- glibc_2.35-0ubuntu3.6 ()
- 2.35-0ubuntu3.9
- 2025-02-25 13:30:09
- CVE CVE-2024-2961, CVSSv2 Score: 8.8
- Description:
The iconv() function in the GNU C Library versions 2.39 and older may overflow the output buffer passed to it by up to 4 bytes when converting strings to the ISO-2022-CN-EXT character set, which may be used to crash an application or overwrite a neighbouring variable.
- Patch: glibc/2.35/CVE-2024-2961.patch
- CVE CVE-2024-33599, CVSSv2 Score: 7.6
- Description:
nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon’s (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
- Patch: glibc/2.35/CVE-2024-33599.patch
- CVE CVE-2024-33600, CVSSv2 Score: 5.3
- Description:
nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon’s (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
- Patch: glibc/2.35/CVE-2024-33600_1.patch
- CVE CVE-2024-33600, CVSSv2 Score: 5.3
- Description:
nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon’s (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary.
- Patch: glibc/2.35/CVE-2024-33600_2.patch
- CVE CVE-2024-33601 CVE-2024-33602, CVSSv2 Score: 4.0
- Description:
nscd: netgroup cache assumes NSS callback uses in-buffer strings
- Patch: glibc/2.35/CVE-2024-33601_33602.patch
- CVE CVE-2025-0395, CVSSv2 Score: 5.5
- Description:
When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
- Patch: glibc/2.35/CVE-2025-0395.patch