BIND is the Berkeley Internet Name Domain Server.
+Multiple vulnerabilities have been discovered in BIND. Please review the + CVE identifiers referenced below for details. +
+The vulnerabilities allow remote attackers to cause a Denial of Service + (daemon crash) via a DNS query, to bypass intended access restrictions, + to incorrectly cache a ncache entry and a rrsig for the same type and to + incorrectly mark zone data as insecure. +
+There is no known workaround at this time.
+All bind users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-dns/bind-9.7.4_p1"
+
+
+ NOTE: This is a legacy GLSA. Updates for all affected architectures are + available since December 22, 2011. It is likely that your system is + already + no longer affected by this issue. +
+QtGui is a module for the Qt toolkit.
+An error in qtiffhandler.cpp could cause a buffer overflow.
+A remote attacker could entice a user to open a specially crafted TIFF + image with an application linked against QtGui, possibly resulting in + execution of arbitrary code with the privileges of the process or a + Denial of Service condition. +
+There is no known workaround at this time.
+All QtGui users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=x11-libs/qt-gui-4.7.4-r1"
+
+
+ Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +
+