You are here
Home > Preporuke > Sigurnosni nedostaci programskih biblioteka LibXfont i LibXfont2

Sigurnosni nedostaci programskih biblioteka LibXfont i LibXfont2

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LGE

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201711-08
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: LibXfont, LibXfont2: Multiple vulnerabilities
Date: November 11, 2017
Bugs: #634044
ID: 201711-08

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

Multiple vulnerabilities have been found in LibXfont and Libxfont2, the
worst of which could allow attackers to cause a Denial of Service
condition.

Background
==========

X.Org Xfont library

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 x11-libs/libXfont2 < 2.0.2 >= 2.0.2
2 x11-libs/libXfont < 1.5.3 >= 1.5.3
——————————————————————-
2 affected packages

Description
===========

Multiple vulnerabilities have been discovered in LibXfont and
LibXfont2. Please review the referenced CVE identifiers for details.

Impact
======

Local attackers could obtain sensitive information or possibly cause a
Denial of Service condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All LibXfont2 users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=x11-libs/libXfont2-2.0.2”

All LibXfont users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=x11-libs/libXfont-1.5.3”

References
==========

[ 1 ] CVE-2017-13720
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13720
[ 2 ] CVE-2017-13722
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13722

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201711-08

Concerns?<!DOCTYPE HTML PUBLIC “-//W3C//DTD HTML 4.0//EN” “http://www.w3.org/TR/REC-html40/strict.dtd”>
<html><head><meta name=”qrichtext” content=”1″ /><style type=”text/css”>
p, li { white-space: pre-wrap; }
</style></head><body style=” font-family:’Noto Sans’; font-size:10pt; font-weight:400; font-style:normal;”>
<p style=” margin-top:12px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – -</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Gentoo Linux Security Advisory GLSA 201711-08</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – -</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://security.gentoo.org/</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – -</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> Severity: Normal</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> Title: LibXfont, LibXfont2: Multiple vulnerabilities</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> Date: November 11, 2017</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> Bugs: #634044</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> ID: 201711-08</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – -</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Synopsis</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Multiple vulnerabilities have been found in LibXfont and Libxfont2, the</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>worst of which could allow attackers to cause a Denial of Service</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>condition.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Background</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>==========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>X.Org Xfont library </span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Affected packages</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>=================</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> ——————————————————————-</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> Package / Vulnerable / Unaffected</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> ——————————————————————-</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> 1 x11-libs/libXfont2 < 2.0.2 >= 2.0.2 </span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> 2 x11-libs/libXfont < 1.5.3 >= 1.5.3 </span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> ——————————————————————-</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> 2 affected packages</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Description</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>===========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Multiple vulnerabilities have been discovered in LibXfont and</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>LibXfont2. Please review the referenced CVE identifiers for details.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Impact</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>======</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Local attackers could obtain sensitive information or possibly cause a</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Denial of Service condition.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Workaround</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>==========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>There is no known workaround at this time.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Resolution</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>==========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>All LibXfont2 users should upgrade to the latest version:</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> # emerge –sync</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> # emerge –ask –oneshot –verbose ">=x11-libs/libXfont2-2.0.2"</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>All LibXfont users should upgrade to the latest version:</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> # emerge –sync</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> # emerge –ask –oneshot –verbose ">=x11-libs/libXfont-1.5.3"</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>References</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>==========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 1 ] CVE-2017-13720</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13720</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 2 ] CVE-2017-13722</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13722</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Availability</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>============</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>This GLSA and any updates to it are available for viewing at</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>the Gentoo Security Website:</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://security.gentoo.org/glsa/201711-08</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Concerns?</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>=========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Security is a primary focus of Gentoo Linux and ensuring the</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>confidentiality and security of our users’ machines is of utmost</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>importance to us. Any security concerns should be addressed to</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>security@gentoo.org or alternatively, you may file a bug at</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>https://bugs.gentoo.org.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>License</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>=======</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Copyright 2017 Gentoo Foundation, Inc; referenced text</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>belongs to its owner(s).</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>The contents of this document are licensed under the</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Creative Commons – Attribution / Share Alike license.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:12px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>http://creativecommons.org/licenses/by-sa/2.5</span></p></body></html>—–BEGIN PGP SIGNATURE—–

iQEyBAABCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAloHETYACgkQpRQw84X1
dt1Sywf4qv3D9SKaSRpi9SuAStxueJkeaXG6oauFSAEMMg+db/+yZR9VEXFotxDC
I8eHnJ8M/mgQsh4jn02uC2gy16E/6urgcOaMEsiaQuu8g/Uo1fdsxqyVGb7qPS1C
8/zomUN/A4xicn4IOF1nKNLBU8VUgfNb5NsUmgHrtLsBytW2Vy2SQuPI6J2VUgDd
M3XpWwkopzv8W1V/icaeF8DTEUBHTmfWkotxLrVgIfzvH+h9m5oqyU6bJbJq/kfQ
pLqGRCC9xt1a1ddWOvGbzz/TAlOVwwe+8QsCpgVnBsRd2tSe4VtUqURuz3gWeHFK
IL4fqrpg1qzAd0yV5GCx4Il9BVNV
=WhuW
—–END PGP SIGNATURE—–

AutorVlatka Misic
Cert idNCERT-REF-2017-11-0029-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa ImageMagick

Otkriveni su sigurnosni nedostaci u programskom paketu ImageMagick za operacijski sustav Gentoo. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju otkrivanje osjetljivih...

Close