{"id":"RLSA-2024:3344","summary":"Important: glibc security update","details":"The glibc packages provide the standard C libraries (libc), POSIX thread\nlibraries (libpthread), standard math libraries (libm), and the name service\ncache daemon (nscd) used by multiple programs on the system. Without these\nlibraries, the Linux system cannot function correctly.\n\nSecurity Fix(es):\n\n* glibc: stack-based buffer overflow in netgroup cache (CVE-2024-33599)\n\n* glibc: null pointer dereferences after failed netgroup cache insertion\n(CVE-2024-33600)\n\n* glibc: netgroup cache may terminate daemon on memory allocation failure\n(CVE-2024-33601)\n\n* glibc: netgroup cache assumes NSS callback uses in-buffer strings\n(CVE-2024-33602)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.","modified":"2026-03-11T06:31:12.976071Z","published":"2024-06-14T13:59:16.809606Z","upstream":["CVE-2024-33599","CVE-2024-33600","CVE-2024-33601","CVE-2024-33602"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2024:3344"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277202"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277204"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277205"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2277206"}],"affected":[{"package":{"name":"glibc","ecosystem":"Rocky Linux:8","purl":"pkg:rpm/rocky-linux/glibc?distro=rocky-linux-8&epoch=0"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"0:2.28-251.el8_10.2"}],"database_specific":{"yum_repository":"BaseOS"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2024:3344.json"}}],"schema_version":"1.7.5","credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}