[gentoo-announce] [ GLSA 201708-02 ] TNEF: Multiple vulnerabilities

2017-08-16 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201708-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: TNEF: Multiple vulnerabilities
 Date: August 17, 2017
 Bugs: #611426, #618658
   ID: 201708-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in TNEF, the worst of which
allows remote attackers to cause a Denial of Service condition.

Background
==

TNEF is a program for unpacking MIME attachments of type
"application/ms-tnef".

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-mail/tnef< 1.4.15  >= 1.4.15

Description
===

Multiple vulnerabilities have been discovered in TNEF. Please review
the CVE identifiers referenced below for details.

Impact
==

A remote attacker could entice a user to process a specially crafted
MIME attachment of type "application/ms-tnef" using TNEF, possibly
resulting in a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All TNEF users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-mail/tnef-1.4.15"

References
==

[ 1 ] CVE-2017-6307
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6307
[ 2 ] CVE-2017-6308
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6308
[ 3 ] CVE-2017-6309
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6309
[ 4 ] CVE-2017-6310
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6310
[ 5 ] CVE-2017-8911
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8911

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201708-02

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201708-01 ] BIND: Multiple vulnerabilities

2017-08-16 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201708-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: BIND: Multiple vulnerabilities
 Date: August 17, 2017
 Bugs: #605454, #608740, #615420, #621730
   ID: 201708-01

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in BIND, the worst of which
allows remote attackers to cause a Denial of Service condition.

Background
==

BIND (Berkeley Internet Name Domain) is a Name Server.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-dns/bind   < 9.11.1_p1  >= 9.11.1_p1

Description
===

Multiple vulnerabilities have been discovered in BIND. Please review
the CVE identifiers referenced below for details.

Impact
==

A remote attacker could send a specially crafted DNS request to the
BIND resolver resulting in a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All BIND users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-dns/bind-9.11.1_p1"

References
==

[  1 ] CVE-2016-9131
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9131
[  2 ] CVE-2016-9147
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9147
[  3 ] CVE-2016-9444
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9444
[  4 ] CVE-2016-9778
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9778
[  5 ] CVE-2017-3135
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3135
[  6 ] CVE-2017-3136
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3136
[  7 ] CVE-2017-3137
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3137
[  8 ] CVE-2017-3138
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3138
[  9 ] CVE-2017-3140
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3140
[ 10 ] CVE-2017-3141
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3141

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201708-01

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] Dropping support of sparc as a security supported architecture.

2017-06-06 Thread Yury German
Hello,

After long discussion with the sparc team and other developers, the
Security Team has decided to drop SPARC as a security supported
architecture. This decision follows the council decision on 2016-12-11,
"The council defers to the security team, but is supportive of dropping
security support for sparc if it is unable to generally meet the
security team timelines."

The list of security supported architectures is maintained in the
[Security Vulnerability Treatment Policy]

The consequences of the removal of security supported architecture
include (i) GLSA will be released before a version of a package is
necessarily stable for the architecture (ii) architecture-specific
issues will not be investigated.

In addition to this announcement, glsa-check will be updated to present
necessary information for sparc users. As most security issues are
cross-architecture, glsa-check will continue to be operational for sparc
based on generic GLSAs for other architectures.

References:
[Security Vulnerability Treatment Policy]
https://www.gentoo.org/support/security/vulnerability-treatment-policy.html
##

-- 
____
Yury German (BlueKnight)
Gentoo Security Team Lead
Email: bluekni...@gentoo.org

OpenPGP keyblock reachable at hkp://pool.sks-keyservers.net
GPG Fingerprint: 8858 89D6 C0C4 75C4 D0DD  FA00 EEAF ED89 024C 043



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-03 ] QEMU: Multiple vulnerabilities

2017-06-06 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: QEMU: Multiple vulnerabilities
 Date: June 06, 2017
 Bugs: #614744, #615874, #616460, #616462, #616482, #616484,
   #616636, #616870, #616872, #616874, #618808, #619018,
   #619020, #620322
   ID: 201706-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in QEMU, the worst of which
may allow a remote attacker to cause a Denial of Service or gain
elevated privileges from a guest VM.

Background
==

QEMU is a generic and open source machine emulator and virtualizer.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-emulation/qemu  < 2.9.0-r2   >= 2.9.0-r2

Description
===

Multiple vulnerabilities have been discovered in QEMU. Please review
the CVE identifiers referenced below for details.

Impact
==

A remote attacker might cause a Denial of Service or gain escalated
privileges from a guest VM.

Workaround
==

There is no known workaround at this time.

Resolution
==

All QEMU users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.9.0-r2"

References
==

[  1 ] CVE-2016-9603
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9603
[  2 ] CVE-2017-7377
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7377
[  3 ] CVE-2017-7471
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7471
[  4 ] CVE-2017-7493
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7493
[  5 ] CVE-2017-7718
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7718
[  6 ] CVE-2017-7980
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7980
[  7 ] CVE-2017-8086
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8086
[  8 ] CVE-2017-8112
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8112
[  9 ] CVE-2017-8309
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8309
[ 10 ] CVE-2017-8379
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8379
[ 11 ] CVE-2017-8380
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-8380
[ 12 ] CVE-2017-9060
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9060
[ 13 ] CVE-2017-9310
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9310
[ 14 ] CVE-2017-9330
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-9330

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-03

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-02 ] Shadow: Multiple vulnerabilities

2017-06-06 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
Title: Shadow: Multiple vulnerabilities
 Date: June 06, 2017
 Bugs: #610804, #620510
   ID: 201706-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Shadow, the worst of which
might allow privilege escalation.

Background
==

Shadow is a set of tools to deal with user accounts.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  sys-apps/shadow  < 4.4-r2  >= 4.4-r2

Description
===

Multiple vulnerabilities have been discovered in Shadow. Please review
the CVE identifiers referenced below for details.

Impact
==

A local attacker could possibly cause a Denial of Service condition,
gain privileges via crafted input, or SIGKILL arbitrary processes.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Shadow users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.4-r2"

References
==

[ 1 ] CVE-2016-6252
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6252
[ 2 ] CVE-2017-2616
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2616

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-02

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201706-01 ] MUNGE: Privilege escalation

2017-06-06 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201706-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
Title: MUNGE: Privilege escalation
 Date: June 06, 2017
 Bugs: #602596
   ID: 201706-01

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Gentoo's MUNGE ebuilds are vulnerable to privilege escalation due to
improper permissions.

Background
==

An authentication service for creating and validating credentials.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  sys-auth/munge < 0.5.10-r2  >= 0.5.10-r2

Description
===

It was discovered that Gentoo's default MUNGE installation suffered
from a privilege escalation vulnerability (munge user to root) due to
improper permissions and a runscript which called chown() on a user
controlled file.

Impact
==

A local attacker, who either is already MUNGE's system user or belongs
to MUNGE's group, could potentially escalate privileges.

Workaround
==

There is no known workaround at this time.

Resolution
==

All MUNGE users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=sys-auth/munge-0.5.10-r2"

References
==


Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201706-01

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201705-10 ] GStreamer plug-ins: User-assisted execution of arbitrary code

2017-05-17 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201705-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: GStreamer plug-ins: User-assisted execution of arbitrary code
 Date: May 18, 2017
 Bugs: #600142, #601354
   ID: 201705-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in various GStreamer plug-ins,
the worst of which could lead to the execution of arbitrary code.

Background
==

The GStreamer plug-ins provide decoders to the GStreamer open source
media framework.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  media-libs/gst-plugins-bad
  < 1.10.3  >= 1.10.3
  2  media-libs/gst-plugins-good
  < 1.10.3  >= 1.10.3
  3  media-libs/gst-plugins-base
  < 1.10.3  >= 1.10.3
  4  media-libs/gst-plugins-ugly
  < 1.10.3  >= 1.10.3
---
 4 affected packages

Description
===

Multiple vulnerabilities have been discovered in various GStreamer
plug-ins. Please review the CVE identifiers referenced below for
details.

Impact
==

A remote attacker could entice a user or automated system using a
GStreamer plug-in to process a specially crafted file, resulting in the
execution of arbitrary code or a Denial of Service.

Workaround
==

There is no known workaround at this time.

Resolution
==

All gst-plugins-bad users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=media-libs/gst-plugins-bad-1.10.3:1.0"

All gst-plugins-good users should upgrade to the latest version:

  # emerge --sync
  # emerge -a --oneshot -v ">=media-libs/gst-plugins-good-1.10.3:1.0"

All gst-plugins-base users should upgrade to the latest version:

  # emerge --sync
  # emerge -a --oneshot -v ">=media-libs/gst-plugins-base-1.10.3:1.0"

All gst-plugins-ugly users should upgrade to the latest version:

  # emerge --sync
  # emerge -a --oneshot -v ">=media-libs/gst-plugins-ugly-1.10.3:1.0"

References
==

[  1 ] CVE-2016-10198
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10198
[  2 ] CVE-2016-10199
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-10199
[  3 ] CVE-2016-9445
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9445
[  4 ] CVE-2016-9446
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9446
[  5 ] CVE-2016-9447
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9447
[  6 ] CVE-2016-9634
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9634
[  7 ] CVE-2016-9635
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9635
[  8 ] CVE-2016-9636
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9636
[  9 ] CVE-2016-9807
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9807
[ 10 ] CVE-2016-9808
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9808
[ 11 ] CVE-2016-9809
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9809
[ 12 ] CVE-2016-9810
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9810
[ 13 ] CVE-2016-9811
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9811
[ 14 ] CVE-2016-9812
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9812
[ 15 ] CVE-2016-9813
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-9813
[ 16 ] CVE-2017-5837
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5837
[ 17 ] CVE-2017-5838
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5838
[ 18 ] CVE-2017-5839
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5839
[ 19 ] CVE-2017-5840
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5840
[ 20 ] CVE-2017-5841
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5841
[ 21 ] CVE-2017-5842
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5842
[ 22 ] CVE-2017-5843
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5843
[ 23 ] CVE-2017-5844
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5844
[ 24 ] CVE-2017-5845
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5845
[ 25 ] CVE-2017-5846
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5846
[ 26 ] CVE-2017-5847
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5847
[ 27 ] CVE-2017-5848
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5848

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 

[gentoo-announce] [ GLSA 201705-09 ] Apache Tomcat: Multiple vulnerabilities

2017-05-17 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201705-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
Title: Apache Tomcat: Multiple vulnerabilities
 Date: May 18, 2017
 Bugs: #575796, #586966, #595978, #615868
   ID: 201705-09

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Apache Tomcat, the worst of
which could lead to privilege escalation.

Background
==

Apache Tomcat is a Servlet-3.0/JSP-2.2 Container.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  www-servers/tomcat   < 8.0.36  >= 7.0.70
>= 8.0.36

Description
===

Multiple vulnerabilities have been discovered in Tomcat. Please review
the CVE identifiers referenced below for details.

Impact
==

A remote attacker may be able to cause a Denial of Service condition,
obtain sensitive information, bypass protection mechanisms and
authentication restrictions.

A local attacker, who is a tomcat's system user or belongs to tomcat’s
group, could potentially escalate privileges.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Apache Tomcat users have to manually check their Tomcat runscripts
to make sure that they don't use an old, vulnerable runscript. In
addition:

All Apache Tomcat 7 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=www-servers/tomcat-7.0.70:7"

All Apache Tomcat 8 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=www-servers/tomcat-8.0.36:8"

References
==

[  1 ] CVE-2015-5174
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5174
[  2 ] CVE-2015-5345
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5345
[  3 ] CVE-2015-5346
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5346
[  4 ] CVE-2015-5351
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5351
[  5 ] CVE-2016-0706
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0706
[  6 ] CVE-2016-0714
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0714
[  7 ] CVE-2016-0763
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-0763
[  8 ] CVE-2016-1240
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-1240
[  9 ] CVE-2016-3092
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3092
[ 10 ] CVE-2016-8745
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-8745
[ 11 ] CVE-2017-5647
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5647
[ 12 ] CVE-2017-5648
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5648
[ 13 ] CVE-2017-5650
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5650
[ 14 ] CVE-2017-5651
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-5651

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201705-09

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201704-04 ] Adobe Flash Player: Multiple vulnerabilities

2017-04-26 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201704-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Adobe Flash Player: Multiple vulnerabilities
 Date: April 27, 2017
 Bugs: #615244
   ID: 201704-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.

Background
==

The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  www-plugins/adobe-flash< 25.0.0.148>= 25.0.0.148

Description
===

Multiple vulnerabilities have been discovered in Adobe Flash Player.
Please review the CVE identifiers referenced below for details.

Impact
==

A remote attacker could possibly execute arbitrary code with the
privileges of the process or bypass security restrictions.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Adobe Flash users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=www-plugins/adobe-flash-25.0.0.148"

References
==

[ 1 ] CVE-2017-3058
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3058
[ 2 ] CVE-2017-3059
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3059
[ 3 ] CVE-2017-3060
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3060
[ 4 ] CVE-2017-3061
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3061
[ 5 ] CVE-2017-3062
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3062
[ 6 ] CVE-2017-3063
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3063
[ 7 ] CVE-2017-3064
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-3064

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201704-04

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201703-07 ] Xen: Privilege Escalation

2017-03-27 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201703-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Xen: Privilege Escalation
 Date: March 28, 2017
 Bugs: #609120
   ID: 201703-07

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A vulnerability in Xen's bundled QEMU version might allow privilege
escalation.

Background
==

Xen is a bare-metal hypervisor.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-emulation/xen-tools < 4.7.1-r8   >= 4.7.1-r8

Description
===

In CIRRUS_BLTMODE_MEMSYSSRC mode the bitblit copy routine
cirrus_bitblt_cputovideo fails to check wethehr the specified memory
region is safe.

Impact
==

A local attacker could potentially execute arbitrary code with
privileges of Xen (QEMU) process on the host, gain privileges on the
host system, or cause a Denial of Service condition.

Workaround
==

Running guests in Paravirtualization (PV)  mode,  or running guests in
Hardware-assisted virtualizion (HVM) utilizing stub domains mitigate
the issue.

Running HVM guests with the device model in a stubdomain will mitigate
the issue.

Changing the video card emulation to stdvga (stdvga=1, vga="stdvga", in
the xl domain configuration) will avoid the vulnerability.

Resolution
==

All Xen Tools users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.7.1-r8"

References
==

[ 1 ] CVE-2017-2620
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2620

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201703-07

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201703-06 ] Deluge: Remote execution of arbitrary code

2017-03-27 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201703-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Deluge: Remote execution of arbitrary code
 Date: March 28, 2017
 Bugs: #612144
   ID: 201703-06

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A vulnerability in Deluge might allow remote attackers to execute
arbitrary code.

Background
==

Deluge is a BitTorrent client.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-p2p/deluge   < 1.3.14  >= 1.3.14

Description
===

A CSRF vulnerability was discovered in the web UI of Deluge.

Impact
==

A remote attacker could entice a user currently logged in into Deluge
web UI to visit a malicious web page which uses forged requests to make
Deluge download and install a Deluge plug-in provided by the attacker.
The plug-in can then execute arbitrary code as the user running Deluge.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Deluge users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-p2p/deluge-1.3.14"

References
==

[ 1 ] CVE-2017-7178
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7178

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201703-06

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201703-04 ] cURL: Certificate validation error

2017-03-27 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201703-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: cURL: Certificate validation error
 Date: March 28, 2017
 Bugs: #610572
   ID: 201703-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A coding error has been found in cURL, causing the TLS Certificate
Status Request extension check to always return true.

Background
==

cURL is a tool and libcurl is a library for transferring data with URL
syntax.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-misc/curl< 7.53.0  >= 7.53.0

Description
===

cURL and applications linked against libcurl support "OCSP stapling",
also known as the TLS Certificate Status Request extension (using the
CURLOPT_SSL_VERIFYSTATUS option). When telling cURL to use this
feature, it uses that TLS extension to ask for a fresh proof of the
server's certificate's validity. If the server doesn't support the
extension, or fails to provide said proof, cURL is expected to return
an error.
Due to a coding mistake, the code that checks for a test success or
failure, ends up always thinking there's valid proof, even when there
is none or if the server doesn't support the TLS extension in question.

Impact
==

Due to the error, a user maybe does not detect when a server's
certificate goes invalid or otherwise be mislead that the server is in
a better shape than it is in reality.

Workaround
==

There is no known workaround at this time.

Resolution
==

All cURL users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-misc/curl-7.53.0"

References
==

[ 1 ] CVE-2017-2629
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-2629

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201703-04

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2017 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201609-01 ] QEMU: Multiple vulnerabilities

2016-09-25 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201609-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: QEMU: Multiple vulnerabilities
 Date: September 25, 2016
 Bugs: #573816, #579734, #580040, #583496, #583952, #584094,
   #584102, #584146, #584514, #584630, #584918, #589924,
   #589928, #591242, #591244, #591374, #591380, #591678,
   #592430, #593036, #593038, #593284, #593956
   ID: 201609-01

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in QEMU, the worst of which
could lead to arbitrary code execution, or cause a Denial of Service
condition.

Background
==

QEMU is a generic and open source machine emulator and virtualizer.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-emulation/qemu  < 2.7.0-r2   >= 2.7.0-r2

Description
===

Multiple vulnerabilities have been discovered in QEMU. Please review
the CVE identifiers referenced below for details.

Impact
==

Local users within a guest QEMU environment can execute arbitrary code
within the host or a cause a Denial of Service condition of the QEMU
guest process.

Workaround
==

There is no known workaround at this time.

Resolution
==

All QEMU users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.7.0-r2"

References
==

[  1 ] CVE-2016-2841
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2841
[  2 ] CVE-2016-4001
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4001
[  3 ] CVE-2016-4002
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4002
[  4 ] CVE-2016-4020
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4020
[  5 ] CVE-2016-4439
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4439
[  6 ] CVE-2016-4441
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4441
[  7 ] CVE-2016-4453
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4453
[  8 ] CVE-2016-4454
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4454
[  9 ] CVE-2016-4964
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-4964
[ 10 ] CVE-2016-5106
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5106
[ 11 ] CVE-2016-5107
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5107
[ 12 ] CVE-2016-5126
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5126
[ 13 ] CVE-2016-5238
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5238
[ 14 ] CVE-2016-5337
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5337
[ 15 ] CVE-2016-5338
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-5338
[ 16 ] CVE-2016-6490
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6490
[ 17 ] CVE-2016-6833
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6833
[ 18 ] CVE-2016-6834
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6834
[ 19 ] CVE-2016-6836
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6836
[ 20 ] CVE-2016-6888
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-6888
[ 21 ] CVE-2016-7116
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7116
[ 22 ] CVE-2016-7156
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7156
[ 23 ] CVE-2016-7157
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7157
[ 24 ] CVE-2016-7422
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-7422

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201609-01

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201608-01 ] OptiPNG: Multiple vulnerabilities

2016-08-11 Thread Yury German

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201608-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: OptiPNG: Multiple vulnerabilities
 Date: August 11, 2016
 Bugs: #561882, #579030
   ID: 201608-01

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in OptiPNG, the worst of which
could lead to the remote execution of arbitrary code, or cause a Denial
of Service condition.

Background
==

OptiPNG is a PNG optimizer that recompresses image files to a smaller
size, without losing any information.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  media-gfx/optipng< 0.7.6>= 0.7.6

Description
===

Multiple vulnerabilities have been discovered in OptiPNG. Please review
the CVE identifiers referenced below for details.

Impact
==

A remote attacker could entice a user to open a specially crafted image
file resulting in the execution of arbitrary code with the privileges
of the process, or a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All OptiPNG users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=media-gfx/optipng-0.7.6"

References
==

[ 1 ] CVE-2016-2191
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2191
[ 2 ] CVE-2016-3981
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3981
[ 3 ] CVE-2016-3982
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-3982

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201608-01

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201606-04 ] GnuPG: Multiple vulnerabilities

2016-06-05 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201606-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: GnuPG: Multiple vulnerabilities
 Date: June 05, 2016
 Bugs: #534110, #541564, #541568
   ID: 201606-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in GnuPG and libgcrypt, the
worst of which may allow a local attacker to obtain confidential key
information.

Background
==

The GNU Privacy Guard, GnuPG, is a free replacement for the PGP suite
of cryptographic software.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-crypt/gnupg< 2.0.26-r3*>= 1.4.19
 >= 2.0.26-r3
  2  dev-libs/libgcrypt  < 1.6.3-r4   >= 1.6.3-r4
---
 2 affected packages

Description
===

Multiple vulnerabilities have been discovered in GnuPG and libgcrypt,
please review the CVE identifiers referenced below for details.

Impact
==

A local attacker could possibly cause a Denial of Service condition.
Side-channel attacks could be leveraged to obtain key material.

Workaround
==

There is no known workaround at this time.

Resolution
==

All GnuPG 2 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-2.0.26-r3"

All GnuPG 1 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.19"

All libgcrypt users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-libs/libgcrypt-1.6.3-r4"

References
==

[ 1 ] CVE-2014-3591
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3591
[ 2 ] CVE-2015-0837
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0837

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201606-04

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201606-03 ] libjpeg-turbo: Multiple vulnerabilities

2016-06-05 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201606-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: libjpeg-turbo: Multiple vulnerabilities
 Date: June 05, 2016
 Bugs: #491150, #531418
   ID: 201606-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Two vulnerabilities have been discovered in libjpeg-turbo, the worse of
which could allow remote attackers access to  sensitive information.

Background
==

libjpeg-turbo is a MMX, SSE, and SSE2 SIMD accelerated JPEG library

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  media-libs/libjpeg-turbo
  < 1.4.2>= 1.4.2

Description
===

libjpeg-turbo does not check for certain duplications of component data
during the reading of segments that follow Start Of Scan (SOS) JPEG
markers.

Impact
==

Remote attackers could obtain sensitive information from uninitialized
memory locations via a crafted JPEG images.

Workaround
==

There is no known workaround at this time.

Resolution
==

All libjpeg-turbo users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=media-libs/libjpeg-turbo-1.4.2"

References
==

[ 1 ] CVE-2013-6629
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6629
[ 2 ] CVE-2013-6630
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6630

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201606-03

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201606-02 ] Puppet Server and Agent: Multiple vulnerabilities

2016-06-05 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201606-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Puppet Server and Agent: Multiple vulnerabilities
 Date: June 05, 2016
 Bugs: #577450, #581372
   ID: 201606-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Puppet Server and Agent,
the worst of which could lead to arbitrary code execution.

Background
==

Puppet Agent contains Puppet’s main code and all of the dependencies
needed to run it, including Facter, Hiera, and bundled versions of Ruby
and OpenSSL.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-admin/puppet-agent   < 1.4.2>= 1.4.2
  2  app-admin/puppetserver   < 2.3.2>= 2.3.2
---
 2 affected packages

Description
===

Multiple vulnerabilities have been discovered in Puppet Server and
Agent.  Please review the CVE identifiers referenced below for details.

Impact
==

Remote attackers, impersonating a trusted broker, could potentially
execute arbitrary code.

Workaround
==

There is no known workaround at this time.

Resolution
==

All puppet-agent users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-admin/puppet-agent-1.4.2"

All puppetserver users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-admin/puppetserver-2.3.2"

References
==

[ 1 ] CVE-2016-2785
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2785
[ 2 ] CVE-2016-2786
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2786

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201606-02

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201606-01 ] PuTTY: Multiple vulnerabilities

2016-06-05 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201606-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: PuTTY: Multiple vulnerabilities
 Date: June 05, 2016
 Bugs: #565080, #576524
   ID: 201606-01

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in PuTTY, the worst of which
could lead to arbitrary code execution, or cause a Denial of Service
condition.

Background
==

PuTTY is a telnet and SSH client.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-misc/putty< 0.67 >= 0.67

Description
===

Multiple vulnerabilities have been discovered in PuTTY. Please review
the CVE identifiers referenced below for details.

Impact
==

Stack-based buffer overflow in the SCP command-line utility allows
remote servers to execute arbitrary code or cause a denial of service
condition via a crafted SCP-SINK file-size response to an SCP download
request.

Workaround
==

There is no known workaround at this time.

Resolution
==

All PuTTY users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-misc/putty-0.67"

References
==

[ 1 ] CVE-2015-5309
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5309
[ 2 ] CVE-2016-2563
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2016-2563

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201606-01

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201605-05 ] Linux-PAM: Multiple vulnerabilities

2016-05-30 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201605-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Linux-PAM: Multiple vulnerabilities
 Date: May 31, 2016
 Bugs: #493432, #505604, #553302
   ID: 201605-05

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Linux-PAM, allowing remote
attackers to bypass the auth process and cause Denial of Service.

Background
==

Linux-PAM (Pluggable Authentication Modules) is an architecture
allowing the separation of the development of privilege granting
software from the development of secure and appropriate authentication
schemes.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  sys-libs/pam < 1.2.1>= 1.2.1

Description
===

Multiple vulnerabilities have been discovered in Linux-PAM.  Please
review the CVE identifiers referenced below for details.

Impact
==

Remote attackers could cause Denial of Service, conduct brute force
attacks, and conduct username enumeration.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Linux-PAM users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=sys-libs/pam-1.2.1"

References
==

[ 1 ] CVE-2013-7041
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-7041
[ 2 ] CVE-2014-2583
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2583
[ 3 ] CVE-2015-3238
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3238
[ 4 ] CVE-2015-3238
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3238

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201605-05

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201605-03 ] libfpx: Denial of Service

2016-05-30 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201605-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: libfpx: Denial of Service
 Date: May 30, 2016
 Bugs: #395367
   ID: 201605-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A double free vulnerability has been discovered in libfpx that allows
remote attackers to cause a Denial of Service.

Background
==

A library for manipulating FlashPIX images.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  media-libs/libfpx   < 1.3.1_p6   >= 1.3.1_p6

Description
===

A double free vulnerability has been discovered in the Free_All_Memory
function in jpeg/dectile.c.

Impact
==

A remote attacker could entice a user to open a specially crafted FPX
image using an application linked against libfpx, possibly resulting in
a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All libfpx users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=media-libs/libfpx-1.3.1_p6"

Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying these packages.

References
==

[ 1 ] CVE-2012-0025
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0025

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201605-03

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2016 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201604-03 ] Xen: Multiple vulnerabilities

2016-04-05 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201604-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Xen: Multiple vulnerabilities
 Date: April 05, 2016
 Bugs: #445254, #513832, #547202, #549200, #549950, #550658,
   #553664, #553718, #32, #556304, #561110, #564472,
   #564932, #566798, #566838, #566842, #567962, #571552,
   #571556, #574012
   ID: 201604-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Xen, the worst of which
cause a Denial of Service.

Background
==

Xen is a bare-metal hypervisor.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-emulation/xen   < 4.6.0-r9   >= 4.6.0-r9
 *>= 4.5.2-r5
  2  app-emulation/xen-pvgrub
  < 4.6.0  Vulnerable!
  3  app-emulation/xen-tools < 4.6.0-r9   >= 4.6.0-r9
 *>= 4.5.2-r5
  4  app-emulation/pvgrub>= 4.6.0
*>= 4.5.2
---
 NOTE: Certain packages are still vulnerable. Users should migrate
   to another package if one is available or wait for the
   existing packages to be marked stable by their
   architecture maintainers.
---
 4 affected packages

Description
===

Multiple vulnerabilities have been discovered in Xen. Please review the
CVE identifiers referenced below for details.

Impact
==

A local attacker could possibly cause a Denial of Service condition or
obtain sensitive information.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Xen 4.5 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.5.2-r5"

All Xen 4.6 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.6.0-r9"

All Xen tools 4.5 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.5.2-r5"

All Xen tools 4.6 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.6.0-r9"

All Xen pvgrub users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-emulation/xen-pvgrub-4.6.0"

References
==

[  1 ] CVE-2012-3494
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494
[  2 ] CVE-2012-3495
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495
[  3 ] CVE-2012-3496
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496
[  4 ] CVE-2012-3497
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497
[  5 ] CVE-2012-3498
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498
[  6 ] CVE-2012-3515
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515
[  7 ] CVE-2012-4411
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411
[  8 ] CVE-2012-4535
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535
[  9 ] CVE-2012-4536
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536
[ 10 ] CVE-2012-4537
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537
[ 11 ] CVE-2012-4538
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538
[ 12 ] CVE-2012-4539
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539
[ 13 ] CVE-2012-6030
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030
[ 14 ] CVE-2012-6031
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031
[ 15 ] CVE-2012-6032
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032
[ 16 ] CVE-2012-6033
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033
[ 17 ] CVE-2012-6034
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034
[ 18 ] CVE-2012-6035
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035
[ 19 ] CVE-2012-6036
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036
[ 20 ] CVE-2015-2151
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2151
[ 21 ] CVE-2015-3209
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209
[ 22 ] CVE-2015-3259
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3259
[ 23 ] CVE-2015-3340
   

[gentoo-announce] [ GLSA 201512-11 ] Firebird: Buffer Overflow

2015-12-30 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201512-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
Title: Firebird: Buffer Overflow
 Date: December 30, 2015
 Bugs: #460780
   ID: 201512-11

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A buffer overflow in Firebird might allow remote attackers to execute
arbitrary code.

Background
==

Firebird is a multi-platform, open source relational database.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  dev-db/firebird < 2.5.3.26780.0-r3   >= 2.5.3.26780.0-r3

Description
===

The vulnerability is caused due to an error when processing requests
from remote clients.

Impact
==

A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Firebird users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=dev-db/firebird-2.5.3.26780.0-r3"

NOTE: Firebird package was moved to the testing branch (unstable) of
Gentoo. There is currently no stable version of Firebird, and  there
will be no further GLSAs for this package.

References
==

[ 1 ] CVE-2013-2492
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2492

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201512-11

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201512-12 ] KDE Systemsettings: Privilege escalation

2015-12-30 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201512-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: KDE Systemsettings: Privilege escalation
 Date: December 30, 2015
 Bugs: #528468
   ID: 201512-12

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Data validation in KDE Systemsettings could lead to local privilege
escalation.

Background
==

KDE workspace configuration module for setting the date and time has a
helper program
which runs as root for performing actions.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  kde-base/systemsettings< 4.11.13-r1>= 4.11.13-r1

Description
===

KDE Systemsettings fails to properly validate user input before passing
it as argument in context of higher privilege.

Impact
==

A local attacker could gain privileges via a crafted ntpUtility (ntp
utility name) argument.

Workaround
==

Add a polkit rule to disable the org.kde.kcontrol.kcmclock.save action.

Resolution
==

All KDE Systemsettings users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=kde-base/systemsettings-4.11.13-r1"

References
==

[ 1 ] CVE-2014-8651
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8651

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201512-12

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201512-13 ] InspIRCd: Multiple vulnerabilities

2015-12-30 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201512-13
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: InspIRCd: Multiple vulnerabilities
 Date: December 30, 2015
 Bugs: #545034, #570244
   ID: 201512-13

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in InspIRCd, the worst
allowing remote attackers to execute arbitrary code.

Background
==

InspIRCd is a modular Internet Relay Chat (IRC) server written in C++
which was created from scratch to be stable, modern and lightweight.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-irc/inspircd < 2.0.20  >= 2.0.20

Description
===

Multiple vulnerabilities have been discovered in InspIRCd. Please
review the CVE identifiers referenced below for details.

Impact
==

A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All InspIRCd users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-irc/inspircd-2.0.20"

References
==

[ 1 ] CVE-2012-6697
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6697
[ 2 ] CVE-2015-6674
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6674
[ 3 ] CVE-2015-8702
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-8702

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201512-13

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201512-07 ] GStreamer: User-assisted execution of arbitrary code

2015-12-30 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201512-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: GStreamer: User-assisted execution of arbitrary code
 Date: December 30, 2015
 Bugs: #553742
   ID: 201512-07

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A buffer overflow in GStreamer could allow remote attackers to execute
arbitrary code or cause Denial of Service.

Background
==

GStreamer is an open source multimedia framework.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  media-libs/gstreamer < 1.4.5>= 1.4.5

Description
===

A buffer overflow vulnerability has been found in the parsing of H.264
formatted video.

Impact
==

A remote attacker could entice a user to open a specially crafted H.264
formatted video using an application linked against GStreamer, possibly
resulting in execution of arbitrary code with the privileges of the
process or a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All GStreamer users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=media-libs/gstreamer-1.4.5"

References
==

[ 1 ] CVE-2015-0797
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0797

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201512-07

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201512-06 ] MPFR: User-assisted execution of arbitrary code

2015-12-30 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201512-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: MPFR: User-assisted execution of arbitrary code
 Date: December 30, 2015
 Bugs: #532028
   ID: 201512-06

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A buffer overflow vulnerability in MPFR could allow remote attackers to
execute arbitrary code or cause Denial of Service.

Background
==

MPFR is a library for multiple-precision floating-point computations
with exact rounding.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  dev-libs/mpfr   < 3.1.3_p4   >= 3.1.3_p4

Description
===

MPFR fails to adequately check user-supplied input, which could lead to
a buffer overflow.

Impact
==

A remote attacker could possibly execute arbitrary code with the
privileges of the process or cause a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All MPFR users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-libs/mpfr-3.1.3_p4"

References
==

[ 1 ] CVE-2014-9474
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9474

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201512-06

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201512-08 ] ClamAV: Multiple vulnerabilities

2015-12-30 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201512-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: ClamAV: Multiple vulnerabilities
 Date: December 30, 2015
 Bugs: #538084, #548066
   ID: 201512-08

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in ClamAV, possibly resulting
in Denial of Service.

Background
==

ClamAV is a GPL virus scanner.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-antivirus/clamav < 0.98.7  >= 0.98.7

Description
===

Multiple vulnerabilities have been discovered in ClamAV. Please review
the CVE identifiers referenced below for details.

Impact
==

A remote attacker could cause ClamAV to scan a specially crafted file,
possibly resulting in a Denial of Service condition or other
unspecified impact.

Workaround
==

There is no known workaround at this time.

Resolution
==

All ClamAV users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.98.7"

References
==

[ 1 ] CVE-2014-9328
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9328
[ 2 ] CVE-2015-1461
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1461
[ 3 ] CVE-2015-1462
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1462
[ 4 ] CVE-2015-1463
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1463
[ 5 ] CVE-2015-2170
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2170
[ 6 ] CVE-2015-2221
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2221
[ 7 ] CVE-2015-
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-
[ 8 ] CVE-2015-2668
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2668

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201512-08

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201512-09 ] encfs: Multiple vulnerabilities

2015-12-30 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201512-09
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: encfs: Multiple vulnerabilities
 Date: December 30, 2015
 Bugs: #510290
   ID: 201512-09

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in encfs, the worst of which
can allow remote attackers to execute arbitrary code or cause a Denial
of Service condition.

Background
==

Encfs is an implementation of encrypted filesystem in user-space using
FUSE.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  sys-fs/encfs < 1.7.5>= 1.7.5

Description
===

Multiple vulnerabilities have been discovered in encfs. Please review
the CVE identifiers referenced below for details.

Impact
==

A local attacker can utilize a  possible buffer overflow in the
encodeName method of StreamNameIO and BlockNameIO to execute arbitrary
code or cause a Denial of Service. Also multiple weak cryptographics
practices have been found in encfs.

Workaround
==

There is no known workaround at this time.

Resolution
==

All encfs users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=sys-fs/encfs-1.7.5"

References
==

[ 1 ] CVE-2014-3462
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3462

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201512-09

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201512-10 ] Mozilla Products: Multiple vulnerabilities

2015-12-30 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201512-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Mozilla Products: Multiple vulnerabilities
 Date: December 30, 2015
 Bugs: #545232, #554036, #556942, #564818, #568376
   ID: 201512-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Mozilla Firefox and
Thunderbird, the worst of which may allow user-assisted execution of
arbitrary code.

Background
==

Mozilla Firefox is an open-source web browser and Mozilla Thunderbird
an open-source email client, both from the Mozilla Project.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  www-client/firefox   < 38.5.0  >= 38.5.0
  2  www-client/firefox-bin   < 38.5.0  >= 38.5.0
  3  mail-client/thunderbird  < 38.5.0  >= 38.5.0
  4  mail-client/thunderbird-bin
  < 38.5.0  >= 38.5.0
---
 4 affected packages

Description
===

Multiple vulnerabilities have been discovered in Mozilla Firefox and
Mozilla Thunderbird. Please review the CVE identifiers referenced below
for details.

Impact
==

A remote attacker could entice a user to view a specially crafted web
page or email, possibly resulting in execution of arbitrary code or a
Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All  Firefox users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=www-client/firefox-38.5.0"

All  Firefox-bin users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-38.5.0"

All  Thunderbird users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-38.5.0"

All  Thunderbird-bin users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-38.5.0"

References
==

[  1 ] CVE-2015-0798
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0798
[  2 ] CVE-2015-0799
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0799
[  3 ] CVE-2015-0801
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0801
[  4 ] CVE-2015-0802
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0802
[  5 ] CVE-2015-0803
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0803
[  6 ] CVE-2015-0804
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0804
[  7 ] CVE-2015-0805
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0805
[  8 ] CVE-2015-0806
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0806
[  9 ] CVE-2015-0807
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0807
[ 10 ] CVE-2015-0808
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0808
[ 11 ] CVE-2015-0810
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0810
[ 12 ] CVE-2015-0811
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0811
[ 13 ] CVE-2015-0812
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0812
[ 14 ] CVE-2015-0813
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0813
[ 15 ] CVE-2015-0814
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0814
[ 16 ] CVE-2015-0815
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0815
[ 17 ] CVE-2015-0816
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0816
[ 18 ] CVE-2015-2706
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2706
[ 19 ] CVE-2015-2721
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2721
[ 20 ] CVE-2015-2722
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2722
[ 21 ] CVE-2015-2724
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2724
[ 22 ] CVE-2015-2725
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2725
[ 23 ] CVE-2015-2726
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2726
[ 24 ] CVE-2015-2727
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2727
[ 25 ] CVE-2015-2728
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2728
[ 26 ] CVE-2015-2729
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2729
[ 27 ] CVE-2015-2730
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2730
[ 28 ] CVE-2015-2731
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2731
[ 29 ] CVE-2015-2733
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2733
[ 30 ] CVE-2015-2734
   

[gentoo-announce] [ GLSA 201512-04 ] OpenSSH: Multiple vulnerabilities

2015-12-21 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201512-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: OpenSSH: Multiple vulnerabilities
 Date: December 20, 2015
 Bugs: #553724, #18, #557340
   ID: 201512-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in OpenSSH, the worst of which
could lead to arbitrary code execution, or cause a Denial of Service
condition.

Background
==

OpenSSH is a complete SSH protocol implementation that includes an SFTP
client and server support.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-misc/openssh   < 7.1_p1-r2  >= 7.1_p1-r2

Description
===

Multiple vulnerabilities have been discovered in OpenSSH. Please review
the CVE identifiers referenced below for details.

Impact
==



Workaround
==

There is no known workaround at this time.

Resolution
==

All OpenSSH users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=net-misc/openssh-6.9_p1-r2"

References
==

[ 1 ] CVE-2015-5352
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5352
[ 2 ] CVE-2015-5600
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5600
[ 3 ] CVE-2015-6563
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6563
[ 4 ] CVE-2015-6564
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6564
[ 5 ] CVE-2015-6565
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6565

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201512-04

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201512-05 ] gdk-pixbuf: Multiple Vulnerabilities

2015-12-21 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201512-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: gdk-pixbuf: Multiple Vulnerabilities
 Date: December 21, 2015
 Bugs: #556314, #562878, #562880
   ID: 201512-05

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple buffer overflow vulnerabilities in gdk-pixbuf may allow remote
attackers to execute arbitrary code or cause Denial of Service.

Background
==

gdk-pixbuf is an image loading library for GTK+.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  x11-libs/gdk-pixbuf  < 2.32.1  >= 2.32.1

Description
===

Three heap-based buffer overflow vulnerabilities have been discovered
in gdk-pixbuf. Please review the CVE identifiers referenced below for
details.

Impact
==

A remote attacker could entice a user to open a specially crafted image
file with an application linked against gdk-pixbuf, possibly resulting
in execution of arbitrary code with the privileges of the process or a
Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All gdk-pixbuf users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=x11-libs/gdk-pixbuf-2.32.1"

Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying these packages.

References
==

[ 1 ] CVE-2015-4491
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4491
[ 2 ] CVE-2015-7673
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7673
[ 3 ] CVE-2015-7674
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7674

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201512-05

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201512-02 ] IPython: User-assisted execution of arbitrary code

2015-12-17 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201512-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: IPython: User-assisted execution of arbitrary code
 Date: December 17, 2015
 Bugs: #560708
   ID: 201512-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A vulnerability in IPython could result in execution of arbitrary
JavaScript.

Background
==

IPython is an advanced interactive shell for Python.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  dev-python/ipython  < 3.2.1-r1   >= 3.2.1-r1

Description
===

IPython does not properly check the MIME type of a file.

Impact
==

A remote attacker could entice a user to open a specially crafted text
file using IPython, possibly resulting in execution of arbitrary
JavaScript with the privileges of the process.

Workaround
==

There is no known workaround at this time.

Resolution
==

All IPython users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose ">=dev-python/ipython-3.2.1-r1"

References
==

[ 1 ] CVE-2015-7337
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7337

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201512-02

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201508-03 ] Icecast: Denial of Service

2015-08-15 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201508-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Icecast: Denial of Service
 Date: August 15, 2015
 Bugs: #545968
   ID: 201508-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A bug in the Icecast code handling source client URL authentication
causes a Denial of Service condition.

Background
==

Icecast is an open source alternative to shoutcast that supports mp3,
ogg (vorbis/theora) and aac streaming.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-misc/icecast  2.4.2= 2.4.2

Description
===

When stream_auth handler is defined for URL authentication and a
request is sent without login credentials, a Denial of Service
condition can occur.

Impact
==

A remote attacker could possibly cause a Denial of Service condition.

Workaround
==

Users of affected versions can change stream_auth mountpoints to use
password authentication instead.

Resolution
==

All icecast users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =net-misc/icecast-2.4.2

References
==

[ 1 ] CVE-2015-3026
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3026

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201508-03

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201508-02 ] libgadu: Multiple vulnerabilities

2015-08-15 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201508-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: libgadu: Multiple vulnerabilities
 Date: August 15, 2015
 Bugs: #490238, #505558, #510714
   ID: 201508-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in libgadu, the worst of which
may result in execution of arbitrary code.

Background
==

libgadu is a library that implements the client side of the Gadu-Gadu
protocol.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-libs/libgadu  1.12.0  = 1.12.0

Description
===

libgadu contains multiple vulnerabilities:

* X.509 certificates are not properly validated (CVE-2013-4488)
* A integer overflow error could lead to a buffer overflow
  (CVE-2013-6487)
* Malformed responses from a Gadu-Gadu file relay server are not
  properly handled (CVE-2014-3775)

Impact
==

A remote attacker may be able to execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, or
spoof servers.

Workaround
==

There is no known workaround at this time.

Resolution
==

All libgadu users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =net-libs/libgadu-1.12.0

References
==

[ 1 ] CVE-2013-4488
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4488
[ 2 ] CVE-2013-6487
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-6487
[ 3 ] CVE-2014-3775
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3775

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201508-02

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201508-01 ] Adobe Flash Player: Multiple vulnerabilities

2015-08-14 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201508-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Adobe Flash Player: Multiple vulnerabilities
 Date: August 15, 2015
 Bugs: #554882, #557342
   ID: 201508-01

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Adobe Flash Player, the
worst of which allows remote attackers to execute arbitrary code.

Background
==

The Adobe Flash Player is a renderer for the SWF file format, which is
commonly used to provide interactive websites.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  www-plugins/adobe-flash11.2.202.508 = 11.2.202.508

Description
===

Multiple vulnerabilities have been discovered in Adobe Flash Player.
Please review the CVE identifiers referenced below for details.

Impact
==

A remote attacker could possibly execute arbitrary code with the
privileges of the process, cause a Denial of Service condition, obtain
sensitive information, or bypass security restrictions.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Adobe Flash Player users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v =www-plugins/adobe-flash-11.2.202.508

References
==

[  1 ] CVE-2015-3107
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3107
[  2 ] CVE-2015-5122
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5122
[  3 ] CVE-2015-5123
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5123
[  4 ] CVE-2015-5124
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5124
[  5 ] CVE-2015-5125
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5125
[  6 ] CVE-2015-5127
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5127
[  7 ] CVE-2015-5129
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5129
[  8 ] CVE-2015-5130
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5130
[  9 ] CVE-2015-5131
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5131
[ 10 ] CVE-2015-5132
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5132
[ 11 ] CVE-2015-5133
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5133
[ 12 ] CVE-2015-5134
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5134
[ 13 ] CVE-2015-5539
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5539
[ 14 ] CVE-2015-5540
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5540
[ 15 ] CVE-2015-5541
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5541
[ 16 ] CVE-2015-5544
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5544
[ 17 ] CVE-2015-5545
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5545
[ 18 ] CVE-2015-5546
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5546
[ 19 ] CVE-2015-5547
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5547
[ 20 ] CVE-2015-5548
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5548
[ 21 ] CVE-2015-5549
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5549
[ 22 ] CVE-2015-5550
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5550
[ 23 ] CVE-2015-5551
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5551
[ 24 ] CVE-2015-5552
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5552
[ 25 ] CVE-2015-5553
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5553
[ 26 ] CVE-2015-5554
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5554
[ 27 ] CVE-2015-
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-
[ 28 ] CVE-2015-5556
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5556
[ 29 ] CVE-2015-5557
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5557
[ 30 ] CVE-2015-5558
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5558
[ 31 ] CVE-2015-5559
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5559
[ 32 ] CVE-2015-5560
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5560
[ 33 ] CVE-2015-5561
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5561
[ 34 ] CVE-2015-5562
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5562
[ 35 ] CVE-2015-5563
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5563
[ 36 ] CVE-2015-5564
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5564
[ 37 ] CVE-2015-5965
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5965

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201508-01

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security 

[gentoo-announce] [ GLSA 201506-04 ] Chromium: Multiple vulnerabilities

2015-06-22 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201506-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Chromium: Multiple vulnerabilities
 Date: June 23, 2015
 Bugs: #545300, #546728, #548108, #549944
   ID: 201506-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been fixed in Chromium, the worst of
which can cause arbitrary remote code execution.

Background
==

Chromium is an open-source web browser project.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  www-client/chromium43.0.2357.65 = 43.0.2357.65

Description
===

Multiple vulnerabilities have been discovered in Chromium. Please
review the CVE identifiers referenced below for details.

Impact
==

A remote attacker can cause arbitrary remote code execution, Denial of
Service or bypass of security mechanisms.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Chromium users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v =www-client/chromium-43.0.2357.65

References
==

[  1 ] CVE-2015-1233
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1233
[  2 ] CVE-2015-1234
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1234
[  3 ] CVE-2015-1235
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1235
[  4 ] CVE-2015-1236
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1236
[  5 ] CVE-2015-1237
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1237
[  6 ] CVE-2015-1238
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1238
[  7 ] CVE-2015-1240
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1240
[  8 ] CVE-2015-1241
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1241
[  9 ] CVE-2015-1242
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1242
[ 10 ] CVE-2015-1243
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1243
[ 11 ] CVE-2015-1244
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1244
[ 12 ] CVE-2015-1245
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1245
[ 13 ] CVE-2015-1246
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1246
[ 14 ] CVE-2015-1247
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1247
[ 15 ] CVE-2015-1248
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1248
[ 16 ] CVE-2015-1250
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1250
[ 17 ] CVE-2015-1251
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1251
[ 18 ] CVE-2015-1252
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1252
[ 19 ] CVE-2015-1253
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1253
[ 20 ] CVE-2015-1254
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1254
[ 21 ] CVE-2015-1255
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1255
[ 22 ] CVE-2015-1256
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1256
[ 23 ] CVE-2015-1257
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1257
[ 24 ] CVE-2015-1258
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1258
[ 25 ] CVE-2015-1259
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1259
[ 26 ] CVE-2015-1260
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1260
[ 27 ] CVE-2015-1262
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1262
[ 28 ] CVE-2015-1263
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1263
[ 29 ] CVE-2015-1264
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1264
[ 30 ] CVE-2015-1265
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1265

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201506-04

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201504-04 ] Xen: Multiple vulnerabilities

2015-04-11 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201504-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
Title: Xen: Multiple vulnerabilities
 Date: April 11, 2015
 Bugs: #478280, #482138, #512294, #519800, #530182, #530980,
   #532030, #536220, #542266, #543304, #545144
   ID: 201504-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Xen, the worst of which can
allow remote attackers to cause a Denial of Service condition.

Background
==

Xen is a bare-metal hypervisor.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-emulation/xen4.4.2-r1   = 4.4.2-r1
 *= 4.2.5-r8

Description
===

Multiple vulnerabilities have been discovered in Xen.  Please review
the CVE identifiers referenced below for details.

Impact
==

A local attacker could possibly cause a Denial of Service condition or
obtain sensitive information.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Xen 4.4 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =app-emulation/xen-4.4.2-r1

All Xen 4.2 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =app-emulation/xen-4.2.5-r8

References
==

[  1 ] CVE-2013-2212
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2212
[  2 ] CVE-2013-3495
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-3495
[  3 ] CVE-2014-3967
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3967
[  4 ] CVE-2014-3968
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3968
[  5 ] CVE-2014-5146
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5146
[  6 ] CVE-2014-5149
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5149
[  7 ] CVE-2014-8594
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8594
[  8 ] CVE-2014-8595
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8595
[  9 ] CVE-2014-8866
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8866
[ 10 ] CVE-2014-8867
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8867
[ 11 ] CVE-2014-9030
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9030
[ 12 ] CVE-2014-9065
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9065
[ 13 ] CVE-2014-9066
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9066
[ 14 ] CVE-2015-0361
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0361
[ 15 ] CVE-2015-2044
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2044
[ 16 ] CVE-2015-2045
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2045
[ 17 ] CVE-2015-2152
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2152
[ 18 ] CVE-2015-2751
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2751
[ 19 ] CVE-2015-2752
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2752
[ 20 ] CVE-2015-2756
   http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2756

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201504-04

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201504-03 ] Apache: Multiple vulnerabilities

2015-04-11 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201504-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Apache: Multiple vulnerabilities
 Date: April 11, 2015
 Bugs: #535948
   ID: 201504-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Apache HTTP Server, the
worst of which could lead to arbitrary code execution.

Background
==

Apache HTTP Server is one of the most popular web servers on the
Internet.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  www-servers/apache2.2.29  = 2.2.29

Description
===

Multiple vulnerabilities have been discovered in Apache HTTP Server.
Please review the CVE identifiers referenced below for details.

Impact
==

A remote attacker may be able to execute arbitrary code or cause a
Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Apache users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =www-servers/apache-2.2.29

References
==

[ 1 ] CVE-2014-0118
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0118
[ 2 ] CVE-2014-0226
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0226
[ 3 ] CVE-2014-0231
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0231
[ 4 ] CVE-2014-5704
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-5704

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201504-03

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201504-05 ] MySQL and MariaDB: Multiple vulnerabilities

2015-04-11 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201504-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
   https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: MySQL and MariaDB: Multiple vulnerabilities
 Date: April 11, 2015
 Bugs: #537216, #537262
   ID: 201504-05

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in MySQL and MariaDB, the
worst of which can allow remote attackers to cause a Denial of Service
condition.

Background
==

MySQL is a popular multi-threaded, multi-user SQL server. MariaDB is an
enhanced, drop-in replacement for MySQL.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  dev-db/mysql  5.6.22  = 5.6.22
  2  dev-db/mariadb   10.0.16 = 10.0.16
---
 2 affected packages

Description
===

Multiple vulnerabilities have been discovered in MySQL and MariaDB.
Please review the CVE identifiers referenced below for details.

Impact
==

A remote attacker could exploit vulnerabilities to possibly cause a
Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All MySQL users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =dev-db/mysql-5.6.22

All MariaDB users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =dev-db/mariadb-10.0.16

References
==

[ 1 ] CVE-2014-6568
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-6568
[ 2 ] CVE-2015-0374
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0374
[ 3 ] CVE-2015-0381
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0381
[ 4 ] CVE-2015-0382
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0382
[ 5 ] CVE-2015-0385
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0385
[ 6 ] CVE-2015-0391
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0391
[ 7 ] CVE-2015-0409
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0409
[ 8 ] CVE-2015-0411
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0411
[ 9 ] CVE-2015-0432
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0432

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 https://security.gentoo.org/glsa/201504-05

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201412-41 ] OpenVPN: Denial of Service

2014-12-26 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201412-41
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: OpenVPN: Denial of Service
 Date: December 26, 2014
 Bugs: #531308
   ID: 201412-41

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A vulnerability in OpenVPN could lead to Denial of Service.

Background
==

OpenVPN is a multi-platform, full-featured SSL VPN solution.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-misc/openvpn  2.3.6= 2.3.6

Description
===

OpenVPN does not properly handle control channel packets that are too
small.

Impact
==

A remote authenticated attacker could send a specially crafted control
channel packet, possibly resulting in a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All OpenVPN users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =net-misc/openvpn-2.3.6

References
==

[ 1 ] CVE-2014-8104
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8104

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201412-41.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201412-42 ] Xen: Denial of Service

2014-12-26 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201412-42
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Xen: Denial of Service
 Date: December 26, 2014
 Bugs: #523524, #524200
   ID: 201412-42

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in Xen, possibly resulting in
Denial of Service.

Background
==

Xen is a bare-metal hypervisor.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-emulation/xen4.4.1-r2  *= 4.2.5-r1
  = 4.4.1-r2

Description
===

Multiple vulnerabilities have been discovered in Xen. Please review the
CVE identifiers referenced below for details.

Impact
==

A local user could possibly cause a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Xen 4.2 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =app-emulation/xen-4.2.5-r1

All Xen 4.4 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =app-emulation/xen-4.4.1-r2

References
==

[ 1 ] CVE-2014-7154
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7154
[ 2 ] CVE-2014-7155
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7155
[ 3 ] CVE-2014-7156
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7156
[ 4 ] CVE-2014-7188
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7188

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201412-42.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201412-43 ] MuPDF: User-assisted execution of arbitrary code

2014-12-26 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201412-43
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: MuPDF: User-assisted execution of arbitrary code
 Date: December 26, 2014
 Bugs: #358029, #498876
   ID: 201412-43

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in MuPDF, possibly resulting
in remote code execution or Denial of Service.

Background
==

MuPDF is a lightweight PDF viewer and toolkit written in portable C.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-text/mupdf1.3_p20140118= 1.3_p20140118

Description
===

Multiple vulnerabilities have been discovered in MuPDF. Please review
the CVE identifier and Secunia Research referenced below for details.

Impact
==

A remote attacker could entice a user to open a specially crafted PDF
using MuPDF, possibly resulting in execution of arbitrary code with the
privileges of the process or a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All MuPDF users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =app-text/mupdf-1.3_p20140118

References
==

[ 1 ] CVE-2014-2013
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2013
[ 2 ] Secunia Research: MuPDF Two Integer Overflow Vulnerabilities
  http://secunia.com/secunia_research/2011-12/

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201412-43.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201412-44 ] policycoreutils: Privilege escalation

2014-12-26 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201412-44
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
Title: policycoreutils: Privilege escalation
 Date: December 26, 2014
 Bugs: #509896
   ID: 201412-44

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


A vulnerability in policycoreutils could lead to local privilege
escalation.

Background
==

policycoreutils is a collection of SELinux policy utilities.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  sys-apps/policycoreutils
  2.2.5-r4   = 2.2.5-r4

Description
===

The seunshare utility is owned by root with 4755 permissions which can
be exploited by a setuid system call.

Impact
==

A local attacker may be able to gain escalated privileges.

Workaround
==

There is no known workaround at this time.

Resolution
==

All policycoreutils users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot -v =sys-apps/policycoreutils-2.2.5-r4

References
==

[ 1 ] CVE-2014-3215
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3215

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201412-44.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201412-46 ] LittleCMS: Denial of Service

2014-12-26 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201412-46
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: LittleCMS: Denial of Service
 Date: December 26, 2014
 Bugs: #479874, #507788
   ID: 201412-46

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple buffer overflow flaws and a parser error in LittleCMS could
cause Denial of Service.

Background
==

LittleCMS, or short lcms, is a color management system for working with
ICC profiles. It is used by many applications including GIMP and
Firefox.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  media-libs/lcms   2.6-r1  = 2.6-r1

Description
===

Multiple stack-based buffer overflows and a profile parser error have
been found in LittleCMS.

Impact
==

A remote attacker could entice a user or automated system to open a
specially crafted file containing a malicious ICC profile, possibly
resulting in a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All LittleCMS users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =media-libs/lcms-2.6-r1

Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying these packages.

NOTE: Gentoo has discontinued support for the LittleCMS 1.9 branch.

References
==

[ 1 ] CVE-2013-4276
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-4276
[ 2 ] CVE-2014-0459
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0459

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201412-46.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201412-34 ] NTP: Multiple vulnerabilities

2014-12-24 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201412-34
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: High
Title: NTP: Multiple vulnerabilities
 Date: December 24, 2014
 Bugs: #533076
   ID: 201412-34

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in NTP, the worst of which
could result in remote execution of arbitrary code.

Background
==

NTP is a protocol designed to synchronize the clocks of computers over
a network. The net-misc/ntp package contains the official reference
implementation by the NTP Project.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-misc/ntp  4.2.8= 4.2.8

Description
===

Multiple vulnerabilities have been discovered in NTP. Please review the
CVE identifiers referenced below for details.

Impact
==

A remote unauthenticated attacker may be able to execute arbitrary code
with the privileges of the process, cause a Denial of Service
condition, and obtain sensitive information that could assist in other
attacks.

Workaround
==

There is no known workaround at this time.

Resolution
==

All NTP users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =net-misc/ntp-4.2.8

References
==

[ 1 ] CVE-2014-9293
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9293
[ 2 ] CVE-2014-9294
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9294
[ 3 ] CVE-2014-9295
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9295
[ 4 ] CVE-2014-9296
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-9296

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201412-34.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201412-35 ] RSYSLOG: Denial of Service

2014-12-24 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201412-35
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: RSYSLOG: Denial of Service
 Date: December 24, 2014
 Bugs: #395709, #491856, #524058, #524290
   ID: 201412-35

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in RSYSLOG, allowing attackers
to cause Denial of Service.

Background
==

RSYSLOG is an enhanced multi-threaded syslogd with database support and
more.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-admin/rsyslog 8.4.2= 8.4.2

Description
===

Multiple vulnerabilities have been discovered in RSYSLOG. Please review
the CVE identifiers referenced below for details.

Impact
==

A context-dependent attacker may be able to create a Denial of Service
condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All RSYSLOG users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =app-admin/rsyslog-8.4.2

References
==

[ 1 ] CVE-2011-4623
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4623
[ 2 ] CVE-2014-3634
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3634
[ 3 ] CVE-2014-3683
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3683

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201412-35.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201412-37 ] QEMU: Multiple Vulnerabilities

2014-12-24 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201412-37
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: QEMU: Multiple Vulnerabilities
 Date: December 24, 2014
 Bugs: #528922, #529030, #531666
   ID: 201412-37

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been found in QEMU, the worst of which
could result in execution of arbitrary code or Denial of Service.

Background
==

QEMU is a generic and open source machine emulator and virtualizer.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  app-emulation/qemu   2.1.2-r2   = 2.1.2-r2

Description
===

Multiple vulnerabilities have been discovered in QEMU. Please review
the CVE identifiers referenced below for details.

Impact
==

A context-dependent attacker may be able to execute arbitrary code,
cause a Denial of Service condition, obtain sensitive information, or
bypass security restrictions.

Workaround
==

There is no known workaround at this time.

Resolution
==

All QEMU users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =app-emulation/qemu-2.1.2-r2

References
==

[ 1 ] CVE-2014-3689
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-3689
[ 2 ] CVE-2014-7840
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-7840
[ 3 ] CVE-2014-8106
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-8106

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201412-37.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201406-36 ] OpenLDAP: Multiple vulnerabilities

2014-06-30 Thread Yury German
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201406-36
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: OpenLDAP: Multiple vulnerabilities
 Date: June 30, 2014
 Bugs: #290345, #323777, #355333, #388605, #407941, #424167
   ID: 201406-36

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities were found in OpenLDAP, allowing for Denial of
Service or a man-in-the-middle attack.

Background
==

OpenLDAP is an LDAP suite of application and development tools.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-nds/openldap  2.4.35  = 2.4.35

Description
===

Multiple vulnerabilities have been discovered in OpenLDAP. Please
review the CVE identifiers referenced below for details.

Impact
==

A remote attacker might employ a specially crafted certificate to
conduct man-in-the-middle attacks on SSL connections made using
OpenLDAP, bypass security restrictions or cause a Denial of Service
condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All OpenLDAP users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =net-nds/openldap-2.4.35

References
==

[ 1 ] CVE-2009-3767
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-3767
[ 2 ] CVE-2010-0211
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0211
[ 3 ] CVE-2010-0212
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-0212
[ 4 ] CVE-2011-1024
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1024
[ 5 ] CVE-2011-1025
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1025
[ 6 ] CVE-2011-1081
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1081
[ 7 ] CVE-2011-4079
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4079
[ 8 ] CVE-2012-1164
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-1164
[ 9 ] CVE-2012-2668
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2668

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201406-36.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature


[gentoo-announce] [ GLSA 201406-25 ] Asterisk: Multiple vulnerabilities

2014-06-25 Thread Yury German

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory   GLSA 201406-25
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

 Severity: Normal
Title: Asterisk: Multiple vulnerabilities
 Date: June 25, 2014
 Bugs: #513102
   ID: 201406-25

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis


Multiple vulnerabilities have been discovered in Asterisk, the worst of
which could allow privileged users to execute arbitrary system shell
commands.

Background
==

Asterisk is an open source telephony engine and toolkit.

Affected packages
=

---
 Package  / Vulnerable /Unaffected
---
  1  net-misc/asterisk11.10.2   *= 1.8.28.2
   = 11.10.2

Description
===

Multiple vulnerabilities have been discovered in Asterisk. Please
review the CVE identifiers below for details.

Impact
==

A remote attacker that gains access to a privileged Asterisk account
can execute arbitrary system shell commands. Furthermore an
unprivileged remote attacker could cause a Denial of Service condition.

Workaround
==

There is no known workaround at this time.

Resolution
==

All Asterisk 11 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =net-misc/asterisk-11.10.2

All Asterisk 1.8 users should upgrade to the latest version:

  # emerge --sync
  # emerge --ask --oneshot --verbose =net-misc/asterisk-1.8.28.2

References
==

[ 1 ] CVE-2014-4046
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4046
[ 2 ] CVE-2014-4047
  http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-4047

Availability


This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

 http://security.gentoo.org/glsa/glsa-201406-25.xml

Concerns?
=

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
secur...@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
===

Copyright 2014 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



signature.asc
Description: OpenPGP digital signature