package: nscd
version: 2.24-11+deb9u1
severity: minor
Hello,
While troubleshooting my boot sequence with some custom SystemD units that rely
on NSS LDAP user <-> UID resolutions, I found out that NSCD negative caching
AND NSCD starting before the network is up was the cause of the failures of
Source: glibc
Version: 2.19-18
Severity: grave
Tags: security upstream
Forwarded: https://sourceware.org/bugzilla/show_bug.cgi?id=18203
Hi glibc maintainers,
the following vulnerability was published for glibc, filling as grave
due to the privilege escalation potential, but by default in Debian
Processing commands for cont...@bugs.debian.org:
> forwarded 887001 https://sourceware.org/bugzilla/show_bug.cgi?id=22679
Bug #887001 [src:glibc] glibc: CVE-2018-101: realpath() buffer underflow
when getcwd() returns relative path allows privilege escalation
Ignoring request to change the
Processing commands for cont...@bugs.debian.org:
> forwarded 887001 https://sourceware.org/bugzilla/show_bug.cgi?id=22679
Bug #887001 [src:glibc] glibc: CVE-2018-101: realpath() buffer underflow
when getcwd() returns relative path allows privilege escalation
Changed Bug forwarded-to-address
This is an automated email from the git hooks/post-receive script.
aurel32 pushed a commit to branch sid
in repository glibc.
commit 96e8c35f425a9c5ffb9d11920c0f1ffa1ba4559d
Author: Aurelien Jarno
Date: Fri Jan 12 22:40:47 2018 +0100
This is an automated email from the git hooks/post-receive script.
aurel32 pushed a change to branch sid
in repository glibc.
from bc38413 typo
new 96e8c35 debian/testsuite-xfail-debian.mk: since we now also run
the testsuite for the multilib flavours, simplify the mips*
6 matches
Mail list logo