Security update for XZ Utils with LZMA compression algorithm
Reporter | Title | Published | Views | Family All 200 |
---|---|---|---|---|
![]() | gzip vulnerability | 13 Apr 202212:37 | – | osv |
![]() | OPENSUSE-SU-2024:11987-1 apache2-mod_apparmor-3.0.4-4.1 on GA media | 15 Jun 202400:00 | – | osv |
![]() | gzip - security update | 18 Apr 202200:00 | – | osv |
![]() | RHSA-2022:1676 Red Hat Security Advisory: gzip security update | 13 Sep 202417:37 | – | osv |
![]() | RHSA-2022:4993 Red Hat Security Advisory: xz security update | 13 Sep 202417:38 | – | osv |
![]() | RHSA-2022:4940 Red Hat Security Advisory: xz security update | 13 Sep 202417:38 | – | osv |
![]() | Important: xz security update | 13 Jun 202200:00 | – | osv |
![]() | xz-utils vulnerability | 13 Apr 202214:47 | – | osv |
![]() | Important: xz security update | 8 Jun 202200:00 | – | osv |
![]() | Important: xz security update | 13 Jun 202207:15 | – | osv |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 8 | s390x | xz-libs-debuginfo | 5.2.4-4.el8_4 | xz-libs-debuginfo-5.2.4-4.el8_4.s390x.rpm |
RedHat | 8 | aarch64 | xz-debuginfo | 5.2.4-4.el8_4 | xz-debuginfo-5.2.4-4.el8_4.aarch64.rpm |
RedHat | 8 | aarch64 | xz | 5.2.4-4.el8_4 | xz-5.2.4-4.el8_4.aarch64.rpm |
RedHat | 8 | s390x | xz-debuginfo | 5.2.4-4.el8_4 | xz-debuginfo-5.2.4-4.el8_4.s390x.rpm |
RedHat | 8 | x86_64 | xz-debuginfo | 5.2.4-4.el8_4 | xz-debuginfo-5.2.4-4.el8_4.x86_64.rpm |
RedHat | 8 | i686 | xz-libs-debuginfo | 5.2.4-4.el8_4 | xz-libs-debuginfo-5.2.4-4.el8_4.i686.rpm |
RedHat | 8 | ppc64le | xz-debugsource | 5.2.4-4.el8_4 | xz-debugsource-5.2.4-4.el8_4.ppc64le.rpm |
RedHat | 8 | i686 | xz-debugsource | 5.2.4-4.el8_4 | xz-debugsource-5.2.4-4.el8_4.i686.rpm |
RedHat | 8 | x86_64 | xz-libs | 5.2.4-4.el8_4 | xz-libs-5.2.4-4.el8_4.x86_64.rpm |
RedHat | 8 | x86_64 | xz-lzma-compat-debuginfo | 5.2.4-4.el8_4 | xz-lzma-compat-debuginfo-5.2.4-4.el8_4.x86_64.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo