Format: 1.8 Date: Mon, 06 May 2024 17:34:28 -0300 Source: glibc Built-For-Profiles: noudeb Architecture: source Version: 2.35-0ubuntu3.8 Distribution: jammy-security Urgency: medium Maintainer: Ubuntu Developers Changed-By: Paulo Flabiano Smorigo Changes: glibc (2.35-0ubuntu3.8) jammy-security; urgency=medium . * SECURITY UPDATE: Stack-based buffer overflow - debian/patches/CVE-2024-33599.patch: CVE-2024-33599: nscd: Stack- based buffer overflow in netgroup cache. - CVE-2024-33599 * SECURITY UPDATE: Null pointer - debian/patches/CVE-2024-33600_1.patch: CVE-2024-33600: nscd: Avoid null pointer crashes after notfound response. - debian/patches/CVE-2024-33600_2.patch: CVE-2024-33600: nscd: Do not send missing not-found response in addgetnetgrentX. - CVE-2024-33600 * SECURITY UPDATE: Memory corruption - debian/patches/CVE-2024-33601_33602.patch: CVE-2024-33601, CVE- 2024-33602: nscd: netgroup: Use two buffers in addgetnetgrentX. - CVE-2024-33601 - CVE-2024-33602 Checksums-Sha1: afba503af4dad5a9218f836d778ec1fa78c85d4b 8917 glibc_2.35-0ubuntu3.8.dsc 53d773b6bd3c697fc0b758381face24b465fc69d 937424 glibc_2.35-0ubuntu3.8.debian.tar.xz 91eceb04b493f2bdc5e897f7f152c5f11aa5c9d0 11097 glibc_2.35-0ubuntu3.8_source.buildinfo Checksums-Sha256: 5fb394b60034e84d87714a7d80a6808a54b7d4214bbe097e89d4d2bf117391c3 8917 glibc_2.35-0ubuntu3.8.dsc a39f2c9db94d01e20753754ff44d16984e3d2ab47ec2da886adee8c5b1fc5a19 937424 glibc_2.35-0ubuntu3.8.debian.tar.xz 4a1560ff83d18370f74e1134b5cd7699a1b96b2f96f4ec9293438449665addfe 11097 glibc_2.35-0ubuntu3.8_source.buildinfo Files: 23e879569886c64bc583fb0006127daf 8917 libs required glibc_2.35-0ubuntu3.8.dsc 2291e2e2d0e88b32cd022eba76e45ac0 937424 libs required glibc_2.35-0ubuntu3.8.debian.tar.xz b8b4dd1c8464d86ebcfb601399260e1d 11097 libs required glibc_2.35-0ubuntu3.8_source.buildinfo Original-Maintainer: GNU Libc Maintainers Original-Vcs-Browser: https://salsa.debian.org/glibc-team/glibc Original-Vcs-Git: https://salsa.debian.org/glibc-team/glibc.git