– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201801-15
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Severity: Normal
Title: PolarSSL: Multiple vulnerabilities
Date: January 15, 2018
Bugs: #537108, #620504
ID: 201801-15
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Synopsis
========
Multiple vulnerabilities have been found in PolarSSL, the worst of
which may allow remote attackers to execute arbitrary code.
Background
==========
PolarSSL is a cryptographic library for embedded systems.
Affected packages
=================
——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 net-libs/polarssl < 1.3.9-r1 Vulnerable!
——————————————————————-
NOTE: Certain packages are still vulnerable. Users should migrate
to another package if one is available or wait for the
existing packages to be marked stable by their
architecture maintainers.
Description
===========
Multiple vulnerabilities have been discovered in PolarSSL. Please
review the CVE identifiers referenced below for details.
Impact
======
A remote attacker might be able to execute arbitrary code, cause Denial
of Service condition or obtain sensitive information.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
Gentoo has discontinued support for PolarSSL and recommends that users
unmerge the package:
# emerge –unmerge “net-libs/polarssl”
References
==========
[ 1 ] CVE-2015-1182
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-1182
[ 2 ] CVE-2015-7575
https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-7575
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/201801-15
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2018 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
iQKTBAEBCgB9FiEEM8WEgsQCKS0uPFwGlwn5DDyW/8gFAlpcLZNfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDMz
QzU4NDgyQzQwMjI5MkQyRTNDNUMwNjk3MDlGOTBDM0M5NkZGQzgACgkQlwn5DDyW
/8jEFA/+MvyyE0mbpBWCYmWyEkHgmTv5cqXF0rsOcbjBR5QHbQ88nwFVlbk5L+gB
dusZVAj7QJZhdUElTB5g8fmoJS8hg6Kzsnb4YHen4x/6+aCFDA60qC4v0+99y5At
87TFY8KIf695tN88TBTCMt3f59t2c/R0tH91VP6L8JZcO0t6ix4Y8CwzcHoJATrd
F0U8DjY3Z8+KkRqLc2KLpB2YgG1eeA8JB3EYzGxrbVDyNaATZksxPR4OQ5QjVSEZ
xCSqHTk1tz0oW4Rby3xEMk/8SZMDnBo6FGcMGQADhGkOjmfIj1FQidZu124yDOtA
bfdbFtSqI+mzl1jTqwyNbyeWhZX0ashNeOjTW3jRNo07ooo1dh207fcKrcAFt8ZM
uILpanUhuztpXZWs0FthAIJ2fJjTnKL8wQvkSflRqxiXW0cYNAEdirHPnI6Cp9s/
zimSw+EnfdD5Hu91zfkp07YNVFQoh8GGbTkX/YhPOdVoDmiaNv+LF75MlICCBnwQ
Yki66z8wWzYCOC6i1LSvbaHAfTQq2NvKkQKu44DUA1TLzbZcHOw3ZfHa++e5bYt1
WTX0HFL9cbt7gPge/NOhuxkkyeylGjp0xDNVH2SQsRbthpTIWdJyIQ3+OXID6jKQ
IVnsZQGPaev5RGMxsURu3fFNmx1fsaw6EmbOQSMFFrm8htsSXds=
=m3i2
—–END PGP SIGNATURE—–