[gentoo-announce] [ GLSA 201706-01 ] MUNGE: Privilege escalation

2017-06-06 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
Title: MUNGE: Privilege escalation
 Date: June 06, 2017
 Bugs: #602596
   ID: 201706-01

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Gentoo's MUNGE ebuilds are vulnerable to privilege escalation due to
improper permissions.

Background
==

An authentication service for creating and validating credentials.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  sys-auth/munge < 0.5.10-r2  >= 0.5.10-r2

Description
===

It was discovered that Gentoo's default MUNGE installation suffered
from a privilege escalation vulnerability (munge user to root) due to
improper permissions and a runscript which called chown() on a user
controlled file.

Impact
==

A local attacker, who either is already MUNGE's system user or belongs
to MUNGE's group, could potentially escalate privileges.

Workaround
==

There is no known workaround at this time.

Resolution
==

All MUNGE users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=sys-auth/munge-0.5.10-r2"

References
==


Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-01

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-03 ] QEMU: Multiple vulnerabilities

2017-06-06 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: QEMU: Multiple vulnerabilities
 Date: June 06, 2017
 Bugs: #614744, #615874, #616460, #616462, #616482, #616484,
   #616636, #616870, #616872, #616874, #618808, #619018,
   #619020, #620322
   ID: 201706-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in QEMU, the worst of which
may allow a remote attacker to cause a Denial of Service or gain
elevated privileges from a guest VM.

Background
==

QEMU is a generic and open source machine emulator and virtualizer.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-emulation/qemu  < 2.9.0-r2   >= 2.9.0-r2

Description
===

Multiple vulnerabilities have been discovered in QEMU. Please review
the CVE identifiers referenced below for details.

Impact
==

A remote attacker might cause a Denial of Service or gain escalated
privileges from a guest VM.

Workaround
==

There is no known workaround at this time.

Resolution
==

All QEMU users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.9.0-r2"

References
==

[  1 ] CVE-2016-9603
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9603
[  2 ] CVE-2017-7377
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7377
[  3 ] CVE-2017-7471
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7471
[  4 ] CVE-2017-7493
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7493
[  5 ] CVE-2017-7718
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7718
[  6 ] CVE-2017-7980
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7980
[  7 ] CVE-2017-8086
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8086
[  8 ] CVE-2017-8112
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8112
[  9 ] CVE-2017-8309
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8309
[ 10 ] CVE-2017-8379
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8379
[ 11 ] CVE-2017-8380
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8380
[ 12 ] CVE-2017-9060
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9060
[ 13 ] CVE-2017-9310
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9310
[ 14 ] CVE-2017-9330
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9330

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-03

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-02 ] Shadow: Multiple vulnerabilities

2017-06-06 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
Title: Shadow: Multiple vulnerabilities
 Date: June 06, 2017
 Bugs: #610804, #620510
   ID: 201706-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Shadow, the worst of which
might allow privilege escalation.

Background
==

Shadow is a set of tools to deal with user accounts.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  sys-apps/shadow  < 4.4-r2  >= 4.4-r2

Description
===

Multiple vulnerabilities have been discovered in Shadow. Please review
the CVE identifiers referenced below for details.

Impact
==

A local attacker could possibly cause a Denial of Service condition,
gain privileges via crafted input, or SIGKILL arbitrary processes.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Shadow users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.4-r2"

References
==

[ 1 ] CVE-2016-6252
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6252
[ 2 ] CVE-2017-2616
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2616

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-02

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-06 ] ImageWorsener: Multiple vulnerabilities

2017-06-06 Thread Thomas Deutschmann
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: ImageWorsener: Multiple vulnerabilities
 Date: June 06, 2017
 Bugs: #618014
   ID: 201706-06

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in ImageWorsener, the worst of
which allows remote attackers to cause a Denial of Service condition or
have other unspecified impact.

Background
==

ImageWorsener is a cross-platform command-line utility and library for
image scaling and other image processing.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  media-gfx/imageworsener  < 1.3.1>= 1.3.1

Description
===

Multiple vulnerabilities have been discovered in ImageWorsener. Please
review the CVE identifiers referenced below for details.

Impact
==

A remote attacker could entice a user to process a specially crafted
image file using ImageWorsener, possibly resulting in a Denial of
Service condition or have other unspecified impacts.

Workaround
==

There is no known workaround at this time.

Resolution
==

All ImageWorsener users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=media-gfx/imageworsener-1.3.1"

References
==

[ 1 ] CVE-2017-7452
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7452
[ 2 ] CVE-2017-7453
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7453
[ 3 ] CVE-2017-7454
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7454
[ 4 ] CVE-2017-7939
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7939
[ 5 ] CVE-2017-7940
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7940
[ 6 ] CVE-2017-7962
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7962
[ 7 ] CVE-2017-8325
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8325
[ 8 ] CVE-2017-8326
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8326
[ 9 ] CVE-2017-8327
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8327

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-06

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-07 ] Libtirpc and RPCBind: Denial of Service

2017-06-06 Thread Thomas Deutschmann
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Libtirpc and RPCBind: Denial of Service
 Date: June 06, 2017
 Bugs: #617472
   ID: 201706-07

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A vulnerability has been found in Libtirpc and RPCBind which may allow
a remote attacker to cause a Denial of Service condition.

Background
==

The RPCBind utility is a server that converts RPC program numbers into
universal addresses.

Libtirpc is a port of Suns Transport-Independent RPC library to Linux.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-nds/rpcbind < 0.2.4-r >= 0.2.4-r
  2  net-libs/libtirpc   < 1.0.1-r1   >= 1.0.1-r1
---
 2 affected packages

Description
===

It was found that due to the way RPCBind uses libtirpc (libntirpc), a
memory leak can occur when parsing specially crafted XDR messages.

Impact
==

A remote attacker could send thousands of messages to RPCBind, possibly
resulting in a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All RPCBind users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-nds/rpcbind-0.2.4-r"

All Libtirpc users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-libs/libtirpc-1.0.1-r1"

References
==

[ 1 ] CVE-2017-8779
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8779

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-07

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-04 ] Git: Security bypass

2017-06-06 Thread Thomas Deutschmann
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Git: Security bypass
 Date: June 06, 2017
 Bugs: #618126
   ID: 201706-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A vulnerability in Git might allow remote attackers to bypass security
restrictions.

Background
==

Git is a free and open source distributed version control system
designed to handle everything from small to very large projects with
speed and efficiency.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  dev-vcs/git  < 2.13.0  >= 2.13.0

Description
===

Timo Schmid discovered that the Git restricted shell incorrectly
filtered allowed commands.

Impact
==

A remote attacker could possibly bypass security restrictions and
access sensitive information.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Git users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.13.0"

References
==

[ 1 ] CVE-2017-8386
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8386

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-04

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-05 ] D-Bus: Multiple vulnerabilities

2017-06-06 Thread Thomas Deutschmann
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: D-Bus: Multiple vulnerabilities
 Date: June 06, 2017
 Bugs: #611392
   ID: 201706-05

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities in D-Bus might allow an attacker to overwrite
files with a fixed filename in arbitrary directories or conduct a
symlink attack.

Background
==

D-Bus is a message bus system which processes can use to talk to each
other.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  sys-apps/dbus   < 1.10.18 >= 1.10.18

Description
===

Multiple vulnerabilities have been discovered in D-Bus. Please review
the original report referenced below for details.

Impact
==

An attacker could possibly overwrite arbitrary files named "once" with
content not controlled by the attacker.

A local attacker could perform a symlink attack against D-Bus' test
suite.

Workaround
==

There is no known workaround at this time.

Resolution
==

All D-Bus users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=sys-apps/dbus-1.10.18"

References
==

[ 1 ] Original report
  http://www.openwall.com/lists/oss-security/2017/02/16/4

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-05

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-08 ] MuPDF: Multiple vulnerabilities

2017-06-06 Thread Thomas Deutschmann
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: MuPDF: Multiple vulnerabilities
 Date: June 06, 2017
 Bugs: #611444, #614044, #614852
   ID: 201706-08

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in MuPDF, the worst of which
allows remote attackers to cause a Denial of Service condition or have
other unspecified impact.

Background
==

A lightweight PDF, XPS, and E-book viewer.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-text/mupdf  < 1.11-r1 >= 1.11-r1

Description
===

Multiple vulnerabilities have been discovered in MuPDF. Please review
the CVE identifiers referenced below for details.

Impact
==

A remote attacker could entice a user to process a specially crafted
PDF document or image using MuPDF, possibly resulting in a Denial of
Service condition or have other unspecified impact.

Workaround
==

There is no known workaround at this time.

Resolution
==

All MuPDF users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-text/mupdf-1.11-r1"

References
==

[ 1 ] CVE-2016-10221
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10221
[ 2 ] CVE-2017-5991
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5991
[ 3 ] CVE-2017-6060
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6060

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-08

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-09 ] FileZilla: Buffer overflow

2017-06-06 Thread Thomas Deutschmann
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: FileZilla: Buffer overflow
 Date: June 06, 2017
 Bugs: #610554
   ID: 201706-09

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A vulnerability in a bundled copy of PuTTY in FileZilla might allow
remote attackers to execute arbitrary code or cause a denial of
service.

Background
==

FileZilla is an open source FTP client.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-ftp/filezilla< 3.25.2  >= 3.25.2

Description
===

FileZilla is affected by the same vulnerability as reported in "GLSA
201703-03" because the package included a vulnerable copy of PuTTY.
Please read the GLSA for PuTTY referenced below for details.

Impact
==

A remote attacker, utilizing the SSH agent forwarding of an SSH server,
could execute arbitrary code with the privileges of the user running
FileZilla or cause a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All FileZilla users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-ftp/filezilla-3.25.2"

References
==

[ 1 ] CVE-2017-6542
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6542
[ 2 ] GLSA 201703-03
  https://security.gentoo.org/glsa/201703-03

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-09

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] Dropping support of sparc as a security supported architecture.

2017-06-06 Thread Yury German
Hello,

After long discussion with the sparc team and other developers, the
Security Team has decided to drop SPARC as a security supported
architecture. This decision follows the council decision on 2016-12-11,
"The council defers to the security team, but is supportive of dropping
security support for sparc if it is unable to generally meet the
security team timelines."

The list of security supported architectures is maintained in the
[Security Vulnerability Treatment Policy]

The consequences of the removal of security supported architecture
include (i) GLSA will be released before a version of a package is
necessarily stable for the architecture (ii) architecture-specific
issues will not be investigated.

In addition to this announcement, glsa-check will be updated to present
necessary information for sparc users. As most security issues are
cross-architecture, glsa-check will continue to be operational for sparc
based on generic GLSAs for other architectures.

References:
[Security Vulnerability Treatment Policy]
https://www.gentoo.org/support/security/vulnerability-treatment-policy.html
##

-- 

Yury German (BlueKnight)
Gentoo Security Team Lead
Email: bluekni...@gentoo.org

OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net
GPG Fingerprint: 8858 89D6 C0C4 75C4 D0DD  FA00 EEAF ED89 024C 043



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-10 ] Pidgin: Arbitrary code execution

2017-06-06 Thread Kristian Fiskerstrand
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Pidgin: Arbitrary code execution
 Date: June 06, 2017
 Bugs: #612188
   ID: 201706-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A vulnerability in Pidgin might allow remote attackers to execute
arbitrary code.

Background
==

Pidgin is a GTK Instant Messenger client for a variety of instant
messaging protocols.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-im/pidgin< 2.12.0  >= 2.12.0

Description
===

Joseph Bisch discovered that Pidgin incorrectly handled certain xml
messages.

Impact
==

A remote attacker could send a specially crafted instant message,
possibly resulting in execution of arbitrary code with the privileges
of the Pidgin process.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Pidgin users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-im/pidgin-2.12.0"

References
==

[ 1 ] CVE-2017-2640
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2640

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-10

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-11 ] PCRE library: Denial of Service

2017-06-06 Thread Kristian Fiskerstrand
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: PCRE library: Denial of Service
 Date: June 06, 2017
 Bugs: #609592
   ID: 201706-11

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A vulnerability in PCRE library allows remote attackers to cause a
Denial of Service condition.

Background
==

PCRE library is a set of functions that implement regular expression
pattern matching using the same syntax and semantics as Perl 5.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  dev-libs/libpcre< 8.40-r1 >= 8.40-r1

Description
===

It was found that the compile_bracket_matchingpath function in
pcre_jit_compile.c in PCRE library is vulnerable to an out-of-bounds
read.

Impact
==

A remote attacker could possibly cause a Denial of Service condition
via a special crafted regular expression.

Workaround
==

There is no known workaround at this time.

Resolution
==

All PCRE library users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-libs/libpcre-8.40-r1"

References
==

[ 1 ] CVE-2017-6004
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6004

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-11

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-12 ] Wireshark: Multiple vulnerabilities

2017-06-06 Thread Kristian Fiskerstrand
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Wireshark: Multiple vulnerabilities
 Date: June 06, 2017
 Bugs: #609646, #615462
   ID: 201706-12

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Wireshark, the worst of
which allows remote attackers to cause a Denial of Service condition.

Background
==

Wireshark is a network protocol analyzer formerly known as ethereal.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-analyzer/wireshark   < 2.2.6>= 2.2.6

Description
===

Multiple vulnerabilities have been discovered in Wireshark. Please
review the CVE identifiers referenced below for details.

Impact
==

A remote attacker could entice a user to process a specially crafted
network packet using Wireshark, possibly resulting a Denial of Service
condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Wireshark users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-2.2.6"

References
==

[ 1 ] CVE-2017-6014
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6014
[ 2 ] CVE-2017-7700
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7700
[ 3 ] CVE-2017-7701
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7701
[ 4 ] CVE-2017-7702
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7702
[ 5 ] CVE-2017-7703
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7703
[ 6 ] CVE-2017-7704
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7704
[ 7 ] CVE-2017-7705
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7705

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-12

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-14 ] FreeType: Multiple vulnerabilities

2017-06-06 Thread Kristian Fiskerstrand
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-14
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: FreeType: Multiple vulnerabilities
 Date: June 06, 2017
 Bugs: #612192, #616730
   ID: 201706-14

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in FreeType, the worst of
which allows remote attackers to execute arbitrary code.

Background
==

FreeType is a high-quality and portable font engine.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  media-libs/freetype   < 2.8   >= 2.8

Description
===

Multiple vulnerabilities have been discovered in FreeType. Please
review the CVE identifiers referenced below for details.

Impact
==

A remote attacker could entice a user to use a specially crafted font
file using FreeType, possibly resulting in execution of arbitrary code
with the privileges of the process or a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All FreeType users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.8"

References
==

[ 1 ] CVE-2016-10244
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10244
[ 2 ] CVE-2016-10328
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10328
[ 3 ] CVE-2017-7857
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7857
[ 4 ] CVE-2017-7858
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7858
[ 5 ] CVE-2017-7864
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7864
[ 6 ] CVE-2017-8105
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8105
[ 7 ] CVE-2017-8287
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8287

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-14

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-13 ] minicom: Remote execution of arbitrary code

2017-06-06 Thread Kristian Fiskerstrand
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: minicom: Remote execution of arbitrary code
 Date: June 06, 2017
 Bugs: #615996
   ID: 201706-13

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


An out-of-bounds data access in minicom might allow remote attackers to
execute arbitrary code.

Background
==

Minicom is a text-based serial port communications program.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-dialup/minicom   < 2.7.1>= 2.7.1

Description
===

In minicom before version 2.7.1, the escparms[] buffer in vt100.c is
vulnerable to an overflow.

Impact
==

A remote attacker, able to connect to a minicom port, could possibly
execute arbitrary code with the privileges of the process, or cause a
Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All minicom users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-dialup/minicom-2.7.1"

References
==

[ 1 ] CVE-2017-7467
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7467

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-13

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature