diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-27.xml new file mode 100644 index 0000000000..5fb7503dc1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-27.xml @@ -0,0 +1,55 @@ + + + + FreeRADIUS: Security bypass + A vulnerability in FreeRADIUS might allow remote attackers to + bypass authentication. + + freeradius + 2017-06-27 + 2017-06-27: 1 + 620186 + remote + + + 3.0.14 + 3.0.14 + + + +

FreeRADIUS is an open source RADIUS authentication server.

+
+ +

It was discovered that the implementation of TTLS and PEAP in FreeRADIUS + skips inner authentication when it handles a resumed TLS connection. The + affected versions of FreeRADIUS fails to reliably prevent the resumption + of unauthenticated sessions unless the TLS session cache is disabled + completely. +

+
+ +

An unauthenticated remote user can bypass authentication by starting a + session, and then resuming an unauthenticated TLS session before inner + authentication has been completed successfully. +

+
+ +

Set “enabled = no” in the cache subsection of eap module settings to + disable TLS session caching. +

+
+ +

All FreeRADIUS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-3.0.14" + + +
+ + CVE-2017-9148 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-28.xml new file mode 100644 index 0000000000..2673741587 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-28.xml @@ -0,0 +1,67 @@ + + + + LibreOffice: Multiple vulnerabilities + Multiple vulnerabilities have been found in LibreOffice, the worst + of which allows for the remote execution of arbitrary code. + + libreoffice + 2017-06-27 + 2017-06-27: 1 + 616472 + remote + + + 5.2.7.2 + 5.2.7.2 + + + 5.2.7.2 + 5.2.7.2 + + + +

LibreOffice is a powerful office suite; its clean interface and powerful + tools let you unleash your creativity and grow your productivity. +

+
+ +

Multiple vulnerabilities have been discovered in LibreOffice. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted file + using LibreOffice, possibly resulting in execution of arbitrary code with + the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All LibreOffice users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-office/libreoffice-5.2.7.2" + + +

All LibreOffice binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-office/libreoffice-bin-5.2.7.2" + + +
+ + + CVE-2016-10327 + + CVE-2017-7870 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-29.xml new file mode 100644 index 0000000000..32e43c22d9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-29.xml @@ -0,0 +1,67 @@ + + + + KAuth and KDELibs: Privilege escalation + A vulnerability in KAuth and KDELibs allows local users to gain + root privileges. + + kauth,kdelibs + 2017-06-27 + 2017-06-27: 1 + 618108 + local + + + 5.29.0-r1 + 5.29.0-r1 + + + 4.14.32 + 4.14.32 + + + +

KAuth provides a convenient, system-integrated way to offload actions + that need to be performed as a privileged user (root, for example) to + small (hopefully secure) helper utilities. +

+ +

The KDE libraries, basis of KDE and used by many open source projects.

+
+ +

KAuth and KDELibs contains a logic flaw in which the service invoking + D-Bus is not properly checked. This allows spoofing the identity of the + caller and with some carefully crafted calls can lead to gaining root + from an unprivileged account. +

+
+ +

A local attacker could spoof the identity of the caller invoking D-Bus, + possibly resulting in gaining privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All KAuth users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=kde-frameworks/kauth-5.29.0-r1" + + +

All KDELibs users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=kde-frameworks/kdelibs-4.14.32" + + +
+ + CVE-2017-8422 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-01.xml new file mode 100644 index 0000000000..0e8127a8cd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-01.xml @@ -0,0 +1,91 @@ + + + + IcedTea: Multiple vulnerabilities + Multiple vulnerabilities have been found in IcedTea, the worst of + which may allow execution of arbitrary code. + + icedtea + 2017-07-05 + 2017-07-05: 1 + 607676 + 609562 + 618874 + 619458 + remote + + + 7.2.6.10 + 3.4.0 + 7.2.6.10 + 3.4.0 + + + +

IcedTea’s aim is to provide OpenJDK in a form suitable for easy + configuration, compilation and distribution with the primary goal of + allowing inclusion in GNU/Linux distributions. +

+
+ +

Multiple vulnerabilities have been discovered in IcedTea. Please review + the CVE identifiers referenced below for details. +

+ +

Note: If the web browser plug-in provided by the dev-java/icedtea-web + package was installed, the issues exposed via Java applets could have + been exploited without user interaction if a user visited a malicious + website. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, gain access to information, or cause a Denial + of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All IcedTea binary 7.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-7.2.6.10:7" + + +

All IcedTea binary 3.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-3.4.0:8" + +
+ + CVE-2016-2183 + CVE-2016-5546 + CVE-2016-5547 + CVE-2016-5548 + CVE-2016-5549 + CVE-2016-5552 + CVE-2017-3231 + CVE-2017-3241 + CVE-2017-3252 + CVE-2017-3253 + CVE-2017-3260 + CVE-2017-3261 + CVE-2017-3272 + CVE-2017-3289 + CVE-2017-3509 + CVE-2017-3511 + CVE-2017-3512 + CVE-2017-3514 + CVE-2017-3526 + CVE-2017-3533 + CVE-2017-3539 + CVE-2017-3544 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml new file mode 100644 index 0000000000..d8ddccf41d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml @@ -0,0 +1,56 @@ + + + + Game Music Emu: Multiple vulnerabilities + Multiple vulnerabilities have been found in Game Music Emu, the + worst of which could lead to the execution of arbitrary code. + + game-music-emu + 2017-07-08 + 2017-07-08: 1 + 603092 + remote + + + 0.6.1 + 0.6.1 + + + +

Game Music Emu is a multi-purpose console music emulator and player + library. +

+
+ +

Multiple vulnerabilities have been discovered in Game Music Emu. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted SPC + music file, using Game Music Emu or an application linked against the + Game Music Emu library, possibly resulting in execution of arbitrary code + with the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Game Music Emu users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/game-music-emu-0.6.1" + +
+ + CVE-2016-9957 + CVE-2016-9958 + CVE-2016-9959 + CVE-2016-9960 + CVE-2016-9961 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-03.xml new file mode 100644 index 0000000000..22c2e86e5f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-03.xml @@ -0,0 +1,66 @@ + + + + phpMyAdmin: Security bypass + A vulnerability in phpMyAdmin might allow remote attackers to + bypass authentication. + + phpmyadmin + 2017-07-08 + 2017-07-08: 1 + 614522 + remote + + + 4.0.10.20 + 4.7.0 + 4.0.10.20 + 4.7.0 + + + +

phpMyAdmin is a web-based management tool for MySQL databases.

+
+ +

A vulnerability was discovered where the restrictions caused by + “$cfg[‘Servers’][$i][‘AllowNoPassword’] = false” are bypassed + under certain PHP versions. This can lead compromised user accounts, who + have no passwords set, even if the administrator has set + “$cfg[‘Servers’][$i][‘AllowNoPassword’]” to false (which is + the default). +

+ +

This behavior depends on the PHP version used (it seems PHP 5 is + affected, while PHP 7.0 is not). +

+
+ +

A remote attacker, who only needs to know the username, could bypass + security restrictions and access phpMyAdmin. +

+
+ +

Set a password for all users.

+
+ +

All phpMyAdmin 4.0.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-db/phpmyadmin-4.0.10.20:4.0.10.20" + + +

All other phpMyAdmin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-4.7.0:4.7.0" + +
+ + PMASA-2017-8 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml new file mode 100644 index 0000000000..f89c27b13d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml @@ -0,0 +1,55 @@ + + + + libsndfile: Multiple vulnerabilities + Multiple vulnerabilities have been found in libsndfile, the worst + of which might allow remote attackers to execute arbitrary code. + + libsndfile + 2017-07-08 + 2017-07-08: 1 + 618010 + remote + + + 1.0.28 + 1.0.28 + + + +

libsndfile is a C library for reading and writing files containing + sampled sound. +

+
+ +

Multiple vulnerabilities have been discovered in libsndfile. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted file, + possibly resulting in the execution of arbitrary code with the privileges + of the process, or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libsndfile users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.28" + + +
+ + CVE-2017-7585 + CVE-2017-7586 + CVE-2017-7741 + CVE-2017-7742 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml new file mode 100644 index 0000000000..dfaad4135c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml @@ -0,0 +1,57 @@ + + + + OpenSLP: Multiple vulnerabilities + Multiple vulnerabilities have been found in OpenSLP, the worst of + which allows remote attackers to cause a Denial of Service condition or + other unspecified impacts. + + OpenSLP + 2017-07-08 + 2017-07-08: 1 + 360061 + 434918 + 583396 + 595542 + remote + + + 2.0.0-r4 + 2.0.0-r4 + + + +

OpenSLP is an open-source implementation of Service Location Protocol + (SLP). +

+
+ +

Multiple vulnerabilities have been discovered in OpenSLP. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly cause a Denial of Service condition or + have other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSLP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/openslp-2.0.0-r4" + +
+ + CVE-2010-3609 + CVE-2012-4428 + CVE-2016-4912 + CVE-2016-7567 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml new file mode 100644 index 0000000000..7b201894bf --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml @@ -0,0 +1,75 @@ + + + + virglrenderer: Multiple vulnerabilities + Multiple vulnerabilities have been found in virglrenderer, the + worst of which could allow local guest OS users to cause a Denial of + Service condition. + + virglrenderer + 2017-07-08 + 2017-07-08: 1 + 606996 + 607022 + 608734 + 609400 + 609402 + 609492 + 609494 + 610678 + 610680 + 611378 + 611380 + 611382 + local + + + 0.6.0 + 0.6.0 + + + +

A virtual 3D GPU library, that allows the guest operating system to use + the host GPU to accelerate 3D rendering. +

+
+ +

Multiple vulnerabilities have been discovered in virglrenderer. Please + review the CVE identifiers referenced below for details. +

+
+ +

A local attacker could cause a Denial of Service condition.

+
+ +

There is no known workaround at this time.

+
+ +

All virglrenderer users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/virglrenderer-0.6.0" + +
+ + + CVE-2016-10163 + + + CVE-2016-10214 + + CVE-2017-5580 + CVE-2017-5956 + CVE-2017-5957 + CVE-2017-5993 + CVE-2017-5994 + CVE-2017-6209 + CVE-2017-6210 + CVE-2017-6317 + CVE-2017-6355 + CVE-2017-6386 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml new file mode 100644 index 0000000000..153c637eb8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml @@ -0,0 +1,58 @@ + + + + JasPer: Multiple vulnerabilities + Multiple vulnerabilities have been found in JasPer, the worst of + which could could allow an attacker to execute arbitrary code. + + JasPer + 2017-07-08 + 2017-07-08: 1 + 559164 + 559168 + 571256 + 599430 + 602848 + remote + + + 2.0.12 + 2.0.12 + + + +

JasPer is a software-based implementation of the codec specified in the + JPEG-2000 Part-1 standard. +

+
+ +

Multiple vulnerabilities have been discovered in JasPer. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted image + file using JasPer possibly resulting in execution of arbitrary code with + the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All JasPer users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/jasper-2.0.12" + +
+ + CVE-2015-5203 + CVE-2015-8751 + CVE-2016-9262 + CVE-2016-9591 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml new file mode 100644 index 0000000000..ebfc4a64b9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml @@ -0,0 +1,51 @@ + + + + feh: Arbitrary remote code execution + A vulnerability in feh might allow remote attackers to execute + arbitrary code. + + feh + 2017-07-08 + 2017-07-08: 1 + 616470 + remote + + + 2.18.3 + 2.18.3 + + + +

feh is an X11 image viewer aimed mostly at console users.

+
+ +

Tobias Stoeckmann discovered it was possible to trigger an + out-of-boundary heap write with the image viewer feh while receiving an + IPC message. +

+
+ +

A remote attacker, pretending to be the E17 window manager, could + possibly trigger an out-of-boundary heap write in feh while receiving an + IPC message. This could result in execution of arbitrary code with the + privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All feh users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/feh-2.18.3" + +
+ + CVE-2017-7875 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml new file mode 100644 index 0000000000..d8ac9db00f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml @@ -0,0 +1,53 @@ + + + + GNOME applet for NetworkManager: Arbitrary file read/write + A vulnerability has been found in GNOME applet for NetworkManager + allowing local attackers to access the local filesystem. + + nm-applet + 2017-07-08 + 2017-07-08: 1 + 613768 + local + + + 1.4.6-r1 + 1.4.6-r1 + + + +

GNOME applet for NetworkManager is a GTK+ 3 front-end which works under + Xorg environments with a systray. +

+
+ +

Frederic Bardy and Quentin Biguenet discovered that GNOME applet for + NetworkManager incorrectly checked permissions when connecting to certain + wireless networks. +

+
+ +

A local attacker could bypass security restrictions at the login screen + to access local files. +

+
+ +

There is no known workaround at this time.

+
+ +

All GNOME applet for NetworkManager users should upgrade to the latest + version: +

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=gnome-extra/nm-applet-1.4.6-r1" + +
+ + CVE-2017-6590 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-10.xml new file mode 100644 index 0000000000..e2edaa0007 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-10.xml @@ -0,0 +1,52 @@ + + + + VLC: Multiple vulnerabilities + Multiple vulnerabilities have been found in VLC, the worst of which + may allow remote attackers to execute arbitrary code. + + vlc + 2017-07-08 + 2017-07-08: 1 + 619494 + remote + + + 2.2.6 + 2.2.6 + + + +

VLC is a cross-platform media player and streaming server.

+
+ +

Multiple vulnerabilities have been discovered in VLC. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by enticing a user to open a specially crafted + subtitles file, could possibly execute arbitrary code with the privileges + of the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All VLC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/vlc-2.2.6" + +
+ + CVE-2017-8310 + CVE-2017-8311 + CVE-2017-8312 + CVE-2017-8313 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-11.xml new file mode 100644 index 0000000000..033caea6e7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-11.xml @@ -0,0 +1,49 @@ + + + + RoundCube: Security bypass + A vulnerability in RoundCube may allow authenticated users to + bypass security restrictions. + + roundcube + 2017-07-08 + 2017-07-08: 1 + 618322 + remote + + + 1.2.5 + 1.2.5 + + + +

Free and open source webmail software for the masses, written in PHP.

+
+ +

Authenticated users can arbitrarily reset passwords due to a problem + caused by an improperly restricted exec call in the virtualmin and sasl + drivers of the password plugin. +

+
+ +

Authenticated users can bypass security restrictions and elevate + privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All RoundCube users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/roundcube-1.2.5" + +
+ + CVE-2017-8114 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml new file mode 100644 index 0000000000..65b6e49ae0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml @@ -0,0 +1,51 @@ + + + + MAN DB: Privilege escalation + A vulnerability in MAN DB allows local users to gain root + privileges. + + man-db + 2017-07-09 + 2017-07-09: 1 + 602588 + local + + + 2.7.6.1-r2 + 2.7.6.1-r2 + + + +

MAN DB is a man replacement that utilizes BerkelyDB instead of flat + files. +

+
+ +

The /var/cache/man directory as part of the MAN DB package has group + permissions set to root. +

+
+ +

A local user who does not belong to the root group, but has the ability + to modify the /var/cache/man directory can escalate privileges to the + group root. +

+
+ +

There is no known workaround at this time.

+
+ +

All MAN DB users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/man-db-2.7.6.1-r2" + +
+ + CVE-2015-1336 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml new file mode 100644 index 0000000000..1f63cb9e5a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml @@ -0,0 +1,50 @@ + + + + libcroco: Multiple vulnerabilities + Multiple vulnerabilities have been found in libcroco, the worst of + which may have unspecified impacts. + + libcroco + 2017-07-09 + 2017-07-09: 1 + 618012 + remote + + + 0.6.12-r1 + 0.6.12-r1 + + + +

libcroco is a standalone CSS2 parsing and manipulation library.

+
+ +

Multiple vulnerabilities have been discovered in libcroco. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted CSS + file possibly resulting in a Denial of Service condition or other + unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All libcroco users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libcroco-0.6.12-r1" + +
+ + CVE-2017-7960 + CVE-2017-7961 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 05115e5297..63616b079e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Fri, 23 Jun 2017 17:39:03 +0000 +Sun, 09 Jul 2017 23:40:01 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index c16353c121..700f29fc7e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -3bbc3731a50a93315f90eba3a430b6d900cf3f5d 1498159143 2017-06-22T19:19:03+00:00 +0d1886fce079a5b039baee6ef4287f5a55945dea 1499633121 2017-07-09T20:45:21+00:00