[Git][security-tracker-team/security-tracker][master] Track fixed version for glibc issues fixed via unstable
Salvatore Bonaccorso (@carnil)
carnil at debian.org
Sun Apr 28 12:13:21 BST 2024
Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker
Commits:
4711197a by Salvatore Bonaccorso at 2024-04-28T13:12:32+02:00
Track fixed version for glibc issues fixed via unstable
- - - - -
1 changed file:
- data/CVE/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -360,26 +360,26 @@ CVE-2024-27282 [Arbitrary memory address read vulnerability with Regex search]
NOTE: https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/
NOTE: https://github.com/ruby/ruby/commit/989a2355808a63fc45367785c82ffd46d18c900a
CVE-2024-33602 [nscd: netgroup cache assumes NSS callback uses in-buffer strings]
- - glibc <unfixed>
+ - glibc 2.37-19
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=31680
NOTE: https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/
NOTE: https://www.openwall.com/lists/oss-security/2024/04/24/2
NOTE: Fixed by: https://sourceware.org/git?p=glibc.git;a=commit;h=c04a21e050d64a1193a6daab872bca2528bda44b
CVE-2024-33601 [nscd: netgroup cache may terminate daemon on memory allocation failure]
- - glibc <unfixed>
+ - glibc 2.37-19
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=31679
NOTE: https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/
NOTE: https://www.openwall.com/lists/oss-security/2024/04/24/2
NOTE: Fixed by: https://sourceware.org/git?p=glibc.git;a=commit;h=c04a21e050d64a1193a6daab872bca2528bda44b
CVE-2024-33600 [nscd: Null pointer dereferences after failed netgroup cache insertion]
- - glibc <unfixed>
+ - glibc 2.37-19
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=31678
NOTE: https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/
NOTE: https://www.openwall.com/lists/oss-security/2024/04/24/2
NOTE: Fixed by: https://sourceware.org/git?p=glibc.git;a=commit;h=b048a482f088e53144d26a61c390bed0210f49f2
NOTE: Fixed by: https://sourceware.org/git/?p=glibc.git;a=commit;h=7835b00dbce53c3c87bbbb1754a95fb5e58187aa
CVE-2024-33599 [nscd: netgroup cache: invalid memcpy under low memory/storage conditions]
- - glibc <unfixed>
+ - glibc 2.37-19
NOTE: https://sourceware.org/bugzilla/show_bug.cgi?id=31677
NOTE: https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/
NOTE: https://www.openwall.com/lists/oss-security/2024/04/24/2
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4711197afc19fdb2d94e9d6407c438346a3dd80b
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/4711197afc19fdb2d94e9d6407c438346a3dd80b
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20240428/67aa8fb2/attachment.htm>
More information about the debian-security-tracker-commits
mailing list