Gentoo 2510 Published by

The following updates has been released for Gentoo Linux:

[ GLSA 201510-02 ] QEMU: Arbitrary code execution
[ GLSA 201510-03 ] Wireshark: Multiple vulnerabilities
[ GLSA 201510-04 ] tcpdump: Multiple vulnerabilities
[ GLSA 201510-05 ] MediaWiki: Multiple vulnerabilities
[ GLSA 201510-06 ] Django: Multiple vulnerabilities
[ GLSA 201510-07 ] CUPS: Multiple vulnerabilities
[ GLSA 201510-08 ] cups-filters: Multiple vulnerabilities



[ GLSA 201510-02 ] QEMU: Arbitrary code execution

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201510-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: QEMU: Arbitrary code execution
Date: October 31, 2015
Bugs: #551752, #555680, #556050, #556052
ID: 201510-02

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A heap-based buffer overflow in QEMU could result in execution of
arbitrary code.

Background
==========

QEMU is a generic and open source machine emulator and virtualizer.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-emulation/qemu < 2.3.0-r4 >= 2.3.0-r4

Description
===========

Heap-based buffer overflow has been found in QEMU's PCNET controller.

Impact
======

A remote attacker could execute arbitrary code via a specially crafted
packets.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All QEMU users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.3.0-r4"

References
==========

[ 1 ] CVE-2015-3209
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3209
[ 2 ] CVE-2015-3214
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3214
[ 3 ] CVE-2015-5154
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5154
[ 4 ] CVE-2015-5158
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5158

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201510-02

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



[ GLSA 201510-03 ] Wireshark: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201510-03
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Wireshark: Multiple vulnerabilities
Date: October 31, 2015
Bugs: #536034, #542206, #548898, #549432, #552434, #557522
ID: 201510-03

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in Wireshark, allowing
attackers to cause Denial of Service condition.

Background
==========

Wireshark is a network protocol analyzer formerly known as ethereal.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-analyzer/wireshark < 1.12.7 >= 1.12.7

Description
===========

Multiple vulnerabilities have been discovered in Wireshark. Please
review the CVE identifiers referenced below for details.

Impact
======

A remote attacker could possibly cause a Denial of Service condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Wireshark users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.12.7"

References
==========

[ 1 ] CVE-2015-2187
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2187
[ 2 ] CVE-2015-2188
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2188
[ 3 ] CVE-2015-2189
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2189
[ 4 ] CVE-2015-2190
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2190
[ 5 ] CVE-2015-2191
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2191
[ 6 ] CVE-2015-2192
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2192
[ 7 ] CVE-2015-3182
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3182
[ 8 ] CVE-2015-3808
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3808
[ 9 ] CVE-2015-3809
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3809
[ 10 ] CVE-2015-3810
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3810
[ 11 ] CVE-2015-3811
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3811
[ 12 ] CVE-2015-3812
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3812
[ 13 ] CVE-2015-3813
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3813
[ 14 ] CVE-2015-3814
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3814
[ 15 ] CVE-2015-3815
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3815
[ 16 ] CVE-2015-3906
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3906
[ 17 ] CVE-2015-4651
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4651
[ 18 ] CVE-2015-4652
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-4652

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201510-03

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



[ GLSA 201510-04 ] tcpdump: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201510-04
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: tcpdump: Multiple vulnerabilities
Date: October 31, 2015
Bugs: #552632
ID: 201510-04

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in tcpdump, the worst of which
can allow remote attackers to cause Denial of Service condition or
executive arbitrary code.

Background
==========

tcpdump is a Tool for network monitoring and data acquisition.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-analyzer/tcpdump < 4.7.4 >= 4.7.4

Description
===========

Multiple vulnerabilities have been discovered in tcpdump. Please review
the CVE identifiers referenced below for details.

Impact
======

A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All tcpdump users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-analyzer/tcpdump-4.7.4"

References
==========

[ 1 ] CVE-2015-0261
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-0261
[ 2 ] CVE-2015-2153
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2153
[ 3 ] CVE-2015-2154
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2154
[ 4 ] CVE-2015-2155
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2155

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201510-04

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



[ GLSA 201510-05 ] MediaWiki: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201510-05
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: MediaWiki: Multiple vulnerabilities
Date: October 31, 2015
Bugs: #545944, #557844
ID: 201510-05

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in MediaWiki, the worst of
which may allow remote attackers to cause a Denial of Service.

Background
==========

MediaWiki is a collaborative editing software used by large projects
such as Wikipedia.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 www-apps/mediawiki < 1.25.2 >= 1.25.2
*>= 1.24.3
*>= 1.23.10

Description
===========

Multiple vulnerabilities have been discovered in MediaWiki. Please
review the CVE identifiers referenced below for details.

Impact
======

A remote attacker may be able to create a Denial of Service condition,
obtain sensitive information, bypass security restrictions, and inject
arbitrary web script or HTML.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All MediaWiki 1.25 users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.25.2"

All MediaWiki 1.24 users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.24.3"

All MediaWiki 1.23 users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.23.10"

References
==========

[ 1 ] CVE-2015-2931
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2931
[ 2 ] CVE-2015-2932
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2932
[ 3 ] CVE-2015-2933
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2933
[ 4 ] CVE-2015-2934
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2934
[ 5 ] CVE-2015-2935
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2935
[ 6 ] CVE-2015-2936
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2936
[ 7 ] CVE-2015-2937
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2937
[ 8 ] CVE-2015-2938
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2938
[ 9 ] CVE-2015-2939
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2939
[ 10 ] CVE-2015-2940
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2940
[ 11 ] CVE-2015-2941
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2941
[ 12 ] CVE-2015-2942
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-2942
[ 13 ] CVE-2015-6728
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6728
[ 14 ] CVE-2015-6729
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6729
[ 15 ] CVE-2015-6730
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6730
[ 16 ] CVE-2015-6731
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6731
[ 17 ] CVE-2015-6732
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6732
[ 18 ] CVE-2015-6733
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6733
[ 19 ] CVE-2015-6734
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6734
[ 20 ] CVE-2015-6735
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6735
[ 21 ] CVE-2015-6736
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6736
[ 22 ] CVE-2015-6737
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6737

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201510-05

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



[ GLSA 201510-06 ] Django: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201510-06
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Django: Multiple vulnerabilities
Date: October 31, 2015
Bugs: #554864
ID: 201510-06

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in Django, the worst of which
may allow a remote attacker to cause Denial of Service.

Background
==========

Django is a Python-based web framework.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-python/django < 1.8.3 >= 1.8.3
*>= 1.7.9
*>= 1.4.21

Description
===========

Multiple vulnerabilities have been found in Django:

* Session backends create a new record anytime request.session was
accessed (CVE-2015-5143)
* Built-in validators in Django do not properly sanitize input
(CVE-2015-5144)
* URL validation included a regular expression that was extremely slow
(CVE-2015-5145)

Impact
======

A remote attacker may be able cause a Denial of Service condition,
inject arbitrary headers, and conduct HTTP response splitting attacks.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Django 1.8 users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-python/django-1.8.3"

All Django 1.7 users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-python/django-1.7.9"

All Django 1.4 users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-python/django-1.4.21"

References
==========

[ 1 ] CVE-2015-5143
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5143
[ 2 ] CVE-2015-5144
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5144
[ 3 ] CVE-2015-5145
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-5145

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201510-06

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



[ GLSA 201510-07 ] CUPS: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201510-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: CUPS: Multiple vulnerabilities
Date: October 31, 2015
Bugs: #551846
ID: 201510-07

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in CUPS, the worst of which
could lead to arbitrary code execution.

Background
==========

CUPS, the Common Unix Printing System, is a full-featured print server.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-print/cups < 2.0.3 >= 2.0.3

Description
===========

Multiple vulnerabilities have been discovered in cups. Please review
the CVE identifiers referenced below for details.

Impact
======

A remote attacker could possibly execute arbitrary code with the
privileges of the process, or cause a Denial of Service condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All CUPS users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-print/cups-2.0.3"

References
==========

[ 1 ] CVE-2015-1158
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1158
[ 2 ] CVE-2015-1159
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1159

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201510-07

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5



[ GLSA 201510-08 ] cups-filters: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201510-08
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: cups-filters: Multiple vulnerabilities
Date: October 31, 2015
Bugs: #553644, #553836
ID: 201510-08

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in cups-filters, the worst of
which could lead to arbitrary code execution.

Background
==========

cups-filters is an OpenPrinting CUPS Filters.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-print/cups-filters < 1.0.71 >= 1.0.71

Description
===========

Multiple vulnerabilities have been discovered in cups-filters. Please
review the CVE identifiers referenced below for details.

Impact
======

A remote attacker could entice a user to open a specially crafted print
job using cups-filters, possibly resulting in execution of arbitrary
code with the privileges of the process or a Denial of Service
condition.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All cups-filters users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-print/cups-filters-1.0.71"

References
==========

[ 1 ] CVE-2015-3258
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3258
[ 2 ] CVE-2015-3279
http://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-3279

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201510-08

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2015 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5