LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: November 28th, 2014
Linux Advisory Watch: November 21st, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Gentoo: 201406-32 IcedTea JDK: Multiple vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Gentoo Multiple vulnerabilities have been found in the IcedTea JDK, the worst of which could lead to arbitrary code execution.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 201406-32
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                            http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
    Title: IcedTea JDK: Multiple vulnerabilities
     Date: June 29, 2014
     Bugs: #312297, #330205, #340819, #346799, #352035, #353418,
           #354231, #355127, #370787, #387637, #404095, #421031,
           #429522, #433389, #438750, #442478, #457206, #458410,
           #461714, #466822, #477210, #489570, #508270
       ID: 201406-32

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in the IcedTea JDK, the worst
of which could lead to arbitrary code execution.

Background
==========

IcedTea is a distribution of the Java OpenJDK source code built with
free build tools.

Affected packages
=================

    -------------------------------------------------------------------
     Package              /     Vulnerable     /            Unaffected
    -------------------------------------------------------------------
  1  dev-java/icedtea-bin        < 6.1.13.3               >= 6.1.13.3 

Description
===========

Multiple vulnerabilities have been discovered in the IcedTea JDK.
Please review the CVE identifiers referenced below for details.

Impact
======

A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, bypass intended security policies, or have other
unspecified impact.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All IcedTea JDK users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-6.1.13.3"

References
==========

[   1 ] CVE-2009-3555
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3555
[   2 ] CVE-2010-2548
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2548
[   3 ] CVE-2010-2783
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-2783
[   4 ] CVE-2010-3541
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3541
[   5 ] CVE-2010-3548
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3548
[   6 ] CVE-2010-3549
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3549
[   7 ] CVE-2010-3551
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3551
[   8 ] CVE-2010-3553
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3553
[   9 ] CVE-2010-3554
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3554
[  10 ] CVE-2010-3557
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3557
[  11 ] CVE-2010-3561
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3561
[  12 ] CVE-2010-3562
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3562
[  13 ] CVE-2010-3564
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3564
[  14 ] CVE-2010-3565
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3565
[  15 ] CVE-2010-3566
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3566
[  16 ] CVE-2010-3567
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3567
[  17 ] CVE-2010-3568
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3568
[  18 ] CVE-2010-3569
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3569
[  19 ] CVE-2010-3573
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3573
[  20 ] CVE-2010-3574
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3574
[  21 ] CVE-2010-3860
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-3860
[  22 ] CVE-2010-4351
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4351
[  23 ] CVE-2010-4448
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4448
[  24 ] CVE-2010-4450
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4450
[  25 ] CVE-2010-4465
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4465
[  26 ] CVE-2010-4467
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4467
[  27 ] CVE-2010-4469
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4469
[  28 ] CVE-2010-4470
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4470
[  29 ] CVE-2010-4471
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4471
[  30 ] CVE-2010-4472
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4472
[  31 ] CVE-2010-4476
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-4476
[  32 ] CVE-2011-0025
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0025
[  33 ] CVE-2011-0706
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0706
[  34 ] CVE-2011-0815
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0815
[  35 ] CVE-2011-0822
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0822
[  36 ] CVE-2011-0862
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0862
[  37 ] CVE-2011-0864
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0864
[  38 ] CVE-2011-0865
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0865
[  39 ] CVE-2011-0868
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0868
[  40 ] CVE-2011-0869
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0869
[  41 ] CVE-2011-0870
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0870
[  42 ] CVE-2011-0871
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0871
[  43 ] CVE-2011-0872
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0872
[  44 ] CVE-2011-3389
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3389
[  45 ] CVE-2011-3521
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3521
[  46 ] CVE-2011-3544
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3544
[  47 ] CVE-2011-3547
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3547
[  48 ] CVE-2011-3548
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3548
[  49 ] CVE-2011-3551
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3551
[  50 ] CVE-2011-3552
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3552
[  51 ] CVE-2011-3553
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3553
[  52 ] CVE-2011-3554
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3554
[  53 ] CVE-2011-3556
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3556
[  54 ] CVE-2011-3557
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3557
[  55 ] CVE-2011-3558
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3558
[  56 ] CVE-2011-3560
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3560
[  57 ] CVE-2011-3563
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3563
[  58 ] CVE-2011-3571
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3571
[  59 ] CVE-2011-5035
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-5035
[  60 ] CVE-2012-0497
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0497
[  61 ] CVE-2012-0501
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0501
[  62 ] CVE-2012-0502
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0502
[  63 ] CVE-2012-0503
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0503
[  64 ] CVE-2012-0505
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0505
[  65 ] CVE-2012-0506
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0506
[  66 ] CVE-2012-0547
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0547
[  67 ] CVE-2012-1711
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1711
[  68 ] CVE-2012-1713
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1713
[  69 ] CVE-2012-1716
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1716
[  70 ] CVE-2012-1717
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1717
[  71 ] CVE-2012-1718
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1718
[  72 ] CVE-2012-1719
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1719
[  73 ] CVE-2012-1723
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1723
[  74 ] CVE-2012-1724
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1724
[  75 ] CVE-2012-1725
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1725
[  76 ] CVE-2012-1726
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1726
[  77 ] CVE-2012-3216
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3216
[  78 ] CVE-2012-3422
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3422
[  79 ] CVE-2012-3423
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3423
[  80 ] CVE-2012-4416
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4416
[  81 ] CVE-2012-4540
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4540
[  82 ] CVE-2012-5068
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5068
[  83 ] CVE-2012-5069
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5069
[  84 ] CVE-2012-5070
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5070
[  85 ] CVE-2012-5071
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5071
[  86 ] CVE-2012-5072
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5072
[  87 ] CVE-2012-5073
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5073
[  88 ] CVE-2012-5074
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5074
[  89 ] CVE-2012-5075
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5075
[  90 ] CVE-2012-5076
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5076
[  91 ] CVE-2012-5077
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5077
[  92 ] CVE-2012-5081
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5081
[  93 ] CVE-2012-5084
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5084
[  94 ] CVE-2012-5085
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5085
[  95 ] CVE-2012-5086
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5086
[  96 ] CVE-2012-5087
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5087
[  97 ] CVE-2012-5089
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5089
[  98 ] CVE-2012-5979
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5979
[  99 ] CVE-2013-0169
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0169
[ 100 ] CVE-2013-0401
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0401
[ 101 ] CVE-2013-0424
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0424
[ 102 ] CVE-2013-0425
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0425
[ 103 ] CVE-2013-0426
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0426
[ 104 ] CVE-2013-0427
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0427
[ 105 ] CVE-2013-0428
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0428
[ 106 ] CVE-2013-0429
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0429
[ 107 ] CVE-2013-0431
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0431
[ 108 ] CVE-2013-0432
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0432
[ 109 ] CVE-2013-0433
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0433
[ 110 ] CVE-2013-0434
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0434
[ 111 ] CVE-2013-0435
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0435
[ 112 ] CVE-2013-0440
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0440
[ 113 ] CVE-2013-0441
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0441
[ 114 ] CVE-2013-0442
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0442
[ 115 ] CVE-2013-0443
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0443
[ 116 ] CVE-2013-0444
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0444
[ 117 ] CVE-2013-0450
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0450
[ 118 ] CVE-2013-0809
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0809
[ 119 ] CVE-2013-1475
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1475
[ 120 ] CVE-2013-1476
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1476
[ 121 ] CVE-2013-1478
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1478
[ 122 ] CVE-2013-1480
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1480
[ 123 ] CVE-2013-1484
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1484
[ 124 ] CVE-2013-1485
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1485
[ 125 ] CVE-2013-1486
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1486
[ 126 ] CVE-2013-1488
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1488
[ 127 ] CVE-2013-1493
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1493
[ 128 ] CVE-2013-1500
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1500
[ 129 ] CVE-2013-1518
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1518
[ 130 ] CVE-2013-1537
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1537
[ 131 ] CVE-2013-1557
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1557
[ 132 ] CVE-2013-1569
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1569
[ 133 ] CVE-2013-1571
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1571
[ 134 ] CVE-2013-2383
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2383
[ 135 ] CVE-2013-2384
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2384
[ 136 ] CVE-2013-2407
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2407
[ 137 ] CVE-2013-2412
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2412
[ 138 ] CVE-2013-2415
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2415
[ 139 ] CVE-2013-2417
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2417
[ 140 ] CVE-2013-2419
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2419
[ 141 ] CVE-2013-2420
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2420
[ 142 ] CVE-2013-2421
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2421
[ 143 ] CVE-2013-2422
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2422
[ 144 ] CVE-2013-2423
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2423
[ 145 ] CVE-2013-2424
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2424
[ 146 ] CVE-2013-2426
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2426
[ 147 ] CVE-2013-2429
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2429
[ 148 ] CVE-2013-2430
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2430
[ 149 ] CVE-2013-2431
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2431
[ 150 ] CVE-2013-2436
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2436
[ 151 ] CVE-2013-2443
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2443
[ 152 ] CVE-2013-2444
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2444
[ 153 ] CVE-2013-2445
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2445
[ 154 ] CVE-2013-2446
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2446
[ 155 ] CVE-2013-2447
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2447
[ 156 ] CVE-2013-2448
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2448
[ 157 ] CVE-2013-2449
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2449
[ 158 ] CVE-2013-2450
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2450
[ 159 ] CVE-2013-2451
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2451
[ 160 ] CVE-2013-2452
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2452
[ 161 ] CVE-2013-2453
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2453
[ 162 ] CVE-2013-2454
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2454
[ 163 ] CVE-2013-2455
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2455
[ 164 ] CVE-2013-2456
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2456
[ 165 ] CVE-2013-2457
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2457
[ 166 ] CVE-2013-2458
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2458
[ 167 ] CVE-2013-2459
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2459
[ 168 ] CVE-2013-2460
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2460
[ 169 ] CVE-2013-2461
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2461
[ 170 ] CVE-2013-2463
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2463
[ 171 ] CVE-2013-2465
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2465
[ 172 ] CVE-2013-2469
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2469
[ 173 ] CVE-2013-2470
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2470
[ 174 ] CVE-2013-2471
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2471
[ 175 ] CVE-2013-2472
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2472
[ 176 ] CVE-2013-2473
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2473
[ 177 ] CVE-2013-3829
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3829
[ 178 ] CVE-2013-4002
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4002
[ 179 ] CVE-2013-5772
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5772
[ 180 ] CVE-2013-5774
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5774
[ 181 ] CVE-2013-5778
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5778
[ 182 ] CVE-2013-5780
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5780
[ 183 ] CVE-2013-5782
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5782
[ 184 ] CVE-2013-5783
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5783
[ 185 ] CVE-2013-5784
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5784
[ 186 ] CVE-2013-5790
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5790
[ 187 ] CVE-2013-5797
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5797
[ 188 ] CVE-2013-5800
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5800
[ 189 ] CVE-2013-5802
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5802
[ 190 ] CVE-2013-5803
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5803
[ 191 ] CVE-2013-5804
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5804
[ 192 ] CVE-2013-5805
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5805
[ 193 ] CVE-2013-5806
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5806
[ 194 ] CVE-2013-5809
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5809
[ 195 ] CVE-2013-5814
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5814
[ 196 ] CVE-2013-5817
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5817
[ 197 ] CVE-2013-5820
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5820
[ 198 ] CVE-2013-5823
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5823
[ 199 ] CVE-2013-5825
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5825
[ 200 ] CVE-2013-5829
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5829
[ 201 ] CVE-2013-5830
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5830
[ 202 ] CVE-2013-5840
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5840
[ 203 ] CVE-2013-5842
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5842
[ 204 ] CVE-2013-5849
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5849
[ 205 ] CVE-2013-5850
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5850
[ 206 ] CVE-2013-5851
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5851
[ 207 ] CVE-2013-6629
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629
[ 208 ] CVE-2013-6954
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6954
[ 209 ] CVE-2014-0429
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0429
[ 210 ] CVE-2014-0446
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0446
[ 211 ] CVE-2014-0451
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0451
[ 212 ] CVE-2014-0452
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0452
[ 213 ] CVE-2014-0453
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0453
[ 214 ] CVE-2014-0456
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0456
[ 215 ] CVE-2014-0457
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0457
[ 216 ] CVE-2014-0458
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0458
[ 217 ] CVE-2014-0459
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459
[ 218 ] CVE-2014-0460
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0460
[ 219 ] CVE-2014-0461
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0461
[ 220 ] CVE-2014-1876
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-1876
[ 221 ] CVE-2014-2397
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2397
[ 222 ] CVE-2014-2398
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2398
[ 223 ] CVE-2014-2403
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2403
[ 224 ] CVE-2014-2412
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2412
[ 225 ] CVE-2014-2414
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2414
[ 226 ] CVE-2014-2421
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2421
[ 227 ] CVE-2014-2423
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2423
[ 228 ] CVE-2014-2427
        http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2427

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201406-32.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.