diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index ec458c168a..276a92b97b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 428688 BLAKE2B ad7b0e93dc8d25ffce2b6b151e2b2f9d3f4644e2e0bd01b04b2cf32db642d1d55604ebfba538d50e5bffd72012f36cafeebb5fa8b059c51e9495a17ed7d24e61 SHA512 38eef2b8a964d52745f651dc5c44cb508b253654c94f1704d61e63093636d75a72c2f7e2db78f40261fe9fecdede9dacd2401b62f42b01813651f01c9fe87245 -TIMESTAMP 2018-10-07T19:38:41Z +MANIFEST Manifest.files.gz 429647 BLAKE2B a411cce710ab8dd39a655bd0e0cc190fbcae6f53119ffd89cae0be474bd52b18b9f669c37dc08ddc9e6dc2a29bf677b9015df98cc57c2d30284d663c0b745fe0 SHA512 727e13fbfd98dfc90a62c0a63c29d8331a6b94e4b42d913790e4a78f814e95d07a616b3b426612b6bfed54ee01f6b9889ca7c2f42345120b9b84f4679ebf482d +TIMESTAMP 2018-11-01T14:08:44Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlu6YMFfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlvbCO1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klBcCw/+KQFZnE+4IPn8ztI2u4v/O0Nsm2Nmv0gKVaRrGLSszOh1NQ7I2/Ran1vH -JH7U1joN/9/se20Sx5nqaXt2ubVNhu4jRYrFVNbbAuDyNqLr8NPi2I0YQPa0pqkW -bxvcNQjcQ5s2tWZTMANkt3DriA117zQidyFjOuZKcZkx5eiTcSq/ICtpF4vQT9U1 -PaB9moOXB7gM+EVvskPYT5D3f16Pe2xTdMPVV7DqDCQFxO7VuiX1tZagVuTkR8Ik -bg5f26ap0TpZOGpCXD56VTOUupb5Yf4K8OJgeg9Q8OQEihXxx2q3fLg69Zf/4E0t -Nwg+uoXvov8EsL8v9W+Tmx9EZTPy1zgTPkqz4e9WsfrVq5QDvro3/tTR28AkhO1i -jzEsR4CZpghnVhl0yejTyrx0u3oP1txkoqpa7DPgUTE3dTICmYiEP/YGtKp7qoIv -/eoUnAA50ojeobe8kx7PxQrgWFZbK4ImWZZvTE+5oTVQrTiUse/vJb4il1Xe0xWU -Dalh9+9K8WrnBfZ6kv7hevdAEmnxZZzX1jPGe1gRLKoBVa/JeXLnmfq8v2li7W53 -uT4nEWZ2Tv+SKSOET8oZfzPL4GjufIyWfNZ1noPjfonXy9J99yb1mkp7Wpcak0c+ -8nMYs6pFmQeaerLMbnRGmitvGkpcipZFw3PJFlsh/xnq+/KCM0Y= -=tYDL +klA5CQ/+Pvm8ev0pfBO6Cs4RoX5CuI2J+zoJXpLwjZyyZ2tCQDQNf7yulp4XfHZa +QRgepSNvJQ9eYgdc2vTxgmXWqw21ARlJw2CK1Zckrvh0Q0eHWTcnWVQj/IKHa8TT +O4NIri0EMV6cEdUz5XCKDZrOffBPfl+uE5WI33SosM+YKZEYnFT0zBPJmFZysxSM +O9T/IiiRrk5rvP+0P8SVnCewmtm3Tw5lhyMU39yHnznY3klFAI4t8G0Di1wpIJ2N +lRhOITHi2cf/koGIcOCuroplkfvUkHWnssOnLD6wF3SPoC+aUFx9ErzidftUkO+C +nExOq7l1x0vu32bRxBVIDZCp3pWo3nkgk+F+kTi9Cbv+8nlbv8oEnmAl+CDHDh+J +UHF+P4u50VA/GIrulWH7LEqlhJQWMfUXxQEhcb/KZJmj7X2KMmGFGYVibIvnUVqJ +eEd84auxv3XtKMPIxIiv8y7kiqd09iFIoKkcM4FVSrEOiVFucRjpnIOn5mCOtych +cV4eM87C+JERmcqKoVCxm/QtWJON5w97U/MoiOc7iMs4jStR6YoMk5Wtig9JNRaI +90H7+DHyzDoznXi1Rlo8U9ANh1jTXaBk6YaoGIxEKMsT8GVRRMCfCGKMpyJWk1+1 +UHZU3ahSMWXVGCNytJopG4qDRnHGsYFqZjEXcGCwQvQv/hnlB9U= +=Zg1g -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index aab66931c1..d0b2412ba0 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-02.xml index efe6722f6a..77b6971a05 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-02.xml @@ -7,13 +7,13 @@ lxc 2018-08-22 - 2018-08-22 + 2018-10-17 662780 local - 3.0.1-r1 - 3.0.1-r1 + 2.1.1-r1 + 2.1.1-r1 @@ -39,7 +39,7 @@ # emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/lxc-3.0.1-r1" + # emerge --ask --oneshot --verbose ">=app-emulation/lxc-2.1.1-r1" @@ -47,5 +47,5 @@ CVE-2018-6556 irishluck83 - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-05.xml new file mode 100644 index 0000000000..d88bef878a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-05.xml @@ -0,0 +1,61 @@ + + + + xkbcommon: Multiple vulnerabilities + Multiple vulnerabilities have been found in xkbcommon, the worst of + which may lead to a Denial of Service condition. + + libxkbcommon + 2018-10-30 + 2018-10-30 + 665702 + local + + + 0.8.2 + 0.8.2 + + + +

xkbcommon is a library to handle keyboard descriptions, including + loading them from disk, parsing them and handling their state. +

+
+ +

Multiple vulnerabilities have been discovered in libxkbcommon. Please + review the CVE identifiers referenced below for details. +

+
+ +

A local attacker could supply a specially crafted keymap file possibly + resulting in a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libxkbcommon users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/libxkbcommon-0.8.2" + + +
+ + CVE-2018-15853 + CVE-2018-15854 + CVE-2018-15855 + CVE-2018-15856 + CVE-2018-15857 + CVE-2018-15858 + CVE-2018-15859 + CVE-2018-15861 + CVE-2018-15862 + CVE-2018-15863 + CVE-2018-15864 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-06.xml new file mode 100644 index 0000000000..9481d47a7e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-06.xml @@ -0,0 +1,83 @@ + + + + Xen: Multiple vulnerabilities + Multiple vulnerabilities have been found in Xen, the worst of which + could cause a Denial of Service condition. + + xen + 2018-10-30 + 2018-10-30 + 643350 + 655188 + 655544 + 659442 + local + + + 4.10.1-r2 + 4.10.1-r2 + + + 4.10.1-r2 + 4.10.1-r2 + + + +

Xen is a bare-metal hypervisor.

+ +
+ +

Multiple vulnerabilities have been discovered in Xen. Please review the + referenced CVE identifiers for details. +

+
+ +

A local attacker could cause a Denial of Service condition or disclose + sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All Xen users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.10.1-r2" + + +

All Xen tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-emulation/xen-tools-4.10.1-r2" + + +
+ + CVE-2017-5715 + CVE-2017-5753 + CVE-2017-5754 + CVE-2018-10471 + CVE-2018-10472 + CVE-2018-10981 + CVE-2018-10982 + CVE-2018-12891 + CVE-2018-12892 + CVE-2018-12893 + CVE-2018-15468 + CVE-2018-15469 + CVE-2018-15470 + CVE-2018-3620 + CVE-2018-3646 + CVE-2018-5244 + CVE-2018-7540 + CVE-2018-7541 + CVE-2018-7542 + + whissi + irishluck83 +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-07.xml new file mode 100644 index 0000000000..a261c2f224 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-07.xml @@ -0,0 +1,77 @@ + + + + Mutt, NeoMutt: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mutt and NeoMutt, the + worst of which allows for arbitrary code execution. + + mutt, neomutt + 2018-10-30 + 2018-10-30 + 661436 + remote + + + 1.10.1 + 1.10.1 + + + 20180716 + 20180716 + + + +

Mutt is a small but very powerful text-based mail client.

+ +

NeoMutt is a command line mail reader (or MUA). It’s a fork of Mutt + with added features. +

+
+ +

Multiple vulnerabilities have been discovered in Mutt, and NeoMutt. + Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted mail + message or connect to malicious mail server using Mutt or NeoMutt, + possibly resulting in execution of arbitrary code or directory traversal + with the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Mutt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-client/mutt-1.10.1" + + +

All NeoMuutt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/neomutt-20180716" + + +
+ + CVE-2018-14349 + CVE-2018-14350 + CVE-2018-14351 + CVE-2018-14352 + CVE-2018-14353 + CVE-2018-14354 + CVE-2018-14355 + CVE-2018-14356 + CVE-2018-14357 + CVE-2018-14358 + CVE-2018-14359 + CVE-2018-14362 + + whissi + irishluck83 +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-08.xml new file mode 100644 index 0000000000..bcb0c46bb2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-08.xml @@ -0,0 +1,98 @@ + + + + PostgreSQL: Multiple vulnerabilities + Multiple vulnerabilities have been found in PostgreSQL, the worst + which could lead to privilege escalation. + + postgresql + 2018-10-30 + 2018-10-30 + 603716 + 603720 + 664332 + local, remote + + + 9.3.24 + 9.4.19 + 9.5.14 + 9.6.10 + 10.5 + 10.5 + + + +

PostgreSQL is an open source object-relational database management + system. +

+
+ +

Multiple vulnerabilities have been discovered in PostgreSQL. Please + review the referenced CVE identifiers for details. +

+ +

In addition it was discovered that Gentoo’s PostgreSQL installation + suffered from a privilege escalation vulnerability due to a runscript + which called OpenRC’s checkpath() on a user controlled path and allowed + user running PostgreSQL to kill arbitrary processes via PID file + manipulation. +

+
+ +

A remote attacker could bypass certain client-side connection security + features, read arbitrary server memory or alter certain data. +

+ +

In addition, a local attacker could gain privileges or cause a Denial of + Service condition by killing arbitrary processes. +

+
+ +

There is no known workaround at this time.

+
+ +

All PostgreSQL users up to 9.3 should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.3.24:9.3" + + +

All PostgreSQL 9.4 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.4.19:9.4" + + +

All PostgreSQL 9.5 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.5.14:9.5" + + +

All PostgreSQL 9.6 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.6.10:9.6" + + +

All PostgreSQL 10 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-10.5:10" + + +
+ + CVE-2018-10915 + CVE-2018-10925 + CVE-2018-1115 + + irishluck83 + irishluck83 +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-09.xml new file mode 100644 index 0000000000..8931f25127 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-09.xml @@ -0,0 +1,53 @@ + + + + X.Org X Server: Privilege escalation + A vulnerability in X.Org X Server allows local users to escalate + privileges. + + xorg x server + 2018-10-30 + 2018-10-30 + 669588 + local + + + 1.20.3 + 1.20.3 + + + +

The X Window System is a graphical windowing system based on a + client/server model. +

+
+ +

An incorrect permission check for -modulepath and -logfile options when + starting Xorg. X server allows unprivileged users with the ability to log + in to the system via physical console to escalate their privileges and + run arbitrary code under root privileges. +

+
+ +

A local attacker can escalate privileges to root by passing crafted + parameters to the X.org X server. +

+
+ +

There is no known workaround at this time.

+
+ +

All X.Org X Server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.20.3" + + +
+ + CVE-2018-14665 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-10.xml new file mode 100644 index 0000000000..017ec0c1e5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-10.xml @@ -0,0 +1,52 @@ + + + + systemd: Multiple vulnerabilities + Multiple vulnerabilities have been found in systemd, the worst of + which may allow execution of arbitrary code. + + systemd + 2018-10-30 + 2018-10-30 + 669664 + 669716 + local, remote + + + 239-r2 + 239-r2 + + + +

A system and service manager.

+
+ +

Multiple vulnerabilities have been discovered in systemd. Please review + the CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly execute arbitrary code, cause a Denial of + Service condition, or gain escalated privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All systemd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/systemd-239-r2" + + +
+ + CVE-2018-15686 + CVE-2018-15687 + CVE-2018-15688 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index fd16c36c45..7032dc3897 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Sun, 07 Oct 2018 19:38:38 +0000 +Thu, 01 Nov 2018 14:08:41 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 6add75c130..41fb03066c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -b914ac7ce64b6f61d701c5cf4173dd03fafdca0e 1538845801 2018-10-06T17:10:01+00:00 +3fe134c9c609fe0fa952396df0dd91b901ef64de 1540938926 2018-10-30T22:35:26+00:00