The following 6 security updates has been released for Gentoo Linux: [ GLSA 201311-22 ] Namazu: Multiple vulnerabilities, [ GLSA 201311-21 ] cpio: Arbitrary code execution, [ GLSA 201311-20 ] Okular: Arbitrary code execution, [ GLSA 201311-19 ] rssh: Access restriction bypass, [ GLSA 201311-18 ] Unbound: Denial of Service, and [ GLSA 201311-17 ] Perl: Multiple vulnerabilities
[ GLSA 201311-22 ] Namazu: Multiple vulnerabilities
[ GLSA 201311-22 ] Namazu: Multiple vulnerabilities
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -[ GLSA 201311-21 ] cpio: Arbitrary code execution
Gentoo Linux Security Advisory GLSA 201311-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Namazu: Multiple vulnerabilities
Date: November 28, 2013
Bugs: #391259
ID: 201311-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Namazu, worst of which
allows remote attackers to cause a Denial of Service condition.
Background
==========
Namazu is a full-text search engine intended for easy use.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-text/namazu < 2.0.21 >= 2.0.21
Description
===========
Multiple vulnerabilities have been discovered in Namazu. Please review
the CVE identifiers referenced below for details.
Impact
======
A remote attacker could execute arbitrary code or cause a Denial of
Service condition.
Furthermore, a remote attacker may be able to inject arbitrary web
script or HTML via a cookie.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Namazu users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-text/namazu-2.0.21"
References
==========
[ 1 ] CVE-2009-5028
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2009-5028
[ 2 ] CVE-2011-4345
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4345
[ 3 ] CVE-2011-4711
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4711
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201311-22.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2013 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -[ GLSA 201311-20 ] Okular: Arbitrary code execution
Gentoo Linux Security Advisory GLSA 201311-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: cpio: Arbitrary code execution
Date: November 28, 2013
Bugs: #314663
ID: 201311-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A heap-based buffer overflow in cpio might allow a remote rmt server to
execute arbitrary code or cause a Denial of Service condition.
Background
==========
GNU cpio copies files into or out of a cpio or tar archive.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-arch/cpio < 2.11 >= 2.11
Description
===========
Cpio contains a heap-based buffer overflow in the rmt_read__ function
in lib/rtapelib.c.
Impact
======
A remote server could sending more data than was requested, related to
archive filenames that contain a : (colon) character, possibly
resulting in execution of arbitrary code or a Denial of Service
condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All cpio users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-arch/cpio-2.11"
References
==========
[ 1 ] CVE-2010-0624
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0624
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201311-21.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2013 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -[ GLSA 201311-19 ] rssh: Access restriction bypass
Gentoo Linux Security Advisory GLSA 201311-20
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Okular: Arbitrary code execution
Date: November 28, 2013
Bugs: #334469
ID: 201311-20
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
A heap-based buffer overflow in Okular might allow a remote attacker to
execute arbitrary code or cause a Denial of Service condition.
Background
==========
Okular is a universal document viewer based on KPDF for KDE 4.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 kde-base/okular < 4.4.5-r2 >= 4.4.5-r2
Description
===========
Okular contains a heap-based buffer overflow in the RLE decompression
functionality in the TranscribePalmImageToJPEG function in
generators/plucker/inplug/image.cpp.
Impact
======
A remote attacker could entice a user to open a specially crafted PBD
file using Okular, possibly resulting in execution of arbitrary code
with the privileges of the process, or a Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Okular users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=kde-base/okular-4.4.5-r2"
References
==========
[ 1 ] CVE-2010-2575
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-2575
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201311-20.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2013 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -[ GLSA 201311-18 ] Unbound: Denial of Service
Gentoo Linux Security Advisory GLSA 201311-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: rssh: Access restriction bypass
Date: November 28, 2013
Bugs: #415255, #445166
ID: 201311-19
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in rssh, allowing local
attackers to bypass access restrictions.
Background
==========
rssh is a restricted shell, allowing only a few commands like scp or
sftp. It is often used as a complement to OpenSSH to provide limited
access to users.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-shells/rssh < 2.3.4 >= 2.3.4
Description
===========
Multiple command line parsing and validation vulnerabilities have been
discovered in rssh. Please review the CVE identifiers referenced below
for details.
Impact
======
Multiple parsing and validation vulnerabilities can cause the
restrictions set up by rssh to be bypassed.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All rssh users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-shells/rssh-2.3.4"
References
==========
[ 1 ] CVE-2012-2252
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-2252
[ 2 ] CVE-2012-3478
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-3478
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201311-19.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2013 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -[ GLSA 201311-17 ] Perl: Multiple vulnerabilities
Gentoo Linux Security Advisory GLSA 201311-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: Unbound: Denial of Service
Date: November 28, 2013
Bugs: #395287
ID: 201311-18
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple Denial of Service vulnerabilities have been found in Unbound.
Background
==========
Unbound is a validating, recursive, and caching DNS resolver.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-dns/unbound < 1.4.13_p2 >= 1.4.13_p2
Description
===========
Multiple vulnerabilities have been discovered in Unbound. Please review
the CVE identifiers referenced below for details.
Impact
======
A remote attacker could possibly cause a Denial of Service condition
via a specially crafted response.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Unbound users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-dns/unbound-1.4.13_p2"
References
==========
[ 1 ] CVE-2011-4528
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4528
[ 2 ] CVE-2011-4869
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4869
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201311-18.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2013 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201311-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: Perl: Multiple vulnerabilities
Date: November 28, 2013
Bugs: #249629, #313565, #362025, #386357
ID: 201311-17
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities were found in Perl, the worst of which could
allow a local attacker to cause a Denial of Service condition.
Background
==========
Perl is Larry Wall's Practical Extraction and Report Language.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-lang/perl < 5.12.3-r1 >= 5.12.3-r1
Description
===========
Multiple vulnerabilities have been discovered in Perl. Please review
the CVE identifiers referenced below for details.
Impact
======
A local attacker could cause a Denial of Service condition or perform
symlink attacks to overwrite arbitrary files with the privileges of the
user running the application. A context-dependent attacker could cause
a Denial of Service condition.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Perl users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/perl-5.12.3-r1"
References
==========
[ 1 ] CVE-2008-5302
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5302
[ 2 ] CVE-2008-5303
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-5303
[ 3 ] CVE-2010-1158
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1158
[ 4 ] CVE-2011-0761
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-0761
[ 5 ] CVE-2011-1487
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-1487
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201311-17.xml
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2013 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5