CVE-2026-3904
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/03/2026
Last modified:
11/03/2026
Description
Calling NSS-backed functions that support caching via nscd may call the <br />
nscd client side code and in the GNU C Library version 2.36 under high <br />
load on x86_64 systems, the client may call memcmp on inputs that are <br />
concurrently modified by other processes or threads and crash.<br />
<br />
<br />
<br />
<br />
The nscd client in the GNU C Library uses the memcmp function with <br />
inputs that may be concurrently modified by another thread, potentially <br />
resulting in spurious cache misses, which in itself is not a security <br />
issue. However in the GNU C Library version 2.36 an optimized <br />
implementation of memcmp was introduced for x86_64 which could crash <br />
when invoked with such undefined behaviour, turning this into a <br />
potential crash of the nscd client and the application that uses it. <br />
This implementation was backported to the 2.35 branch, making the nscd <br />
client in that branch vulnerable as well. Subsequently, the fix for <br />
this issue was backported to all vulnerable branches in the GNU C <br />
Library repository.<br />
<br />
<br />
It is advised that distributions that may have cherry-picked the memcpy <br />
SSE2 optimization in their copy of the GNU C Library, also apply the fix <br />
to avoid the potential crash in the nscd client.
Impact
Base Score 3.x
6.20
Severity 3.x
MEDIUM
References to Advisories, Solutions, and Tools
- https://sourceware.org/bugzilla/show_bug.cgi?id=29863
- https://sourceware.org/git/?p=glibc.git%3Ba%3Dblob_plain%3Bf%3Dadvisories/GLIBC-SA-2026-0004%3Bhb%3DHEAD
- https://sourceware.org/git/?p=glibc.git%3Ba%3Dcommit%3Bh%3D8804157ad9da39631703b92315460808eac86b0c
- https://sourceware.org/git/?p=glibc.git%3Ba%3Dcommit%3Bh%3Db712be52645282c706a5faa038242504feb06db5
- http://www.openwall.com/lists/oss-security/2026/03/11/5



