Lucene search

K

[SECURITY] [DSA 1442-2] New libsndfile packages fix arbitrary code execution

🗓️ 29 Dec 2007 01:21:41Reported by DebianType 
debian
 debian
🔗 lists.debian.org👁 16 Views

Libsndfile buffer overflow vulnerability fixed in version 1.0.16-2. Upgrade recommended

Show more
Related
Packages
OSOS VersionArchitecturePackagePackage VersionFilename
Debian4sparcsndfile-programs1.0.16-2sndfile-programs_1.0.16-2_sparc.deb
Debian4i386libsndfile11.0.16-2libsndfile1_1.0.16-2_i386.deb
Debian4armlibsndfile1-dev1.0.16-2libsndfile1-dev_1.0.16-2_arm.deb
Debian4amd64libsndfile1-dev1.0.16-2libsndfile1-dev_1.0.16-2_amd64.deb
Debian4ia64libsndfile1-dev1.0.16-2libsndfile1-dev_1.0.16-2_ia64.deb
Debian4hppasndfile-programs1.0.16-2sndfile-programs_1.0.16-2_hppa.deb
Debian4hppalibsndfile1-dev1.0.16-2libsndfile1-dev_1.0.16-2_hppa.deb
Debian4powerpclibsndfile11.0.16-2libsndfile1_1.0.16-2_powerpc.deb
Debian4i386libsndfile1-dev1.0.16-2libsndfile1-dev_1.0.16-2_i386.deb
Debian4amd64sndfile-programs1.0.16-2sndfile-programs_1.0.16-2_amd64.deb
Rows per page

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
29 Dec 2007 01:41Current
6.4Medium risk
Vulners AI Score6.4
CVSS27.5
EPSS0.314
16
.json
Report