Lucene search

K

[SECURITY] [DSA 1016-1] New evolution packages fix arbitrary code execution

πŸ—“οΈΒ 23 Mar 2006Β 13:27:42Reported byΒ DebianTypeΒ 
debian
Β debian
πŸ”—Β lists.debian.orgπŸ‘Β 14Β Views

The evolution package is vulnerable to format string vulnerabilities that could lead to the execution of arbitrary code. Upgrading is recommended

Show more
Related
Packages
OSOS VersionArchitecturePackagePackage VersionFilename
Debian3.1s390evolution2.0.4-2sarge1evolution_2.0.4-2sarge1_s390.deb
Debian3m68klibcamel01.0.5-1woody3libcamel0_1.0.5-1woody3_m68k.deb
Debian3powerpclibcamel-dev1.0.5-1woody3libcamel-dev_1.0.5-1woody3_powerpc.deb
Debian3sparclibcamel-dev1.0.5-1woody3libcamel-dev_1.0.5-1woody3_sparc.deb
Debian3.1sparcevolution2.0.4-2sarge1evolution_2.0.4-2sarge1_sparc.deb
Debian3m68kevolution1.0.5-1woody3evolution_1.0.5-1woody3_m68k.deb
Debian3.1hppaevolution-dev2.0.4-2sarge1evolution-dev_2.0.4-2sarge1_hppa.deb
Debian3i386evolution1.0.5-1woody3evolution_1.0.5-1woody3_i386.deb
Debian3.1i386evolution2.0.4-2sarge1evolution_2.0.4-2sarge1_i386.deb
Debian3.1alphaevolution-dev2.0.4-2sarge1evolution-dev_2.0.4-2sarge1_alpha.deb
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. ContactΒ us for a demo andΒ discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo