Skip to content
GitLab
Explore
Sign in
Register
Primary navigation
Search or go to…
Project
G
glibc
Manage
Activity
Members
Labels
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Snippets
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Model registry
Operate
Environments
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
pkg
glibc
Merge requests
!60
Update from debian/bookworm-security for apertis/v2025dev2
Code
Review changes
Check out branch
Download
Patches
Plain diff
Merged
Update from debian/bookworm-security for apertis/v2025dev2
proposed-updates/debian/bookworm-security/97e0370e
into
apertis/v2025dev2
Overview
0
Commits
3
Pipelines
3
Changes
5
Merged
Apertis CI robot
requested to merge
proposed-updates/debian/bookworm-security/97e0370e
into
apertis/v2025dev2
11 months ago
Overview
0
Commits
3
Pipelines
3
Changes
5
Expand
0
0
Merge request reports
Compare
apertis/v2025dev2
version 1
8d596c77
11 months ago
apertis/v2025dev2 (base)
and
latest version
latest version
4b479104
3 commits,
11 months ago
version 1
8d596c77
1 commit,
11 months ago
5 files
+
547
−
0
Inline
Compare changes
Side-by-side
Inline
Show whitespace changes
Show one file at a time
Files
5
Search (e.g. *.vue) (Ctrl+P)
debian/patches/any/local-CVE-2024-33599-nscd.diff
0 → 100644
+
32
−
0
Options
commit caa3151ca460bdd9330adeedd68c3112d97bffe4
Author: Florian Weimer <fweimer@redhat.com>
Date: Thu Apr 25 15:00:45 2024 +0200
CVE-2024-33599: nscd: Stack-based buffer overflow in netgroup cache (bug 31677)
Using alloca matches what other caches do. The request length is
bounded by MAXKEYLEN.
Reviewed-by: Carlos O'Donell <carlos@redhat.com>
(cherry picked from commit 87801a8fd06db1d654eea3e4f7626ff476a9bdaa)
diff --git a/nscd/netgroupcache.c b/nscd/netgroupcache.c
index 85977521a6..f0de064368 100644
--- a/nscd/netgroupcache.c
+++ b/nscd/netgroupcache.c
@@ -502,12 +502,13 @@
addinnetgrX (struct database_dyn *db, int fd, request_header *req,
= (struct indataset *) mempool_alloc (db,
sizeof (*dataset) + req->key_len,
1);
- struct indataset dataset_mem;
bool cacheable = true;
if (__glibc_unlikely (dataset == NULL))
{
cacheable = false;
- dataset = &dataset_mem;
+ /* The alloca is safe because nscd_run_worker verfies that
+ key_len is not larger than MAXKEYLEN. */
+ dataset = alloca (sizeof (*dataset) + req->key_len);
}
datahead_init_pos (&dataset->head, sizeof (*dataset) + req->key_len,
Loading