CVE-2024-33599 Affecting glibc package, versions <2.31-13+deb11u10


low

Snyk CVSS

      Threat Intelligence

      EPSS 0.04% (9th percentile)
    Expand this section
    Red Hat
    7.6 high

    Do your applications use this vulnerable package?

    In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

    Test your applications
    • Snyk ID SNYK-DEBIAN11-GLIBC-6673955
    • published 26 Apr 2024
    • disclosed 6 May 2024

    Introduced: 26 Apr 2024

    New CVE-2024-33599 Open this link in a new tab

    How to fix?

    Upgrade Debian:11 glibc to version 2.31-13+deb11u10 or higher.

    NVD Description

    Note: Versions mentioned in the description apply only to the upstream glibc package and not the glibc package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

    nscd: Stack-based buffer overflow in netgroup cache

    If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd.

    This vulnerability is only present in the nscd binary.