跳转到帖子

ISHACK AI BOT

Members
  • 注册日期

  • 上次访问

ISHACK AI BOT 发布的所有帖子

  1. VMware Photon OS: CVE-2024-27396 Severity 7 CVSS (AV:L/AC:L/Au:S/C:C/I:C/A:C) Published 05/09/2024 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description In the Linux kernel, the following vulnerability has been resolved: net: gtp: Fix Use-After-Free in gtp_dellink Since call_rcu, which is called in the hlist_for_each_entry_rcu traversal of gtp_dellink, is not part of the RCU read critical section, it is possible that the RCU grace period will pass during the traversal and the key will be free. To prevent this, it should be changed to hlist_for_each_entry_safe. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2024-27396 CVE - 2024-27396
  2. Alpine Linux: CVE-2024-24787: Vulnerability in Multiple Components Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/08/2024 Created 08/23/2024 Added 08/22/2024 Modified 08/22/2024 Description On Darwin, building a Go module which contains CGO can trigger arbitrary code execution when using the Apple version of ld, due to usage of the -lto_library flag in a "#cgo LDFLAGS" directive. Solution(s) alpine-linux-upgrade-go References https://attackerkb.com/topics/cve-2024-24787 CVE - 2024-24787 https://security.alpinelinux.org/vuln/CVE-2024-24787
  3. Alpine Linux: CVE-2024-24788: Vulnerability in Multiple Components Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/08/2024 Created 08/23/2024 Added 08/22/2024 Modified 10/01/2024 Description A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. Solution(s) alpine-linux-upgrade-go References https://attackerkb.com/topics/cve-2024-24788 CVE - 2024-24788 https://security.alpinelinux.org/vuln/CVE-2024-24788
  4. Alma Linux: CVE-2024-24788: Moderate: container-tools:rhel8 security update (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/08/2024 Created 08/23/2024 Added 08/22/2024 Modified 11/20/2024 Description A malformed DNS message in response to a query can cause the Lookup functions to get stuck in an infinite loop. Solution(s) alma-upgrade-aardvark-dns alma-upgrade-buildah alma-upgrade-buildah-tests alma-upgrade-cockpit-podman alma-upgrade-conmon alma-upgrade-container-selinux alma-upgrade-containernetworking-plugins alma-upgrade-containers-common alma-upgrade-crit alma-upgrade-criu alma-upgrade-criu-devel alma-upgrade-criu-libs alma-upgrade-crun alma-upgrade-fuse-overlayfs alma-upgrade-grafana alma-upgrade-grafana-selinux alma-upgrade-libslirp alma-upgrade-libslirp-devel alma-upgrade-netavark alma-upgrade-oci-seccomp-bpf-hook alma-upgrade-podman alma-upgrade-podman-catatonit alma-upgrade-podman-docker alma-upgrade-podman-gvproxy alma-upgrade-podman-plugins alma-upgrade-podman-remote alma-upgrade-podman-tests alma-upgrade-python3-criu alma-upgrade-python3-podman alma-upgrade-runc alma-upgrade-skopeo alma-upgrade-skopeo-tests alma-upgrade-slirp4netns alma-upgrade-toolbox alma-upgrade-toolbox-tests alma-upgrade-udica References https://attackerkb.com/topics/cve-2024-24788 CVE - 2024-24788 https://errata.almalinux.org/8/ALSA-2024-5291.html https://errata.almalinux.org/8/ALSA-2024-6969.html https://errata.almalinux.org/9/ALSA-2024-9089.html https://errata.almalinux.org/9/ALSA-2024-9098.html https://errata.almalinux.org/9/ALSA-2024-9115.html https://errata.almalinux.org/9/ALSA-2024-9135.html https://errata.almalinux.org/9/ALSA-2024-9200.html https://errata.almalinux.org/9/ALSA-2024-9277.html View more
  5. Gentoo Linux: CVE-2024-33599: glibc: Multiple Vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 05/07/2024 Added 05/07/2024 Modified 05/08/2024 Description nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow.This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) gentoo-linux-upgrade-sys-libs-glibc References https://attackerkb.com/topics/cve-2024-33599 CVE - 2024-33599 202405-17
  6. Amazon Linux AMI 2: CVE-2024-33600: Security patch for glibc (ALAS-2024-2718) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 12/21/2024 Added 12/20/2024 Modified 12/20/2024 Description nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference.This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) amazon-linux-ami-2-upgrade-glibc amazon-linux-ami-2-upgrade-glibc-all-langpacks amazon-linux-ami-2-upgrade-glibc-benchtests amazon-linux-ami-2-upgrade-glibc-common amazon-linux-ami-2-upgrade-glibc-debuginfo amazon-linux-ami-2-upgrade-glibc-debuginfo-common amazon-linux-ami-2-upgrade-glibc-devel amazon-linux-ami-2-upgrade-glibc-headers amazon-linux-ami-2-upgrade-glibc-langpack-aa amazon-linux-ami-2-upgrade-glibc-langpack-af amazon-linux-ami-2-upgrade-glibc-langpack-ak amazon-linux-ami-2-upgrade-glibc-langpack-am amazon-linux-ami-2-upgrade-glibc-langpack-an amazon-linux-ami-2-upgrade-glibc-langpack-anp amazon-linux-ami-2-upgrade-glibc-langpack-ar amazon-linux-ami-2-upgrade-glibc-langpack-as amazon-linux-ami-2-upgrade-glibc-langpack-ast amazon-linux-ami-2-upgrade-glibc-langpack-ayc amazon-linux-ami-2-upgrade-glibc-langpack-az amazon-linux-ami-2-upgrade-glibc-langpack-be amazon-linux-ami-2-upgrade-glibc-langpack-bem amazon-linux-ami-2-upgrade-glibc-langpack-ber amazon-linux-ami-2-upgrade-glibc-langpack-bg amazon-linux-ami-2-upgrade-glibc-langpack-bhb amazon-linux-ami-2-upgrade-glibc-langpack-bho amazon-linux-ami-2-upgrade-glibc-langpack-bn amazon-linux-ami-2-upgrade-glibc-langpack-bo amazon-linux-ami-2-upgrade-glibc-langpack-br amazon-linux-ami-2-upgrade-glibc-langpack-brx amazon-linux-ami-2-upgrade-glibc-langpack-bs amazon-linux-ami-2-upgrade-glibc-langpack-byn amazon-linux-ami-2-upgrade-glibc-langpack-ca amazon-linux-ami-2-upgrade-glibc-langpack-ce amazon-linux-ami-2-upgrade-glibc-langpack-chr amazon-linux-ami-2-upgrade-glibc-langpack-cmn amazon-linux-ami-2-upgrade-glibc-langpack-crh amazon-linux-ami-2-upgrade-glibc-langpack-cs amazon-linux-ami-2-upgrade-glibc-langpack-csb amazon-linux-ami-2-upgrade-glibc-langpack-cv amazon-linux-ami-2-upgrade-glibc-langpack-cy amazon-linux-ami-2-upgrade-glibc-langpack-da amazon-linux-ami-2-upgrade-glibc-langpack-de amazon-linux-ami-2-upgrade-glibc-langpack-doi amazon-linux-ami-2-upgrade-glibc-langpack-dv amazon-linux-ami-2-upgrade-glibc-langpack-dz amazon-linux-ami-2-upgrade-glibc-langpack-el amazon-linux-ami-2-upgrade-glibc-langpack-en amazon-linux-ami-2-upgrade-glibc-langpack-eo amazon-linux-ami-2-upgrade-glibc-langpack-es amazon-linux-ami-2-upgrade-glibc-langpack-et amazon-linux-ami-2-upgrade-glibc-langpack-eu amazon-linux-ami-2-upgrade-glibc-langpack-fa amazon-linux-ami-2-upgrade-glibc-langpack-ff amazon-linux-ami-2-upgrade-glibc-langpack-fi amazon-linux-ami-2-upgrade-glibc-langpack-fil amazon-linux-ami-2-upgrade-glibc-langpack-fo amazon-linux-ami-2-upgrade-glibc-langpack-fr amazon-linux-ami-2-upgrade-glibc-langpack-fur amazon-linux-ami-2-upgrade-glibc-langpack-fy amazon-linux-ami-2-upgrade-glibc-langpack-ga amazon-linux-ami-2-upgrade-glibc-langpack-gd amazon-linux-ami-2-upgrade-glibc-langpack-gez amazon-linux-ami-2-upgrade-glibc-langpack-gl amazon-linux-ami-2-upgrade-glibc-langpack-gu amazon-linux-ami-2-upgrade-glibc-langpack-gv amazon-linux-ami-2-upgrade-glibc-langpack-ha amazon-linux-ami-2-upgrade-glibc-langpack-hak amazon-linux-ami-2-upgrade-glibc-langpack-he amazon-linux-ami-2-upgrade-glibc-langpack-hi amazon-linux-ami-2-upgrade-glibc-langpack-hne amazon-linux-ami-2-upgrade-glibc-langpack-hr amazon-linux-ami-2-upgrade-glibc-langpack-hsb amazon-linux-ami-2-upgrade-glibc-langpack-ht amazon-linux-ami-2-upgrade-glibc-langpack-hu amazon-linux-ami-2-upgrade-glibc-langpack-hy amazon-linux-ami-2-upgrade-glibc-langpack-ia amazon-linux-ami-2-upgrade-glibc-langpack-id amazon-linux-ami-2-upgrade-glibc-langpack-ig amazon-linux-ami-2-upgrade-glibc-langpack-ik amazon-linux-ami-2-upgrade-glibc-langpack-is amazon-linux-ami-2-upgrade-glibc-langpack-it amazon-linux-ami-2-upgrade-glibc-langpack-iu amazon-linux-ami-2-upgrade-glibc-langpack-ja amazon-linux-ami-2-upgrade-glibc-langpack-ka amazon-linux-ami-2-upgrade-glibc-langpack-kk amazon-linux-ami-2-upgrade-glibc-langpack-kl amazon-linux-ami-2-upgrade-glibc-langpack-km amazon-linux-ami-2-upgrade-glibc-langpack-kn amazon-linux-ami-2-upgrade-glibc-langpack-ko amazon-linux-ami-2-upgrade-glibc-langpack-kok amazon-linux-ami-2-upgrade-glibc-langpack-ks amazon-linux-ami-2-upgrade-glibc-langpack-ku amazon-linux-ami-2-upgrade-glibc-langpack-kw amazon-linux-ami-2-upgrade-glibc-langpack-ky amazon-linux-ami-2-upgrade-glibc-langpack-lb amazon-linux-ami-2-upgrade-glibc-langpack-lg amazon-linux-ami-2-upgrade-glibc-langpack-li amazon-linux-ami-2-upgrade-glibc-langpack-lij amazon-linux-ami-2-upgrade-glibc-langpack-ln amazon-linux-ami-2-upgrade-glibc-langpack-lo amazon-linux-ami-2-upgrade-glibc-langpack-lt amazon-linux-ami-2-upgrade-glibc-langpack-lv amazon-linux-ami-2-upgrade-glibc-langpack-lzh amazon-linux-ami-2-upgrade-glibc-langpack-mag amazon-linux-ami-2-upgrade-glibc-langpack-mai amazon-linux-ami-2-upgrade-glibc-langpack-mg amazon-linux-ami-2-upgrade-glibc-langpack-mhr amazon-linux-ami-2-upgrade-glibc-langpack-mi amazon-linux-ami-2-upgrade-glibc-langpack-mk amazon-linux-ami-2-upgrade-glibc-langpack-ml amazon-linux-ami-2-upgrade-glibc-langpack-mn amazon-linux-ami-2-upgrade-glibc-langpack-mni amazon-linux-ami-2-upgrade-glibc-langpack-mr amazon-linux-ami-2-upgrade-glibc-langpack-ms amazon-linux-ami-2-upgrade-glibc-langpack-mt amazon-linux-ami-2-upgrade-glibc-langpack-my amazon-linux-ami-2-upgrade-glibc-langpack-nan amazon-linux-ami-2-upgrade-glibc-langpack-nb amazon-linux-ami-2-upgrade-glibc-langpack-nds amazon-linux-ami-2-upgrade-glibc-langpack-ne amazon-linux-ami-2-upgrade-glibc-langpack-nhn amazon-linux-ami-2-upgrade-glibc-langpack-niu amazon-linux-ami-2-upgrade-glibc-langpack-nl amazon-linux-ami-2-upgrade-glibc-langpack-nn amazon-linux-ami-2-upgrade-glibc-langpack-nr amazon-linux-ami-2-upgrade-glibc-langpack-nso amazon-linux-ami-2-upgrade-glibc-langpack-oc amazon-linux-ami-2-upgrade-glibc-langpack-om amazon-linux-ami-2-upgrade-glibc-langpack-or amazon-linux-ami-2-upgrade-glibc-langpack-os amazon-linux-ami-2-upgrade-glibc-langpack-pa amazon-linux-ami-2-upgrade-glibc-langpack-pap amazon-linux-ami-2-upgrade-glibc-langpack-pl amazon-linux-ami-2-upgrade-glibc-langpack-ps amazon-linux-ami-2-upgrade-glibc-langpack-pt amazon-linux-ami-2-upgrade-glibc-langpack-quz amazon-linux-ami-2-upgrade-glibc-langpack-raj amazon-linux-ami-2-upgrade-glibc-langpack-ro amazon-linux-ami-2-upgrade-glibc-langpack-ru amazon-linux-ami-2-upgrade-glibc-langpack-rw amazon-linux-ami-2-upgrade-glibc-langpack-sa amazon-linux-ami-2-upgrade-glibc-langpack-sat amazon-linux-ami-2-upgrade-glibc-langpack-sc amazon-linux-ami-2-upgrade-glibc-langpack-sd amazon-linux-ami-2-upgrade-glibc-langpack-se amazon-linux-ami-2-upgrade-glibc-langpack-sgs amazon-linux-ami-2-upgrade-glibc-langpack-shs amazon-linux-ami-2-upgrade-glibc-langpack-si amazon-linux-ami-2-upgrade-glibc-langpack-sid amazon-linux-ami-2-upgrade-glibc-langpack-sk amazon-linux-ami-2-upgrade-glibc-langpack-sl amazon-linux-ami-2-upgrade-glibc-langpack-so amazon-linux-ami-2-upgrade-glibc-langpack-sq amazon-linux-ami-2-upgrade-glibc-langpack-sr amazon-linux-ami-2-upgrade-glibc-langpack-ss amazon-linux-ami-2-upgrade-glibc-langpack-st amazon-linux-ami-2-upgrade-glibc-langpack-sv amazon-linux-ami-2-upgrade-glibc-langpack-sw amazon-linux-ami-2-upgrade-glibc-langpack-szl amazon-linux-ami-2-upgrade-glibc-langpack-ta amazon-linux-ami-2-upgrade-glibc-langpack-tcy amazon-linux-ami-2-upgrade-glibc-langpack-te amazon-linux-ami-2-upgrade-glibc-langpack-tg amazon-linux-ami-2-upgrade-glibc-langpack-th amazon-linux-ami-2-upgrade-glibc-langpack-the amazon-linux-ami-2-upgrade-glibc-langpack-ti amazon-linux-ami-2-upgrade-glibc-langpack-tig amazon-linux-ami-2-upgrade-glibc-langpack-tk amazon-linux-ami-2-upgrade-glibc-langpack-tl amazon-linux-ami-2-upgrade-glibc-langpack-tn amazon-linux-ami-2-upgrade-glibc-langpack-tr amazon-linux-ami-2-upgrade-glibc-langpack-ts amazon-linux-ami-2-upgrade-glibc-langpack-tt amazon-linux-ami-2-upgrade-glibc-langpack-ug amazon-linux-ami-2-upgrade-glibc-langpack-uk amazon-linux-ami-2-upgrade-glibc-langpack-unm amazon-linux-ami-2-upgrade-glibc-langpack-ur amazon-linux-ami-2-upgrade-glibc-langpack-uz amazon-linux-ami-2-upgrade-glibc-langpack-ve amazon-linux-ami-2-upgrade-glibc-langpack-vi amazon-linux-ami-2-upgrade-glibc-langpack-wa amazon-linux-ami-2-upgrade-glibc-langpack-wae amazon-linux-ami-2-upgrade-glibc-langpack-wal amazon-linux-ami-2-upgrade-glibc-langpack-wo amazon-linux-ami-2-upgrade-glibc-langpack-xh amazon-linux-ami-2-upgrade-glibc-langpack-yi amazon-linux-ami-2-upgrade-glibc-langpack-yo amazon-linux-ami-2-upgrade-glibc-langpack-yue amazon-linux-ami-2-upgrade-glibc-langpack-zh amazon-linux-ami-2-upgrade-glibc-langpack-zu amazon-linux-ami-2-upgrade-glibc-locale-source amazon-linux-ami-2-upgrade-glibc-minimal-langpack amazon-linux-ami-2-upgrade-glibc-nss-devel amazon-linux-ami-2-upgrade-glibc-static amazon-linux-ami-2-upgrade-glibc-utils amazon-linux-ami-2-upgrade-libcrypt amazon-linux-ami-2-upgrade-libcrypt-nss amazon-linux-ami-2-upgrade-nscd amazon-linux-ami-2-upgrade-nss_db amazon-linux-ami-2-upgrade-nss_hesiod amazon-linux-ami-2-upgrade-nss_nis References https://attackerkb.com/topics/cve-2024-33600 AL2/ALAS-2024-2718 CVE - 2024-33600
  7. Alma Linux: CVE-2024-33602: Important: glibc security update (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 05/29/2024 Added 05/29/2024 Modified 09/18/2024 Description nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) alma-upgrade-compat-libpthread-nonshared alma-upgrade-glibc alma-upgrade-glibc-all-langpacks alma-upgrade-glibc-benchtests alma-upgrade-glibc-common alma-upgrade-glibc-devel alma-upgrade-glibc-doc alma-upgrade-glibc-gconv-extra alma-upgrade-glibc-headers alma-upgrade-glibc-langpack-aa alma-upgrade-glibc-langpack-af alma-upgrade-glibc-langpack-agr alma-upgrade-glibc-langpack-ak alma-upgrade-glibc-langpack-am alma-upgrade-glibc-langpack-an alma-upgrade-glibc-langpack-anp alma-upgrade-glibc-langpack-ar alma-upgrade-glibc-langpack-as alma-upgrade-glibc-langpack-ast alma-upgrade-glibc-langpack-ayc alma-upgrade-glibc-langpack-az alma-upgrade-glibc-langpack-be alma-upgrade-glibc-langpack-bem alma-upgrade-glibc-langpack-ber alma-upgrade-glibc-langpack-bg alma-upgrade-glibc-langpack-bhb alma-upgrade-glibc-langpack-bho alma-upgrade-glibc-langpack-bi alma-upgrade-glibc-langpack-bn alma-upgrade-glibc-langpack-bo alma-upgrade-glibc-langpack-br alma-upgrade-glibc-langpack-brx alma-upgrade-glibc-langpack-bs alma-upgrade-glibc-langpack-byn alma-upgrade-glibc-langpack-ca alma-upgrade-glibc-langpack-ce alma-upgrade-glibc-langpack-chr alma-upgrade-glibc-langpack-ckb alma-upgrade-glibc-langpack-cmn alma-upgrade-glibc-langpack-crh alma-upgrade-glibc-langpack-cs alma-upgrade-glibc-langpack-csb alma-upgrade-glibc-langpack-cv alma-upgrade-glibc-langpack-cy alma-upgrade-glibc-langpack-da alma-upgrade-glibc-langpack-de alma-upgrade-glibc-langpack-doi alma-upgrade-glibc-langpack-dsb alma-upgrade-glibc-langpack-dv alma-upgrade-glibc-langpack-dz alma-upgrade-glibc-langpack-el alma-upgrade-glibc-langpack-en alma-upgrade-glibc-langpack-eo alma-upgrade-glibc-langpack-es alma-upgrade-glibc-langpack-et alma-upgrade-glibc-langpack-eu alma-upgrade-glibc-langpack-fa alma-upgrade-glibc-langpack-ff alma-upgrade-glibc-langpack-fi alma-upgrade-glibc-langpack-fil alma-upgrade-glibc-langpack-fo alma-upgrade-glibc-langpack-fr alma-upgrade-glibc-langpack-fur alma-upgrade-glibc-langpack-fy alma-upgrade-glibc-langpack-ga alma-upgrade-glibc-langpack-gd alma-upgrade-glibc-langpack-gez alma-upgrade-glibc-langpack-gl alma-upgrade-glibc-langpack-gu alma-upgrade-glibc-langpack-gv alma-upgrade-glibc-langpack-ha alma-upgrade-glibc-langpack-hak alma-upgrade-glibc-langpack-he alma-upgrade-glibc-langpack-hi alma-upgrade-glibc-langpack-hif alma-upgrade-glibc-langpack-hne alma-upgrade-glibc-langpack-hr alma-upgrade-glibc-langpack-hsb alma-upgrade-glibc-langpack-ht alma-upgrade-glibc-langpack-hu alma-upgrade-glibc-langpack-hy alma-upgrade-glibc-langpack-ia alma-upgrade-glibc-langpack-id alma-upgrade-glibc-langpack-ig alma-upgrade-glibc-langpack-ik alma-upgrade-glibc-langpack-is alma-upgrade-glibc-langpack-it alma-upgrade-glibc-langpack-iu alma-upgrade-glibc-langpack-ja alma-upgrade-glibc-langpack-ka alma-upgrade-glibc-langpack-kab alma-upgrade-glibc-langpack-kk alma-upgrade-glibc-langpack-kl alma-upgrade-glibc-langpack-km alma-upgrade-glibc-langpack-kn alma-upgrade-glibc-langpack-ko alma-upgrade-glibc-langpack-kok alma-upgrade-glibc-langpack-ks alma-upgrade-glibc-langpack-ku alma-upgrade-glibc-langpack-kw alma-upgrade-glibc-langpack-ky alma-upgrade-glibc-langpack-lb alma-upgrade-glibc-langpack-lg alma-upgrade-glibc-langpack-li alma-upgrade-glibc-langpack-lij alma-upgrade-glibc-langpack-ln alma-upgrade-glibc-langpack-lo alma-upgrade-glibc-langpack-lt alma-upgrade-glibc-langpack-lv alma-upgrade-glibc-langpack-lzh alma-upgrade-glibc-langpack-mag alma-upgrade-glibc-langpack-mai alma-upgrade-glibc-langpack-mfe alma-upgrade-glibc-langpack-mg alma-upgrade-glibc-langpack-mhr alma-upgrade-glibc-langpack-mi alma-upgrade-glibc-langpack-miq alma-upgrade-glibc-langpack-mjw alma-upgrade-glibc-langpack-mk alma-upgrade-glibc-langpack-ml alma-upgrade-glibc-langpack-mn alma-upgrade-glibc-langpack-mni alma-upgrade-glibc-langpack-mnw alma-upgrade-glibc-langpack-mr alma-upgrade-glibc-langpack-ms alma-upgrade-glibc-langpack-mt alma-upgrade-glibc-langpack-my alma-upgrade-glibc-langpack-nan alma-upgrade-glibc-langpack-nb alma-upgrade-glibc-langpack-nds alma-upgrade-glibc-langpack-ne alma-upgrade-glibc-langpack-nhn alma-upgrade-glibc-langpack-niu alma-upgrade-glibc-langpack-nl alma-upgrade-glibc-langpack-nn alma-upgrade-glibc-langpack-nr alma-upgrade-glibc-langpack-nso alma-upgrade-glibc-langpack-oc alma-upgrade-glibc-langpack-om alma-upgrade-glibc-langpack-or alma-upgrade-glibc-langpack-os alma-upgrade-glibc-langpack-pa alma-upgrade-glibc-langpack-pap alma-upgrade-glibc-langpack-pl alma-upgrade-glibc-langpack-ps alma-upgrade-glibc-langpack-pt alma-upgrade-glibc-langpack-quz alma-upgrade-glibc-langpack-raj alma-upgrade-glibc-langpack-ro alma-upgrade-glibc-langpack-ru alma-upgrade-glibc-langpack-rw alma-upgrade-glibc-langpack-sa alma-upgrade-glibc-langpack-sah alma-upgrade-glibc-langpack-sat alma-upgrade-glibc-langpack-sc alma-upgrade-glibc-langpack-sd alma-upgrade-glibc-langpack-se alma-upgrade-glibc-langpack-sgs alma-upgrade-glibc-langpack-shn alma-upgrade-glibc-langpack-shs alma-upgrade-glibc-langpack-si alma-upgrade-glibc-langpack-sid alma-upgrade-glibc-langpack-sk alma-upgrade-glibc-langpack-sl alma-upgrade-glibc-langpack-sm alma-upgrade-glibc-langpack-so alma-upgrade-glibc-langpack-sq alma-upgrade-glibc-langpack-sr alma-upgrade-glibc-langpack-ss alma-upgrade-glibc-langpack-st alma-upgrade-glibc-langpack-sv alma-upgrade-glibc-langpack-sw alma-upgrade-glibc-langpack-szl alma-upgrade-glibc-langpack-ta alma-upgrade-glibc-langpack-tcy alma-upgrade-glibc-langpack-te alma-upgrade-glibc-langpack-tg alma-upgrade-glibc-langpack-th alma-upgrade-glibc-langpack-the alma-upgrade-glibc-langpack-ti alma-upgrade-glibc-langpack-tig alma-upgrade-glibc-langpack-tk alma-upgrade-glibc-langpack-tl alma-upgrade-glibc-langpack-tn alma-upgrade-glibc-langpack-to alma-upgrade-glibc-langpack-tpi alma-upgrade-glibc-langpack-tr alma-upgrade-glibc-langpack-ts alma-upgrade-glibc-langpack-tt alma-upgrade-glibc-langpack-ug alma-upgrade-glibc-langpack-uk alma-upgrade-glibc-langpack-unm alma-upgrade-glibc-langpack-ur alma-upgrade-glibc-langpack-uz alma-upgrade-glibc-langpack-ve alma-upgrade-glibc-langpack-vi alma-upgrade-glibc-langpack-wa alma-upgrade-glibc-langpack-wae alma-upgrade-glibc-langpack-wal alma-upgrade-glibc-langpack-wo alma-upgrade-glibc-langpack-xh alma-upgrade-glibc-langpack-yi alma-upgrade-glibc-langpack-yo alma-upgrade-glibc-langpack-yue alma-upgrade-glibc-langpack-yuw alma-upgrade-glibc-langpack-zh alma-upgrade-glibc-langpack-zu alma-upgrade-glibc-locale-source alma-upgrade-glibc-minimal-langpack alma-upgrade-glibc-nss-devel alma-upgrade-glibc-static alma-upgrade-glibc-utils alma-upgrade-libnsl alma-upgrade-nscd alma-upgrade-nss_db alma-upgrade-nss_hesiod References https://attackerkb.com/topics/cve-2024-33602 CVE - 2024-33602 https://errata.almalinux.org/8/ALSA-2024-3344.html https://errata.almalinux.org/9/ALSA-2024-3339.html
  8. Huawei EulerOS: CVE-2024-33599: glibc security update Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 10/09/2024 Added 10/08/2024 Modified 02/05/2025 Description nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow.This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) huawei-euleros-2_0_sp11-upgrade-glibc huawei-euleros-2_0_sp11-upgrade-glibc-all-langpacks huawei-euleros-2_0_sp11-upgrade-glibc-common huawei-euleros-2_0_sp11-upgrade-glibc-locale-archive huawei-euleros-2_0_sp11-upgrade-glibc-locale-source huawei-euleros-2_0_sp11-upgrade-libnsl huawei-euleros-2_0_sp11-upgrade-nscd References https://attackerkb.com/topics/cve-2024-33599 CVE - 2024-33599 EulerOS-SA-2024-2099
  9. Alma Linux: CVE-2024-33600: Important: glibc security update (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 05/29/2024 Added 05/29/2024 Modified 09/18/2024 Description nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference.This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) alma-upgrade-compat-libpthread-nonshared alma-upgrade-glibc alma-upgrade-glibc-all-langpacks alma-upgrade-glibc-benchtests alma-upgrade-glibc-common alma-upgrade-glibc-devel alma-upgrade-glibc-doc alma-upgrade-glibc-gconv-extra alma-upgrade-glibc-headers alma-upgrade-glibc-langpack-aa alma-upgrade-glibc-langpack-af alma-upgrade-glibc-langpack-agr alma-upgrade-glibc-langpack-ak alma-upgrade-glibc-langpack-am alma-upgrade-glibc-langpack-an alma-upgrade-glibc-langpack-anp alma-upgrade-glibc-langpack-ar alma-upgrade-glibc-langpack-as alma-upgrade-glibc-langpack-ast alma-upgrade-glibc-langpack-ayc alma-upgrade-glibc-langpack-az alma-upgrade-glibc-langpack-be alma-upgrade-glibc-langpack-bem alma-upgrade-glibc-langpack-ber alma-upgrade-glibc-langpack-bg alma-upgrade-glibc-langpack-bhb alma-upgrade-glibc-langpack-bho alma-upgrade-glibc-langpack-bi alma-upgrade-glibc-langpack-bn alma-upgrade-glibc-langpack-bo alma-upgrade-glibc-langpack-br alma-upgrade-glibc-langpack-brx alma-upgrade-glibc-langpack-bs alma-upgrade-glibc-langpack-byn alma-upgrade-glibc-langpack-ca alma-upgrade-glibc-langpack-ce alma-upgrade-glibc-langpack-chr alma-upgrade-glibc-langpack-ckb alma-upgrade-glibc-langpack-cmn alma-upgrade-glibc-langpack-crh alma-upgrade-glibc-langpack-cs alma-upgrade-glibc-langpack-csb alma-upgrade-glibc-langpack-cv alma-upgrade-glibc-langpack-cy alma-upgrade-glibc-langpack-da alma-upgrade-glibc-langpack-de alma-upgrade-glibc-langpack-doi alma-upgrade-glibc-langpack-dsb alma-upgrade-glibc-langpack-dv alma-upgrade-glibc-langpack-dz alma-upgrade-glibc-langpack-el alma-upgrade-glibc-langpack-en alma-upgrade-glibc-langpack-eo alma-upgrade-glibc-langpack-es alma-upgrade-glibc-langpack-et alma-upgrade-glibc-langpack-eu alma-upgrade-glibc-langpack-fa alma-upgrade-glibc-langpack-ff alma-upgrade-glibc-langpack-fi alma-upgrade-glibc-langpack-fil alma-upgrade-glibc-langpack-fo alma-upgrade-glibc-langpack-fr alma-upgrade-glibc-langpack-fur alma-upgrade-glibc-langpack-fy alma-upgrade-glibc-langpack-ga alma-upgrade-glibc-langpack-gd alma-upgrade-glibc-langpack-gez alma-upgrade-glibc-langpack-gl alma-upgrade-glibc-langpack-gu alma-upgrade-glibc-langpack-gv alma-upgrade-glibc-langpack-ha alma-upgrade-glibc-langpack-hak alma-upgrade-glibc-langpack-he alma-upgrade-glibc-langpack-hi alma-upgrade-glibc-langpack-hif alma-upgrade-glibc-langpack-hne alma-upgrade-glibc-langpack-hr alma-upgrade-glibc-langpack-hsb alma-upgrade-glibc-langpack-ht alma-upgrade-glibc-langpack-hu alma-upgrade-glibc-langpack-hy alma-upgrade-glibc-langpack-ia alma-upgrade-glibc-langpack-id alma-upgrade-glibc-langpack-ig alma-upgrade-glibc-langpack-ik alma-upgrade-glibc-langpack-is alma-upgrade-glibc-langpack-it alma-upgrade-glibc-langpack-iu alma-upgrade-glibc-langpack-ja alma-upgrade-glibc-langpack-ka alma-upgrade-glibc-langpack-kab alma-upgrade-glibc-langpack-kk alma-upgrade-glibc-langpack-kl alma-upgrade-glibc-langpack-km alma-upgrade-glibc-langpack-kn alma-upgrade-glibc-langpack-ko alma-upgrade-glibc-langpack-kok alma-upgrade-glibc-langpack-ks alma-upgrade-glibc-langpack-ku alma-upgrade-glibc-langpack-kw alma-upgrade-glibc-langpack-ky alma-upgrade-glibc-langpack-lb alma-upgrade-glibc-langpack-lg alma-upgrade-glibc-langpack-li alma-upgrade-glibc-langpack-lij alma-upgrade-glibc-langpack-ln alma-upgrade-glibc-langpack-lo alma-upgrade-glibc-langpack-lt alma-upgrade-glibc-langpack-lv alma-upgrade-glibc-langpack-lzh alma-upgrade-glibc-langpack-mag alma-upgrade-glibc-langpack-mai alma-upgrade-glibc-langpack-mfe alma-upgrade-glibc-langpack-mg alma-upgrade-glibc-langpack-mhr alma-upgrade-glibc-langpack-mi alma-upgrade-glibc-langpack-miq alma-upgrade-glibc-langpack-mjw alma-upgrade-glibc-langpack-mk alma-upgrade-glibc-langpack-ml alma-upgrade-glibc-langpack-mn alma-upgrade-glibc-langpack-mni alma-upgrade-glibc-langpack-mnw alma-upgrade-glibc-langpack-mr alma-upgrade-glibc-langpack-ms alma-upgrade-glibc-langpack-mt alma-upgrade-glibc-langpack-my alma-upgrade-glibc-langpack-nan alma-upgrade-glibc-langpack-nb alma-upgrade-glibc-langpack-nds alma-upgrade-glibc-langpack-ne alma-upgrade-glibc-langpack-nhn alma-upgrade-glibc-langpack-niu alma-upgrade-glibc-langpack-nl alma-upgrade-glibc-langpack-nn alma-upgrade-glibc-langpack-nr alma-upgrade-glibc-langpack-nso alma-upgrade-glibc-langpack-oc alma-upgrade-glibc-langpack-om alma-upgrade-glibc-langpack-or alma-upgrade-glibc-langpack-os alma-upgrade-glibc-langpack-pa alma-upgrade-glibc-langpack-pap alma-upgrade-glibc-langpack-pl alma-upgrade-glibc-langpack-ps alma-upgrade-glibc-langpack-pt alma-upgrade-glibc-langpack-quz alma-upgrade-glibc-langpack-raj alma-upgrade-glibc-langpack-ro alma-upgrade-glibc-langpack-ru alma-upgrade-glibc-langpack-rw alma-upgrade-glibc-langpack-sa alma-upgrade-glibc-langpack-sah alma-upgrade-glibc-langpack-sat alma-upgrade-glibc-langpack-sc alma-upgrade-glibc-langpack-sd alma-upgrade-glibc-langpack-se alma-upgrade-glibc-langpack-sgs alma-upgrade-glibc-langpack-shn alma-upgrade-glibc-langpack-shs alma-upgrade-glibc-langpack-si alma-upgrade-glibc-langpack-sid alma-upgrade-glibc-langpack-sk alma-upgrade-glibc-langpack-sl alma-upgrade-glibc-langpack-sm alma-upgrade-glibc-langpack-so alma-upgrade-glibc-langpack-sq alma-upgrade-glibc-langpack-sr alma-upgrade-glibc-langpack-ss alma-upgrade-glibc-langpack-st alma-upgrade-glibc-langpack-sv alma-upgrade-glibc-langpack-sw alma-upgrade-glibc-langpack-szl alma-upgrade-glibc-langpack-ta alma-upgrade-glibc-langpack-tcy alma-upgrade-glibc-langpack-te alma-upgrade-glibc-langpack-tg alma-upgrade-glibc-langpack-th alma-upgrade-glibc-langpack-the alma-upgrade-glibc-langpack-ti alma-upgrade-glibc-langpack-tig alma-upgrade-glibc-langpack-tk alma-upgrade-glibc-langpack-tl alma-upgrade-glibc-langpack-tn alma-upgrade-glibc-langpack-to alma-upgrade-glibc-langpack-tpi alma-upgrade-glibc-langpack-tr alma-upgrade-glibc-langpack-ts alma-upgrade-glibc-langpack-tt alma-upgrade-glibc-langpack-ug alma-upgrade-glibc-langpack-uk alma-upgrade-glibc-langpack-unm alma-upgrade-glibc-langpack-ur alma-upgrade-glibc-langpack-uz alma-upgrade-glibc-langpack-ve alma-upgrade-glibc-langpack-vi alma-upgrade-glibc-langpack-wa alma-upgrade-glibc-langpack-wae alma-upgrade-glibc-langpack-wal alma-upgrade-glibc-langpack-wo alma-upgrade-glibc-langpack-xh alma-upgrade-glibc-langpack-yi alma-upgrade-glibc-langpack-yo alma-upgrade-glibc-langpack-yue alma-upgrade-glibc-langpack-yuw alma-upgrade-glibc-langpack-zh alma-upgrade-glibc-langpack-zu alma-upgrade-glibc-locale-source alma-upgrade-glibc-minimal-langpack alma-upgrade-glibc-nss-devel alma-upgrade-glibc-static alma-upgrade-glibc-utils alma-upgrade-libnsl alma-upgrade-nscd alma-upgrade-nss_db alma-upgrade-nss_hesiod References https://attackerkb.com/topics/cve-2024-33600 CVE - 2024-33600 https://errata.almalinux.org/8/ALSA-2024-3344.html https://errata.almalinux.org/9/ALSA-2024-3339.html
  10. Alma Linux: CVE-2024-33601: Important: glibc security update (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 05/29/2024 Added 05/29/2024 Modified 09/18/2024 Description nscd: netgroup cache may terminate daemon on memory allocation failure The Name Service Cache Daemon's (nscd) netgroup cache uses xmalloc or xrealloc and these functions may terminate the process due to a memory allocation failure resulting in a denial of service to the clients.The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) alma-upgrade-compat-libpthread-nonshared alma-upgrade-glibc alma-upgrade-glibc-all-langpacks alma-upgrade-glibc-benchtests alma-upgrade-glibc-common alma-upgrade-glibc-devel alma-upgrade-glibc-doc alma-upgrade-glibc-gconv-extra alma-upgrade-glibc-headers alma-upgrade-glibc-langpack-aa alma-upgrade-glibc-langpack-af alma-upgrade-glibc-langpack-agr alma-upgrade-glibc-langpack-ak alma-upgrade-glibc-langpack-am alma-upgrade-glibc-langpack-an alma-upgrade-glibc-langpack-anp alma-upgrade-glibc-langpack-ar alma-upgrade-glibc-langpack-as alma-upgrade-glibc-langpack-ast alma-upgrade-glibc-langpack-ayc alma-upgrade-glibc-langpack-az alma-upgrade-glibc-langpack-be alma-upgrade-glibc-langpack-bem alma-upgrade-glibc-langpack-ber alma-upgrade-glibc-langpack-bg alma-upgrade-glibc-langpack-bhb alma-upgrade-glibc-langpack-bho alma-upgrade-glibc-langpack-bi alma-upgrade-glibc-langpack-bn alma-upgrade-glibc-langpack-bo alma-upgrade-glibc-langpack-br alma-upgrade-glibc-langpack-brx alma-upgrade-glibc-langpack-bs alma-upgrade-glibc-langpack-byn alma-upgrade-glibc-langpack-ca alma-upgrade-glibc-langpack-ce alma-upgrade-glibc-langpack-chr alma-upgrade-glibc-langpack-ckb alma-upgrade-glibc-langpack-cmn alma-upgrade-glibc-langpack-crh alma-upgrade-glibc-langpack-cs alma-upgrade-glibc-langpack-csb alma-upgrade-glibc-langpack-cv alma-upgrade-glibc-langpack-cy alma-upgrade-glibc-langpack-da alma-upgrade-glibc-langpack-de alma-upgrade-glibc-langpack-doi alma-upgrade-glibc-langpack-dsb alma-upgrade-glibc-langpack-dv alma-upgrade-glibc-langpack-dz alma-upgrade-glibc-langpack-el alma-upgrade-glibc-langpack-en alma-upgrade-glibc-langpack-eo alma-upgrade-glibc-langpack-es alma-upgrade-glibc-langpack-et alma-upgrade-glibc-langpack-eu alma-upgrade-glibc-langpack-fa alma-upgrade-glibc-langpack-ff alma-upgrade-glibc-langpack-fi alma-upgrade-glibc-langpack-fil alma-upgrade-glibc-langpack-fo alma-upgrade-glibc-langpack-fr alma-upgrade-glibc-langpack-fur alma-upgrade-glibc-langpack-fy alma-upgrade-glibc-langpack-ga alma-upgrade-glibc-langpack-gd alma-upgrade-glibc-langpack-gez alma-upgrade-glibc-langpack-gl alma-upgrade-glibc-langpack-gu alma-upgrade-glibc-langpack-gv alma-upgrade-glibc-langpack-ha alma-upgrade-glibc-langpack-hak alma-upgrade-glibc-langpack-he alma-upgrade-glibc-langpack-hi alma-upgrade-glibc-langpack-hif alma-upgrade-glibc-langpack-hne alma-upgrade-glibc-langpack-hr alma-upgrade-glibc-langpack-hsb alma-upgrade-glibc-langpack-ht alma-upgrade-glibc-langpack-hu alma-upgrade-glibc-langpack-hy alma-upgrade-glibc-langpack-ia alma-upgrade-glibc-langpack-id alma-upgrade-glibc-langpack-ig alma-upgrade-glibc-langpack-ik alma-upgrade-glibc-langpack-is alma-upgrade-glibc-langpack-it alma-upgrade-glibc-langpack-iu alma-upgrade-glibc-langpack-ja alma-upgrade-glibc-langpack-ka alma-upgrade-glibc-langpack-kab alma-upgrade-glibc-langpack-kk alma-upgrade-glibc-langpack-kl alma-upgrade-glibc-langpack-km alma-upgrade-glibc-langpack-kn alma-upgrade-glibc-langpack-ko alma-upgrade-glibc-langpack-kok alma-upgrade-glibc-langpack-ks alma-upgrade-glibc-langpack-ku alma-upgrade-glibc-langpack-kw alma-upgrade-glibc-langpack-ky alma-upgrade-glibc-langpack-lb alma-upgrade-glibc-langpack-lg alma-upgrade-glibc-langpack-li alma-upgrade-glibc-langpack-lij alma-upgrade-glibc-langpack-ln alma-upgrade-glibc-langpack-lo alma-upgrade-glibc-langpack-lt alma-upgrade-glibc-langpack-lv alma-upgrade-glibc-langpack-lzh alma-upgrade-glibc-langpack-mag alma-upgrade-glibc-langpack-mai alma-upgrade-glibc-langpack-mfe alma-upgrade-glibc-langpack-mg alma-upgrade-glibc-langpack-mhr alma-upgrade-glibc-langpack-mi alma-upgrade-glibc-langpack-miq alma-upgrade-glibc-langpack-mjw alma-upgrade-glibc-langpack-mk alma-upgrade-glibc-langpack-ml alma-upgrade-glibc-langpack-mn alma-upgrade-glibc-langpack-mni alma-upgrade-glibc-langpack-mnw alma-upgrade-glibc-langpack-mr alma-upgrade-glibc-langpack-ms alma-upgrade-glibc-langpack-mt alma-upgrade-glibc-langpack-my alma-upgrade-glibc-langpack-nan alma-upgrade-glibc-langpack-nb alma-upgrade-glibc-langpack-nds alma-upgrade-glibc-langpack-ne alma-upgrade-glibc-langpack-nhn alma-upgrade-glibc-langpack-niu alma-upgrade-glibc-langpack-nl alma-upgrade-glibc-langpack-nn alma-upgrade-glibc-langpack-nr alma-upgrade-glibc-langpack-nso alma-upgrade-glibc-langpack-oc alma-upgrade-glibc-langpack-om alma-upgrade-glibc-langpack-or alma-upgrade-glibc-langpack-os alma-upgrade-glibc-langpack-pa alma-upgrade-glibc-langpack-pap alma-upgrade-glibc-langpack-pl alma-upgrade-glibc-langpack-ps alma-upgrade-glibc-langpack-pt alma-upgrade-glibc-langpack-quz alma-upgrade-glibc-langpack-raj alma-upgrade-glibc-langpack-ro alma-upgrade-glibc-langpack-ru alma-upgrade-glibc-langpack-rw alma-upgrade-glibc-langpack-sa alma-upgrade-glibc-langpack-sah alma-upgrade-glibc-langpack-sat alma-upgrade-glibc-langpack-sc alma-upgrade-glibc-langpack-sd alma-upgrade-glibc-langpack-se alma-upgrade-glibc-langpack-sgs alma-upgrade-glibc-langpack-shn alma-upgrade-glibc-langpack-shs alma-upgrade-glibc-langpack-si alma-upgrade-glibc-langpack-sid alma-upgrade-glibc-langpack-sk alma-upgrade-glibc-langpack-sl alma-upgrade-glibc-langpack-sm alma-upgrade-glibc-langpack-so alma-upgrade-glibc-langpack-sq alma-upgrade-glibc-langpack-sr alma-upgrade-glibc-langpack-ss alma-upgrade-glibc-langpack-st alma-upgrade-glibc-langpack-sv alma-upgrade-glibc-langpack-sw alma-upgrade-glibc-langpack-szl alma-upgrade-glibc-langpack-ta alma-upgrade-glibc-langpack-tcy alma-upgrade-glibc-langpack-te alma-upgrade-glibc-langpack-tg alma-upgrade-glibc-langpack-th alma-upgrade-glibc-langpack-the alma-upgrade-glibc-langpack-ti alma-upgrade-glibc-langpack-tig alma-upgrade-glibc-langpack-tk alma-upgrade-glibc-langpack-tl alma-upgrade-glibc-langpack-tn alma-upgrade-glibc-langpack-to alma-upgrade-glibc-langpack-tpi alma-upgrade-glibc-langpack-tr alma-upgrade-glibc-langpack-ts alma-upgrade-glibc-langpack-tt alma-upgrade-glibc-langpack-ug alma-upgrade-glibc-langpack-uk alma-upgrade-glibc-langpack-unm alma-upgrade-glibc-langpack-ur alma-upgrade-glibc-langpack-uz alma-upgrade-glibc-langpack-ve alma-upgrade-glibc-langpack-vi alma-upgrade-glibc-langpack-wa alma-upgrade-glibc-langpack-wae alma-upgrade-glibc-langpack-wal alma-upgrade-glibc-langpack-wo alma-upgrade-glibc-langpack-xh alma-upgrade-glibc-langpack-yi alma-upgrade-glibc-langpack-yo alma-upgrade-glibc-langpack-yue alma-upgrade-glibc-langpack-yuw alma-upgrade-glibc-langpack-zh alma-upgrade-glibc-langpack-zu alma-upgrade-glibc-locale-source alma-upgrade-glibc-minimal-langpack alma-upgrade-glibc-nss-devel alma-upgrade-glibc-static alma-upgrade-glibc-utils alma-upgrade-libnsl alma-upgrade-nscd alma-upgrade-nss_db alma-upgrade-nss_hesiod References https://attackerkb.com/topics/cve-2024-33601 CVE - 2024-33601 https://errata.almalinux.org/8/ALSA-2024-3344.html https://errata.almalinux.org/9/ALSA-2024-3339.html
  11. Red Hat OpenShift: CVE-2024-34064: jinja2: accepts keys containing non-attribute characters Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 07/26/2024 Added 07/25/2024 Modified 02/13/2025 Description Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4. Solution(s) linuxrpm-upgrade-python-jinja2 References https://attackerkb.com/topics/cve-2024-34064 CVE - 2024-34064 RHSA-2024:3781 RHSA-2024:3795 RHSA-2024:3811 RHSA-2024:3820 RHSA-2024:4231 RHSA-2024:4404 RHSA-2024:4414 RHSA-2024:4427 RHSA-2024:4522 RHSA-2024:4616 RHSA-2024:4958 RHSA-2024:5662 RHSA-2024:5810 RHSA-2024:6011 RHSA-2024:9150 RHSA-2025:1335 View more
  12. Amazon Linux AMI 2: CVE-2024-34064: Security patch for python-jinja2, python3-jinja2 (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 06/26/2024 Added 06/26/2024 Modified 06/26/2024 Description Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4. Solution(s) amazon-linux-ami-2-upgrade-python-jinja2 amazon-linux-ami-2-upgrade-python3-jinja2 References https://attackerkb.com/topics/cve-2024-34064 AL2/ALAS-2024-2573 AL2/ALAS-2024-2574 CVE - 2024-34064
  13. SUSE: CVE-2024-34064: SUSE Linux Security Advisory Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 06/01/2024 Added 05/31/2024 Modified 06/11/2024 Description Jinja is an extensible templating engine. The `xmlattr` filter in affected versions of Jinja accepts keys containing non-attribute characters. XML/HTML attributes cannot contain spaces, `/`, `>`, or `=`, as each would then be interpreted as starting a separate attribute. If an application accepts keys (as opposed to only values) as user input, and renders these in pages that other users see as well, an attacker could use this to inject other attributes and perform XSS. The fix for CVE-2024-22195 only addressed spaces but not other characters. Accepting keys as user input is now explicitly considered an unintended use case of the `xmlattr` filter, and code that does so without otherwise validating the input should be flagged as insecure, regardless of Jinja version. Accepting _values_ as user input continues to be safe. This vulnerability is fixed in 3.1.4. Solution(s) suse-upgrade-python-jinja2 suse-upgrade-python-jinja2-emacs suse-upgrade-python-jinja2-vim suse-upgrade-python3-jinja2 suse-upgrade-python311-jinja2 References https://attackerkb.com/topics/cve-2024-34064 CVE - 2024-34064
  14. SUSE: CVE-2024-33599: SUSE Linux Security Advisory Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 05/21/2024 Added 05/20/2024 Modified 06/04/2024 Description nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow.This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) suse-upgrade-glibc suse-upgrade-glibc-32bit suse-upgrade-glibc-devel suse-upgrade-glibc-devel-32bit suse-upgrade-glibc-devel-static suse-upgrade-glibc-devel-static-32bit suse-upgrade-glibc-extra suse-upgrade-glibc-html suse-upgrade-glibc-i18ndata suse-upgrade-glibc-info suse-upgrade-glibc-lang suse-upgrade-glibc-locale suse-upgrade-glibc-locale-32bit suse-upgrade-glibc-locale-base suse-upgrade-glibc-locale-base-32bit suse-upgrade-glibc-profile suse-upgrade-glibc-profile-32bit suse-upgrade-glibc-utils suse-upgrade-glibc-utils-32bit suse-upgrade-nscd References https://attackerkb.com/topics/cve-2024-33599 CVE - 2024-33599
  15. SUSE: CVE-2024-33600: SUSE Linux Security Advisory Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 05/21/2024 Added 05/20/2024 Modified 06/04/2024 Description nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference.This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) suse-upgrade-glibc suse-upgrade-glibc-32bit suse-upgrade-glibc-devel suse-upgrade-glibc-devel-32bit suse-upgrade-glibc-devel-static suse-upgrade-glibc-devel-static-32bit suse-upgrade-glibc-extra suse-upgrade-glibc-html suse-upgrade-glibc-i18ndata suse-upgrade-glibc-info suse-upgrade-glibc-lang suse-upgrade-glibc-locale suse-upgrade-glibc-locale-32bit suse-upgrade-glibc-locale-base suse-upgrade-glibc-locale-base-32bit suse-upgrade-glibc-profile suse-upgrade-glibc-profile-32bit suse-upgrade-glibc-utils suse-upgrade-glibc-utils-32bit suse-upgrade-nscd References https://attackerkb.com/topics/cve-2024-33600 CVE - 2024-33600
  16. Huawei EulerOS: CVE-2024-33599: glibc security update Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 07/17/2024 Added 07/17/2024 Modified 07/17/2024 Description nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow.This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) huawei-euleros-2_0_sp9-upgrade-glibc huawei-euleros-2_0_sp9-upgrade-glibc-all-langpacks huawei-euleros-2_0_sp9-upgrade-glibc-common huawei-euleros-2_0_sp9-upgrade-glibc-debugutils huawei-euleros-2_0_sp9-upgrade-glibc-locale-source huawei-euleros-2_0_sp9-upgrade-libnsl huawei-euleros-2_0_sp9-upgrade-nscd References https://attackerkb.com/topics/cve-2024-33599 CVE - 2024-33599 EulerOS-SA-2024-1959
  17. SUSE: CVE-2024-33602: SUSE Linux Security Advisory Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 05/21/2024 Added 05/20/2024 Modified 06/04/2024 Description nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) suse-upgrade-glibc suse-upgrade-glibc-32bit suse-upgrade-glibc-devel suse-upgrade-glibc-devel-32bit suse-upgrade-glibc-devel-static suse-upgrade-glibc-devel-static-32bit suse-upgrade-glibc-extra suse-upgrade-glibc-html suse-upgrade-glibc-i18ndata suse-upgrade-glibc-info suse-upgrade-glibc-lang suse-upgrade-glibc-locale suse-upgrade-glibc-locale-32bit suse-upgrade-glibc-locale-base suse-upgrade-glibc-locale-base-32bit suse-upgrade-glibc-profile suse-upgrade-glibc-profile-32bit suse-upgrade-glibc-utils suse-upgrade-glibc-utils-32bit suse-upgrade-nscd References https://attackerkb.com/topics/cve-2024-33602 CVE - 2024-33602
  18. Red Hat: CVE-2024-33602: glibc: netgroup cache assumes NSS callback uses in-buffer strings (Multiple Advisories) Severity 2 CVSS (AV:L/AC:L/Au:N/C:N/I:N/A:P) Published 05/06/2024 Created 05/10/2024 Added 05/13/2024 Modified 09/03/2024 Description nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) redhat-upgrade-compat-libpthread-nonshared redhat-upgrade-glibc redhat-upgrade-glibc-all-langpacks redhat-upgrade-glibc-all-langpacks-debuginfo redhat-upgrade-glibc-benchtests redhat-upgrade-glibc-benchtests-debuginfo redhat-upgrade-glibc-common redhat-upgrade-glibc-common-debuginfo redhat-upgrade-glibc-debuginfo redhat-upgrade-glibc-debuginfo-common redhat-upgrade-glibc-debugsource redhat-upgrade-glibc-devel redhat-upgrade-glibc-doc redhat-upgrade-glibc-gconv-extra redhat-upgrade-glibc-gconv-extra-debuginfo redhat-upgrade-glibc-headers redhat-upgrade-glibc-langpack-aa redhat-upgrade-glibc-langpack-af redhat-upgrade-glibc-langpack-agr redhat-upgrade-glibc-langpack-ak redhat-upgrade-glibc-langpack-am redhat-upgrade-glibc-langpack-an redhat-upgrade-glibc-langpack-anp redhat-upgrade-glibc-langpack-ar redhat-upgrade-glibc-langpack-as redhat-upgrade-glibc-langpack-ast redhat-upgrade-glibc-langpack-ayc redhat-upgrade-glibc-langpack-az redhat-upgrade-glibc-langpack-be redhat-upgrade-glibc-langpack-bem redhat-upgrade-glibc-langpack-ber redhat-upgrade-glibc-langpack-bg redhat-upgrade-glibc-langpack-bhb redhat-upgrade-glibc-langpack-bho redhat-upgrade-glibc-langpack-bi redhat-upgrade-glibc-langpack-bn redhat-upgrade-glibc-langpack-bo redhat-upgrade-glibc-langpack-br redhat-upgrade-glibc-langpack-brx redhat-upgrade-glibc-langpack-bs redhat-upgrade-glibc-langpack-byn redhat-upgrade-glibc-langpack-ca redhat-upgrade-glibc-langpack-ce redhat-upgrade-glibc-langpack-chr redhat-upgrade-glibc-langpack-ckb redhat-upgrade-glibc-langpack-cmn redhat-upgrade-glibc-langpack-crh redhat-upgrade-glibc-langpack-cs redhat-upgrade-glibc-langpack-csb redhat-upgrade-glibc-langpack-cv redhat-upgrade-glibc-langpack-cy redhat-upgrade-glibc-langpack-da redhat-upgrade-glibc-langpack-de redhat-upgrade-glibc-langpack-doi redhat-upgrade-glibc-langpack-dsb redhat-upgrade-glibc-langpack-dv redhat-upgrade-glibc-langpack-dz redhat-upgrade-glibc-langpack-el redhat-upgrade-glibc-langpack-en redhat-upgrade-glibc-langpack-eo redhat-upgrade-glibc-langpack-es redhat-upgrade-glibc-langpack-et redhat-upgrade-glibc-langpack-eu redhat-upgrade-glibc-langpack-fa redhat-upgrade-glibc-langpack-ff redhat-upgrade-glibc-langpack-fi redhat-upgrade-glibc-langpack-fil redhat-upgrade-glibc-langpack-fo redhat-upgrade-glibc-langpack-fr redhat-upgrade-glibc-langpack-fur redhat-upgrade-glibc-langpack-fy redhat-upgrade-glibc-langpack-ga redhat-upgrade-glibc-langpack-gd redhat-upgrade-glibc-langpack-gez redhat-upgrade-glibc-langpack-gl redhat-upgrade-glibc-langpack-gu redhat-upgrade-glibc-langpack-gv redhat-upgrade-glibc-langpack-ha redhat-upgrade-glibc-langpack-hak redhat-upgrade-glibc-langpack-he redhat-upgrade-glibc-langpack-hi redhat-upgrade-glibc-langpack-hif redhat-upgrade-glibc-langpack-hne redhat-upgrade-glibc-langpack-hr redhat-upgrade-glibc-langpack-hsb redhat-upgrade-glibc-langpack-ht redhat-upgrade-glibc-langpack-hu redhat-upgrade-glibc-langpack-hy redhat-upgrade-glibc-langpack-ia redhat-upgrade-glibc-langpack-id redhat-upgrade-glibc-langpack-ig redhat-upgrade-glibc-langpack-ik redhat-upgrade-glibc-langpack-is redhat-upgrade-glibc-langpack-it redhat-upgrade-glibc-langpack-iu redhat-upgrade-glibc-langpack-ja redhat-upgrade-glibc-langpack-ka redhat-upgrade-glibc-langpack-kab redhat-upgrade-glibc-langpack-kk redhat-upgrade-glibc-langpack-kl redhat-upgrade-glibc-langpack-km redhat-upgrade-glibc-langpack-kn redhat-upgrade-glibc-langpack-ko redhat-upgrade-glibc-langpack-kok redhat-upgrade-glibc-langpack-ks redhat-upgrade-glibc-langpack-ku redhat-upgrade-glibc-langpack-kw redhat-upgrade-glibc-langpack-ky redhat-upgrade-glibc-langpack-lb redhat-upgrade-glibc-langpack-lg redhat-upgrade-glibc-langpack-li redhat-upgrade-glibc-langpack-lij redhat-upgrade-glibc-langpack-ln redhat-upgrade-glibc-langpack-lo redhat-upgrade-glibc-langpack-lt redhat-upgrade-glibc-langpack-lv redhat-upgrade-glibc-langpack-lzh redhat-upgrade-glibc-langpack-mag redhat-upgrade-glibc-langpack-mai redhat-upgrade-glibc-langpack-mfe redhat-upgrade-glibc-langpack-mg redhat-upgrade-glibc-langpack-mhr redhat-upgrade-glibc-langpack-mi redhat-upgrade-glibc-langpack-miq redhat-upgrade-glibc-langpack-mjw redhat-upgrade-glibc-langpack-mk redhat-upgrade-glibc-langpack-ml redhat-upgrade-glibc-langpack-mn redhat-upgrade-glibc-langpack-mni redhat-upgrade-glibc-langpack-mnw redhat-upgrade-glibc-langpack-mr redhat-upgrade-glibc-langpack-ms redhat-upgrade-glibc-langpack-mt redhat-upgrade-glibc-langpack-my redhat-upgrade-glibc-langpack-nan redhat-upgrade-glibc-langpack-nb redhat-upgrade-glibc-langpack-nds redhat-upgrade-glibc-langpack-ne redhat-upgrade-glibc-langpack-nhn redhat-upgrade-glibc-langpack-niu redhat-upgrade-glibc-langpack-nl redhat-upgrade-glibc-langpack-nn redhat-upgrade-glibc-langpack-nr redhat-upgrade-glibc-langpack-nso redhat-upgrade-glibc-langpack-oc redhat-upgrade-glibc-langpack-om redhat-upgrade-glibc-langpack-or redhat-upgrade-glibc-langpack-os redhat-upgrade-glibc-langpack-pa redhat-upgrade-glibc-langpack-pap redhat-upgrade-glibc-langpack-pl redhat-upgrade-glibc-langpack-ps redhat-upgrade-glibc-langpack-pt redhat-upgrade-glibc-langpack-quz redhat-upgrade-glibc-langpack-raj redhat-upgrade-glibc-langpack-ro redhat-upgrade-glibc-langpack-ru redhat-upgrade-glibc-langpack-rw redhat-upgrade-glibc-langpack-sa redhat-upgrade-glibc-langpack-sah redhat-upgrade-glibc-langpack-sat redhat-upgrade-glibc-langpack-sc redhat-upgrade-glibc-langpack-sd redhat-upgrade-glibc-langpack-se redhat-upgrade-glibc-langpack-sgs redhat-upgrade-glibc-langpack-shn redhat-upgrade-glibc-langpack-shs redhat-upgrade-glibc-langpack-si redhat-upgrade-glibc-langpack-sid redhat-upgrade-glibc-langpack-sk redhat-upgrade-glibc-langpack-sl redhat-upgrade-glibc-langpack-sm redhat-upgrade-glibc-langpack-so redhat-upgrade-glibc-langpack-sq redhat-upgrade-glibc-langpack-sr redhat-upgrade-glibc-langpack-ss redhat-upgrade-glibc-langpack-st redhat-upgrade-glibc-langpack-sv redhat-upgrade-glibc-langpack-sw redhat-upgrade-glibc-langpack-szl redhat-upgrade-glibc-langpack-ta redhat-upgrade-glibc-langpack-tcy redhat-upgrade-glibc-langpack-te redhat-upgrade-glibc-langpack-tg redhat-upgrade-glibc-langpack-th redhat-upgrade-glibc-langpack-the redhat-upgrade-glibc-langpack-ti redhat-upgrade-glibc-langpack-tig redhat-upgrade-glibc-langpack-tk redhat-upgrade-glibc-langpack-tl redhat-upgrade-glibc-langpack-tn redhat-upgrade-glibc-langpack-to redhat-upgrade-glibc-langpack-tpi redhat-upgrade-glibc-langpack-tr redhat-upgrade-glibc-langpack-ts redhat-upgrade-glibc-langpack-tt redhat-upgrade-glibc-langpack-ug redhat-upgrade-glibc-langpack-uk redhat-upgrade-glibc-langpack-unm redhat-upgrade-glibc-langpack-ur redhat-upgrade-glibc-langpack-uz redhat-upgrade-glibc-langpack-ve redhat-upgrade-glibc-langpack-vi redhat-upgrade-glibc-langpack-wa redhat-upgrade-glibc-langpack-wae redhat-upgrade-glibc-langpack-wal redhat-upgrade-glibc-langpack-wo redhat-upgrade-glibc-langpack-xh redhat-upgrade-glibc-langpack-yi redhat-upgrade-glibc-langpack-yo redhat-upgrade-glibc-langpack-yue redhat-upgrade-glibc-langpack-yuw redhat-upgrade-glibc-langpack-zh redhat-upgrade-glibc-langpack-zu redhat-upgrade-glibc-locale-source redhat-upgrade-glibc-minimal-langpack redhat-upgrade-glibc-nss-devel redhat-upgrade-glibc-static redhat-upgrade-glibc-utils redhat-upgrade-glibc-utils-debuginfo redhat-upgrade-libnsl redhat-upgrade-libnsl-debuginfo redhat-upgrade-nscd redhat-upgrade-nscd-debuginfo redhat-upgrade-nss_db redhat-upgrade-nss_db-debuginfo redhat-upgrade-nss_hesiod redhat-upgrade-nss_hesiod-debuginfo References CVE-2024-33602 RHSA-2024:2799 RHSA-2024:3312 RHSA-2024:3339 RHSA-2024:3344 RHSA-2024:3411 RHSA-2024:3423 RHSA-2024:3588 View more
  19. Huawei EulerOS: CVE-2024-33600: glibc security update Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 07/17/2024 Added 07/17/2024 Modified 07/17/2024 Description nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference.This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) huawei-euleros-2_0_sp9-upgrade-glibc huawei-euleros-2_0_sp9-upgrade-glibc-all-langpacks huawei-euleros-2_0_sp9-upgrade-glibc-common huawei-euleros-2_0_sp9-upgrade-glibc-debugutils huawei-euleros-2_0_sp9-upgrade-glibc-locale-source huawei-euleros-2_0_sp9-upgrade-libnsl huawei-euleros-2_0_sp9-upgrade-nscd References https://attackerkb.com/topics/cve-2024-33600 CVE - 2024-33600 EulerOS-SA-2024-1959
  20. VMware Photon OS: CVE-2024-33599 Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 01/21/2025 Added 01/20/2025 Modified 01/20/2025 Description nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow.This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2024-33599 CVE - 2024-33599
  21. VMware Photon OS: CVE-2024-33602 Severity 6 CVSS (AV:L/AC:H/Au:N/C:C/I:C/A:C) Published 05/06/2024 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description nscd: netgroup cache assumes NSS callback uses in-buffer strings The Name Service Cache Daemon's (nscd) netgroup cache can corrupt memory when the NSS callback does not store all strings in the provided buffer. The flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2024-33602 CVE - 2024-33602
  22. Alma Linux: CVE-2024-33599: Important: glibc security update (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 05/29/2024 Added 05/29/2024 Modified 09/18/2024 Description nscd: Stack-based buffer overflow in netgroup cache If the Name Service Cache Daemon's (nscd) fixed size cache is exhausted by client requests then a subsequent client request for netgroup data may result in a stack-based buffer overflow.This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) alma-upgrade-compat-libpthread-nonshared alma-upgrade-glibc alma-upgrade-glibc-all-langpacks alma-upgrade-glibc-benchtests alma-upgrade-glibc-common alma-upgrade-glibc-devel alma-upgrade-glibc-doc alma-upgrade-glibc-gconv-extra alma-upgrade-glibc-headers alma-upgrade-glibc-langpack-aa alma-upgrade-glibc-langpack-af alma-upgrade-glibc-langpack-agr alma-upgrade-glibc-langpack-ak alma-upgrade-glibc-langpack-am alma-upgrade-glibc-langpack-an alma-upgrade-glibc-langpack-anp alma-upgrade-glibc-langpack-ar alma-upgrade-glibc-langpack-as alma-upgrade-glibc-langpack-ast alma-upgrade-glibc-langpack-ayc alma-upgrade-glibc-langpack-az alma-upgrade-glibc-langpack-be alma-upgrade-glibc-langpack-bem alma-upgrade-glibc-langpack-ber alma-upgrade-glibc-langpack-bg alma-upgrade-glibc-langpack-bhb alma-upgrade-glibc-langpack-bho alma-upgrade-glibc-langpack-bi alma-upgrade-glibc-langpack-bn alma-upgrade-glibc-langpack-bo alma-upgrade-glibc-langpack-br alma-upgrade-glibc-langpack-brx alma-upgrade-glibc-langpack-bs alma-upgrade-glibc-langpack-byn alma-upgrade-glibc-langpack-ca alma-upgrade-glibc-langpack-ce alma-upgrade-glibc-langpack-chr alma-upgrade-glibc-langpack-ckb alma-upgrade-glibc-langpack-cmn alma-upgrade-glibc-langpack-crh alma-upgrade-glibc-langpack-cs alma-upgrade-glibc-langpack-csb alma-upgrade-glibc-langpack-cv alma-upgrade-glibc-langpack-cy alma-upgrade-glibc-langpack-da alma-upgrade-glibc-langpack-de alma-upgrade-glibc-langpack-doi alma-upgrade-glibc-langpack-dsb alma-upgrade-glibc-langpack-dv alma-upgrade-glibc-langpack-dz alma-upgrade-glibc-langpack-el alma-upgrade-glibc-langpack-en alma-upgrade-glibc-langpack-eo alma-upgrade-glibc-langpack-es alma-upgrade-glibc-langpack-et alma-upgrade-glibc-langpack-eu alma-upgrade-glibc-langpack-fa alma-upgrade-glibc-langpack-ff alma-upgrade-glibc-langpack-fi alma-upgrade-glibc-langpack-fil alma-upgrade-glibc-langpack-fo alma-upgrade-glibc-langpack-fr alma-upgrade-glibc-langpack-fur alma-upgrade-glibc-langpack-fy alma-upgrade-glibc-langpack-ga alma-upgrade-glibc-langpack-gd alma-upgrade-glibc-langpack-gez alma-upgrade-glibc-langpack-gl alma-upgrade-glibc-langpack-gu alma-upgrade-glibc-langpack-gv alma-upgrade-glibc-langpack-ha alma-upgrade-glibc-langpack-hak alma-upgrade-glibc-langpack-he alma-upgrade-glibc-langpack-hi alma-upgrade-glibc-langpack-hif alma-upgrade-glibc-langpack-hne alma-upgrade-glibc-langpack-hr alma-upgrade-glibc-langpack-hsb alma-upgrade-glibc-langpack-ht alma-upgrade-glibc-langpack-hu alma-upgrade-glibc-langpack-hy alma-upgrade-glibc-langpack-ia alma-upgrade-glibc-langpack-id alma-upgrade-glibc-langpack-ig alma-upgrade-glibc-langpack-ik alma-upgrade-glibc-langpack-is alma-upgrade-glibc-langpack-it alma-upgrade-glibc-langpack-iu alma-upgrade-glibc-langpack-ja alma-upgrade-glibc-langpack-ka alma-upgrade-glibc-langpack-kab alma-upgrade-glibc-langpack-kk alma-upgrade-glibc-langpack-kl alma-upgrade-glibc-langpack-km alma-upgrade-glibc-langpack-kn alma-upgrade-glibc-langpack-ko alma-upgrade-glibc-langpack-kok alma-upgrade-glibc-langpack-ks alma-upgrade-glibc-langpack-ku alma-upgrade-glibc-langpack-kw alma-upgrade-glibc-langpack-ky alma-upgrade-glibc-langpack-lb alma-upgrade-glibc-langpack-lg alma-upgrade-glibc-langpack-li alma-upgrade-glibc-langpack-lij alma-upgrade-glibc-langpack-ln alma-upgrade-glibc-langpack-lo alma-upgrade-glibc-langpack-lt alma-upgrade-glibc-langpack-lv alma-upgrade-glibc-langpack-lzh alma-upgrade-glibc-langpack-mag alma-upgrade-glibc-langpack-mai alma-upgrade-glibc-langpack-mfe alma-upgrade-glibc-langpack-mg alma-upgrade-glibc-langpack-mhr alma-upgrade-glibc-langpack-mi alma-upgrade-glibc-langpack-miq alma-upgrade-glibc-langpack-mjw alma-upgrade-glibc-langpack-mk alma-upgrade-glibc-langpack-ml alma-upgrade-glibc-langpack-mn alma-upgrade-glibc-langpack-mni alma-upgrade-glibc-langpack-mnw alma-upgrade-glibc-langpack-mr alma-upgrade-glibc-langpack-ms alma-upgrade-glibc-langpack-mt alma-upgrade-glibc-langpack-my alma-upgrade-glibc-langpack-nan alma-upgrade-glibc-langpack-nb alma-upgrade-glibc-langpack-nds alma-upgrade-glibc-langpack-ne alma-upgrade-glibc-langpack-nhn alma-upgrade-glibc-langpack-niu alma-upgrade-glibc-langpack-nl alma-upgrade-glibc-langpack-nn alma-upgrade-glibc-langpack-nr alma-upgrade-glibc-langpack-nso alma-upgrade-glibc-langpack-oc alma-upgrade-glibc-langpack-om alma-upgrade-glibc-langpack-or alma-upgrade-glibc-langpack-os alma-upgrade-glibc-langpack-pa alma-upgrade-glibc-langpack-pap alma-upgrade-glibc-langpack-pl alma-upgrade-glibc-langpack-ps alma-upgrade-glibc-langpack-pt alma-upgrade-glibc-langpack-quz alma-upgrade-glibc-langpack-raj alma-upgrade-glibc-langpack-ro alma-upgrade-glibc-langpack-ru alma-upgrade-glibc-langpack-rw alma-upgrade-glibc-langpack-sa alma-upgrade-glibc-langpack-sah alma-upgrade-glibc-langpack-sat alma-upgrade-glibc-langpack-sc alma-upgrade-glibc-langpack-sd alma-upgrade-glibc-langpack-se alma-upgrade-glibc-langpack-sgs alma-upgrade-glibc-langpack-shn alma-upgrade-glibc-langpack-shs alma-upgrade-glibc-langpack-si alma-upgrade-glibc-langpack-sid alma-upgrade-glibc-langpack-sk alma-upgrade-glibc-langpack-sl alma-upgrade-glibc-langpack-sm alma-upgrade-glibc-langpack-so alma-upgrade-glibc-langpack-sq alma-upgrade-glibc-langpack-sr alma-upgrade-glibc-langpack-ss alma-upgrade-glibc-langpack-st alma-upgrade-glibc-langpack-sv alma-upgrade-glibc-langpack-sw alma-upgrade-glibc-langpack-szl alma-upgrade-glibc-langpack-ta alma-upgrade-glibc-langpack-tcy alma-upgrade-glibc-langpack-te alma-upgrade-glibc-langpack-tg alma-upgrade-glibc-langpack-th alma-upgrade-glibc-langpack-the alma-upgrade-glibc-langpack-ti alma-upgrade-glibc-langpack-tig alma-upgrade-glibc-langpack-tk alma-upgrade-glibc-langpack-tl alma-upgrade-glibc-langpack-tn alma-upgrade-glibc-langpack-to alma-upgrade-glibc-langpack-tpi alma-upgrade-glibc-langpack-tr alma-upgrade-glibc-langpack-ts alma-upgrade-glibc-langpack-tt alma-upgrade-glibc-langpack-ug alma-upgrade-glibc-langpack-uk alma-upgrade-glibc-langpack-unm alma-upgrade-glibc-langpack-ur alma-upgrade-glibc-langpack-uz alma-upgrade-glibc-langpack-ve alma-upgrade-glibc-langpack-vi alma-upgrade-glibc-langpack-wa alma-upgrade-glibc-langpack-wae alma-upgrade-glibc-langpack-wal alma-upgrade-glibc-langpack-wo alma-upgrade-glibc-langpack-xh alma-upgrade-glibc-langpack-yi alma-upgrade-glibc-langpack-yo alma-upgrade-glibc-langpack-yue alma-upgrade-glibc-langpack-yuw alma-upgrade-glibc-langpack-zh alma-upgrade-glibc-langpack-zu alma-upgrade-glibc-locale-source alma-upgrade-glibc-minimal-langpack alma-upgrade-glibc-nss-devel alma-upgrade-glibc-static alma-upgrade-glibc-utils alma-upgrade-libnsl alma-upgrade-nscd alma-upgrade-nss_db alma-upgrade-nss_hesiod References https://attackerkb.com/topics/cve-2024-33599 CVE - 2024-33599 https://errata.almalinux.org/8/ALSA-2024-3344.html https://errata.almalinux.org/9/ALSA-2024-3339.html
  23. VMware Photon OS: CVE-2024-34069 Severity 8 CVSS (AV:N/AC:H/Au:N/C:C/I:C/A:C) Published 05/06/2024 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description Werkzeug is a comprehensive WSGI web application library. The debugger in affected versions of Werkzeug can allow an attacker to execute code on a developer's machine under some circumstances. This requires the attacker to get the developer to interact with a domain and subdomain they control, and enter the debugger PIN, but if they are successful it allows access to the debugger even if it is only running on localhost. This also requires the attacker to guess a URL in the developer's application that will trigger the debugger. This vulnerability is fixed in 3.0.3. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2024-34069 CVE - 2024-34069
  24. VMware Photon OS: CVE-2024-33600 Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/06/2024 Created 01/21/2025 Added 01/20/2025 Modified 01/20/2025 Description nscd: Null pointer crashes after notfound response If the Name Service Cache Daemon's (nscd) cache fails to add a not-found netgroup response to the cache, the client request can result in a null pointer dereference.This flaw was introduced in glibc 2.15 when the cache was added to nscd. This vulnerability is only present in the nscd binary. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2024-33600 CVE - 2024-33600
  25. Ubuntu: (Multiple Advisories) (CVE-2024-2201): Linux kernel vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 05/07/2024 Created 05/18/2024 Added 05/17/2024 Modified 12/23/2024 Description A cross-privilege Spectre v2 vulnerability allows attackers to bypass all deployed mitigations, including the recent Fine(IBT), and to leak arbitrary Linux kernel memory on Intel systems. Solution(s) ubuntu-upgrade-linux-image-4-15-0-1132-oracle ubuntu-upgrade-linux-image-4-15-0-1153-kvm ubuntu-upgrade-linux-image-4-15-0-1163-gcp ubuntu-upgrade-linux-image-4-15-0-1169-aws ubuntu-upgrade-linux-image-4-15-0-1178-azure ubuntu-upgrade-linux-image-4-15-0-226-generic ubuntu-upgrade-linux-image-4-15-0-226-lowlatency ubuntu-upgrade-linux-image-4-4-0-1133-aws ubuntu-upgrade-linux-image-4-4-0-1134-kvm ubuntu-upgrade-linux-image-4-4-0-1171-aws ubuntu-upgrade-linux-image-4-4-0-256-generic ubuntu-upgrade-linux-image-4-4-0-256-lowlatency ubuntu-upgrade-linux-image-5-15-0-1044-gkeop ubuntu-upgrade-linux-image-5-15-0-1054-ibm ubuntu-upgrade-linux-image-5-15-0-1054-nvidia ubuntu-upgrade-linux-image-5-15-0-1054-nvidia-lowlatency ubuntu-upgrade-linux-image-5-15-0-1054-raspi ubuntu-upgrade-linux-image-5-15-0-1057-intel-iotg ubuntu-upgrade-linux-image-5-15-0-1058-gke ubuntu-upgrade-linux-image-5-15-0-1058-intel-iotg ubuntu-upgrade-linux-image-5-15-0-1058-kvm ubuntu-upgrade-linux-image-5-15-0-1059-gcp ubuntu-upgrade-linux-image-5-15-0-1059-oracle ubuntu-upgrade-linux-image-5-15-0-106-generic ubuntu-upgrade-linux-image-5-15-0-106-generic-64k ubuntu-upgrade-linux-image-5-15-0-106-generic-lpae ubuntu-upgrade-linux-image-5-15-0-106-lowlatency ubuntu-upgrade-linux-image-5-15-0-106-lowlatency-64k ubuntu-upgrade-linux-image-5-15-0-1061-aws ubuntu-upgrade-linux-image-5-15-0-1063-azure ubuntu-upgrade-linux-image-5-15-0-1063-azure-fde ubuntu-upgrade-linux-image-5-4-0-1039-iot ubuntu-upgrade-linux-image-5-4-0-1046-xilinx-zynqmp ubuntu-upgrade-linux-image-5-4-0-1074-ibm ubuntu-upgrade-linux-image-5-4-0-1087-bluefield ubuntu-upgrade-linux-image-5-4-0-1094-gkeop ubuntu-upgrade-linux-image-5-4-0-1111-raspi ubuntu-upgrade-linux-image-5-4-0-1115-kvm ubuntu-upgrade-linux-image-5-4-0-1126-oracle ubuntu-upgrade-linux-image-5-4-0-1127-aws ubuntu-upgrade-linux-image-5-4-0-1131-gcp ubuntu-upgrade-linux-image-5-4-0-1132-azure ubuntu-upgrade-linux-image-5-4-0-187-generic ubuntu-upgrade-linux-image-5-4-0-187-generic-lpae ubuntu-upgrade-linux-image-5-4-0-187-lowlatency ubuntu-upgrade-linux-image-6-5-0-1014-starfive ubuntu-upgrade-linux-image-6-5-0-1016-laptop ubuntu-upgrade-linux-image-6-5-0-1017-raspi ubuntu-upgrade-linux-image-6-5-0-1019-nvidia ubuntu-upgrade-linux-image-6-5-0-1019-nvidia-64k ubuntu-upgrade-linux-image-6-5-0-1020-aws ubuntu-upgrade-linux-image-6-5-0-1020-gcp ubuntu-upgrade-linux-image-6-5-0-1021-azure ubuntu-upgrade-linux-image-6-5-0-1021-azure-fde ubuntu-upgrade-linux-image-6-5-0-1023-oem ubuntu-upgrade-linux-image-6-5-0-1023-oracle ubuntu-upgrade-linux-image-6-5-0-1023-oracle-64k ubuntu-upgrade-linux-image-6-5-0-35-generic ubuntu-upgrade-linux-image-6-5-0-35-generic-64k ubuntu-upgrade-linux-image-6-5-0-35-lowlatency ubuntu-upgrade-linux-image-6-5-0-35-lowlatency-64k ubuntu-upgrade-linux-image-aws ubuntu-upgrade-linux-image-aws-hwe ubuntu-upgrade-linux-image-aws-lts-18-04 ubuntu-upgrade-linux-image-aws-lts-20-04 ubuntu-upgrade-linux-image-aws-lts-22-04 ubuntu-upgrade-linux-image-azure ubuntu-upgrade-linux-image-azure-cvm ubuntu-upgrade-linux-image-azure-fde ubuntu-upgrade-linux-image-azure-fde-lts-22-04 ubuntu-upgrade-linux-image-azure-lts-18-04 ubuntu-upgrade-linux-image-azure-lts-20-04 ubuntu-upgrade-linux-image-azure-lts-22-04 ubuntu-upgrade-linux-image-bluefield ubuntu-upgrade-linux-image-gcp ubuntu-upgrade-linux-image-gcp-lts-18-04 ubuntu-upgrade-linux-image-gcp-lts-20-04 ubuntu-upgrade-linux-image-gcp-lts-22-04 ubuntu-upgrade-linux-image-generic ubuntu-upgrade-linux-image-generic-64k ubuntu-upgrade-linux-image-generic-64k-hwe-20-04 ubuntu-upgrade-linux-image-generic-64k-hwe-22-04 ubuntu-upgrade-linux-image-generic-hwe-16-04 ubuntu-upgrade-linux-image-generic-hwe-18-04 ubuntu-upgrade-linux-image-generic-hwe-20-04 ubuntu-upgrade-linux-image-generic-hwe-22-04 ubuntu-upgrade-linux-image-generic-lpae ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04 ubuntu-upgrade-linux-image-generic-lts-xenial ubuntu-upgrade-linux-image-gke ubuntu-upgrade-linux-image-gke-5-15 ubuntu-upgrade-linux-image-gkeop ubuntu-upgrade-linux-image-gkeop-5-15 ubuntu-upgrade-linux-image-gkeop-5-4 ubuntu-upgrade-linux-image-ibm ubuntu-upgrade-linux-image-ibm-lts-20-04 ubuntu-upgrade-linux-image-intel ubuntu-upgrade-linux-image-intel-iotg ubuntu-upgrade-linux-image-kvm ubuntu-upgrade-linux-image-laptop-23-10 ubuntu-upgrade-linux-image-lowlatency ubuntu-upgrade-linux-image-lowlatency-64k ubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04 ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04 ubuntu-upgrade-linux-image-lowlatency-hwe-16-04 ubuntu-upgrade-linux-image-lowlatency-hwe-18-04 ubuntu-upgrade-linux-image-lowlatency-hwe-20-04 ubuntu-upgrade-linux-image-lowlatency-hwe-22-04 ubuntu-upgrade-linux-image-lowlatency-lts-xenial ubuntu-upgrade-linux-image-nvidia ubuntu-upgrade-linux-image-nvidia-6-5 ubuntu-upgrade-linux-image-nvidia-64k-6-5 ubuntu-upgrade-linux-image-nvidia-64k-hwe-22-04 ubuntu-upgrade-linux-image-nvidia-hwe-22-04 ubuntu-upgrade-linux-image-nvidia-lowlatency ubuntu-upgrade-linux-image-oem ubuntu-upgrade-linux-image-oem-20-04 ubuntu-upgrade-linux-image-oem-20-04b ubuntu-upgrade-linux-image-oem-20-04c ubuntu-upgrade-linux-image-oem-20-04d ubuntu-upgrade-linux-image-oem-22-04 ubuntu-upgrade-linux-image-oem-22-04a ubuntu-upgrade-linux-image-oem-22-04b ubuntu-upgrade-linux-image-oem-22-04c ubuntu-upgrade-linux-image-oem-22-04d ubuntu-upgrade-linux-image-oem-osp1 ubuntu-upgrade-linux-image-oracle ubuntu-upgrade-linux-image-oracle-64k ubuntu-upgrade-linux-image-oracle-lts-18-04 ubuntu-upgrade-linux-image-oracle-lts-20-04 ubuntu-upgrade-linux-image-oracle-lts-22-04 ubuntu-upgrade-linux-image-raspi ubuntu-upgrade-linux-image-raspi-hwe-18-04 ubuntu-upgrade-linux-image-raspi-nolpae ubuntu-upgrade-linux-image-raspi2 ubuntu-upgrade-linux-image-snapdragon-hwe-18-04 ubuntu-upgrade-linux-image-starfive ubuntu-upgrade-linux-image-virtual ubuntu-upgrade-linux-image-virtual-hwe-16-04 ubuntu-upgrade-linux-image-virtual-hwe-18-04 ubuntu-upgrade-linux-image-virtual-hwe-20-04 ubuntu-upgrade-linux-image-virtual-hwe-22-04 ubuntu-upgrade-linux-image-virtual-lts-xenial ubuntu-upgrade-linux-image-xilinx-zynqmp References https://attackerkb.com/topics/cve-2024-2201 CVE - 2024-2201 USN-6765-1 USN-6766-1 USN-6766-2 USN-6766-3 USN-6774-1 USN-6795-1 USN-6828-1 USN-6865-1 USN-6866-1 USN-6866-2 USN-6866-3 USN-6868-1 USN-6868-2 View more