Gentoo Essential and Critical Security Patch Updates - Page 145
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
An authentication error in GDM could allow users to gain elevated privileges.
MySQL is vulnerable to an SQL Injection flaw in the multi-byte encoding process.
Vulnerabilities in Mozilla Firefox allow privilege escalations for JavaScript code, cross site scripting attacks, HTTP response smuggling and possibly the execution of arbitrary code. [More...]
The JPEG library is vulnerable to a Denial of Service.
Cscope is vulnerable to multiple buffer overflows that could lead to the execution of arbitrary code.
SpamAssassin, when running with certain options, could allow local or even remote attackers to execute arbitrary commands, possibly as the root user. [More...]
The fixed zgv ebuild proposed in the initial version of this Security Advisory did not address all the vulnerabilities of the zgv package. The corrected sections appear below. [More...]
WordPress fails to sufficiently check the format of cached username data.
Vixie Cron allows local users to execute programs as root.
AWStats contains a bug in the sanitization of the input parameters which can lead to the remote execution of arbitrary code.
Pound is vulnerable to HTTP request smuggling, which could be exploited to bypass security restrictions or poison web caches.
Tor is vulnerable to a possible buffer overflow, a Denial of Service, information disclosure and information leak.
Format string vulnerabilities in Dia may lead to the execution of arbitrary code.
A security issue in shadow allows a local user to perform certain actions with escalated privileges.
Opera contains an integer signedness error resulting in a buffer overflow which may allow a remote attacker to execute arbitrary code.
Multiple vulnerabilities in libTIFF could lead to the execution of arbitrary code or a Denial of Service.
CherryPy is vulnerable to a directory traversal that could allow attackers to read arbitrary files.
Quagga's RIP daemon allows the injection of routes and the disclosure of routing information. The BGP daemon is vulnerable to a Denial of Service. [More...]
libextractor is vulnerable to two heap overflow vulnerabilities which could lead to the execution of arbitrary code.
A MySQL server may leak information to unauthorized users.