DSA 825-1 loop-aes-utils fix privilege escalatio
Reporter | Title | Published | Views | Family All 35 |
---|---|---|---|---|
UbuntuCve | CVE-2005-2876 | 13 Sep 200500:00 | – | ubuntucve |
OpenVAS | Debian: Security Advisory (DSA-823-1) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Slackware Advisory SSA:2005-255-02 util-linux umount | 11 Sep 201200:00 | – | openvas |
OpenVAS | Debian: Security Advisory (DSA-825-1) | 17 Jan 200800:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 825-1 (loop-aes-utils) | 17 Jan 200800:00 | – | openvas |
OpenVAS | SLES9: Security update for util-linux | 10 Oct 200900:00 | – | openvas |
OpenVAS | Debian Security Advisory DSA 823-1 (util-linux) | 17 Jan 200800:00 | – | openvas |
OpenVAS | SLES9: Security update for util-linux | 10 Oct 200900:00 | – | openvas |
OpenVAS | Slackware: Security Advisory (SSA:2005-255-02) | 10 Sep 201200:00 | – | openvas |
OpenVAS | Gentoo Security Advisory GLSA 200509-15 (util-linux) | 24 Sep 200800:00 | – | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Debian | 3.1 | s390 | fdisk-udeb | 2.12p-4sarge1 | fdisk-udeb_2.12p-4sarge1_s390.deb |
Debian | 3 | mips | mount | 2.11n-7woody1 | mount_2.11n-7woody1_mips.deb |
Debian | 3.1 | s390 | bsdutils | 2.12p-4sarge1 | bsdutils_2.12p-4sarge1_s390.deb |
Debian | 3.1 | mips | mount | 2.12p-4sarge1 | mount_2.12p-4sarge1_mips.deb |
Debian | 3.1 | i386 | loop-aes-utils | 2.12p-4sarge1 | loop-aes-utils_2.12p-4sarge1_i386.deb |
Debian | 3.1 | sparc | util-linux | 2.12p-4sarge1 | util-linux_2.12p-4sarge1_sparc.deb |
Debian | 3.1 | ia64 | util-linux | 2.12p-4sarge1 | util-linux_2.12p-4sarge1_ia64.deb |
Debian | 3 | alpha | util-linux | 2.11n-7woody1 | util-linux_2.11n-7woody1_alpha.deb |
Debian | 3 | hppa | util-linux | 2.11n-7woody1 | util-linux_2.11n-7woody1_hppa.deb |
Debian | 3 | mipsel | mount | 2.11n-7woody1 | mount_2.11n-7woody1_mipsel.deb |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo