Описание
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | needs-triage | |
| esm-infra/focal | DNE | |
| focal | DNE | |
| jammy | DNE | |
| mantic | DNE | |
| noble | DNE | |
| oracular | DNE | |
| plucky | DNE | |
| questing | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 2.40-4ubuntu1 |
| esm-infra/bionic | released | 2.27-3ubuntu1.6+esm3 |
| esm-infra/focal | released | 2.31-0ubuntu9.16 |
| esm-infra/xenial | released | 2.23-0ubuntu11.3+esm7 |
| focal | released | 2.31-0ubuntu9.16 |
| jammy | released | 2.35-0ubuntu3.8 |
| mantic | released | 2.38-1ubuntu6.3 |
| noble | released | 2.39-0ubuntu8.2 |
| oracular | not-affected | 2.40-1ubuntu3 |
| plucky | not-affected | 2.40-4ubuntu1 |
Показывать по
EPSS
8.1 High
CVSS3
Связанные уязвимости
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
nscd: Stack-based buffer overflow in netgroup cache If the Name Servi ...
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
EPSS
8.1 High
CVSS3