4
GLSA 200907-13 (High): pulseaudioview story

http://security.gentoo.org – PulseAudio: Local privilege escalation (Security)

5
GLSA 200907-07 (Normal): libmodplug (and 1view story

http://security.gentoo.org – ModPlug: User-assisted execution of arbitrary code (Security)

6
GLSA 200907-08 (High): rt2400 (and 4view story

http://security.gentoo.org – Multiple Ralink wireless drivers: Execution of arbitrary code (Security)

4
GLSA 200907-05 (Normal): gitview story

http://security.gentoo.org – git: git-daemon Denial of Service (Security)

6
GLSA 200907-11 (Normal): gst-plugins-good (and 2view story

http://security.gentoo.org – GStreamer plug-ins: User-assisted execution of arbitrary code (Security)

4
GLSA 200907-04 (High): apacheview story

http://security.gentoo.org – Apache: Multiple vulnerabilities (Security)

5
GLSA 200907-06 (Normal): acroreadview story

http://security.gentoo.org – Adobe Reader: User-assisted execution of arbitrary code (Security)

4
GLSA 200907-10 (Low): syslog-ngview story

http://security.gentoo.org – Syslog-ng: Chroot escape (Security)

6
GLSA 200907-03 (Normal): apr-utilview story

http://security.gentoo.org – APR Utility Library: Multiple vulnerabilities (Security)

6
GLSA 200907-02 (Normal): mod_securityview story

http://security.gentoo.org – ModSecurity: Denial of Service (Security)

6
GLSA 200907-01 (Normal): libwmfview story

http://security.gentoo.org – libwmf: User-assisted execution of arbitrary code (Security)

4
USN-794-1: Perl vulnerabilityview story

http://www.ubuntu.com – In general, a standard system upgrade is sufficient to effect the necessary changes. Details follow: It was discovered that the Compress::Raw::Zlib Perl module incorrectly handled certain zlib compressed streams. If a user or automated system were tricked into processing a specially crafted compressed stream or file, a remote attacker could crash the application, leading to a denial of (Security)