diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 799a8a09f2..7b4574dde4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 426775 BLAKE2B 0a924e893bc7d02fb872d05ff4b63ad4d237b75711b0c6a09d632bbc7eeb1a14506448cef5b376ba25b504b6e4c16d40d6662762ee100207b8ee92abf972340d SHA512 811f8949726f5f714f93c3522b7ae6b1eb5aad37a0229ee9d5f5ee0ddb8c5273a4f3b0d4055d44a1dbeed5fc458aeb2e5620e47889961d9b7a4e961c24e5877b -TIMESTAMP 2018-06-26T03:08:38Z +MANIFEST Manifest.files.gz 427414 BLAKE2B 03f31e82901c67c54c9e2a393ac3d0d1d25bb342aa53f12ef4cda3b8ecae5db556d030b733bc4f3fdba54171e0a9a96a6e0e3c4ab9239061ea537618ba745ce1 SHA512 01f241123b41771420b69c122806bf7c9c1b4f6f77886ed4e9a9737364198dc0d9cc296f967c056f28a2af511a8d2680a7991527b5ca7723fbd12dcffe525a32 +TIMESTAMP 2018-07-30T15:38:34Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlsxrjZfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAltfMPpfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klCMpBAAnXInYoDgylCxujtbrePIEkh+9fLMXgdIZCCN0UoEddA8me1T4Dz/ZwWu -x+qJuVSyq0vokydf7pMS5iKrTxac6MuVxyHL/CuqFEYSilNlGfnzbtITmTckxOKH -dzk1s3tyjL07dpAB/idAh9l6cgM3inKpOc4u1+/ryijJKpz8xWYrwillBSW/IqWb -9xMdxuPzYHC/HI1A0qrFNPIP7dBKRgOTzlacedvmxB0n0UcBSznw6ahR4vTsVJiV -ISjPNwkDRsd4Izypppfj0rOdZ7kN8xO1YFP061pssVgKbEoNVU36FX9zK+O6binl -9NkuJ5NBW320vdbUO3EwLl+qKUylTa71xYyK2lf8HrySSrmGf9ECq6up8ep7NwHv -anhkjpsBWTSOnaN0ty8cSif7WO6zEmLUofoUpYP8NdUh86TaEXxirSZbUSl5LoLU -iEw29QQiaemrI3+nV7/FoDt61Bs3gl7FOkBiT8iC3W6FDQcaqBT7odjq4WonDsdQ -jCadsZdzOJhybRgUOsOA7UCa2Vmk9zRu4MNdqn8euuZwh2/KC1vcJ+QnFKzQEK82 -N/+NqPr/PTuylsOVeohYi/QYZYN34B6BvVclVWnV3mZvmla+I4euSpGep7/JL5Sx -nXw5zOsCSDBLXyEJYDTt8T3EXLs8+JtrAhEugXjMCTe8rmnWmiA= -=Ut/r +klBgNw//T4p4YyrqTdUXKjPqYDKbPIAY6BLQMU6U2py9pMfpRJy6Mb7Otpfr2KCJ +kM7Fc6KssxErmqes0ivw8FIU6/6NgnTMLETlPC6LPPApd49FmkRrI0JV4qt5CAgR +whUVWRNU7+LGxzL3w9Sj3Z47b6XPRHZwVzsX0F8eXAC4C2prRojGOd+Zs+wilFgE +DiWg3PAiGQQjIOgNq3Jl86d09vD0QkCYNlTJrCil54VW9ct6vXLiyv7Gij5EMmay +gFnhFTNahYgrJkt8EP7R+lRILynopntLOnE1dpsWqWdyqvXaILxNiMWSxQO6c2E+ +lhxvIaD2jZIdldbiy2va3jENhVr7RpqMx9N7mB/CRf0VNhPJc9onqfXWT0h3QCBt +CtosieBoPc8rW3OJYIbvCQmMLzNQ2u4gKVcYwbNGMOwkOiO1oHgevpwHdQ2O5jyK +EDsxINAOG27DHbdHVqWhTfRI5SmxWq47uE6zjM0zKWimbjRY8RFpExVDjM8SCyh0 +J59CYZXLi3h1MpX1Ydi20kGkJKO6O6WzzZzLOn1OK4uBPnD/WYiO36IDH2PjwRSM +XK2pK+UR6bV7Jb9vyK6kdwi+fKMz7BSsJcfXLr67MOAuorx/qq+2vdwghEVmpWj8 +jc6bhGf5mde/MetlAtL2rHWJC1UPNiTBATnZYBIMe1po0zuIjCY= +=OVLH -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index f740db1e7b..2c573718af 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-01.xml new file mode 100644 index 0000000000..5a945f7929 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-01.xml @@ -0,0 +1,49 @@ + + + + tqdm: Arbitrary code execution + A vulnerability in tqdm could allow remote attackers to execute + arbitrary code. + + tqdm + 2018-07-18 + 2018-07-18 + 636384 + remote + + + 4.23.3 + 4.23.3 + + + +

tqdm is a smart progress meter.

+
+ +

A vulnerablility was discovered in tqdm._version that could allow a + malicious git log within the current working directory. +

+
+ +

A remote attacker could execute arbitrary commands by enticing a user to + clone a crafted repo. +

+
+ +

There is no known workaround at this time.

+
+ +

All tqdm users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/tqdm-4.23.3" + + +
+ + CVE-2016-10075 + + b-man + irishluck83 +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-02.xml new file mode 100644 index 0000000000..ec691f42d0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-02.xml @@ -0,0 +1,51 @@ + + + + Passenger: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Passenger, the worst of + which could result in the execution of arbitrary code. + + passenger + 2018-07-22 + 2018-07-22 + 658346 + remote + + + 5.3.2 + 5.3.2 + + + +

Passenger runs and manages your Ruby, Node.js, and Python apps.

+
+ +

Multiple vulnerabilities have been discovered in Passenger. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could escalate privileges, execute arbitrary code, + cause a Denial of Service condition, or obtain sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All Passenger users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apache/passenger-5.3.2" + +
+ + CVE-2018-12026 + CVE-2018-12027 + CVE-2018-12028 + CVE-2018-12029 + + irishluck83 + irishluck83 +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-03.xml new file mode 100644 index 0000000000..f6a41e2fa6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-03.xml @@ -0,0 +1,48 @@ + + + + ZNC:Multiple Vulnerabilities + Multiple vulnerabilities have been found in ZNC, the worst of which + could result in privilege escalation. + + ZNC + 2018-07-29 + 2018-07-29 + 661228 + remote + + + 1.7.1 + 1.7.1 + + + +

ZNC is an advanced IRC bouncer.

+
+ +

Multiple vulnerabilities have been discovered in ZNC. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker could read arbitary files and esclate privileges.

+
+ +

There is no known workaround at this time.

+
+ +

All ZNC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-irc/znc-1.7.1" + + +
+ + CVE-2018-14055 + CVE-2018-14056 + + Zlogene + irishluck83 +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-04.xml new file mode 100644 index 0000000000..38cedbc06c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201807-04.xml @@ -0,0 +1,50 @@ + + + + cURL:Heap-based Buffer Overflow + A heap-based buffer overflow in cURL might allow remote attackers + to execute arbitrary code. + + curl + 2018-07-29 + 2018-07-29 + 660894 + remote + + + 7.61.0 + 7.61.0 + + + +

A command line tool and library for transferring data with URLs.

+ +
+ +

A heap-based buffer overflow was discovered in cURL’s + Curl_smtp_escape_eob() function. +

+
+ +

An attacker could cause a Denial of Service condition or execute + arbitrary code via SMTP connections. +

+
+ +

There is no known workaround at this time.

+
+ +

All cURL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.61.0" + + +
+ + CVE-2018-0500 + + irishluck83 + irishluck83 +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 426c2e64bb..ff19ea6845 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Tue, 26 Jun 2018 03:08:35 +0000 +Mon, 30 Jul 2018 15:38:31 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 371b226d68..39d5ceab63 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -676a0a13a2c9c89e7a04d5a85550b5b48c25f9b4 1529809898 2018-06-24T03:11:38+00:00 +bc003b9516bfd3c1d933c8cd919b86b13f8c5548 1532902339 2018-07-29T22:12:19+00:00