Updated glib2.0 packages fix buffer overflow vulnerability in socks proxy cod
Reporter | Title | Published | Views | Family All 37 |
---|---|---|---|---|
OSV | Security update for glib2 | 15 Nov 202409:12 | – | osv |
OSV | UBUNTU-CVE-2024-52533 | 11 Nov 202423:15 | – | osv |
OSV | gio-branding-upstream-2.82.2-2.1 on GA media | 13 Nov 202400:00 | – | osv |
OSV | glib2.0 vulnerability | 18 Nov 202416:25 | – | osv |
OSV | glib2.0 - security update | 23 Nov 202400:00 | – | osv |
OSV | Security update for glib2 | 19 Dec 202410:22 | – | osv |
OSV | Security update for glib2 | 6 Dec 202417:03 | – | osv |
OSV | CVE-2024-52533 | 11 Nov 202423:15 | – | osv |
OSV | Security update for glib2 | 27 Nov 202412:53 | – | osv |
Debian | [SECURITY] [DLA 3962-1] glib2.0 security update | 23 Nov 202419:02 | – | debian |
Source | Link |
---|---|
bugs | www.bugs.mageia.org/show_bug.cgi |
openwall | www.openwall.com/lists/oss-security/2024/11/12/11 |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Mageia | 9 | noarch | glib2.0 | 2.76.3-1.3 | glib2.0-2.76.3-1.3.mga9 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo