procmail security update with buffer overflow vulnerability patc
Reporter | Title | Published | Views | Family All 74 |
---|---|---|---|---|
OpenVAS | CentOS Update for procmail CESA-2014:1172 centos7 | 11 Sep 201400:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DLA-46-1) | 8 Mar 202300:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-3019-1) | 3 Sep 201400:00 | – | openvas |
OpenVAS | Ubuntu: Security Advisory (USN-2340-1) | 5 Sep 201400:00 | – | openvas |
OpenVAS | CentOS Update for procmail CESA-2014:1172 centos6 | 11 Sep 201400:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 3019-1 (procmail - security update) | 4 Sep 201400:00 | – | openvas |
OpenVAS | Mageia: Security Advisory (MGASA-2014-0373) | 28 Jan 202200:00 | – | openvas |
OpenVAS | Fedora Update for procmail FEDORA-2014-10359 | 1 Oct 201400:00 | – | openvas |
OpenVAS | Amazon Linux: Security Advisory (ALAS-2014-408) | 8 Sep 201500:00 | – | openvas |
OpenVAS | Fedora Update for procmail FEDORA-2014-10357 | 14 Sep 201400:00 | – | openvas |
Source | Link |
---|---|
steadfast | www.steadfast.net/ |
www.facebook.com/groups/centosproject/ | |
rhn | www.rhn.redhat.com/errata/RHSA-2014-1172.html |
youtube | www.youtube.com/TheCentOSProject |
www.reddit.com/r/CentOS/ | |
www.linkedin.com/groups/22405 | |
www.twitter.com/centos |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
CentOS | 6 | i686 | procmail | 3.22-25.1.el6_5.1 | procmail-3.22-25.1.el6_5.1.i686.rpm |
CentOS | 6 | x86_64 | procmail | 3.22-25.1.el6_5.1 | procmail-3.22-25.1.el6_5.1.x86_64.rpm |
CentOS | 5 | i386 | procmail | 3.22-17.1.2.el5_10 | procmail-3.22-17.1.2.el5_10.i386.rpm |
CentOS | 5 | x86_64 | procmail | 3.22-17.1.2.el5_10 | procmail-3.22-17.1.2.el5_10.x86_64.rpm |
CentOS | 7 | i686 | procmail | 3.22-34.el7_0.1 | procmail-3.22-34.el7_0.1.i686.rpm |
CentOS | 7 | x86_64 | procmail | 3.22-34.el7_0.1 | procmail-3.22-34.el7_0.1.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo