Security update for XZ Utils with LZMA compression algorith
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
![]() | Remote Code Execution | 10 Apr 202210:33 | – | veracode |
![]() | CVE-2022-1271 | 7 Apr 202200:00 | – | ubuntucve |
![]() | [SECURITY] Fedora 36 Update: xz-5.2.5-9.fc36 | 2 May 202219:43 | – | fedora |
![]() | [SECURITY] Fedora 36 Update: gzip-1.11-3.fc36 | 28 Apr 202222:25 | – | fedora |
![]() | [SECURITY] Fedora 34 Update: gzip-1.10-5.fc34 | 30 Apr 202218:40 | – | fedora |
![]() | [SECURITY] Fedora 35 Update: xz-5.2.5-9.fc35 | 21 Apr 202221:22 | – | fedora |
![]() | [SECURITY] Fedora 35 Update: gzip-1.10-6.fc35 | 20 Apr 202219:13 | – | fedora |
![]() | AlmaLinux 9 : xz (ALSA-2022:4940) | 16 Nov 202200:00 | – | nessus |
![]() | NewStart CGSL MAIN 6.06 : gzip Vulnerability (NS-SA-2023-0081) | 27 Dec 202300:00 | – | nessus |
![]() | Amazon Linux AMI : xz (ALAS-2022-1598) | 10 Jun 202200:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | 8 | x86_64 | xz | 5.2.4-4.el8_1 | xz-5.2.4-4.el8_1.x86_64.rpm |
RedHat | 8 | x86_64 | xz-libs | 5.2.4-4.el8_1 | xz-libs-5.2.4-4.el8_1.x86_64.rpm |
RedHat | 8 | i686 | xz-debuginfo | 5.2.4-4.el8_1 | xz-debuginfo-5.2.4-4.el8_1.i686.rpm |
RedHat | 8 | x86_64 | xz-debugsource | 5.2.4-4.el8_1 | xz-debugsource-5.2.4-4.el8_1.x86_64.rpm |
RedHat | 8 | ppc64le | xz-devel | 5.2.4-4.el8_1 | xz-devel-5.2.4-4.el8_1.ppc64le.rpm |
RedHat | 8 | ppc64le | xz-libs-debuginfo | 5.2.4-4.el8_1 | xz-libs-debuginfo-5.2.4-4.el8_1.ppc64le.rpm |
RedHat | 8 | i686 | xz-debugsource | 5.2.4-4.el8_1 | xz-debugsource-5.2.4-4.el8_1.i686.rpm |
RedHat | 8 | i686 | xz-libs | 5.2.4-4.el8_1 | xz-libs-5.2.4-4.el8_1.i686.rpm |
RedHat | 8 | i686 | xz-libs-debuginfo | 5.2.4-4.el8_1 | xz-libs-debuginfo-5.2.4-4.el8_1.i686.rpm |
RedHat | 8 | i686 | xz-devel | 5.2.4-4.el8_1 | xz-devel-5.2.4-4.el8_1.i686.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo