High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2024-33601
HighVulnerability Description
nscd: netgroup cache may terminate daemon on memory allocation failure
The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or
xrealloc and these functions may terminate the process due to a memory
allocation failure resulting in a denial of service to the clients. The
flaw was introduced in glibc 2.15 when the cache was added to nscd.
This vulnerability is only present in the nscd binary.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Known Affected Software
64 configuration(s) from 3 vendor(s)
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.35:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.38.19:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.36.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.26:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.23:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.33:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.18.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.36.113:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.21:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.30.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.26.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.37.38:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.39.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.37:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.32.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.33.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.20:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.19.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.17:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.32.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.18:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.15:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.38.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.30:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.28.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.29.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.22:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.27.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.36:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.20.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.29:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.37.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.19:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.16.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.24.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.39:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.28:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.22.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.31.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.23.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.32:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.25.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.17.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.31:*:*:*:*:*:x64:*
cpe:2.3:a:gnu:glibc:2.34:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.27:*:*:*:*:*:x86:*
cpe:2.3:a:gnu:glibc:2.38:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.21.90:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.16:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.34.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.25:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.35.9000:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.16.0:*:*:*:*:*:*:*
cpe:2.3:a:gnu:glibc:2.24:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*
cpe:2.3:o:netapp:hci_bootstrap_os:-:*:*:*:*:*:*:*
2025-Feb-CVE-2024-33601
CVE-2024-33601: None
2024-Jul-CVE-2024-33601
CVE-2024-33601: None
2024-May-CVE-2024-33601
CVE-2024-33601: nscd: netgroup cache may terminate daemon on memory allocation failure
2025-Jul-CVE-2024-33601
CVE-2024-33601: None
2025-Mar-CVE-2024-33601
CVE-2024-33601: None
CPUJAN2025
Oracle Critical Patch Update Advisory - January 2025
References & Resources
-
http://www.openwall.com/lists/oss-security/2024/07/22/53ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2024/06/msg00026.html3ff69d7a-14f2-4f67-a097-88dee7810d18 Mailing List Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20240524-0014/3ff69d7a-14f2-4f67-a097-88dee7810d18 Third Party Advisory
-
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-00073ff69d7a-14f2-4f67-a097-88dee7810d18 Broken Link
-
http://www.openwall.com/lists/oss-security/2024/07/22/5af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2024/06/msg00026.htmlaf854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
https://security.netapp.com/advisory/ntap-20240524-0014/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2024-0007af854a3a-2127-422b-91ae-364da2661108 Broken Link
Severity Details
Weakness Type (CWE)
Reachable Assertion
- Description
- The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
- Typical Severity
- High
- Abstraction Level
- Base
Key Information
- Published Date
- May 06, 2024
