You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa ImageMagick

Sigurnosni nedostaci programskog paketa ImageMagick

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201711-07
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: ImageMagick: Multiple vulnerabilities
Date: November 11, 2017
Bugs: #626454, #626906, #627036, #628192, #628490, #628646,
#628650, #628700, #628702, #629354, #629482, #629576,
#629932, #630256, #630458, #630674, #635200, #635664, #635666
ID: 201711-07

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
========

Multiple vulnerabilities have been found in ImageMagick, the worst of
which may allow remote attackers to cause a Denial of Service
condition.

Background
==========

A collection of tools and libraries for many image formats.

Affected packages
=================

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 media-gfx/imagemagick < 6.9.9.20 >= 6.9.9.20

Description
===========

Multiple vulnerabilities have been discovered in ImageMagick. Please
review the referenced CVE identifiers for details.

Impact
======

Remote attackers, by enticing a user to process a specially crafted
file, could obtain sensitive information, cause a Denial of Service
condition, or have other unspecified impacts.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All ImageMagick users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=media-gfx/imagemagick-6.9.9.20”

References
==========

[ 1 ] CVE-2017-11640
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-11640
[ 2 ] CVE-2017-11724
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-11724
[ 3 ] CVE-2017-12140
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12140
[ 4 ] CVE-2017-12418
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12418
[ 5 ] CVE-2017-12427
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12427
[ 6 ] CVE-2017-12691
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12691
[ 7 ] CVE-2017-12692
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12692
[ 8 ] CVE-2017-12693
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12693
[ 9 ] CVE-2017-12876
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12876
[ 10 ] CVE-2017-12877<!DOCTYPE HTML PUBLIC “-//W3C//DTD HTML 4.0//EN” “http://www.w3.org/TR/REC-html40/strict.dtd”>
<html><head><meta name=”qrichtext” content=”1″ /><style type=”text/css”>
p, li { white-space: pre-wrap; }
</style></head><body style=” font-family:’Noto Sans’; font-size:10pt; font-weight:400; font-style:normal;”>
<p style=” margin-top:12px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – -</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Gentoo Linux Security Advisory GLSA 201711-07</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – -</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://security.gentoo.org/</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – -</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> Severity: Normal</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> Title: ImageMagick: Multiple vulnerabilities</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> Date: November 11, 2017</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> Bugs: #626454, #626906, #627036, #628192, #628490, #628646,</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> #628650, #628700, #628702, #629354, #629482, #629576,</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> #629932, #630256, #630458, #630674, #635200, #635664, #635666</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> ID: 201711-07</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>- – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – -</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Synopsis</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Multiple vulnerabilities have been found in ImageMagick, the worst of</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>which may allow remote attackers to cause a Denial of Service</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>condition.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Background</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>==========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>A collection of tools and libraries for many image formats.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Affected packages</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>=================</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> ——————————————————————-</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> Package / Vulnerable / Unaffected</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> ——————————————————————-</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> 1 media-gfx/imagemagick < 6.9.9.20 >= 6.9.9.20 </span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Description</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>===========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Multiple vulnerabilities have been discovered in ImageMagick. Please</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>review the referenced CVE identifiers for details.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Impact</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>======</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Remote attackers, by enticing a user to process a specially crafted</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>file, could obtain sensitive information, cause a Denial of Service</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>condition, or have other unspecified impacts.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Workaround</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>==========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>There is no known workaround at this time.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Resolution</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>==========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>All ImageMagick users should upgrade to the latest version:</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> # emerge –sync</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> # emerge –ask –oneshot –verbose ">=media-gfx/imagemagick-6.9.9.20"</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>References</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>==========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 1 ] CVE-2017-11640</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-11640</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 2 ] CVE-2017-11724</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-11724</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 3 ] CVE-2017-12140</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12140</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 4 ] CVE-2017-12418</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12418</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 5 ] CVE-2017-12427</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12427</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 6 ] CVE-2017-12691</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12691</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 7 ] CVE-2017-12692</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12692</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 8 ] CVE-2017-12693</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12693</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 9 ] CVE-2017-12876</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12876</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 10 ] CVE-2017-12877</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12877</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 11 ] CVE-2017-12983</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-12983</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 12 ] CVE-2017-13058</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13058</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 13 ] CVE-2017-13059</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13059</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 14 ] CVE-2017-13060</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13060</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 15 ] CVE-2017-13061</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13061</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 16 ] CVE-2017-13062</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13062</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 17 ] CVE-2017-13131</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13131</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 18 ] CVE-2017-13132</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13132</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 19 ] CVE-2017-13133</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13133</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 20 ] CVE-2017-13134</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13134</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 21 ] CVE-2017-13139</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13139</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 22 ] CVE-2017-13140</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13140</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 23 ] CVE-2017-13141</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13141</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 24 ] CVE-2017-13142</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13142</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 25 ] CVE-2017-13143</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13143</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 26 ] CVE-2017-13144</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13144</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 27 ] CVE-2017-13145</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13145</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 28 ] CVE-2017-13146</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13146</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 29 ] CVE-2017-13758</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13758</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 30 ] CVE-2017-13768</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13768</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 31 ] CVE-2017-13769</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-13769</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 32 ] CVE-2017-14060</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14060</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 33 ] CVE-2017-14137</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14137</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 34 ] CVE-2017-14138</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14138</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 35 ] CVE-2017-14139</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14139</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 36 ] CVE-2017-14172</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14172</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 37 ] CVE-2017-14173</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14173</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 38 ] CVE-2017-14174</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14174</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 39 ] CVE-2017-14175</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14175</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 40 ] CVE-2017-14224</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14224</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 41 ] CVE-2017-14248</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14248</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 42 ] CVE-2017-14249</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14249</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>[ 43 ] CVE-2017-15281</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15281</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Availability</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>============</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>This GLSA and any updates to it are available for viewing at</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>the Gentoo Security Website:</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”> https://security.gentoo.org/glsa/201711-07</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Concerns?</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>=========</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Security is a primary focus of Gentoo Linux and ensuring the</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>confidentiality and security of our users’ machines is of utmost</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>importance to us. Any security concerns should be addressed to</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>security@gentoo.org or alternatively, you may file a bug at</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>https://bugs.gentoo.org.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>License</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>=======</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Copyright 2017 Gentoo Foundation, Inc; referenced text</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>belongs to its owner(s).</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>The contents of this document are licensed under the</span></p>
<p style=” margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>Creative Commons – Attribution / Share Alike license.</span></p>
<p style=”-qt-paragraph-type:empty; margin-top:0px; margin-bottom:0px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; “> </p>
<p style=” margin-top:0px; margin-bottom:12px; margin-left:0px; margin-right:0px; -qt-block-indent:0; text-indent:0px; -qt-user-state:0;”><span style=” font-family:’Hack’; color:#000000;”>http://creativecommons.org/licenses/by-sa/2.5</span></p></body></html>—–BEGIN PGP SIGNATURE—–

iQEzBAABCAAdFiEEiDRK3jyVBE/RkymqpRQw84X1dt0FAloHBiYACgkQpRQw84X1
dt15PggApAjtnL14Or6giP3Y/bVFgOI+3BzcHSI8PMyH5PAWGoqnQ0dblui2ZiaP
uGHPGID5w36rhdZVgvkEoh3UaWFMxTfDtLPvvE0Fu4/f3AseXQLqGXhKJp8mYIKc
QumLBGwdIJWa7vEBlFbZUh084JH30xOpXbOR5KwIEJ7jQW95YbnH0yG8SpbvhgTw
GcAUiBGKi6PAWcH4exgAfshPvAa2MwcBp0qxkn5GM28Rfa7CxI5w0ss3pXCEyz7O
0rjYdTtY8eVYpOr8nSPK3+RkdNL3wArufHe/O4BbBB8HFNKsZoi80HRUDdgqpgCX
49YK3ld4KVUb9FDG41Bcndm/2o5UFA==
=E1cl
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostaci programskog paketa GNU Wget

Otkriveni su sigurnosni nedostaci u programskom paketu GNU Wget za operacijski sustav Gentoo. Otkriveni nedostaci potencijalnim udaljenim napadačima omogućuju izvršavanje...

Close