nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: glibc

Published: 2024-05-06T19:21:54.314Z

Updated: 2024-08-02T02:36:04.290Z

Reserved: 2024-04-24T20:35:08.340Z

Link: CVE-2024-33599

cve-icon Vulnrichment

Updated: 2024-05-29T19:01:22.692Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-06T20:15:11.437

Modified: 2024-11-21T09:17:13.847

Link: CVE-2024-33599

cve-icon Redhat

Severity : Important

Publid Date: 2024-04-23T00:00:00Z

Links: CVE-2024-33599 - Bugzilla