libextractor security update denial of service and arbitrary code execution fix for Debian stretc
Reporter | Title | Published | Views | Family All 38 |
---|---|---|---|---|
OSV | libextractor - security update | 10 Sep 201800:00 | – | osv |
OSV | libextractor - security update | 26 Aug 201800:00 | – | osv |
OSV | libextractor - security update | 11 Sep 201800:00 | – | osv |
OSV | libextractor vulnerabilities | 23 Nov 202018:02 | – | osv |
Debian | [SECURITY] [DSA 4290-1] libextractor security update | 10 Sep 201820:50 | – | debian |
Debian | [SECURITY] [DLA-1478-1] libextractor security update | 26 Aug 201813:10 | – | debian |
Debian | [SECURITY] [DLA 1501-1] libextractor security update | 11 Sep 201816:14 | – | debian |
OpenVAS | Debian: Security Advisory (DSA-4290-1) | 9 Sep 201800:00 | – | openvas |
OpenVAS | Mageia: Security Advisory (MGASA-2018-0388) | 28 Jan 202200:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DLA-1478-1) | 25 Aug 201800:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 8 | all | libextractor | 1:1.3-2+deb8u2 | libextractor_1:1.3-2+deb8u2_all.deb |
Debian | 9 | armhf | extract | 1.3-4+deb9u2 | extract_1.3-4+deb9u2_armhf.deb |
Debian | 9 | arm64 | extract | 1.3-4+deb9u2 | extract_1.3-4+deb9u2_arm64.deb |
Debian | 9 | i386 | extract | 1.3-4+deb9u2 | extract_1.3-4+deb9u2_i386.deb |
Debian | 9 | arm64 | libextractor-dev | 1.3-4+deb9u2 | libextractor-dev_1.3-4+deb9u2_arm64.deb |
Debian | 9 | mipsel | libextractor-dev | 1.3-4+deb9u2 | libextractor-dev_1.3-4+deb9u2_mipsel.deb |
Debian | 8 | i386 | libextractor-dbg | 1.3-2+deb8u2 | libextractor-dbg_1.3-2+deb8u2_i386.deb |
Debian | 9 | amd64 | libextractor3 | 1.3-4+deb9u2 | libextractor3_1.3-4+deb9u2_amd64.deb |
Debian | 8 | armhf | libextractor3 | 1.3-2+deb8u2 | libextractor3_1.3-2+deb8u2_armhf.deb |
Debian | 9 | armhf | libextractor3 | 1.3-4+deb9u2 | libextractor3_1.3-4+deb9u2_armhf.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo