发布时间: 2024年5月10日
修改时间: 2024年6月7日
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
NVD | openEuler | |
---|---|---|
CVSS评分 | 7.6 | |
Attack Vector | Network | |
Attack Complexity | Low | |
Privileges Required | Low | |
User Interaction | None | |
Scope | Unchanged | |
Confidentiality | Low | |
Integrity | Low | |
Availability | High |
公告名 | 概要 | 发布时间 |
---|---|---|
KylinSec-SA-2024-2345 | glibc security update | 2024年5月17日 |
KylinSec-SA-2024-3496 | glibc security update | 2024年5月10日 |
产品 | 包 | 状态 |
---|---|---|
KY3.4-4A | glibc | Fixed |
KY3.4-5A | glibc | Fixed |
KY3.5.1 | glibc | Fixed |
KY3.5.2 | glibc | Fixed |