Описание
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
Релиз | Статус | Примечание |
---|---|---|
devel | DNE | |
esm-infra-legacy/trusty | needs-triage | |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
mantic | DNE | |
noble | DNE | |
oracular | DNE | |
plucky | DNE | |
trusty/esm | ignored | end of ESM support, was needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 2.40-4ubuntu1 |
esm-infra/bionic | released | 2.27-3ubuntu1.6+esm3 |
esm-infra/focal | not-affected | 2.31-0ubuntu9.16 |
esm-infra/xenial | released | 2.23-0ubuntu11.3+esm7 |
focal | released | 2.31-0ubuntu9.16 |
jammy | released | 2.35-0ubuntu3.8 |
mantic | released | 2.38-1ubuntu6.3 |
noble | released | 2.39-0ubuntu8.2 |
oracular | not-affected | 2.40-1ubuntu3 |
plucky | not-affected | 2.40-4ubuntu1 |
Показывать по
EPSS
8.1 High
CVSS3
Связанные уязвимости
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
nscd: Stack-based buffer overflow in netgroup cache If the Name Servi ...
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
EPSS
8.1 High
CVSS3