libldb security enhancement updat
Reporter | Title | Published | Views | Family All 160 |
---|---|---|---|---|
![]() | libldb security, bug fix, and enhancement update | 22 Nov 202200:00 | – | oraclelinux |
![]() | libldb security, bug fix, and enhancement update | 15 Nov 202200:00 | – | oraclelinux |
![]() | CVE-2022-32746 | 27 Jul 202215:55 | – | redhatcve |
![]() | CentOS 8 : libldb (CESA-2022:7730) | 9 Nov 202200:00 | – | nessus |
![]() | AlmaLinux 9 : libldb (ALSA-2022:8318) | 18 Nov 202200:00 | – | nessus |
![]() | Alibaba Cloud Linux 3 : 0006: libldb (ALINUX3-SA-2023:0006) | 14 May 202500:00 | – | nessus |
![]() | Rocky Linux 8 : libldb (RLSA-2022:7730) | 7 Nov 202300:00 | – | nessus |
![]() | EulerOS Virtualization 2.9.1 : libldb (EulerOS-SA-2023-1195) | 10 Jan 202300:00 | – | nessus |
![]() | EulerOS 2.0 SP9 : libldb (EulerOS-SA-2022-2734) | 14 Nov 202200:00 | – | nessus |
![]() | Oracle Linux 9 : libldb (ELSA-2022-8318) | 22 Nov 202200:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
almalinux | 8 | i686 | python3-ldb-devel | 2.5.2-2.el8 | python3-ldb-devel-2.5.2-2.el8.i686.rpm |
almalinux | 8 | i686 | python-ldb-devel-common | 2.5.2-2.el8 | python-ldb-devel-common-2.5.2-2.el8.i686.rpm |
almalinux | 8 | i686 | libldb-devel | 2.5.2-2.el8 | libldb-devel-2.5.2-2.el8.i686.rpm |
almalinux | 8 | i686 | python3-ldb | 2.5.2-2.el8 | python3-ldb-2.5.2-2.el8.i686.rpm |
almalinux | 8 | i686 | libldb | 2.5.2-2.el8 | libldb-2.5.2-2.el8.i686.rpm |
almalinux | 8 | aarch64 | libldb-devel | 2.5.2-2.el8 | libldb-devel-2.5.2-2.el8.aarch64.rpm |
almalinux | 8 | aarch64 | python3-ldb | 2.5.2-2.el8 | python3-ldb-2.5.2-2.el8.aarch64.rpm |
almalinux | 8 | aarch64 | ldb-tools | 2.5.2-2.el8 | ldb-tools-2.5.2-2.el8.aarch64.rpm |
almalinux | 8 | aarch64 | libldb | 2.5.2-2.el8 | libldb-2.5.2-2.el8.aarch64.rpm |
almalinux | 8 | x86_64 | libldb-devel | 2.5.2-2.el8 | libldb-devel-2.5.2-2.el8.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo