Format: 1.8 Date: Tue, 30 Apr 2024 15:20:18 -0300 Source: glibc Architecture: source Version: 2.31-0ubuntu9.16 Distribution: focal-security Urgency: medium Maintainer: Ubuntu Developers Changed-By: Paulo Flabiano Smorigo Changes: glibc (2.31-0ubuntu9.16) focal-security; urgency=medium . * SECURITY UPDATE: Stack-based buffer overflow - debian/patches/CVE-2024-33599.patch: CVE-2024-33599: nscd: Stack- based buffer overflow in netgroup cache. - CVE-2024-33599 * SECURITY UPDATE: Null pointer - debian/patches/CVE-2024-33600_1.patch: CVE-2024-33600: nscd: Avoid null pointer crashes after notfound response. - debian/patches/CVE-2024-33600_2.patch: CVE-2024-33600: nscd: Do not send missing not-found response in addgetnetgrentX. - CVE-2024-33600 * SECURITY UPDATE: Memory corruption - debian/patches/CVE-2024-33601_33602.patch: CVE-2024-33601, CVE- 2024-33602: nscd: netgroup: Use two buffers in addgetnetgrentX. - CVE-2024-33601 - CVE-2024-33602 Checksums-Sha1: dd331e4b9a2b5bee244f4e34e49a43e3b80d4b11 9585 glibc_2.31-0ubuntu9.16.dsc 1466ab36aaa6d94d05d5fec6e342f87d1f05b678 890412 glibc_2.31-0ubuntu9.16.debian.tar.xz 4ef6c62a6e063f39b2356d8b50d5bdcb6d17826a 9276 glibc_2.31-0ubuntu9.16_source.buildinfo Checksums-Sha256: d6eebb112b5d30eadd7fbd627b0f18d8136486247b9b5f1d5a83c95f9709f992 9585 glibc_2.31-0ubuntu9.16.dsc b0226c7d66bb5f3ab1d42f1bd33c3be8830f48064383f7d495779cdc6f3cd0e8 890412 glibc_2.31-0ubuntu9.16.debian.tar.xz 94a1d4498cbdf53ea408eec1b68687f1767339175991077c426b8cd0ed72cbb1 9276 glibc_2.31-0ubuntu9.16_source.buildinfo Files: 2621cd69e4891c8f5c05ff83472278cc 9585 libs required glibc_2.31-0ubuntu9.16.dsc 99869ab59d86895448c16dce6554b6c7 890412 libs required glibc_2.31-0ubuntu9.16.debian.tar.xz 32c0886f4111597773f333722982461b 9276 libs required glibc_2.31-0ubuntu9.16_source.buildinfo Original-Maintainer: GNU Libc Maintainers Original-Vcs-Browser: https://salsa.debian.org/glibc-team/glibc Original-Vcs-Git: https://salsa.debian.org/glibc-team/glibc.git