| Name | CVE-2024-33599 | 
| Description | nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow. This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. | 
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) | 
| References | DLA-3850-1, DSA-5678-1 | 
The table below lists information on source packages.
| Source Package | Release | Version | Status | 
|---|---|---|---|
| glibc (PTS) | bullseye | 2.31-13+deb11u11 | fixed | 
| bullseye (security) | 2.31-13+deb11u13 | fixed | |
| bookworm | 2.36-9+deb12u13 | fixed | |
| bookworm (security) | 2.36-9+deb12u7 | fixed | |
| forky, sid, trixie | 2.41-12 | fixed | 
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs | 
|---|---|---|---|---|---|---|
| glibc | source | buster | 2.28-10+deb10u4 | DLA-3850-1 | ||
| glibc | source | bullseye | 2.31-13+deb11u10 | DSA-5678-1 | ||
| glibc | source | bookworm | 2.36-9+deb12u7 | DSA-5678-1 | ||
| glibc | source | (unstable) | 2.37-19 | 
https://sourceware.org/bugzilla/show_bug.cgi?id=31677
https://inbox.sourceware.org/libc-alpha/cover.1713974801.git.fweimer@redhat.com/
https://www.openwall.com/lists/oss-security/2024/04/24/2
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0005
Fixed by: https://sourceware.org/git?p=glibc.git;a=commit;h=87801a8fd06db1d654eea3e4f7626ff476a9bdaa