Aurelien Jarno pushed to branch bullseye-security at GNU Libc Maintainers / 
glibc


Commits:
08dcff14 by Aurelien Jarno at 2024-04-30T23:22:04+02:00
debian/patches/local-CVE-2024-33599-nscd.patch: Fix a stack-based buffer 
overflow in nscd netgroup cache (CVE-2024-33599).

- - - - -
b2d2f5f6 by Aurelien Jarno at 2024-04-30T23:22:51+02:00
debian/patches/local-CVE-2024-33600-nscd.patch: Fix a null pointer dereferences 
in nscd after failed netgroup cache insertion (CVE-2024-33600).

- - - - -
7344d1e3 by Aurelien Jarno at 2024-04-30T23:23:28+02:00
debian/patches/any/local-CVE-2024-33601-33602-nscd.patch: Fix a DoS in nscd in 
case of memory allocation failure (CVE-2024-33601) and a memory corruption in 
nscd when the underlying NSS callback function does not use the buffer space to 
store all strings (CVE-2024-33602).

- - - - -
b716d81b by Aurelien Jarno at 2024-04-30T23:57:25+02:00
releasing package glibc version 2.31-13+deb11u10

- - - - -


5 changed files:

- debian/changelog
- + debian/patches/any/local-CVE-2024-33599-nscd.patch
- + debian/patches/any/local-CVE-2024-33600-nscd.patch
- + debian/patches/any/local-CVE-2024-33601-33602-nscd.patch
- debian/patches/series


View it on GitLab: 
https://salsa.debian.org/glibc-team/glibc/-/compare/6ad1212b40891dee66059b6d2e39be69b82884af...b716d81b3030de9e87284fa61940d74b8902b453

-- 
View it on GitLab: 
https://salsa.debian.org/glibc-team/glibc/-/compare/6ad1212b40891dee66059b6d2e39be69b82884af...b716d81b3030de9e87284fa61940d74b8902b453
You're receiving this email because of your account on salsa.debian.org.


Reply via email to