vulnerability

SUSE: CVE-2024-33599: SUSE Linux Security Advisory

Severity
8
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:C)
Published
05/06/2024
Added
05/20/2024
Modified
02/18/2025

Description

nscd: Stack-based buffer overflow in netgroup cache

If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted
by client requests then a subsequent client request for netgroup data
may result in a stack-based buffer overflow. This flaw was introduced
in glibc 2.15 when the cache was added to nscd.

This vulnerability is only present in the nscd binary.

Solution(s)

suse-upgrade-glibcsuse-upgrade-glibc-32bitsuse-upgrade-glibc-develsuse-upgrade-glibc-devel-32bitsuse-upgrade-glibc-devel-staticsuse-upgrade-glibc-devel-static-32bitsuse-upgrade-glibc-extrasuse-upgrade-glibc-htmlsuse-upgrade-glibc-i18ndatasuse-upgrade-glibc-infosuse-upgrade-glibc-langsuse-upgrade-glibc-localesuse-upgrade-glibc-locale-32bitsuse-upgrade-glibc-locale-basesuse-upgrade-glibc-locale-base-32bitsuse-upgrade-glibc-profilesuse-upgrade-glibc-profile-32bitsuse-upgrade-glibc-utilssuse-upgrade-glibc-utils-32bitsuse-upgrade-nscd
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.