what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Gentoo Linux Security Advisory 201605-06

Gentoo Linux Security Advisory 201605-06
Posted May 31, 2016
Authored by Gentoo | Site security.gentoo.org

Gentoo Linux Security Advisory 201605-6 - Multiple vulnerabilities have been found in Firefox, Thunderbird, Network Security Services (NSS), and NetScape Portable Runtime (NSPR) with the worst of which may allow remote execution of arbitrary code. Versions less than 4.12 are affected.

tags | advisory, remote, arbitrary, vulnerability
systems | linux, gentoo
advisories | CVE-2015-2708, CVE-2015-2709, CVE-2015-2710, CVE-2015-2711, CVE-2015-2712, CVE-2015-2713, CVE-2015-2714, CVE-2015-2715, CVE-2015-2716, CVE-2015-2717, CVE-2015-2718, CVE-2015-4473, CVE-2015-4474, CVE-2015-4475, CVE-2015-4477, CVE-2015-4478, CVE-2015-4479, CVE-2015-4480, CVE-2015-4481, CVE-2015-4482, CVE-2015-4483, CVE-2015-4484, CVE-2015-4485, CVE-2015-4486, CVE-2015-4487, CVE-2015-4488, CVE-2015-4489, CVE-2015-4490
SHA-256 | f6e136b96891d177bd1fed741b580437aa9ef8f98c5b4bd3d0964a4a18ce81f0

Gentoo Linux Security Advisory 201605-06

Change Mirror Download
From: Yury German <blueknight@gentoo.org>
To: gentoo-announce@lists.gentoo.org
Message-ID: <916540f6-4310-774b-bd6f-8f60d477da02@gentoo.org>
Subject: [ GLSA 201605-06 ] Mozilla Products: Multiple vulnerabilities




- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201605-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Mozilla Products: Multiple vulnerabilities
Date: May 31, 2016
Bugs: #549356, #557590, #559186, #561246, #563230, #564834,
#573074, #574596, #576862
ID: 201605-06

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in Firefox, Thunderbird,
Network Security Services (NSS), and NetScape Portable Runtime (NSPR)
with the worst of which may allow remote execution of arbitrary code.

Background
==========

Mozilla Firefox is an open-source web browser, Mozilla Thunderbird an
open-source email client, and the Network Security Service (NSS) is a
library implementing security features like SSL v.2/v.3, TLS, PKCS #5,
PKCS #7, PKCS #11, PKCS #12, S/MIME and X.509 certificates. The
SeaMonkey project is a community effort to deliver production-quality
releases of code derived from the application formerly known as
'Mozilla Application Suite'.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-libs/nspr < 4.12 >= 4.12
2 dev-libs/nss < 3.22.2 >= 3.22.2
3 mail-client/thunderbird < 38.7.0 >= 38.7.0
4 mail-client/thunderbird-bin
< 38.7.0 >= 38.7.0
5 www-client/firefox < 38.7.0 >= 38.7.0
6 www-client/firefox-bin < 38.7.0 >= 38.7.0
-------------------------------------------------------------------
6 affected packages

Description
===========

Multiple vulnerabilities have been discovered in Firefox, NSS, NSPR,
and Thunderbird. Please review the CVE identifiers referenced below for
details.

Impact
======

A remote attacker could entice a user to view a specially crafted web
page or email, possibly resulting in execution of arbitrary code or a
Denial of Service condition. Furthermore, a remote attacker may be able
to perform Man-in-the-Middle attacks, obtain sensitive information,
spoof the address bar, conduct clickjacking attacks, bypass security
restrictions and protection mechanisms, or have other unspecified
impacts.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All NSS users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/nss-3.22.2"

All Thunderbird users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/thunderbird-38.7.0"=


All users of the Thunderbird binary package should upgrade to the
latest version:

# emerge --sync
# emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-38.7.0"

All Firefox 38.7.x users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/firefox-38.7.0"

All users of the Firefox 38.7.x binary package should upgrade to the
latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/firefox-bin-38.7.0"

References
==========

[ 1 ] CVE-2015-2708
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708
[ 2 ] CVE-2015-2708
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2708
[ 3 ] CVE-2015-2709
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709
[ 4 ] CVE-2015-2709
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2709
[ 5 ] CVE-2015-2710
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710
[ 6 ] CVE-2015-2710
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2710
[ 7 ] CVE-2015-2711
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711
[ 8 ] CVE-2015-2711
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2711
[ 9 ] CVE-2015-2712
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712
[ 10 ] CVE-2015-2712
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2712
[ 11 ] CVE-2015-2713
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713
[ 12 ] CVE-2015-2713
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2713
[ 13 ] CVE-2015-2714
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714
[ 14 ] CVE-2015-2714
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2714
[ 15 ] CVE-2015-2715
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715
[ 16 ] CVE-2015-2715
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2715
[ 17 ] CVE-2015-2716
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716
[ 18 ] CVE-2015-2716
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2716
[ 19 ] CVE-2015-2717
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717
[ 20 ] CVE-2015-2717
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2717
[ 21 ] CVE-2015-2718
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718
[ 22 ] CVE-2015-2718
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2718
[ 23 ] CVE-2015-4473
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473
[ 24 ] CVE-2015-4473
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4473
[ 25 ] CVE-2015-4474
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474
[ 26 ] CVE-2015-4474
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4474
[ 27 ] CVE-2015-4475
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475
[ 28 ] CVE-2015-4475
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4475
[ 29 ] CVE-2015-4477
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477
[ 30 ] CVE-2015-4477
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4477
[ 31 ] CVE-2015-4478
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478
[ 32 ] CVE-2015-4478
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4478
[ 33 ] CVE-2015-4479
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479
[ 34 ] CVE-2015-4479
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4479
[ 35 ] CVE-2015-4480
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480
[ 36 ] CVE-2015-4480
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4480
[ 37 ] CVE-2015-4481
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481
[ 38 ] CVE-2015-4481
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4481
[ 39 ] CVE-2015-4482
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482
[ 40 ] CVE-2015-4482
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4482
[ 41 ] CVE-2015-4483
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483
[ 42 ] CVE-2015-4483
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4483
[ 43 ] CVE-2015-4484
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484
[ 44 ] CVE-2015-4484
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4484
[ 45 ] CVE-2015-4485
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485
[ 46 ] CVE-2015-4485
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4485
[ 47 ] CVE-2015-4486
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486
[ 48 ] CVE-2015-4486
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4486
[ 49 ] CVE-2015-4487
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487
[ 50 ] CVE-2015-4487
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4487
[ 51 ] CVE-2015-4488
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488
[ 52 ] CVE-2015-4488
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4488
[ 53 ] CVE-2015-4489
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489
[ 54 ] CVE-2015-4489
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4489
[ 55 ] CVE-2015-4490
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490
[ 56 ] CVE-2015-4490
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4490
[ 57 ] CVE-2015-4491
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491
[ 58 ] CVE-2015-4491
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491
[ 59 ] CVE-2015-4492
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492
[ 60 ] CVE-2015-4492
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4492
[ 61 ] CVE-2015-4493
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493
[ 62 ] CVE-2015-4493
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4493
[ 63 ] CVE-2015-7181
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7181
[ 64 ] CVE-2015-7182
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7182
[ 65 ] CVE-2015-7183
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7183
[ 66 ] CVE-2016-1523
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523
[ 67 ] CVE-2016-1523
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1523
[ 68 ] CVE-2016-1930
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930
[ 69 ] CVE-2016-1930
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1930
[ 70 ] CVE-2016-1931
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931
[ 71 ] CVE-2016-1931
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1931
[ 72 ] CVE-2016-1933
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933
[ 73 ] CVE-2016-1933
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1933
[ 74 ] CVE-2016-1935
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935
[ 75 ] CVE-2016-1935
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1935
[ 76 ] CVE-2016-1937
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937
[ 77 ] CVE-2016-1937
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1937
[ 78 ] CVE-2016-1938
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938
[ 79 ] CVE-2016-1938
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1938
[ 80 ] CVE-2016-1939
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939
[ 81 ] CVE-2016-1939
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1939
[ 82 ] CVE-2016-1940
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940
[ 83 ] CVE-2016-1940
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1940
[ 84 ] CVE-2016-1941
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941
[ 85 ] CVE-2016-1941
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1941
[ 86 ] CVE-2016-1942
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942
[ 87 ] CVE-2016-1942
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1942
[ 88 ] CVE-2016-1943
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943
[ 89 ] CVE-2016-1943
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1943
[ 90 ] CVE-2016-1944
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944
[ 91 ] CVE-2016-1944
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1944
[ 92 ] CVE-2016-1945
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945
[ 93 ] CVE-2016-1945
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1945
[ 94 ] CVE-2016-1946
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946
[ 95 ] CVE-2016-1946
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1946
[ 96 ] CVE-2016-1947
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947
[ 97 ] CVE-2016-1947
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1947
[ 98 ] CVE-2016-1948
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948
[ 99 ] CVE-2016-1948
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1948
[ 100 ] CVE-2016-1949
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949
[ 101 ] CVE-2016-1949
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1949
[ 102 ] CVE-2016-1950
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950
[ 103 ] CVE-2016-1950
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1950
[ 104 ] CVE-2016-1952
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952
[ 105 ] CVE-2016-1952
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1952
[ 106 ] CVE-2016-1953
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953
[ 107 ] CVE-2016-1953
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1953
[ 108 ] CVE-2016-1954
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954
[ 109 ] CVE-2016-1954
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1954
[ 110 ] CVE-2016-1955
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955
[ 111 ] CVE-2016-1955
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1955
[ 112 ] CVE-2016-1956
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956
[ 113 ] CVE-2016-1956
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1956
[ 114 ] CVE-2016-1957
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957
[ 115 ] CVE-2016-1957
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1957
[ 116 ] CVE-2016-1958
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958
[ 117 ] CVE-2016-1958
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1958
[ 118 ] CVE-2016-1959
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959
[ 119 ] CVE-2016-1959
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1959
[ 120 ] CVE-2016-1960
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960
[ 121 ] CVE-2016-1960
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1960
[ 122 ] CVE-2016-1961
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961
[ 123 ] CVE-2016-1961
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1961
[ 124 ] CVE-2016-1962
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962
[ 125 ] CVE-2016-1962
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1962
[ 126 ] CVE-2016-1963
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963
[ 127 ] CVE-2016-1963
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1963
[ 128 ] CVE-2016-1964
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964
[ 129 ] CVE-2016-1964
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1964
[ 130 ] CVE-2016-1965
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965
[ 131 ] CVE-2016-1965
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1965
[ 132 ] CVE-2016-1966
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966
[ 133 ] CVE-2016-1966
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1966
[ 134 ] CVE-2016-1967
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967
[ 135 ] CVE-2016-1967
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1967
[ 136 ] CVE-2016-1968
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968
[ 137 ] CVE-2016-1968
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1968
[ 138 ] CVE-2016-1969
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969
[ 139 ] CVE-2016-1969
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1969
[ 140 ] CVE-2016-1970
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970
[ 141 ] CVE-2016-1970
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1970
[ 142 ] CVE-2016-1971
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971
[ 143 ] CVE-2016-1971
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1971
[ 144 ] CVE-2016-1972
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972
[ 145 ] CVE-2016-1972
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1972
[ 146 ] CVE-2016-1973
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973
[ 147 ] CVE-2016-1973
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1973
[ 148 ] CVE-2016-1974
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974
[ 149 ] CVE-2016-1974
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1974
[ 150 ] CVE-2016-1975
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975
[ 151 ] CVE-2016-1975
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1975
[ 152 ] CVE-2016-1976
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976
[ 153 ] CVE-2016-1976
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1976
[ 154 ] CVE-2016-1977
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977
[ 155 ] CVE-2016-1977
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1977
[ 156 ] CVE-2016-1978
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978
[ 157 ] CVE-2016-1978
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1978
[ 158 ] CVE-2016-1979
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979
[ 159 ] CVE-2016-1979
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1979
[ 160 ] CVE-2016-2790
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790
[ 161 ] CVE-2016-2790
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2790
[ 162 ] CVE-2016-2791
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791
[ 163 ] CVE-2016-2791
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2791
[ 164 ] CVE-2016-2792
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792
[ 165 ] CVE-2016-2792
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2792
[ 166 ] CVE-2016-2793
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793
[ 167 ] CVE-2016-2793
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2793
[ 168 ] CVE-2016-2794
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794
[ 169 ] CVE-2016-2794
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2794
[ 170 ] CVE-2016-2795
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795
[ 171 ] CVE-2016-2795
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2795
[ 172 ] CVE-2016-2796
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796
[ 173 ] CVE-2016-2796
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2796
[ 174 ] CVE-2016-2797
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797
[ 175 ] CVE-2016-2797
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2797
[ 176 ] CVE-2016-2798
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798
[ 177 ] CVE-2016-2798
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2798
[ 178 ] CVE-2016-2799
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799
[ 179 ] CVE-2016-2799
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2799
[ 180 ] CVE-2016-2800
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800
[ 181 ] CVE-2016-2800
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2800
[ 182 ] CVE-2016-2801
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801
[ 183 ] CVE-2016-2801
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2801
[ 184 ] CVE-2016-2802
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802
[ 185 ] CVE-2016-2802
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2802

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201605-06

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



--Bs4bwglUWSbluQjJQQ051Q7fVoU1XxLw6
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    38 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close