024-33599.patch: CVE-2024-33599: nscd: Stack-
based buffer overflow in netgroup cache.
- CVE-2024-33599
* SECURITY UPDATE: Null pointer
- debian/patches/CVE-2024-33600_1.patch: CVE-2024-33600: nscd: Avoid
null pointer crashes after notfound response.
- debian/patches/CVE-2024-33600_2.patch: CVE-2024-33600: nscd: Do
not send missing not-found response in addgetnetgrentX.
- CVE-2024-33600
* SECURITY UPDATE: Memory corruption
- debian/patches/CVE-2024-33601_33602.patch: CVE-2024-33601, CVE-
2024-33602: nscd: netgroup: Use two buffers in addgetnetgrentX.
- CVE-2024-33601
- CVE-2024-33602
Date: 2024-05-06 22:15:11.437751+00:00
Changed-By: Paulo Flabiano Smorigo <pfsmorigo at canonical.com>
https://launchpad.net/ubuntu/+source/glibc/2.35-0ubuntu3.8
-------------- next part --------------
Sorry, changesfile not available.
More information about the jammy-changes
mailing list