Gentoo 2510 Published by

The following updates has been released for Gentoo Linux:

GLSA 201904-10 : Mailman: Multiple vulnerabilities
GLSA 201904-11 : Portage: Man-in-the-middle
GLSA 201904-12 : ClamAV: Multiple vulnerabilities



GLSA 201904-10 : Mailman: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201904-10
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Mailman: Multiple vulnerabilities
Date: April 08, 2019
Bugs: #662902
ID: 201904-10

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in Mailman, the worst of which
could result in the arbitrary execution of code.

Background
==========

Mailman is a Python based mailing list server with an extensive web
interface.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-mail/mailman < 2.1.29 >= 2.1.29

Description
===========

Multiple vulnerabilities have been discovered in Mailman. Please review
the referenced CVE identifier for details.

Impact
======

Please review the referenced CVE identifiers for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Mailman users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=net-mail/mailman-2.1.29"

References
==========

[ 1 ] CVE-2018-0618
https://nvd.nist.gov/vuln/detail/CVE-2018-0618
[ 2 ] CVE-2018-13796
https://nvd.nist.gov/vuln/detail/CVE-2018-13796

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-10

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



GLSA 201904-11 : Portage: Man-in-the-middle

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201904-11
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: Portage: Man-in-the-middle
Date: April 08, 2019
Bugs: #646212
ID: 201904-11

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

A vulnerability in emerge-delta-webrsync and Portage could result in a
man-in-the-middle attack.

Background
==========

Portage is the package management and distribution system for Gentoo.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-portage/emerge-delta-webrsync
< 3.7.4 >= 3.7.4
2 sys-apps/portage < 2.3.22 >= 2.3.22
-------------------------------------------------------------------
2 affected packages

Description
===========

A vulnerability was discovered in emerge-delta-webrsync and Portage
that did not properly validate the revocation status of GPG keys.

Impact
======

A remote attacker could conduct a man-in-the-middle attack. Please
review the referenced bug for specific details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All emerge-delta-webrsync users should upgrade to the latest version:

# emerge --sync
# emerge -a --oneshot -v ">=app-portage/emerge-delta-webrsync-3.7.4"

All Portage users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-apps/portage-2.3.22"

References
==========


Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-11

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5



GLSA 201904-12 : ClamAV: Multiple vulnerabilities

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 201904-12
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Severity: Normal
Title: ClamAV: Multiple vulnerabilities
Date: April 08, 2019
Bugs: #660820, #667900, #681840
ID: 201904-12

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

Multiple vulnerabilities have been found in ClamAV, the worst of which
could result in a Denial of Service condition.

Background
==========

ClamAV is a GPL virus scanner.

Affected packages
=================

-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-antivirus/clamav < 0.101.2 >= 0.101.2

Description
===========

Multiple vulnerabilities have been discovered in ClamAV. Please review
the CVE identifiers referenced below for details.

Impact
======

Please review the referenced CVE identifiers for details.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All ClamAV users should upgrade to the latest version:

# emerge --sync
# emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.101.2"

References
==========

[ 1 ] CVE-2018-0360
https://nvd.nist.gov/vuln/detail/CVE-2018-0360
[ 2 ] CVE-2018-0361
https://nvd.nist.gov/vuln/detail/CVE-2018-0361
[ 3 ] CVE-2018-15378
https://nvd.nist.gov/vuln/detail/CVE-2018-15378
[ 4 ] CVE-2019-1785
https://nvd.nist.gov/vuln/detail/CVE-2019-1785
[ 5 ] CVE-2019-1786
https://nvd.nist.gov/vuln/detail/CVE-2019-1786
[ 6 ] CVE-2019-1787
https://nvd.nist.gov/vuln/detail/CVE-2019-1787
[ 7 ] CVE-2019-1788
https://nvd.nist.gov/vuln/detail/CVE-2019-1788
[ 8 ] CVE-2019-1789
https://nvd.nist.gov/vuln/detail/CVE-2019-1789
[ 9 ] CVE-2019-1798
https://nvd.nist.gov/vuln/detail/CVE-2019-1798

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201904-12

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=======

Copyright 2019 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5