Updated dpic package fixes a stack-based buffer overflow vulnerability in wfloat() functio
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
Prion | Stack overflow | 19 Jul 201920:15 | – | prion |
Cvelist | CVE-2019-13989 | 19 Jul 201919:40 | – | cvelist |
UbuntuCve | CVE-2019-13989 | 19 Jul 201900:00 | – | ubuntucve |
CVE | CVE-2019-13989 | 19 Jul 201920:15 | – | cve |
NVD | CVE-2019-13989 | 19 Jul 201920:15 | – | nvd |
OpenVAS | Mageia: Security Advisory (MGASA-2020-0460) | 28 Jan 202200:00 | – | openvas |
Debian CVE | CVE-2019-13989 | 19 Jul 201920:15 | – | debiancve |
Source | Link |
---|---|
bugs | www.bugs.mageia.org/show_bug.cgi |
security-tracker | www.security-tracker.debian.org/tracker/CVE-2019-13989 |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
Mageia | 7 | noarch | dpic | 2018.02.01-2.1 | dpic-2018.02.01-2.1.mga7 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo