[ GLSA 201807-03 ] ZNC:Multiple Vulnerabilities


–=-a4gh0y+NXcPKJNvoLF4l
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
Gentoo Linux Security Advisory GLSA 201807-03
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –
https://security.gentoo.org/
– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Severity: Normal
Title: ZNC:Multiple Vulnerabilities
Date: July 29, 2018
Bugs: #661228
ID: 201807-03

– – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – – –

Synopsis
=3D=3D=3D=3D=3D=3D=3D=3D

Multiple vulnerabilities have been found in ZNC, the worst of which
could result in privilege escalation.

Background
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

ZNC is an advanced IRC bouncer.

Affected packages
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

——————————————————————-
Package / Vulnerable / Unaffected
——————————————————————-
1 net-irc/znc =3D 1.7.1-rc1=20

Description
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

Multiple vulnerabilities have been discovered in ZNC. Please review the
CVE identifiers referenced below for details.

Impact
=3D=3D=3D=3D=3D=3D

A remote attacker could read arbitary files and esclate privileges.

Workaround
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

There is no known workaround at this time.

Resolution
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

All ZNC users should upgrade to the latest version:

# emerge –sync
# emerge –ask –oneshot –verbose “>=3Dnet-irc/znc-1.7.1-rc1″

References
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

[ 1 ] CVE-2018-14055
https://nvd.nist.gov/vuln/detail/CVE-2018-14055
[ 2 ] CVE-2018-14056
https://nvd.nist.gov/vuln/detail/CVE-2018-14056

Availability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

https://security.gentoo.org/glsa/201807-03

Concerns?
=3D=3D=3D=3D=3D=3D=3D=3D=3D

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users’ machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.

License
=3D=3D=3D=3D=3D=3D=3D

Copyright 2018 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons – Attribution / Share Alike license.

https://creativecommons.org/licenses/by-sa/2.5
–=-a4gh0y+NXcPKJNvoLF4l
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2

iQGTBAABCgB9FiEE5Rdey4FSmOT+vCuqTbvRDw/dJUcFAlteOX1fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEU1
MTc1RUNCODE1Mjk4RTRGRUJDMkJBQTREQkJEMTBGMEZERDI1NDcACgkQTbvRDw/d
JUcGMgf+NKunX2qyC+uVKff0zHpSXBGXYDRGaix2SqEpbeJNgIeZtG11tSGWb3wj
9aJ6Qod+++1Y+3TyO3QyAOD4ltczDo7tOLnS8O1g8ZQ95Ao6vLMh1J5lmv/3kTCj
O/iaesTfRa1D+apKgBT2z8OVSh6RdrbVgVAN5QeR1HvgYcAUkT18abqOVUoM0FZN
yeEcMZQ4NnhJCDJkmzDa6jhfj782OnM5PFPD72fg2KoZvkVYKMTKUUTmoNLIqm0n
oAGVxf8WYkK2w4KEOE5lo6vLy4AFJq/eYHRiw69c32fHoPiJy+uvzEO7A8boyOwz
M7CLFuovEgefQFt0iwsDEW+eAonmZQ==
=v8zq
—–END PGP SIGNATURE—–

–=-a4gh0y+NXcPKJNvoLF4l–