Gentoo Archives: gentoo-announce

From: Sean Amoss <ackle@g.o>
To: gentoo-announce@l.g.o
Subject: [gentoo-announce] [ GLSA 201412-11 ] AMD64 x86 emulation base libraries: Multiple vulnerabilities
Date: Fri, 12 Dec 2014 01:09:51
Message-Id: 548A4018.4050502@gentoo.org
1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
2 Gentoo Linux Security Advisory GLSA 201412-11
3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
4 http://security.gentoo.org/
5 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
6
7 Severity: Normal
8 Title: AMD64 x86 emulation base libraries: Multiple vulnerabilities
9 Date: December 12, 2014
10 Bugs: #196865, #335508, #483632, #508322
11 ID: 201412-11
12
13 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
14
15 Synopsis
16 ========
17
18 Multiple vulnerabilities have been found in AMD64 x86 emulation base
19 libraries, the worst of which may allow remote execution of arbitrary
20 code.
21
22 Background
23 ==========
24
25 AMD64 x86 emulation base libraries provides pre-compiled 32-bit
26 libraries.
27
28 Affected packages
29 =================
30
31 -------------------------------------------------------------------
32 Package / Vulnerable / Unaffected
33 -------------------------------------------------------------------
34 1 app-emulation/emul-linux-x86-baselibs
35 < 20140406-r1 >= 20140406-r1
36
37 Description
38 ===========
39
40 Multiple vulnerabilities have been discovered in AMD64 x86 emulation
41 base libraries. Please review the CVE identifiers referenced below for
42 details.
43
44 Impact
45 ======
46
47 A context-dependent attacker may be able to execute arbitrary code,
48 cause a Denial of Service condition, or obtain sensitive information.
49
50 Workaround
51 ==========
52
53 There is no known workaround at this time.
54
55 Resolution
56 ==========
57
58 All users of the AMD64 x86 emulation base libraries should upgrade to
59 the latest version:
60
61 # emerge --sync
62 # emerge -1av ">=app-emulation/emul-linux-x86-baselibs-20140406-r1"
63
64 NOTE: One or more of the issues described in this advisory have been
65 fixed in previous updates. They are included in this advisory for the
66 sake of completeness. It is likely that your system is already no
67 longer affected by them.
68
69 References
70 ==========
71
72 [ 1 ] CVE-2007-0720
73 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-0720
74 [ 2 ] CVE-2007-1536
75 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-1536
76 [ 3 ] CVE-2007-2026
77 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2026
78 [ 4 ] CVE-2007-2445
79 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2445
80 [ 5 ] CVE-2007-2741
81 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-2741
82 [ 6 ] CVE-2007-3108
83 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-3108
84 [ 7 ] CVE-2007-4995
85 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-4995
86 [ 8 ] CVE-2007-5116
87 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5116
88 [ 9 ] CVE-2007-5135
89 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5135
90 [ 10 ] CVE-2007-5266
91 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5266
92 [ 11 ] CVE-2007-5268
93 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5268
94 [ 12 ] CVE-2007-5269
95 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5269
96 [ 13 ] CVE-2007-5849
97 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2007-5849
98 [ 14 ] CVE-2010-1205
99 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1205
100 [ 15 ] CVE-2013-0338
101 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0338
102 [ 16 ] CVE-2013-0339
103 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0339
104 [ 17 ] CVE-2013-1664
105 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1664
106 [ 18 ] CVE-2013-1969
107 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1969
108 [ 19 ] CVE-2013-2877
109 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2877
110 [ 20 ] CVE-2014-0160
111 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-0160
112
113 Availability
114 ============
115
116 This GLSA and any updates to it are available for viewing at
117 the Gentoo Security Website:
118
119 http://security.gentoo.org/glsa/glsa-201412-11.xml
120
121 Concerns?
122 =========
123
124 Security is a primary focus of Gentoo Linux and ensuring the
125 confidentiality and security of our users' machines is of utmost
126 importance to us. Any security concerns should be addressed to
127 security@g.o or alternatively, you may file a bug at
128 https://bugs.gentoo.org.
129
130 License
131 =======
132
133 Copyright 2014 Gentoo Foundation, Inc; referenced text
134 belongs to its owner(s).
135
136 The contents of this document are licensed under the
137 Creative Commons - Attribution / Share Alike license.
138
139 http://creativecommons.org/licenses/by-sa/2.5

Attachments

File name MIME type
signature.asc application/pgp-signature