A new security update has been released for Gentoo Linux - phpGroupWare: Multiple vulnerabilities. Here the announcement:
A new security update has been released for Gentoo Linux - PhpWiki: Arbitrary command execution through XML-RPC. Here the announcement:
A new security update has been released for Gentoo Linux - libpcre: Heap integer overflow. Here the announcement:
A new security update has been released for Gentoo Linux - Apache 2.0: Denial of Service vulnerability. Here the announcement:
A new security update has been released for Gentoo Linux - Tor: Information disclosure. Here the announcement:
A new security update has been released for Gentoo Linux - TikiWiki, eGroupWare: Arbitrary command execution through XML-RPC. Here the announcement:
A new security update has been released for Gentoo Linux - PEAR XML-RPC, phpxmlrpc: New PHP script injection vulnerability. Here the announcement:
A new security update has been released for Gentoo Linux - Evolution: Format string vulnerabilities. Here the announcement:
A new security update has been released for Gentoo Linux - Adobe Reader: Buffer Overflow. Here the announcement:
A Kismet security update is available for Gentoo Linux
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Kismet: Multiple vulnerabilities
Date: August 19, 2005
Bugs: #102702
ID: 200508-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Kismet is vulnerable to multiple issues potentially resulting in the execution of arbitrary code.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Kismet: Multiple vulnerabilities
Date: August 19, 2005
Bugs: #102702
ID: 200508-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Kismet is vulnerable to multiple issues potentially resulting in the execution of arbitrary code.
A bluez-utils security update is available for Gentoo Linux
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: bluez-utils: Bluetooth device name validation vulnerability
Date: August 17, 2005
Bugs: #101557
ID: 200508-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Improper validation of Bluetooth device names can lead to arbitrary command execution.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: bluez-utils: Bluetooth device name validation vulnerability
Date: August 17, 2005
Bugs: #101557
ID: 200508-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Improper validation of Bluetooth device names can lead to arbitrary command execution.
A new security update has been released for Gentoo Linux - AWStats: Arbitrary code execution using malicious Referrer information. Here the announcement:
A new security update has been released for Gentoo Linux - Xpdf, Kpdf, GPdf: Denial of Service vulnerability. Here the announcement:
A new security update has been released for Gentoo Linux - Gaim: Remote execution of arbitrary code. Here the announcement:
A Heartbeat security update has been released for Gentoo Linux
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Heartbeat: Insecure temporary file creation
Date: August 07, 2005
Bugs: #97175
ID: 200508-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Heartbeat is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Heartbeat: Insecure temporary file creation
Date: August 07, 2005
Bugs: #97175
ID: 200508-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Heartbeat is vulnerable to symlink attacks, potentially allowing a local user to overwrite arbitrary files.
A Netpbm update has been released for Gentoo Linux
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Netpbm: Arbitrary code execution in pstopnm
Date: August 05, 2005
Bugs: #100398
ID: 200508-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
The pstopnm utility, part of the Netpbm tools, contains a vulnerability which can potentially result in the execution of arbitrary code.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Netpbm: Arbitrary code execution in pstopnm
Date: August 05, 2005
Bugs: #100398
ID: 200508-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
The pstopnm utility, part of the Netpbm tools, contains a vulnerability which can potentially result in the execution of arbitrary code.
A nbSMTP security update has been released for Gentoo Linux
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: nbSMTP: Format string vulnerability
Date: August 02, 2005
Bugs: #100274
ID: 200508-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
nbSMTP is vulnerable to a format string vulnerability which may result in remote execution of arbitrary code.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: nbSMTP: Format string vulnerability
Date: August 02, 2005
Bugs: #100274
ID: 200508-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
nbSMTP is vulnerable to a format string vulnerability which may result in remote execution of arbitrary code.
A ProFTPD security update has been released for Gentoo Linux
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: ProFTPD: Format string vulnerabilities
Date: August 01, 2005
Bugs: #100364
ID: 200508-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Under specific circumstances, ProFTPD is vulnerable to format string vulnerabilities, potentially resulting in the execution of arbitrary code.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: ProFTPD: Format string vulnerabilities
Date: August 01, 2005
Bugs: #100364
ID: 200508-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Under specific circumstances, ProFTPD is vulnerable to format string vulnerabilities, potentially resulting in the execution of arbitrary code.
A Compress::Zlib security update has been released for Gentoo Linux
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Compress::Zlib: Buffer overflow
Date: August 01, 2005
Bugs: #100540
ID: 200508-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Compress::Zlib is vulnerable to a buffer overflow which could potentially lead to execution of arbitrary code.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200508-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Compress::Zlib: Buffer overflow
Date: August 01, 2005
Bugs: #100540
ID: 200508-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Compress::Zlib is vulnerable to a buffer overflow which could potentially lead to execution of arbitrary code.
A pstotext update has been released for Gentoo Linux
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200507-29
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: pstotext: Remote execution of arbitrary code
Date: July 31, 2005
Bugs: #100245
ID: 200507-29
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
pstotext contains a vulnerability which can potentially result in the execution of arbitrary code.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200507-29
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: pstotext: Remote execution of arbitrary code
Date: July 31, 2005
Bugs: #100245
ID: 200507-29
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
pstotext contains a vulnerability which can potentially result in the execution of arbitrary code.