- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202107-32
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Low
Title: Apache Thrift: Multiple vulnerabilities
Date: July 14, 2021
Bugs: #761409, #770145
ID: 202107-32
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been found in Apache Thrift, the worst of
which could result in a Denial of Service condition.
Background
==========
Apache Thrift is a software framework that combines a software stack
with a code generation engine to build services that work efficiently
and seamlessly between many languages.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-python/thrift < 0.14.1 >= 0.14.1
Description
===========
Multiple vulnerabilities have been discovered in Apache Thrift. Please
review the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All Apache Thrift users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-python/thrift-0.14.1"
References
==========
[ 1 ] CVE-2019-0205
https://nvd.nist.gov/vuln/detail/CVE-2019-0205
[ 2 ] CVE-2019-0210
https://nvd.nist.gov/vuln/detail/CVE-2019-0210
[ 3 ] CVE-2020-13949
https://nvd.nist.gov/vuln/detail/CVE-2020-13949
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202107-32
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2021 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
-----BEGIN PGP SIGNATURE-----
iQIzBAABCAAdFiEElFuPenBj6NvNLoABXP0dAeB+IzgFAmDuVkgACgkQXP0dAeB+ IzjJNQ/+PTW9MKCDRHM/itgv05FD1FPuCGUeCQLPhiKP0z85tL5lPRgmJLpuHPNT jZvR43eJ4Y5ppuTL0x9eKqJRPwodr6D/uqxA5WJozUrZyhwLDyUrxE+B8dJvggAo XxnDyWRIt4fKjPprOxIthIogbVMAAxtXyPLccwUA5y39h/fxBKHWmEqHX2q3KG+h Z9P1mPitm6RsnrzhZ36V4nTUx41kKfBsvKIvGzBwYldIZ3pDmLevU5oG/klNkOYp OS2WST91kT3viO4jpt9XP6FD9KkZTtqRtd6LEMKk/vGIasSUOLDjIfks5EfLKbkg geS81ZUoVbC+Q+LPcpiyoXoLH3zlbo2YjWrFK8tJwLjTCd9h4aw+D/SCUKq21jWF GH7Kf9wY3g6q9kXsAKZYgH7KFyZsiik5rxPDgURAfSNgjKLolAwuiA/uf18VPQI6 dsEffeDE/UbI5GohaM6iP6V9Jq9aLMQkfGaYJVNme68xfagRVGnD2HIVYb0+bmJO 6Cy6s/GBog/AcHK0VsW5udEx+8Pl2CrNYs+GtAP+sZZqr99e2m+GLkRgekeZjSQ9 24oXXwIuCsTzSJkx4rM4xgMe+ezVhSeaK0EQBYQYeiV72IAXE2M8pB2hNmXJwFke vbBXABS3eYYzBovMfJ81GGr/OSAdhAoZYUDBe+nw0hE5f5FTzCE=
=7gYU
-----END PGP SIGNATURE-----
--- SoupGate-Win32 v1.05
* Origin: fsxNet Usenet Gateway (21:1/5)