trivy was added to epel9 repo on 2024-09-23
Page updated: 2025-03-31 01:59
Repo Status -
Overall Status
Source NVR: trivy-0.50.4-6.el9 (2024-09-23)
trivy | trivy-0.50.4-6.el9 |
2330734 | NEW | CVE-2024-52798 trivy: path-to-regexp Unpatched `path-to-regexp` ReDoS in 0.1.x [epel-9] |
2331096 | NEW | CVE-2024-55565 trivy: nanoid mishandles non-integer values [epel-9] |
2331938 | NEW | CVE-2024-45337 trivy: Misuse of ServerConfig.PublicKeyCallback may cause authorization bypass in golang.org/x/crypto [epel-9] |
2333218 | NEW | CVE-2024-45338 trivy: Non-linear parsing of case-insensitive content in golang.org/x/net/html [epel-9] |
2348792 | NEW | CVE-2025-22868 trivy: Unexpected memory consumption during token parsing in golang.org/x/oauth2 [epel-9] |
2350767 | NEW | CVE-2025-22869 trivy: Denial of Service in the Key Exchange of golang.org/x/crypto/ssh [epel-9] |
2351912 | NEW | CVE-2025-22870 trivy: HTTP Proxy bypass using IPv6 Zone IDs in golang.org/x/net [epel-9] |
2353082 | NEW | CVE-2024-40635 trivy: containerd has an integer overflow in User ID handling [epel-9] |
2354399 | NEW | CVE-2025-30204 trivy: jwt-go allows excessive memory allocation during header parsing [epel-9] |