Moderate dbus security update to prevent unauthorized method calls and privilege elevatio
Reporter | Title | Published | Views | Family All 45 |
---|---|---|---|---|
![]() | Fedora Update for dbus FEDORA-2008-2070 | 16 Feb 200900:00 | โ | openvas |
![]() | Fedora Update for dbus FEDORA-2008-2070 | 16 Feb 200900:00 | โ | openvas |
![]() | Debian Security Advisory DSA 1599-1 (dbus) | 7 Jul 200800:00 | โ | openvas |
![]() | Mandriva Update for dbus MDVSA-2008:054 (dbus) | 9 Apr 200900:00 | โ | openvas |
![]() | RedHat Update for dbus RHSA-2008:0159-01 | 6 Mar 200900:00 | โ | openvas |
![]() | RedHat Update for dbus RHSA-2008:0159-01 | 6 Mar 200900:00 | โ | openvas |
![]() | Debian: Security Advisory (DSA-1599-1) | 7 Jul 200800:00 | โ | openvas |
![]() | Fedora Update for dbus FEDORA-2008-2043 | 16 Feb 200900:00 | โ | openvas |
![]() | Fedora Update for dbus FEDORA-2008-2043 | 16 Feb 200900:00 | โ | openvas |
![]() | Mandriva Update for dbus MDVSA-2008:054 (dbus) | 9 Apr 200900:00 | โ | openvas |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 5 | ppc64 | dbus-devel | 1.0.0-6.3.el5_1 | dbus-devel-1.0.0-6.3.el5_1.ppc64.rpm |
RedHat | 5 | s390x | dbus-x11 | 1.0.0-6.3.el5_1 | dbus-x11-1.0.0-6.3.el5_1.s390x.rpm |
RedHat | 5 | s390x | dbus | 1.0.0-6.3.el5_1 | dbus-1.0.0-6.3.el5_1.s390x.rpm |
RedHat | 5 | x86_64 | dbus-devel | 1.0.0-6.3.el5_1 | dbus-devel-1.0.0-6.3.el5_1.x86_64.rpm |
RedHat | 5 | i386 | dbus-x11 | 1.0.0-6.3.el5_1 | dbus-x11-1.0.0-6.3.el5_1.i386.rpm |
RedHat | 5 | ia64 | dbus-x11 | 1.0.0-6.3.el5_1 | dbus-x11-1.0.0-6.3.el5_1.ia64.rpm |
RedHat | 5 | ppc | dbus | 1.0.0-6.3.el5_1 | dbus-1.0.0-6.3.el5_1.ppc.rpm |
RedHat | 5 | i386 | dbus | 1.0.0-6.3.el5_1 | dbus-1.0.0-6.3.el5_1.i386.rpm |
RedHat | 5 | ia64 | dbus | 1.0.0-6.3.el5_1 | dbus-1.0.0-6.3.el5_1.ia64.rpm |
RedHat | 5 | x86_64 | dbus-x11 | 1.0.0-6.3.el5_1 | dbus-x11-1.0.0-6.3.el5_1.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contactย us for a demo andย discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo