Gentoo Essential and Critical Security Patch Updates - Page 134
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
A memory leak has been discovered in FreeRADIUS, possibly allowing for a Denial of Service.
A vulnerability has been discovered in file allowing for a denial of service.
Multiple vulnerabilities have been discovered in OpenOffice.org, allowing for remote execution of arbitrary code.
The Gentoo implementation of Vixie Cron is vulnerable to a local Denial of Service.
Two format string vulnerabilities have been discovered in Inkscape, allowing for user-assisted execution of arbitrary code.
xine-lib is vulnerable to a heap-based buffer overflow.
DokuWiki is vulnerable to a cross-site scripting attack.
libwpd is vulnerable to several heap overflows and an integer overflow.
Evince improperly handles user-supplied data possibly allowing for the execution of arbitrary code.
The zziplib library contains a buffer overflow vulnerability that could lead to user-assisted remote execution of arbitrary code.
OpenPBS contains unspecified vulnerabilities which may allow for the remote execution of arbitrary code or a Denial of Service.
OpenAFS is subject to a design flaw that could allow privilege escalation on the client.
Multiple vulnerabilities in MIT Kerberos 5 could potentially result in unauthenticated remote root code execution.
Asterisk is vulnerable to two Denial of Service issues in the SIP channel.
CUPS incorrectly handles partially-negotiated SSL connections allowing for a Denial of Service.
Squid is affected by a Denial of Service vulnerability.
A buffer underflow vulnerability has been reported in file allowing for the user-assisted execution of arbitrary code.
A format string vulnerability in Ekiga may allow the remote execution of arbitrary code.
mgv improperly handles user-supplied data possibly allowing for the execution of arbitrary code.
Wordpress contains several cross-site scripting, cross-site request forgery and information leak vulnerabilities.