Pardus Linux Security Advisory 2008-77 - Two vulnerabilities have been fixed in ffmpeg which can cause to a DoS (Denial of Service).Versions below 0.4.9_20080909-48-16 are affected.
020d5a4726238fdff876dfab924ad97c0bab8cfbd235da8c0f446a73adaceb2b
Pardus Linux Security Advisory 2008-71 -ClamAV contains an off-by-one heap overflow vulnerability in the code responsible for parsing VBA project files. Successful exploitation could allow an attacker to execute arbitrary code with the privileges of the 'clamd' process by sending an email with a prepared attachment.
930f71b9add142ea985cb6e2db72995a5489fb4d104b8caa4ec7c49cf5342b5f
Pardus Linux Security Advisory 2008-70 -A vulnerability has been reported in GnuTLS, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error when validating the X.509 certificate chain and can be exploited to spoof arbitrary names e.g. during a Man-in-the-Middle (MitM) attack.
3c2662b7e460287e9cc145ea7d0b9487ff84e81276c0932011ff5059ef43322b
Pardus Linux Security Advisory 2008-69 - A vulnerability has been reported in libpng, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to a memory leak error within the "png_handle_tEXt()" function in pngrutil.c. This can be exploited to potentially exhaust all available memory via a specially crafted PNG image. Versions below 1.2.33-16-6 are affected.
af59534916e47c11cc4641f00354e8aa4e7d2fa674f1633e8291fdd1ba245ae2
Pardus Linux Security Advisory 2008-67 - A remotely exploitable heap-based buffer overflow exists in libcaudio versions prior to 0.99.12-2-2.
6273274b35ca23a850c3df31e3310cf18e41dbdfa85a0db467c45b6b489785d3
Pardus Linux Security Advisory 2008-66 - An untrusted search path vulnerability in BPY_interface in Blender 2.46 allows local users to execute arbitrary code via a Trojan horse Python file in the current working directory, related to an erroneous setting of sys.path by the PySys_SetArgv function.Blender versions prior to 2.47-14-3 are affected.
f6c4f042b3d94489e7fc447f94e9dc1e3fc5a416d6e1396261743844b53235e9
Pardus Linux Security Advisory 2008-64 - A denial of service condition from invalid message address parsing exists in Dovecot versions before 1.1.6-18-3.
23e2c4b0204b71072efe9f5aae407275eff23fa3c9e66fcd6c3f43ffc8bd5cc1
Pardus Linux Security Advisory 2008-63 - Some vulnerabilities with unknown impact have been reported in imlib2. Versions before 1.4.2-10-3 are affected.
81dd6a0ae6ea047bdfd8be08f9927daed8b7dcfb3edb692e59a5485356ae15cf
Pardus Linux Security Advisory 2008-62 - The getbulk code in net-snmp 5.4 before 5.4.2.1, 5.3 before 5.3.2.3, and 5.2 before 5.2.5.1 allows remote attackers to cause a denial of service (crash) via vectors related to the number of responses or repeats.
ba0220feac8ba2e8bd794b3246c5288dac98fbeee797e7d8a94eda1607ef948f
Pardus Linux Security Advisory 2008-62 - A vulnerability has been reported in Smarty, which can be exploited by malicious people to bypass certain security restrictions. Versions below 2.6.20-6-3 are affected.
654d926a65e9a1b631321427a9345b5eaecde41c425c884a5ff08596250ad412
Pardus Linux Security Advisory 2008-61 - Some vulnerabilities have been discovered in KTorrent, which can be exploited by malicious users to compromise a vulnerable system and malicious people to bypass certain security restrictions. Versions below 2.2.7-30-4 are affected.
9561f7dade50a79ef90383d23eb5333696780886fc96417a1f90bdc16dc81273
Pardus Linux Security Advisory - Romain Francoise has found a security risk in a feature of GNU Emacs related to how Emacs interacts with Python.
48a13887b9e512f4baabfaf2c71af289e1947c6fe595ea6051cbd6d9f0bd19f5
Pardus Linux Security Advisory - A security issue has been reported in Postfix, which can be exploited by malicious, local users to cause a DoS (Denial of Service).
958c2becbf55d42c7936f60de3ecc7d90e1b2002e2058419d481531dd00703ed
Pardus Linux Security Advisory - Multiple vulnerabilities have been discovered in Clamav including a DoS (Denial of Service) vulnerability and memory leaks.
2331c30928290a28bfd081bc7ad6f8d8dbfe7c81e96370e17f7a6bef9463794e
Pardus Linux Security Advisory - Some vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service).
7a2756675c858fefab07fe032db2c66d614e3bf57731f0e65770eff5c2169b3f
Pardus Linux Security Advisory - A vulnerability has been reported in Django, which can be exploited by malicious people to conduct cross-site request forgery attacks.
0f3e2d8d2aa2a771508d97fb6450823f97cb7e84e3836afa0152e50cc3924c78
Pardus Linux Security Advisory - Multiple memory leaks and buffer overflows have been addressed in ffmpeg. Affected packages are mplayer versions below 0.0_20080825-92-11 and ffmpeg versions below 0.4.9_20080825-46-14.
b4b27cac67b92d6e20c70530934418439a246afaab6d193ab1ef0f54f41e36ab
Pardus Linux Security Advisory - A vulnerability has been reported in Ruby, which can be exploited by malicious people to cause a DoS (Denial of Service).
c6e9d536c199df4973a3e06474000294ccc5a550605dc6539e629df16a27784f
Pardus Linux Security Advisory - A vulnerability was reported in GNU ed. A remote user can cause arbitrary code to be executed on the target user's system.
3187bcf64a1c2bcc2493093e213b416ee5994503d7ff1b5bc5c2c91db758be95
Pardus Linux Security Advisory - A security issue has been reported in OpenSC, which can be exploited by malicious people to bypass certain security restrictions.
5f2a2b3d0283b838e15c5e12ba9ccab3134fb5e185e2e38e881cf0869f083b2e
Pardus Linux Security Advisory - Juraj Skripsky has reported a vulnerability in Mono, which can be exploited by malicious people to conduct HTTP header injection attacks.
a110dc1f502aff35301058c2b04af09d0ba26ed433987154ac42c5cb4f2b88fa
Pardus Linux Security Advisory - A vulnerability has been reported in LibTIFF, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise a user's system.
4b1155a3c4fc7782e4b2a42dbe108c156dbc1b5e5f22ea2ec736bbd250b6459c
Pardus Linux Security Advisory - Insufficient sanitization can lead to Vim executing arbitrary commands when performing keyword or tag lookup.
1af038f49dd7be46df684cca00b19f3590775e4fc513b99292bcdeb1e65d3219
Pardus Linux Security Advisory - Multiple vulnerabilities have discovered by g_ which potentially can be exploited by malicious people to compromise a user's system.
19543faebfa0c824149c043f1f5ca4914a2d200771201b1afa424f14923c36ef
Pardus Linux Security Advisory - A vulnerability has been reported in Libxml2, which can be exploited by malicious people to cause a DoS (Denial of Service).
64c355dcce91e0b0f828984ad3723412eb26fdf00f38a5667c4504d985959f28