Vulnerability Database
Blog
FAQ
Docs
arrow_forward
search
DEBIAN-CVE-2009-3614
See a problem?
Please try reporting it
to the source
first.
Source
https://security-tracker.debian.org/tracker/DEBIAN-CVE-2009-3614
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2009-3614.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2009-3614
Upstream
CVE-2009-3614
Published
2019-11-09T03:15:10Z
Modified
2025-09-19T06:12:34Z
Summary
[none]
Details
liboping 1.3.2 allows users reading arbitrary files upon the local system.
References
https://security-tracker.debian.org/tracker/CVE-2009-3614
Affected packages
Debian:11
/
liboping
Package
Name
liboping
Purl
pkg:deb/debian/liboping?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.3.3-1
Ecosystem specific
{ "urgency": "low" }
Debian:12
/
liboping
Package
Name
liboping
Purl
pkg:deb/debian/liboping?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.3.3-1
Ecosystem specific
{ "urgency": "low" }
Debian:13
/
liboping
Package
Name
liboping
Purl
pkg:deb/debian/liboping?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.3.3-1
Ecosystem specific
{ "urgency": "low" }
Debian:14
/
liboping
Package
Name
liboping
Purl
pkg:deb/debian/liboping?arch=source
Affected ranges
Type
ECOSYSTEM
Events
Introduced
0
Unknown introduced version / All previous versions are affected
Fixed
1.3.3-1
Ecosystem specific
{ "urgency": "low" }
DEBIAN-CVE-2009-3614 - OSV