CVE-2024-52533
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
gio/gsocks4aproxy.c in GNOME GLib before 2.82.1 has an off-by-one error and resultant buffer overflow because SOCKS4_CONN_MSG_LEN is not sufficient for a trailing '\0' character.
| Vendor | n/a |
| Product | n/a |
| Published | Nov 11, 2024 |
| Last Updated | Dec 6, 2024 |
Stay Ahead of the Next One
Get instant alerts for n/a n/a
Be the first to know when new critical vulnerabilities affecting n/a n/a are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
n/a / n/a
n/a
References
gitlab.gnome.org: https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home gitlab.gnome.org: https://gitlab.gnome.org/GNOME/glib/-/issues/3461 gitlab.gnome.org: https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1 openwall.com: http://www.openwall.com/lists/oss-security/2024/11/12/11 lists.debian.org: https://lists.debian.org/debian-lts-announce/2024/11/msg00020.html security.netapp.com: https://security.netapp.com/advisory/ntap-20241206-0009/