Metrics
Affected Vendors & Products
Thu, 13 Feb 2025 00:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat enterprise Linux |
|
CPEs | cpe:/a:redhat:enterprise_linux:9::crb | |
Vendors & Products |
Redhat
Redhat enterprise Linux |
Fri, 06 Dec 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sat, 23 Nov 2024 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 12 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Gnome
Gnome glib |
|
Weaknesses | CWE-120 | |
CPEs | cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:* | |
Vendors & Products |
Gnome
Gnome glib |
|
Metrics |
cvssV3_1
|
ssvc
|
Tue, 12 Nov 2024 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Title | glib: buffer overflow in set_connect_msg() | |
Weaknesses | CWE-193 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Mon, 11 Nov 2024 23:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-12-06T13:09:32.561Z
Reserved: 2024-11-11T00:00:00
Link: CVE-2024-52533

Updated: 2024-12-06T13:09:32.561Z

Status : Awaiting Analysis
Published: 2024-11-11T23:15:05.967
Modified: 2024-12-06T14:15:21.400
Link: CVE-2024-52533
