[ubuntu/oracular-proposed] glibc 2.39-0ubuntu9 (Accepted)
Paulo Flabiano Smorigo
pfsmorigo at canonical.com
Mon Jun 10 15:55:31 UTC 2024
glibc (2.39-0ubuntu9) oracular; urgency=medium
* SECURITY UPDATE: Stack-based buffer overflow
- debian/patches/any/CVE-2024-33599.patch: CVE-2024-33599: nscd: Stack-
based buffer overflow in netgroup cache.
- CVE-2024-33599
* SECURITY UPDATE: Null pointer
- debian/patches/any/CVE-2024-33600_1.patch: CVE-2024-33600: nscd:
Avoid null pointer crashes after notfound response.
- debian/patches/any/CVE-2024-33600_2.patch: CVE-2024-33600: nscd: Do
not send missing not-found response in addgetnetgrentX.
- CVE-2024-33600
* SECURITY UPDATE: Memory corruption
- debian/patches/any/CVE-2024-33601_33602.patch: CVE-2024-33601, CVE-
2024-33602: nscd: netgroup: Use two buffers in addgetnetgrentX.
- CVE-2024-33601
- CVE-2024-33602
Date: Mon, 10 Jun 2024 09:37:39 -0300
Changed-By: Paulo Flabiano Smorigo <pfsmorigo at canonical.com>
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Signed-By: Marc Deslauriers <marc.deslauriers at canonical.com>
https://launchpad.net/ubuntu/+source/glibc/2.39-0ubuntu9
-------------- next part --------------
Format: 1.8
Date: Mon, 10 Jun 2024 09:37:39 -0300
Source: glibc
Built-For-Profiles: noudeb
Architecture: source
Version: 2.39-0ubuntu9
Distribution: oracular
Urgency: medium
Maintainer: Ubuntu Developers <ubuntu-devel-discuss at lists.ubuntu.com>
Changed-By: Paulo Flabiano Smorigo <pfsmorigo at canonical.com>
Changes:
glibc (2.39-0ubuntu9) oracular; urgency=medium
.
* SECURITY UPDATE: Stack-based buffer overflow
- debian/patches/any/CVE-2024-33599.patch: CVE-2024-33599: nscd: Stack-
based buffer overflow in netgroup cache.
- CVE-2024-33599
* SECURITY UPDATE: Null pointer
- debian/patches/any/CVE-2024-33600_1.patch: CVE-2024-33600: nscd:
Avoid null pointer crashes after notfound response.
- debian/patches/any/CVE-2024-33600_2.patch: CVE-2024-33600: nscd: Do
not send missing not-found response in addgetnetgrentX.
- CVE-2024-33600
* SECURITY UPDATE: Memory corruption
- debian/patches/any/CVE-2024-33601_33602.patch: CVE-2024-33601, CVE-
2024-33602: nscd: netgroup: Use two buffers in addgetnetgrentX.
- CVE-2024-33601
- CVE-2024-33602
Checksums-Sha1:
dbb6b5a8939dd919733771426b84cbb03ab62294 9379 glibc_2.39-0ubuntu9.dsc
de98035baad5c9bd9849a96697e586b68b9602ad 462644 glibc_2.39-0ubuntu9.debian.tar.xz
68fb835a03c5296ca43c930d3bc981a62baaa08b 10729 glibc_2.39-0ubuntu9_source.buildinfo
Checksums-Sha256:
11543e45c0ac9d2c2ea7cde1c96e0eb64a8ec23f8ba9662bb36b198dfaa5ec1e 9379 glibc_2.39-0ubuntu9.dsc
e4106c028f95e015d08c2de7022f9f6dc7feb7f536c1dea8fe0ec705431c5150 462644 glibc_2.39-0ubuntu9.debian.tar.xz
d4bcb651166a3aae09ad7b27e23aea95501e075e621dada33c0613b49357f9c1 10729 glibc_2.39-0ubuntu9_source.buildinfo
Files:
09ab51552e4e70103c52324703eeaefd 9379 libs required glibc_2.39-0ubuntu9.dsc
9e51e30f07cba8c5f7d3e51eb674cf4e 462644 libs required glibc_2.39-0ubuntu9.debian.tar.xz
f41afd9773518fc27810b8aa0fd98181 10729 libs required glibc_2.39-0ubuntu9_source.buildinfo
Original-Maintainer: GNU Libc Maintainers <debian-glibc at lists.debian.org>
Original-Vcs-Browser: https://salsa.debian.org/glibc-team/glibc
Original-Vcs-Git: https://salsa.debian.org/glibc-team/glibc.git
More information about the oracular-changes
mailing list