Gentoo Essential and Critical Security Patch Updates - Page 169
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
The original fix introduced new vulnerabilities on 64-bit platforms. New fixed packages are available. Updated sections follow. Affected packages [More...]
The original fix introduced new vulnerabilities on 64-bit platforms. New fixed packages are available. Updated sections follow. Affected packages [More...]
A flaw in the chfn and chsh utilities might allow modification of account properties by unauthorized users.
The PNG image decoding routines in the GD library contain an integer overflow that may allow execution of arbitrary code with the rights of the program decoding a malicious PNG image. [More...]
Proxytunnel is vulnerable to a format string vulnerability, potentially allowing a remote server to execute arbitrary code with the rights of the Proxytunnel process. [More...]
pppd contains a bug that allows an attacker to crash his own connection, but it cannot be used to deny service to other users.
MIME-tools doesn't handle empty MIME boundaries correctly. This may prevent some virus-scanning programs which use MIME-tools from detecting certain viruses. [More...]
libxml2 contains multiple buffer overflows which could lead to the execution of arbitrary code.
A buffer overflow vulnerability exists in mod_include which could possibly allow a local attacker to gain escalated privileges.
A vulnerability in the Speedtouch USB driver can be exploited to allow local users to execute arbitrary code with escalated privileges.
Cherokee contains a format string vulnerability that could lead to denial of service or the execution of arbitary code.
pppd contains a vulnerability that may allow an attacker to crash the server.
Email virus scanning software relying on Archive::Zip can be fooled into thinking a ZIP attachment is empty while it contains a virus, allowing detection evasion. [More...]
PuTTY contains a vulnerability allowing an SSH server to execute arbitrary code on the connecting client.
rssh is vulnerable to a format string vulnerability that allows arbitrary execution of code with the rights of the connected user, thereby bypassing rssh restrictions. [More...]
Buffer overflow vulnerabilities have been found in mpg123 which could lead to execution of arbitrary code.
socat contains a format string vulnerability that can potentially lead to remote or local execution of arbitrary code with the privileges of the socat process. [More...]
The etc2ps.sh script, included in the Netatalk package, is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the rights of the user running the utility. [More...]
The send-pr.sh script, included in the mit-krb5 package, is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files with the rights of the user running the utility. [More...]
Multiple vulnerabilities have been found in Gaim which could allow a remote attacker to crash the application, or possibly execute arbitrary code. [More...]