Gentoo 2510 Published by

The following updates has been released for Gentoo Linux:

GLSA 201904-01 : Cairo: Denial of Service
GLSA 201904-02 : Libical: Multiple vulnerabilities
GLSA 201904-03 : Unbound: Multiple vulnerabilities
GLSA 201904-04 : Poppler: Multiple vulnerabilities
GLSA 201904-05 : BURP: Root privilege escalation
GLSA 201904-06 : GlusterFS: Multiple Vulnerabilities
GLSA 201904-07 : Mozilla Thunderbird and Firefox: Multiple vulnerabilities
GLSA 201904-08 : Subversion: Denial of Service



GLSA 201904-01 : Cairo: Denial of Service

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201904-01
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Cairo: Denial of Service
Date: April 02, 2019
Bugs: #596756, #625636, #672908
ID: 201904-01

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities were found in Cairo, the worst of which could
cause a Denial of Service condition.

Background
==========

Cairo is a 2D vector graphics library with cross-device output support.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 x11-libs/cairo < 1.16.0-r3 >= 1.16.0-r3

Description
===========

Multiple vulnerabilities have been discovered in Cairo. Please review
the CVE identifiers referenced below for details.

Impact
======

Please review the referenced CVE identifiers for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Cairo users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=x11-libs/cairo-1.16.0-r2"

References
==========

[ 1 ] CVE-2016-9082
https://nvd.nist.gov/vuln/detail/CVE-2016-9082
[ 2 ] CVE-2017-9814
https://nvd.nist.gov/vuln/detail/CVE-2017-9814

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-01

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



GLSA 201904-02 : Libical: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201904-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Libical: Multiple vulnerabilities
Date: April 02, 2019
Bugs: #587572, #587574
ID: 201904-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in Libical, the worst of which
could result in a Denial of Service condition.

Background
==========

An Open Source implementation of the iCalendar protocols and protocol
data units.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-libs/libical < 3.0.0 >= 3.0.0

Description
===========

Multiple vulnerabilities have been discovered in Libical. Please review
the referenced CVE identifiers for details.

Impact
======

Please review the referenced CVE identifiers for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Libical users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/libical-3.0.0"

References
==========

[ 1 ] CVE-2016-5823
https://nvd.nist.gov/vuln/detail/CVE-2016-5823
[ 2 ] CVE-2016-5824
https://nvd.nist.gov/vuln/detail/CVE-2016-5824

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-02

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



GLSA 201904-03 : Unbound: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201904-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Unbound: Multiple vulnerabilities
Date: April 02, 2019
Bugs: #641042, #677054
ID: 201904-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in Unbound, the worst of which
could lead to privilege escalation.

Background
==========

Unbound is a validating, recursive, and caching DNS resolver.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/unbound < 1.8.3 >= 1.8.3

Description
===========

Multiple vulnerabilities have been discovered in Unbound. Please review
the referenced bugs for details.

Impact
======

Please review the referenced bugs for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Unbound users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/unbound-1.8.3"

References
==========


Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-03

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



GLSA 201904-04 : Poppler: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201904-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Poppler: Multiple vulnerabilities
Date: April 02, 2019
Bugs: #659828, #670880
ID: 201904-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in Poppler, the worst of which
could allow a Denial of Service.

Background
==========

Poppler is a PDF rendering library based on the xpdf-3.0 code base.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-text/poppler < 0.70.0 >= 0.70.0

Description
===========

Multiple vulnerabilities have been discovered in Poppler. Please review
the CVE identifiers referenced below for details.

Impact
======

Please review the referenced CVE identifiers for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Poppler users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/poppler-0.70.0"

References
==========

[ 1 ] CVE-2018-19149
https://nvd.nist.gov/vuln/detail/CVE-2018-19149

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-04

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



GLSA 201904-05 : BURP: Root privilege escalation

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201904-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: BURP: Root privilege escalation
Date: April 02, 2019
Bugs: #641842
ID: 201904-05

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A vulnerability was discovered in Gentoo's ebuild for BURP which could
lead to root privilege escalation.

Background
==========

A network backup and restore program.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-backup/burp < 2.1.32-r1 >= 2.1.32-r1

Description
===========

It was discovered that Gentoo’s BURP ebuild does not properly set
permissions or place the pid file in a safe directory. Additionally,
the first set of patches did not completely address this. As such, a
revision has been made available that addresses all concerns of the
initial report.

Impact
======

A local attacker could escalate privileges.

Workaround
==========

Users should ensure the proper permissions are set as discussed in the
referenced bugs.

Resolution
==========

All BURP users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-backup/burp-2.1.32-r1"

References
==========

[ 1 ] CVE-2017-18285
https://nvd.nist.gov/vuln/detail/CVE-2017-18285

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-05

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



GLSA 201904-06 : GlusterFS: Multiple Vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201904-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: GlusterFS: Multiple Vulnerabilities
Date: April 02, 2019
Bugs: #653070, #658606, #664336, #670088
ID: 201904-06

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in GlusterFS, the worst of
which could result in the execution of arbitrary code.

Background
==========

A free and open source software scalable network filesystem.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 sys-cluster/glusterfs < 4.1.8 >= 4.1.8

Description
===========

Multiple vulnerabilities have been discovered in GlusterFS. Please
review the referenced CVE identifiers for details.

Impact
======

Please review the referenced CVE identifiers for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All GlusterFS users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-cluster/glusterfs-4.1.8"

References
==========

[ 1 ] CVE-2018-10841
https://nvd.nist.gov/vuln/detail/CVE-2018-10841
[ 2 ] CVE-2018-1088
https://nvd.nist.gov/vuln/detail/CVE-2018-1088
[ 3 ] CVE-2018-10904
https://nvd.nist.gov/vuln/detail/CVE-2018-10904
[ 4 ] CVE-2018-10907
https://nvd.nist.gov/vuln/detail/CVE-2018-10907
[ 5 ] CVE-2018-10911
https://nvd.nist.gov/vuln/detail/CVE-2018-10911
[ 6 ] CVE-2018-10913
https://nvd.nist.gov/vuln/detail/CVE-2018-10913
[ 7 ] CVE-2018-10914
https://nvd.nist.gov/vuln/detail/CVE-2018-10914
[ 8 ] CVE-2018-10923
https://nvd.nist.gov/vuln/detail/CVE-2018-10923
[ 9 ] CVE-2018-10924
https://nvd.nist.gov/vuln/detail/CVE-2018-10924
[ 10 ] CVE-2018-10926
https://nvd.nist.gov/vuln/detail/CVE-2018-10926
[ 11 ] CVE-2018-10927
https://nvd.nist.gov/vuln/detail/CVE-2018-10927
[ 12 ] CVE-2018-10928
https://nvd.nist.gov/vuln/detail/CVE-2018-10928
[ 13 ] CVE-2018-10929
https://nvd.nist.gov/vuln/detail/CVE-2018-10929
[ 14 ] CVE-2018-10930
https://nvd.nist.gov/vuln/detail/CVE-2018-10930
[ 15 ] CVE-2018-14651
https://nvd.nist.gov/vuln/detail/CVE-2018-14651
[ 16 ] CVE-2018-14652
https://nvd.nist.gov/vuln/detail/CVE-2018-14652
[ 17 ] CVE-2018-14653
https://nvd.nist.gov/vuln/detail/CVE-2018-14653
[ 18 ] CVE-2018-14654
https://nvd.nist.gov/vuln/detail/CVE-2018-14654
[ 19 ] CVE-2018-14659
https://nvd.nist.gov/vuln/detail/CVE-2018-14659
[ 20 ] CVE-2018-14660
https://nvd.nist.gov/vuln/detail/CVE-2018-14660
[ 21 ] CVE-2018-14661
https://nvd.nist.gov/vuln/detail/CVE-2018-14661

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-06

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



GLSA 201904-07 : Mozilla Thunderbird and Firefox: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201904-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Mozilla Thunderbird and Firefox: Multiple vulnerabilities
Date: April 02, 2019
Bugs: #676954, #678072, #681834, #681836
ID: 201904-07

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in Mozilla Thunderbird and
Firefox, the worst of which could lead to the execution of arbitrary
code.

Background
==========

Mozilla Thunderbird is a popular open-source email client from the
Mozilla project.
Mozilla Firefox is a popular open-source web browser from the Mozilla
Project.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 mail-client/thunderbird < 60.6.1 >= 60.6.1
2 mail-client/thunderbird-bin
< 60.6.1 >= 60.6.1
3 www-client/firefox < 60.6.1 >= 60.6.1
4 www-client/firefox-bin < 60.6.1 >= 60.6.1
-------------------------------------------------------------------
4 affected packages

Description
===========

Multiple vulnerabilities have been discovered in Mozilla Thunderbird
and Firefox. Please review the referenced Mozilla Foundation Security
Advisories and CVE identifiers below for details.

Impact
======

Please review the referenced Mozilla Foundation Security Advisories and
CVE identifiers below for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Thunderbird users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/thunderbird-60.6.1"

All Thunderbird bin users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot -v ">=mail-client/thunderbird-bin-60.6.1"

All Firefox users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/firefox-60.6.1"

All Firefox bin users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-client/firefox-bin-60.6.1"

References
==========

[ 1 ] CVE-2016-5824
https://nvd.nist.gov/vuln/detail/CVE-2016-5824
[ 2 ] CVE-2018-18335
https://nvd.nist.gov/vuln/detail/CVE-2018-18335
[ 3 ] CVE-2018-18356
https://nvd.nist.gov/vuln/detail/CVE-2018-18356
[ 4 ] CVE-2018-18500
https://nvd.nist.gov/vuln/detail/CVE-2018-18500
[ 5 ] CVE-2018-18501
https://nvd.nist.gov/vuln/detail/CVE-2018-18501
[ 6 ] CVE-2018-18505
https://nvd.nist.gov/vuln/detail/CVE-2018-18505
[ 7 ] CVE-2018-18506
https://nvd.nist.gov/vuln/detail/CVE-2018-18506
[ 8 ] CVE-2018-18509
https://nvd.nist.gov/vuln/detail/CVE-2018-18509
[ 9 ] CVE-2018-18512
https://nvd.nist.gov/vuln/detail/CVE-2018-18512
[ 10 ] CVE-2018-18513
https://nvd.nist.gov/vuln/detail/CVE-2018-18513
[ 11 ] CVE-2019-5785
https://nvd.nist.gov/vuln/detail/CVE-2019-5785
[ 12 ] CVE-2019-9788
https://nvd.nist.gov/vuln/detail/CVE-2019-9788
[ 13 ] CVE-2019-9790
https://nvd.nist.gov/vuln/detail/CVE-2019-9790
[ 14 ] CVE-2019-9791
https://nvd.nist.gov/vuln/detail/CVE-2019-9791
[ 15 ] CVE-2019-9792
https://nvd.nist.gov/vuln/detail/CVE-2019-9792
[ 16 ] CVE-2019-9793
https://nvd.nist.gov/vuln/detail/CVE-2019-9793
[ 17 ] CVE-2019-9795
https://nvd.nist.gov/vuln/detail/CVE-2019-9795
[ 18 ] CVE-2019-9796
https://nvd.nist.gov/vuln/detail/CVE-2019-9796
[ 19 ] CVE-2019-9810
https://nvd.nist.gov/vuln/detail/CVE-2019-9810
[ 20 ] CVE-2019-9813
https://nvd.nist.gov/vuln/detail/CVE-2019-9813

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-07

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



GLSA 201904-08 : Subversion: Denial of Service

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201904-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Subversion: Denial of Service
Date: April 02, 2019
Bugs: #676094
ID: 201904-08

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A vulnerability in Subversion could lead to a Denial of Service
condition.

Background
==========

Subversion is a version control system intended to eventually replace
CVS. Like CVS, it has an optional client-server architecture (where the
server can be an Apache server running mod_svn, or an ssh program as in
CVS’s :ext: method). In addition to supporting the features found in
CVS, Subversion also provides support for moving and copying files and
directories.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-vcs/subversion < 1.10.4 >= 1.10.4

Description
===========

A vulnerability was discovered in Subversion's mod_dav_svn, that could
lead to a Denial of Service Condition.

Impact
======

An attacker could cause a possible enial of Service condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Subversion users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-vcs/subversion-1.10.4"

References
==========

[ 1 ] CVE-2018-11803
https://nvd.nist.gov/vuln/detail/CVE-2018-11803

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-08

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5