Gentoo Linux Security Advisories (GLSA)

This page lists all security advisories that were released by the Gentoo security team. For more information, please visit our distribution's security overview.

ID Title
200812-24 VLC: Multiple vulnerabilities
200812-23 Imlib2: User-assisted execution of arbitrary code
200812-22 Ampache: Insecure temporary file usage
200812-21 ClamAV: Multiple vulnerabilities
200812-20 phpCollab: Multiple vulnerabilities
200812-19 PowerDNS: Multiple vulnerabilities
200812-18 JasPer: User-assisted execution of arbitrary code
200812-17 Ruby: Multiple vulnerabilities
200812-16 Dovecot: Multiple vulnerabilities
200812-15 POV-Ray: User-assisted execution of arbitrary code
200812-14 aview: Insecure temporary file usage
200812-13 OpenOffice.org: Multiple vulnerabilities
200812-12 Honeyd: Insecure temporary file creation
200812-11 CUPS: Multiple vulnerabilities
200812-10 Archive::Tar: Directory traversal vulnerability
200812-09 OpenSC: Insufficient protection of smart card PIN
200812-08 Mgetty: Insecure temporary file usage
200812-07 Mantis: Multiple vulnerabilities
200812-06 libxml2: Multiple vulnerabilities
200812-05 libsamplerate: User-assisted execution of arbitrary code
200812-04 lighttpd: Multiple vulnerabilities
200812-03 IPsec-Tools: racoon Denial of service
200812-02 enscript: User-assisted execution of arbitrary code
200812-01 OptiPNG: User-assisted execution of arbitrary code
200811-05 PHP: Multiple vulnerabilities
200811-04 Graphviz: User-assisted execution of arbitrary code
200811-03 FAAD2: User-assisted execution of arbitrary code
200811-02 Gallery: Multiple vulnerabilities
200811-01 Opera: Multiple vulnerabilities
200810-03 libspf2: DNS response buffer overflow
200810-02 Portage: Untrusted search path local root vulnerability
200810-01 WordNet: Execution of arbitrary code
200809-18 ClamAV: Multiple Denials of Service
200809-17 Wireshark: Multiple Denials of Service
200809-16 Git: User-assisted execution of arbitrary code
200809-15 GNU ed: User-assisted execution of arbitrary code
200809-14 BitlBee: Security bypass
200809-13 R: Insecure temporary file creation
200809-12 Newsbeuter: User-assisted execution of arbitrary code
200809-11 HAVP: Denial of service
200809-10 Mantis: Multiple vulnerabilities
200809-09 Postfix: Denial of service
200809-08 Amarok: Insecure temporary file creation
200809-07 libTIFF: User-assisted execution of arbitrary code
200809-06 VLC: Multiple vulnerabilities
200809-05 Courier Authentication Library: SQL injection vulnerability
200809-04 MySQL: Privilege bypass
200809-03 RealPlayer: Buffer overflow
200809-02 dnsmasq: Denial of Service and DNS spoofing
200809-01 yelp: User-assisted execution of arbitrary code
200808-12 Postfix: Local privilege escalation vulnerability
200808-11 UUDeview: Insecure temporary file creation
200808-10 Adobe Reader: User-assisted execution of arbitrary code
200808-09 OpenLDAP: Denial of Service vulnerability
200808-08 stunnel: Security bypass
200808-07 ClamAV: Multiple Denials of Service
200808-06 libxslt: Execution of arbitrary code
200808-05 ISC DHCP: Denial of service
200808-04 Wireshark: Denial of service
200808-03 Mozilla products: Multiple vulnerabilities
200808-02 Net-SNMP: Multiple vulnerabilities
200808-01 xine-lib: User-assisted execution of arbitrary code
200807-16 Python: Multiple vulnerabilities
200807-15 Pan: User-assisted execution of arbitrary code
200807-14 Linux Audit: Buffer overflow
200807-13 VLC: Multiple vulnerabilities
200807-12 BitchX: Multiple vulnerabilities
200807-11 PeerCast: Buffer overflow
200807-10 Bacula: Information disclosure
200807-09 Mercurial: Directory traversal
200807-08 BIND: Cache poisoning
200807-07 NX: User-assisted execution of arbitrary code
200807-06 Apache: Denial of service
200807-05 OpenOffice.org: User-assisted execution of arbitrary code
200807-04 Poppler: User-assisted execution of arbitrary code
200807-03 PCRE: Buffer overflow
200807-02 Motion: Execution of arbitrary code
200807-01 Python: Multiple integer overflows
200806-11 IBM JDK/JRE: Multiple vulnerabilities
200806-10 FreeType: User-assisted execution of arbitrary code
200806-09 libvorbis: Multiple vulnerabilities
200806-08 OpenSSL: Denial of service
200806-07 X.Org X server: Multiple vulnerabilities
200806-06 Evolution: User-assisted execution of arbitrary code
200806-05 cbrPager: User-assisted execution of arbitrary code
200806-04 rdesktop: Multiple vulnerabilities
200806-03 Imlib 2: User-assisted execution of arbitrary code
200806-02 libxslt: Execution of arbitrary code
200806-01 mtr: Stack-based buffer overflow
200805-23 Samba: Heap-based buffer overflow
200805-22 MPlayer: User-assisted execution of arbitrary code
200805-21 Roundup: Permission bypass
200805-20 GnuTLS: Execution of arbitrary code
200805-19 ClamAV: Multiple vulnerabilities
200805-18 Mozilla products: Multiple vulnerabilities
200805-17 Perl: Execution of arbitrary code
200805-16 OpenOffice.org: Multiple vulnerabilities
200805-15 libid3tag: Denial of service
200805-14 Common Data Format library: User-assisted execution of arbitrary code
200805-13 PTeX: Multiple vulnerabilities
200805-12 Blender: Multiple vulnerabilities
200805-11 Chicken: Multiple vulnerabilities
200805-10 Pngcrush: User-assisted execution of arbitrary code
200805-09 MoinMoin: Privilege escalation
200805-08 InspIRCd: Denial of service
200805-07 Linux Terminal Server Project: Multiple vulnerabilities
200805-06 Firebird: Data disclosure
200805-05 Wireshark: Denial of service
200805-04 eGroupWare: Multiple vulnerabilities
200805-03 Multiple X11 terminals: Local privilege escalation
200805-02 phpMyAdmin: Information disclosure
200805-01 Horde Application Framework: Multiple vulnerabilities
200804-30 KDE start_kdeinit: Multiple vulnerabilities
200804-29 Comix: Multiple vulnerabilities
200804-28 JRockit: Multiple vulnerabilities
200804-27 SILC: Multiple vulnerabilities
200804-26 Openfire: Denial of service
200804-25 VLC: User-assisted execution of arbitrary code
200804-24 DBmail: Data disclosure
200804-23 CUPS: Integer overflow vulnerability
200804-22 PowerDNS Recursor: DNS Cache Poisoning
200804-21 Adobe Flash Player: Multiple vulnerabilities
200804-20 Sun JDK/JRE: Multiple vulnerabilities
200804-19 PHP Toolkit: Data disclosure and Denial of service
200804-18 Poppler: User-assisted execution of arbitrary code
200804-17 Speex: User-assisted execution of arbitrary code
200804-16 rsync: Execution of arbitrary code
200804-15 libpng: Execution of arbitrary code
200804-14 Opera: Multiple vulnerabilities
200804-13 Asterisk: Multiple vulnerabilities
200804-12 gnome-screensaver: Privilege escalation
200804-11 policyd-weight: Insecure temporary file creation
200804-10 Tomcat: Multiple vulnerabilities
200804-09 am-utils: Insecure temporary file creation
200804-08 lighttpd: Multiple vulnerabilities
200804-07 PECL APC: Buffer Overflow
200804-06 UnZip: User-assisted execution of arbitrary code
200804-05 NX: User-assisted execution of arbitrary code
200804-04 MySQL: Multiple vulnerabilities
200804-03 OpenSSH: Privilege escalation
200804-02 bzip2: Denial of service
200804-01 CUPS: Multiple vulnerabilities
200803-32 Wireshark: Denial of service
200803-31 MIT Kerberos 5: Multiple vulnerabilities
200803-30 ssl-cert eclass: Certificate disclosure
200803-29 ViewVC: Multiple vulnerabilities
200803-28 OpenLDAP: Denial of Service vulnerabilities
200803-27 MoinMoin: Multiple vulnerabilities
200803-26 Adobe Acrobat Reader: Insecure temporary file creation
200803-25 Dovecot: Multiple vulnerabilities
200803-24 PCRE: Buffer overflow
200803-23 Website META Language: Insecure temporary file usage
200803-22 LIVE555 Media Server: Denial of service
200803-21 Sarg: Remote execution of arbitrary code
200803-20 International Components for Unicode: Multiple vulnerabilities
200803-19 Apache: Multiple vulnerabilities
200803-18 Cacti: Multiple vulnerabilities
200803-17 PDFlib: Multiple buffer overflows
200803-16 MPlayer: Multiple buffer overflows
200803-15 phpMyAdmin: SQL injection vulnerability
200803-14 Ghostscript: Buffer overflow
200803-13 VLC: Multiple vulnerabilities
200803-12 Evolution: Format string vulnerability
200803-11 Vobcopy: Insecure temporary file creation
200803-10 lighttpd: Multiple vulnerabilities
200803-09 Opera: Multiple vulnerabilities
200803-08 Win32 binary codecs: Multiple vulnerabilities
200803-07 Paramiko: Information disclosure
200803-06 SWORD: Shell command injection
200803-05 SplitVT: Privilege escalation
200803-04 Mantis: Cross-Site Scripting
200803-03 Audacity: Insecure temporary file creation
200803-02 Firebird: Multiple vulnerabilities
200803-01 Adobe Acrobat Reader: Multiple vulnerabilities
200802-12 xine-lib: User-assisted execution of arbitrary code
200802-11 Asterisk: Multiple vulnerabilities
200802-10 Python: PCRE Integer overflow
200802-09 ClamAV: Multiple vulnerabilities
200802-08 Boost: Denial of service
200802-07 Pulseaudio: Privilege escalation
200802-06 scponly: Multiple vulnerabilities
200802-05 Gnumeric: User-assisted execution of arbitrary code
200802-04 Gallery: Multiple vulnerabilities
200802-03 Horde IMP: Security bypass
200802-02 Doomsday: Multiple vulnerabilities
200802-01 SDL_image: Two buffer overflow vulnerabilities
200801-22 PeerCast: Buffer overflow
200801-21 Xdg-Utils: Arbitrary command execution
200801-20 libxml2: Denial of service
200801-19 GOffice: Multiple vulnerabilities
200801-18 Kazehakase: Multiple vulnerabilities
200801-17 Netkit FTP Server: Denial of service
200801-16 MaraDNS: CNAME Denial of service
200801-15 PostgreSQL: Multiple vulnerabilities
200801-14 Blam: User-assisted execution of arbitrary code
200801-13 ngIRCd: Denial of service
200801-12 xine-lib: User-assisted execution of arbitrary code
200801-11 CherryPy: Directory traversal vulnerability
200801-10 TikiWiki: Multiple vulnerabilities
200801-09 X.Org X server and Xfont library: Multiple vulnerabilities
200801-08 libcdio: User-assisted execution of arbitrary code
200801-07 Adobe Flash Player: Multiple vulnerabilities
200801-06 Xfce: Multiple vulnerabilities
200801-05 Squid: Denial of service
200801-04 OpenAFS: Denial of service
200801-03 Claws Mail: Insecure temporary file creation
200801-02 R: Multiple vulnerabilities
200801-01 unp: Arbitrary command execution