USN-6804-1: GNU C Library vulnerabilities
31 May 2024
Several security issues were fixed in GNU C Library.
Releases
Packages
- glibc - GNU C Library
Details
It was discovered that GNU C Library nscd daemon contained a stack-based buffer
overflow. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-33599)
It was discovered that GNU C Library nscd daemon did not properly check the
cache content, leading to a null pointer dereference vulnerability. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2024-33600)
It was discovered that GNU C Library nscd daemon did not properly validate
memory allocation in certain situations, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-33601)
It was discovered that GNU C Library nscd daemon did not properly handle memory
allocation, which could lead to memory corruption. A local attacker could use
this to cause a denial of service (system crash). (CVE-2024-33602)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.04
Ubuntu 23.10
Ubuntu 22.04
Ubuntu 20.04
Ubuntu 18.04
-
nscd
-
2.27-3ubuntu1.6+esm3
Available with Ubuntu Pro
Ubuntu 16.04
-
nscd
-
2.23-0ubuntu11.3+esm7
Available with Ubuntu Pro
After a standard system update you need to restart nscd to make
all the necessary changes.