Gentoo Security Advisory GLSA 201301-01

Published: 2015-09-29 08:25:19
CVE Author: NIST National Vulnerability Database

Technical Details:
Multiple vulnerabilities have been discovered in Mozilla Firefox, Thunderbird, SeaMonkey, NSS, GNU IceCat, and XULRunner. Please review the CVE identifiers referenced below for details.

Recommendations:
Update the affected Linux Distribution Packages to the latest available version.

Solution Type:
Vendor Patch

CVSS Base Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C

Detection Type:
Linux Distribution Package

Summary:
Gentoo Linux Local Security Checks GLSA 201301-01

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2011-3101
https://nvd.nist.gov/vuln/detail/CVE-2007-2436
https://nvd.nist.gov/vuln/detail/CVE-2007-2437
https://nvd.nist.gov/vuln/detail/CVE-2007-2671
https://nvd.nist.gov/vuln/detail/CVE-2007-3073
https://nvd.nist.gov/vuln/detail/CVE-2008-0016
https://nvd.nist.gov/vuln/detail/CVE-2008-0017
https://nvd.nist.gov/vuln/detail/CVE-2008-0367
https://nvd.nist.gov/vuln/detail/CVE-2008-3835
https://nvd.nist.gov/vuln/detail/CVE-2008-3836
https://nvd.nist.gov/vuln/detail/CVE-2008-3837
https://nvd.nist.gov/vuln/detail/CVE-2008-4058
https://nvd.nist.gov/vuln/detail/CVE-2008-4059
https://nvd.nist.gov/vuln/detail/CVE-2008-4060
https://nvd.nist.gov/vuln/detail/CVE-2008-4061
https://nvd.nist.gov/vuln/detail/CVE-2008-4062
https://nvd.nist.gov/vuln/detail/CVE-2008-4063
https://nvd.nist.gov/vuln/detail/CVE-2008-4064
https://nvd.nist.gov/vuln/detail/CVE-2008-4065
https://nvd.nist.gov/vuln/detail/CVE-2008-4066
https://nvd.nist.gov/vuln/detail/CVE-2008-4067
https://nvd.nist.gov/vuln/detail/CVE-2008-4068
https://nvd.nist.gov/vuln/detail/CVE-2008-4069
https://nvd.nist.gov/vuln/detail/CVE-2008-4070
https://nvd.nist.gov/vuln/detail/CVE-2008-4582
https://nvd.nist.gov/vuln/detail/CVE-2008-5012
https://nvd.nist.gov/vuln/detail/CVE-2008-5013
https://nvd.nist.gov/vuln/detail/CVE-2008-5014
https://nvd.nist.gov/vuln/detail/CVE-2008-5015
https://nvd.nist.gov/vuln/detail/CVE-2008-5016
https://nvd.nist.gov/vuln/detail/CVE-2008-5017
https://nvd.nist.gov/vuln/detail/CVE-2008-5018
https://nvd.nist.gov/vuln/detail/CVE-2008-5019
https://nvd.nist.gov/vuln/detail/CVE-2008-5021
https://nvd.nist.gov/vuln/detail/CVE-2008-5022
https://nvd.nist.gov/vuln/detail/CVE-2008-5023
https://nvd.nist.gov/vuln/detail/CVE-2008-5024
https://nvd.nist.gov/vuln/detail/CVE-2008-5052
https://nvd.nist.gov/vuln/detail/CVE-2008-5500
https://nvd.nist.gov/vuln/detail/CVE-2008-5501
https://nvd.nist.gov/vuln/detail/CVE-2008-5502
https://nvd.nist.gov/vuln/detail/CVE-2008-5503
https://nvd.nist.gov/vuln/detail/CVE-2008-5504
https://nvd.nist.gov/vuln/detail/CVE-2008-5505
https://nvd.nist.gov/vuln/detail/CVE-2008-5506
https://nvd.nist.gov/vuln/detail/CVE-2008-5507
https://nvd.nist.gov/vuln/detail/CVE-2008-5508
https://nvd.nist.gov/vuln/detail/CVE-2008-5510
https://nvd.nist.gov/vuln/detail/CVE-2008-5511
https://nvd.nist.gov/vuln/detail/CVE-2008-5512
https://nvd.nist.gov/vuln/detail/CVE-2008-5513
https://nvd.nist.gov/vuln/detail/CVE-2008-5822
https://nvd.nist.gov/vuln/detail/CVE-2008-5913
https://nvd.nist.gov/vuln/detail/CVE-2008-6961
https://nvd.nist.gov/vuln/detail/CVE-2009-0071
https://nvd.nist.gov/vuln/detail/CVE-2009-0352
https://nvd.nist.gov/vuln/detail/CVE-2009-0353
https://nvd.nist.gov/vuln/detail/CVE-2009-0354
https://nvd.nist.gov/vuln/detail/CVE-2009-0355
https://nvd.nist.gov/vuln/detail/CVE-2009-0356
https://nvd.nist.gov/vuln/detail/CVE-2009-0357
https://nvd.nist.gov/vuln/detail/CVE-2009-0358
https://nvd.nist.gov/vuln/detail/CVE-2009-0652
https://nvd.nist.gov/vuln/detail/CVE-2009-0771
https://nvd.nist.gov/vuln/detail/CVE-2009-0772
https://nvd.nist.gov/vuln/detail/CVE-2009-0773
https://nvd.nist.gov/vuln/detail/CVE-2009-0774
https://nvd.nist.gov/vuln/detail/CVE-2009-0775
https://nvd.nist.gov/vuln/detail/CVE-2009-0776
https://nvd.nist.gov/vuln/detail/CVE-2009-0777
https://nvd.nist.gov/vuln/detail/CVE-2009-1044
https://nvd.nist.gov/vuln/detail/CVE-2009-1169
https://nvd.nist.gov/vuln/detail/CVE-2009-1302
https://nvd.nist.gov/vuln/detail/CVE-2009-1303
https://nvd.nist.gov/vuln/detail/CVE-2009-1304
https://nvd.nist.gov/vuln/detail/CVE-2009-1305
https://nvd.nist.gov/vuln/detail/CVE-2009-1306
https://nvd.nist.gov/vuln/detail/CVE-2009-1307
https://nvd.nist.gov/vuln/detail/CVE-2009-1308
https://nvd.nist.gov/vuln/detail/CVE-2009-1309
https://nvd.nist.gov/vuln/detail/CVE-2009-1310
https://nvd.nist.gov/vuln/detail/CVE-2009-1311
https://nvd.nist.gov/vuln/detail/CVE-2009-1312
https://nvd.nist.gov/vuln/detail/CVE-2009-1313
https://nvd.nist.gov/vuln/detail/CVE-2009-1392
https://nvd.nist.gov/vuln/detail/CVE-2009-1563
https://nvd.nist.gov/vuln/detail/CVE-2009-1571
https://nvd.nist.gov/vuln/detail/CVE-2009-1828
https://nvd.nist.gov/vuln/detail/CVE-2009-1832
https://nvd.nist.gov/vuln/detail/CVE-2009-1833
https://nvd.nist.gov/vuln/detail/CVE-2009-1834
https://nvd.nist.gov/vuln/detail/CVE-2009-1835
https://nvd.nist.gov/vuln/detail/CVE-2009-1836
https://nvd.nist.gov/vuln/detail/CVE-2009-1837
https://nvd.nist.gov/vuln/detail/CVE-2009-1838
https://nvd.nist.gov/vuln/detail/CVE-2009-1839
https://nvd.nist.gov/vuln/detail/CVE-2009-1840
https://nvd.nist.gov/vuln/detail/CVE-2009-1841
https://nvd.nist.gov/vuln/detail/CVE-2009-2043
https://nvd.nist.gov/vuln/detail/CVE-2009-2044
https://nvd.nist.gov/vuln/detail/CVE-2009-2061
https://nvd.nist.gov/vuln/detail/CVE-2009-2065
https://nvd.nist.gov/vuln/detail/CVE-2009-2210
https://nvd.nist.gov/vuln/detail/CVE-2009-2404
https://nvd.nist.gov/vuln/detail/CVE-2009-2408
https://nvd.nist.gov/vuln/detail/CVE-2009-2462
https://nvd.nist.gov/vuln/detail/CVE-2009-2463
https://nvd.nist.gov/vuln/detail/CVE-2009-2464
https://nvd.nist.gov/vuln/detail/CVE-2009-2465
https://nvd.nist.gov/vuln/detail/CVE-2009-2466
https://nvd.nist.gov/vuln/detail/CVE-2009-2467
https://nvd.nist.gov/vuln/detail/CVE-2009-2469
https://nvd.nist.gov/vuln/detail/CVE-2009-2470
https://nvd.nist.gov/vuln/detail/CVE-2009-2471
https://nvd.nist.gov/vuln/detail/CVE-2009-2472
https://nvd.nist.gov/vuln/detail/CVE-2009-2477
https://nvd.nist.gov/vuln/detail/CVE-2009-2478
https://nvd.nist.gov/vuln/detail/CVE-2009-2479
https://nvd.nist.gov/vuln/detail/CVE-2009-2535
https://nvd.nist.gov/vuln/detail/CVE-2009-2654
https://nvd.nist.gov/vuln/detail/CVE-2009-2662
https://nvd.nist.gov/vuln/detail/CVE-2009-2664
https://nvd.nist.gov/vuln/detail/CVE-2009-2665
https://nvd.nist.gov/vuln/detail/CVE-2009-3069
https://nvd.nist.gov/vuln/detail/CVE-2009-3070
https://nvd.nist.gov/vuln/detail/CVE-2009-3071
https://nvd.nist.gov/vuln/detail/CVE-2009-3072
https://nvd.nist.gov/vuln/detail/CVE-2009-3074
https://nvd.nist.gov/vuln/detail/CVE-2009-3075
https://nvd.nist.gov/vuln/detail/CVE-2009-3076
https://nvd.nist.gov/vuln/detail/CVE-2009-3077
https://nvd.nist.gov/vuln/detail/CVE-2009-3078
https://nvd.nist.gov/vuln/detail/CVE-2009-3079
https://nvd.nist.gov/vuln/detail/CVE-2009-3274
https://nvd.nist.gov/vuln/detail/CVE-2009-3371
https://nvd.nist.gov/vuln/detail/CVE-2009-3372
https://nvd.nist.gov/vuln/detail/CVE-2009-3373
https://nvd.nist.gov/vuln/detail/CVE-2009-3374
https://nvd.nist.gov/vuln/detail/CVE-2009-3375
https://nvd.nist.gov/vuln/detail/CVE-2009-3376
https://nvd.nist.gov/vuln/detail/CVE-2009-3377
https://nvd.nist.gov/vuln/detail/CVE-2009-3378
https://nvd.nist.gov/vuln/detail/CVE-2009-3379
https://nvd.nist.gov/vuln/detail/CVE-2009-3380
https://nvd.nist.gov/vuln/detail/CVE-2009-3381
https://nvd.nist.gov/vuln/detail/CVE-2009-3382
https://nvd.nist.gov/vuln/detail/CVE-2009-3383
https://nvd.nist.gov/vuln/detail/CVE-2009-3388
https://nvd.nist.gov/vuln/detail/CVE-2009-3389
https://nvd.nist.gov/vuln/detail/CVE-2009-3555
https://nvd.nist.gov/vuln/detail/CVE-2009-3978
https://nvd.nist.gov/vuln/detail/CVE-2009-3979
https://nvd.nist.gov/vuln/detail/CVE-2009-3980
https://nvd.nist.gov/vuln/detail/CVE-2009-3981
https://nvd.nist.gov/vuln/detail/CVE-2009-3982
https://nvd.nist.gov/vuln/detail/CVE-2009-3983
https://nvd.nist.gov/vuln/detail/CVE-2009-3984
https://nvd.nist.gov/vuln/detail/CVE-2009-3985
https://nvd.nist.gov/vuln/detail/CVE-2009-3986
https://nvd.nist.gov/vuln/detail/CVE-2009-3987
https://nvd.nist.gov/vuln/detail/CVE-2009-3988
https://nvd.nist.gov/vuln/detail/CVE-2010-0159
https://nvd.nist.gov/vuln/detail/CVE-2010-0160
https://nvd.nist.gov/vuln/detail/CVE-2010-0162
https://nvd.nist.gov/vuln/detail/CVE-2010-0163
https://nvd.nist.gov/vuln/detail/CVE-2010-0164
https://nvd.nist.gov/vuln/detail/CVE-2010-0165
https://nvd.nist.gov/vuln/detail/CVE-2010-0166
https://nvd.nist.gov/vuln/detail/CVE-2010-0167
https://nvd.nist.gov/vuln/detail/CVE-2010-0168
https://nvd.nist.gov/vuln/detail/CVE-2010-0169
https://nvd.nist.gov/vuln/detail/CVE-2010-0170
https://nvd.nist.gov/vuln/detail/CVE-2010-0171
https://nvd.nist.gov/vuln/detail/CVE-2010-0172
https://nvd.nist.gov/vuln/detail/CVE-2010-0173
https://nvd.nist.gov/vuln/detail/CVE-2010-0174
https://nvd.nist.gov/vuln/detail/CVE-2010-0175
https://nvd.nist.gov/vuln/detail/CVE-2010-0176
https://nvd.nist.gov/vuln/detail/CVE-2010-0177
https://nvd.nist.gov/vuln/detail/CVE-2010-0178
https://nvd.nist.gov/vuln/detail/CVE-2010-0179
https://nvd.nist.gov/vuln/detail/CVE-2010-0181
https://nvd.nist.gov/vuln/detail/CVE-2010-0182
https://nvd.nist.gov/vuln/detail/CVE-2010-0183
https://nvd.nist.gov/vuln/detail/CVE-2010-0220
https://nvd.nist.gov/vuln/detail/CVE-2010-0648
https://nvd.nist.gov/vuln/detail/CVE-2010-0654
https://nvd.nist.gov/vuln/detail/CVE-2010-1028
https://nvd.nist.gov/vuln/detail/CVE-2010-1121
https://nvd.nist.gov/vuln/detail/CVE-2010-1125
https://nvd.nist.gov/vuln/detail/CVE-2010-1196
https://nvd.nist.gov/vuln/detail/CVE-2010-1197
https://nvd.nist.gov/vuln/detail/CVE-2010-1198
https://nvd.nist.gov/vuln/detail/CVE-2010-1199
https://nvd.nist.gov/vuln/detail/CVE-2010-1200
https://nvd.nist.gov/vuln/detail/CVE-2010-1201
https://nvd.nist.gov/vuln/detail/CVE-2010-1202
https://nvd.nist.gov/vuln/detail/CVE-2010-1203
https://nvd.nist.gov/vuln/detail/CVE-2010-1205
https://nvd.nist.gov/vuln/detail/CVE-2010-1206
https://nvd.nist.gov/vuln/detail/CVE-2010-1207
https://nvd.nist.gov/vuln/detail/CVE-2010-1208
https://nvd.nist.gov/vuln/detail/CVE-2010-1209
https://nvd.nist.gov/vuln/detail/CVE-2010-1210
https://nvd.nist.gov/vuln/detail/CVE-2010-1211
https://nvd.nist.gov/vuln/detail/CVE-2010-1212
https://nvd.nist.gov/vuln/detail/CVE-2010-1213
https://nvd.nist.gov/vuln/detail/CVE-2010-1214
https://nvd.nist.gov/vuln/detail/CVE-2010-1215
https://nvd.nist.gov/vuln/detail/CVE-2010-1585
https://nvd.nist.gov/vuln/detail/CVE-2010-2751
https://nvd.nist.gov/vuln/detail/CVE-2010-2752
https://nvd.nist.gov/vuln/detail/CVE-2010-2753
https://nvd.nist.gov/vuln/detail/CVE-2010-2754
https://nvd.nist.gov/vuln/detail/CVE-2010-2755
https://nvd.nist.gov/vuln/detail/CVE-2010-2760
https://nvd.nist.gov/vuln/detail/CVE-2010-2762
https://nvd.nist.gov/vuln/detail/CVE-2010-2763
https://nvd.nist.gov/vuln/detail/CVE-2010-2764
https://nvd.nist.gov/vuln/detail/CVE-2010-2765
https://nvd.nist.gov/vuln/detail/CVE-2010-2766
https://nvd.nist.gov/vuln/detail/CVE-2010-2767
https://nvd.nist.gov/vuln/detail/CVE-2010-2768
https://nvd.nist.gov/vuln/detail/CVE-2010-2769
https://nvd.nist.gov/vuln/detail/CVE-2010-2770
https://nvd.nist.gov/vuln/detail/CVE-2010-3131
https://nvd.nist.gov/vuln/detail/CVE-2010-3166
https://nvd.nist.gov/vuln/detail/CVE-2010-3167
https://nvd.nist.gov/vuln/detail/CVE-2010-3168
https://nvd.nist.gov/vuln/detail/CVE-2010-3169
https://nvd.nist.gov/vuln/detail/CVE-2010-3170
https://nvd.nist.gov/vuln/detail/CVE-2010-3171
https://nvd.nist.gov/vuln/detail/CVE-2010-3173
https://nvd.nist.gov/vuln/detail/CVE-2010-3174
https://nvd.nist.gov/vuln/detail/CVE-2010-3175
https://nvd.nist.gov/vuln/detail/CVE-2010-3176
https://nvd.nist.gov/vuln/detail/CVE-2010-3177
https://nvd.nist.gov/vuln/detail/CVE-2010-3178
https://nvd.nist.gov/vuln/detail/CVE-2010-3179
https://nvd.nist.gov/vuln/detail/CVE-2010-3180
https://nvd.nist.gov/vuln/detail/CVE-2010-3182
https://nvd.nist.gov/vuln/detail/CVE-2010-3183
https://nvd.nist.gov/vuln/detail/CVE-2010-3399
https://nvd.nist.gov/vuln/detail/CVE-2010-3400
https://nvd.nist.gov/vuln/detail/CVE-2010-3765
https://nvd.nist.gov/vuln/detail/CVE-2010-3766
https://nvd.nist.gov/vuln/detail/CVE-2010-3767
https://nvd.nist.gov/vuln/detail/CVE-2010-3768
https://nvd.nist.gov/vuln/detail/CVE-2010-3769
https://nvd.nist.gov/vuln/detail/CVE-2010-3770
https://nvd.nist.gov/vuln/detail/CVE-2010-3771
https://nvd.nist.gov/vuln/detail/CVE-2010-3772
https://nvd.nist.gov/vuln/detail/CVE-2010-3773
https://nvd.nist.gov/vuln/detail/CVE-2010-3774
https://nvd.nist.gov/vuln/detail/CVE-2010-3775
https://nvd.nist.gov/vuln/detail/CVE-2010-3776
https://nvd.nist.gov/vuln/detail/CVE-2010-3777
https://nvd.nist.gov/vuln/detail/CVE-2010-3778
https://nvd.nist.gov/vuln/detail/CVE-2010-4508
https://nvd.nist.gov/vuln/detail/CVE-2010-5074
https://nvd.nist.gov/vuln/detail/CVE-2011-0051
https://nvd.nist.gov/vuln/detail/CVE-2011-0053
https://nvd.nist.gov/vuln/detail/CVE-2011-0054
https://nvd.nist.gov/vuln/detail/CVE-2011-0055
https://nvd.nist.gov/vuln/detail/CVE-2011-0056
https://nvd.nist.gov/vuln/detail/CVE-2011-0057
https://nvd.nist.gov/vuln/detail/CVE-2011-0058
https://nvd.nist.gov/vuln/detail/CVE-2011-0059
https://nvd.nist.gov/vuln/detail/CVE-2011-0061
https://nvd.nist.gov/vuln/detail/CVE-2011-0062
https://nvd.nist.gov/vuln/detail/CVE-2011-0065
https://nvd.nist.gov/vuln/detail/CVE-2011-0066
https://nvd.nist.gov/vuln/detail/CVE-2011-0067
https://nvd.nist.gov/vuln/detail/CVE-2011-0068
https://nvd.nist.gov/vuln/detail/CVE-2011-0069
https://nvd.nist.gov/vuln/detail/CVE-2011-0070
https://nvd.nist.gov/vuln/detail/CVE-2011-0071
https://nvd.nist.gov/vuln/detail/CVE-2011-0072
https://nvd.nist.gov/vuln/detail/CVE-2011-0073
https://nvd.nist.gov/vuln/detail/CVE-2011-0074
https://nvd.nist.gov/vuln/detail/CVE-2011-0075
https://nvd.nist.gov/vuln/detail/CVE-2011-0076
https://nvd.nist.gov/vuln/detail/CVE-2011-0077
https://nvd.nist.gov/vuln/detail/CVE-2011-0078
https://nvd.nist.gov/vuln/detail/CVE-2011-0079
https://nvd.nist.gov/vuln/detail/CVE-2011-0080
https://nvd.nist.gov/vuln/detail/CVE-2011-0081
https://nvd.nist.gov/vuln/detail/CVE-2011-0082
https://nvd.nist.gov/vuln/detail/CVE-2011-0083
https://nvd.nist.gov/vuln/detail/CVE-2011-0084
https://nvd.nist.gov/vuln/detail/CVE-2011-0085
https://nvd.nist.gov/vuln/detail/CVE-2011-1187
https://nvd.nist.gov/vuln/detail/CVE-2011-1202
https://nvd.nist.gov/vuln/detail/CVE-2011-1712
https://nvd.nist.gov/vuln/detail/CVE-2011-2362
https://nvd.nist.gov/vuln/detail/CVE-2011-2363
https://nvd.nist.gov/vuln/detail/CVE-2011-2364
https://nvd.nist.gov/vuln/detail/CVE-2011-2365
https://nvd.nist.gov/vuln/detail/CVE-2011-2369
https://nvd.nist.gov/vuln/detail/CVE-2011-2370
https://nvd.nist.gov/vuln/detail/CVE-2011-2371
https://nvd.nist.gov/vuln/detail/CVE-2011-2372
https://nvd.nist.gov/vuln/detail/CVE-2011-2373
https://nvd.nist.gov/vuln/detail/CVE-2011-2374
https://nvd.nist.gov/vuln/detail/CVE-2011-2375
https://nvd.nist.gov/vuln/detail/CVE-2011-2376
https://nvd.nist.gov/vuln/detail/CVE-2011-2377
https://nvd.nist.gov/vuln/detail/CVE-2011-2378
https://nvd.nist.gov/vuln/detail/CVE-2011-2605
https://nvd.nist.gov/vuln/detail/CVE-2011-2980
https://nvd.nist.gov/vuln/detail/CVE-2011-2981
https://nvd.nist.gov/vuln/detail/CVE-2011-2982
https://nvd.nist.gov/vuln/detail/CVE-2011-2983
https://nvd.nist.gov/vuln/detail/CVE-2011-2984
https://nvd.nist.gov/vuln/detail/CVE-2011-2985
https://nvd.nist.gov/vuln/detail/CVE-2011-2986
https://nvd.nist.gov/vuln/detail/CVE-2011-2987
https://nvd.nist.gov/vuln/detail/CVE-2011-2988
https://nvd.nist.gov/vuln/detail/CVE-2011-2989
https://nvd.nist.gov/vuln/detail/CVE-2011-2990
https://nvd.nist.gov/vuln/detail/CVE-2011-2991
https://nvd.nist.gov/vuln/detail/CVE-2011-2993
https://nvd.nist.gov/vuln/detail/CVE-2011-2995
https://nvd.nist.gov/vuln/detail/CVE-2011-2996
https://nvd.nist.gov/vuln/detail/CVE-2011-2997
https://nvd.nist.gov/vuln/detail/CVE-2011-2998
https://nvd.nist.gov/vuln/detail/CVE-2011-2999
https://nvd.nist.gov/vuln/detail/CVE-2011-3000
https://nvd.nist.gov/vuln/detail/CVE-2011-3001
https://nvd.nist.gov/vuln/detail/CVE-2011-3002
https://nvd.nist.gov/vuln/detail/CVE-2011-3003
https://nvd.nist.gov/vuln/detail/CVE-2011-3004
https://nvd.nist.gov/vuln/detail/CVE-2011-3005
https://nvd.nist.gov/vuln/detail/CVE-2011-3026
https://nvd.nist.gov/vuln/detail/CVE-2011-3062
https://nvd.nist.gov/vuln/detail/CVE-2011-3232
https://nvd.nist.gov/vuln/detail/CVE-2011-3389
https://nvd.nist.gov/vuln/detail/CVE-2011-3640
https://nvd.nist.gov/vuln/detail/CVE-2011-3647
https://nvd.nist.gov/vuln/detail/CVE-2011-3648
https://nvd.nist.gov/vuln/detail/CVE-2011-3649
https://nvd.nist.gov/vuln/detail/CVE-2011-3650
https://nvd.nist.gov/vuln/detail/CVE-2011-3651
https://nvd.nist.gov/vuln/detail/CVE-2011-3652
https://nvd.nist.gov/vuln/detail/CVE-2011-3653
https://nvd.nist.gov/vuln/detail/CVE-2011-3654
https://nvd.nist.gov/vuln/detail/CVE-2011-3655
https://nvd.nist.gov/vuln/detail/CVE-2011-3658
https://nvd.nist.gov/vuln/detail/CVE-2011-3659
https://nvd.nist.gov/vuln/detail/CVE-2011-3660
https://nvd.nist.gov/vuln/detail/CVE-2011-3661
https://nvd.nist.gov/vuln/detail/CVE-2011-3663
https://nvd.nist.gov/vuln/detail/CVE-2011-3665
https://nvd.nist.gov/vuln/detail/CVE-2011-3670
https://nvd.nist.gov/vuln/detail/CVE-2011-3866
https://nvd.nist.gov/vuln/detail/CVE-2011-4688
https://nvd.nist.gov/vuln/detail/CVE-2012-0441
https://nvd.nist.gov/vuln/detail/CVE-2012-0442
https://nvd.nist.gov/vuln/detail/CVE-2012-0443
https://nvd.nist.gov/vuln/detail/CVE-2012-0444
https://nvd.nist.gov/vuln/detail/CVE-2012-0445
https://nvd.nist.gov/vuln/detail/CVE-2012-0446
https://nvd.nist.gov/vuln/detail/CVE-2012-0447
https://nvd.nist.gov/vuln/detail/CVE-2012-0449
https://nvd.nist.gov/vuln/detail/CVE-2012-0450
https://nvd.nist.gov/vuln/detail/CVE-2012-0451
https://nvd.nist.gov/vuln/detail/CVE-2012-0452
https://nvd.nist.gov/vuln/detail/CVE-2012-0455
https://nvd.nist.gov/vuln/detail/CVE-2012-0456
https://nvd.nist.gov/vuln/detail/CVE-2012-0457
https://nvd.nist.gov/vuln/detail/CVE-2012-0458
https://nvd.nist.gov/vuln/detail/CVE-2012-0459
https://nvd.nist.gov/vuln/detail/CVE-2012-0460
https://nvd.nist.gov/vuln/detail/CVE-2012-0461
https://nvd.nist.gov/vuln/detail/CVE-2012-0462
https://nvd.nist.gov/vuln/detail/CVE-2012-0463
https://nvd.nist.gov/vuln/detail/CVE-2012-0464
https://nvd.nist.gov/vuln/detail/CVE-2012-0467
https://nvd.nist.gov/vuln/detail/CVE-2012-0468
https://nvd.nist.gov/vuln/detail/CVE-2012-0469
https://nvd.nist.gov/vuln/detail/CVE-2012-0470
https://nvd.nist.gov/vuln/detail/CVE-2012-0471
https://nvd.nist.gov/vuln/detail/CVE-2012-0473
https://nvd.nist.gov/vuln/detail/CVE-2012-0474
https://nvd.nist.gov/vuln/detail/CVE-2012-0475
https://nvd.nist.gov/vuln/detail/CVE-2012-0477
https://nvd.nist.gov/vuln/detail/CVE-2012-0478
https://nvd.nist.gov/vuln/detail/CVE-2012-0479
https://nvd.nist.gov/vuln/detail/CVE-2012-1937
https://nvd.nist.gov/vuln/detail/CVE-2012-1938
https://nvd.nist.gov/vuln/detail/CVE-2012-1939
https://nvd.nist.gov/vuln/detail/CVE-2012-1940
https://nvd.nist.gov/vuln/detail/CVE-2012-1941
https://nvd.nist.gov/vuln/detail/CVE-2012-1945
https://nvd.nist.gov/vuln/detail/CVE-2012-1946
https://nvd.nist.gov/vuln/detail/CVE-2012-1947
https://nvd.nist.gov/vuln/detail/CVE-2012-1948
https://nvd.nist.gov/vuln/detail/CVE-2012-1949
https://nvd.nist.gov/vuln/detail/CVE-2012-1950
https://nvd.nist.gov/vuln/detail/CVE-2012-1951
https://nvd.nist.gov/vuln/detail/CVE-2012-1952
https://nvd.nist.gov/vuln/detail/CVE-2012-1953
https://nvd.nist.gov/vuln/detail/CVE-2012-1954
https://nvd.nist.gov/vuln/detail/CVE-2012-1955
https://nvd.nist.gov/vuln/detail/CVE-2012-1956
https://nvd.nist.gov/vuln/detail/CVE-2012-1957
https://nvd.nist.gov/vuln/detail/CVE-2012-1958
https://nvd.nist.gov/vuln/detail/CVE-2012-1959
https://nvd.nist.gov/vuln/detail/CVE-2012-1960
https://nvd.nist.gov/vuln/detail/CVE-2012-1961
https://nvd.nist.gov/vuln/detail/CVE-2012-1962
https://nvd.nist.gov/vuln/detail/CVE-2012-1963
https://nvd.nist.gov/vuln/detail/CVE-2012-1964
https://nvd.nist.gov/vuln/detail/CVE-2012-1965
https://nvd.nist.gov/vuln/detail/CVE-2012-1966
https://nvd.nist.gov/vuln/detail/CVE-2012-1967
https://nvd.nist.gov/vuln/detail/CVE-2012-1970
https://nvd.nist.gov/vuln/detail/CVE-2012-1971
https://nvd.nist.gov/vuln/detail/CVE-2012-1972
https://nvd.nist.gov/vuln/detail/CVE-2012-1973
https://nvd.nist.gov/vuln/detail/CVE-2012-1974
https://nvd.nist.gov/vuln/detail/CVE-2012-1975
https://nvd.nist.gov/vuln/detail/CVE-2012-1976
https://nvd.nist.gov/vuln/detail/CVE-2012-1994
https://nvd.nist.gov/vuln/detail/CVE-2012-3956
https://nvd.nist.gov/vuln/detail/CVE-2012-3957
https://nvd.nist.gov/vuln/detail/CVE-2012-3958
https://nvd.nist.gov/vuln/detail/CVE-2012-3959
https://nvd.nist.gov/vuln/detail/CVE-2012-3960
https://nvd.nist.gov/vuln/detail/CVE-2012-3961
https://nvd.nist.gov/vuln/detail/CVE-2012-3962
https://nvd.nist.gov/vuln/detail/CVE-2012-3963
https://nvd.nist.gov/vuln/detail/CVE-2012-3964
https://nvd.nist.gov/vuln/detail/CVE-2012-3965
https://nvd.nist.gov/vuln/detail/CVE-2012-3966
https://nvd.nist.gov/vuln/detail/CVE-2012-3967
https://nvd.nist.gov/vuln/detail/CVE-2012-3968
https://nvd.nist.gov/vuln/detail/CVE-2012-3969
https://nvd.nist.gov/vuln/detail/CVE-2012-3970
https://nvd.nist.gov/vuln/detail/CVE-2012-3971
https://nvd.nist.gov/vuln/detail/CVE-2012-3972
https://nvd.nist.gov/vuln/detail/CVE-2012-3973
https://nvd.nist.gov/vuln/detail/CVE-2012-3975
https://nvd.nist.gov/vuln/detail/CVE-2012-3976
https://nvd.nist.gov/vuln/detail/CVE-2012-3977
https://nvd.nist.gov/vuln/detail/CVE-2012-3978
https://nvd.nist.gov/vuln/detail/CVE-2012-3980
https://nvd.nist.gov/vuln/detail/CVE-2012-3982
https://nvd.nist.gov/vuln/detail/CVE-2012-3984
https://nvd.nist.gov/vuln/detail/CVE-2012-3985
https://nvd.nist.gov/vuln/detail/CVE-2012-3986
https://nvd.nist.gov/vuln/detail/CVE-2012-3988
https://nvd.nist.gov/vuln/detail/CVE-2012-3989
https://nvd.nist.gov/vuln/detail/CVE-2012-3990
https://nvd.nist.gov/vuln/detail/CVE-2012-3991
https://nvd.nist.gov/vuln/detail/CVE-2012-3992
https://nvd.nist.gov/vuln/detail/CVE-2012-3993
https://nvd.nist.gov/vuln/detail/CVE-2012-3994
https://nvd.nist.gov/vuln/detail/CVE-2012-3995
https://nvd.nist.gov/vuln/detail/CVE-2012-4179
https://nvd.nist.gov/vuln/detail/CVE-2012-4180
https://nvd.nist.gov/vuln/detail/CVE-2012-4181
https://nvd.nist.gov/vuln/detail/CVE-2012-4182
https://nvd.nist.gov/vuln/detail/CVE-2012-4183
https://nvd.nist.gov/vuln/detail/CVE-2012-4184
https://nvd.nist.gov/vuln/detail/CVE-2012-4185
https://nvd.nist.gov/vuln/detail/CVE-2012-4186
https://nvd.nist.gov/vuln/detail/CVE-2012-4187
https://nvd.nist.gov/vuln/detail/CVE-2012-4188
https://nvd.nist.gov/vuln/detail/CVE-2012-4190
https://nvd.nist.gov/vuln/detail/CVE-2012-4191
https://nvd.nist.gov/vuln/detail/CVE-2012-4192
https://nvd.nist.gov/vuln/detail/CVE-2012-4193
https://nvd.nist.gov/vuln/detail/CVE-2012-4194
https://nvd.nist.gov/vuln/detail/CVE-2012-4195
https://nvd.nist.gov/vuln/detail/CVE-2012-4196
https://nvd.nist.gov/vuln/detail/CVE-2012-4201
https://nvd.nist.gov/vuln/detail/CVE-2012-4202
https://nvd.nist.gov/vuln/detail/CVE-2012-4204
https://nvd.nist.gov/vuln/detail/CVE-2012-4205
https://nvd.nist.gov/vuln/detail/CVE-2012-4206
https://nvd.nist.gov/vuln/detail/CVE-2012-4207
https://nvd.nist.gov/vuln/detail/CVE-2012-4208
https://nvd.nist.gov/vuln/detail/CVE-2012-4209
https://nvd.nist.gov/vuln/detail/CVE-2012-4210
https://nvd.nist.gov/vuln/detail/CVE-2012-4212
https://nvd.nist.gov/vuln/detail/CVE-2012-4215
https://nvd.nist.gov/vuln/detail/CVE-2012-4216
https://nvd.nist.gov/vuln/detail/CVE-2012-5354
https://nvd.nist.gov/vuln/detail/CVE-2012-5829
https://nvd.nist.gov/vuln/detail/CVE-2012-5830
https://nvd.nist.gov/vuln/detail/CVE-2012-5833
https://nvd.nist.gov/vuln/detail/CVE-2012-5835
https://nvd.nist.gov/vuln/detail/CVE-2012-5836
https://nvd.nist.gov/vuln/detail/CVE-2012-5838
https://nvd.nist.gov/vuln/detail/CVE-2012-5839
https://nvd.nist.gov/vuln/detail/CVE-2012-5840
https://nvd.nist.gov/vuln/detail/CVE-2012-5841
https://nvd.nist.gov/vuln/detail/CVE-2012-5842
https://nvd.nist.gov/vuln/detail/CVE-2012-5843

References:

https://security.gentoo.org/glsa/201301-01

Severity
High
CVSS Score
10.0
Published
2015-09-29
Modified
2018-10-26
Category
Gentoo Local Security Checks

Free Vulnerability Scanning, Assessment and Management

Mageni's Platform is packed with all the features you need to scan, assess and manage vulnerabilities like this - it is free, open source, lightning fast, reliable and scalable.

Router
Servers
Laptop
Database
Group
Cloud

Frequently Asked Questions

No, you can scan concurrently as many assets as you want. Please note that you must be aware of the hardware requeriments of the platform to ensure a good performance.

No, you can add as many assest as you want. It doesn't matters if you have millions of assets, we won't charge you for that.

No. The software is completely free. We have no intention to charge you to use the software, in fact - it completely goes against our beliefs and business model.

A vulnerability is defined in the ISO 27002 standard as “A weakness of an asset or group of assets that can be exploited by one or more threats” (International Organization for Standardization, 2005)

We generate revenue by providing support and other services for customers that require a subscription so they get guaranteed support and enterprise services. To use Mageni's Platform is completely free, with no limits at all.

Yes. Mageni understands that there are professionals and businesses that need commercial support so Mageni provides an active support subscription with everything needed to run Mageni's Platform reliably and securely. More than software, it's access to security experts, knowledge resources, security updates, and support tools you can't get anywhere else. The subscription includes:

  • Ongoing delivery
    • Patches
    • Bug fixes
    • Updates
    • Upgrades
  • Technical support
    • 24/7 availability
    • Unlimited Incidents
    • Specialty-based routing
    • Multi-Channel
  • Commitments
    • Software certifications
    • Software assurance
    • SLA

No, we don't store the information of your vulnerabilities in our servers.

Vulnerability management is the process in which vulnerabilities in IT are identified and the risks of these vulnerabilities are evaluated. This evaluation leads to correcting the vulnerabilities and removing the risk or a formal risk acceptance by the management of an organization. The term vulnerability management is often confused with vulnerability scanning. Despite the fact both are related, there is an important difference between the two. Vulnerability scanning consists of using a computer program to identify vulnerabilities in networks, computer infrastructure or applications. Vulnerability management is the process surrounding vulnerability scanning, also taking into account other aspects such as risk acceptance, remediation etc. Source: "Implementing a Vulnerability Management Process". SANS Institute.

I am ready to start scanning for vulnerabilities