Gentoo Essential and Critical Security Patch Updates - Page 43
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
A heap-based buffer overflow in GStreamer Base Plugins might allow remote attackers to execute arbitrary code.
A vulnerability in Libgcrypt could allow a local attacker to recover sensitive information.
A buffer overflow in gdb might allow a remote attacker to cause a Denial of Service condition.
Multiple vulnerabilities have been found in Git, the worst of which could result in the arbitrary execution of code.
Multiple vulnerabilities have been found in cURL, the worst of which may lead to arbitrary code execution.
Multiple vulnerabilities have been found in libarchive, the worst of which may lead to arbitrary code execution.
A vulnerability in libssh could allow a remote attacker to execute arbitrary commands.
Multiple vulnerabilities have been found in Python, the worst of which could result in a Denial of Service condition.
Multiple vulnerabilities have been found in LibTIFF, the worst of which could result in a Denial of Service condition.
Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to arbitrary code execution.
Multiple vulnerabilities have been discovered in runC, the worst of which may lead to privilege escalation.
A heap use-after-free flaw in systemd at worst might allow an attacker to execute arbitrary code.
A buffer overflow in PPP might allow a remote attacker to execute arbitrary code.
Multiple vulnerabilities have been discovered in libvirt, the worst of which may result in the execution of arbitrary commands.
Multiple vulnerabilities have been found in nfdump, the worst of which could result in the execution of arbitrary code.
Multiple vulnerabilities have been found in SQLite, the worst of which could result in the arbitrary execution of code.
An integer overflow flaw in ICU could possibly allow for the execution of arbitrary code.
Multiple vulnerabilities have been found in atftp, the worst of which could result in the execution of arbitrary code.
A stack-based buffer overflow in musl might allow an attacker to have an application dependent impact.
Multiple vulnerabilities have been found in sudo, the worst of which could result in privilege escalation.