From e6c2c08e1e6f045070f9c148c02a413746b342da Mon Sep 17 00:00:00 2001 From: David Michael Date: Mon, 18 Sep 2017 13:03:12 -0700 Subject: [PATCH 01/14] bump(metadata/glsa): sync with upstream --- .../metadata/glsa/glsa-201708-04.xml | 6 +- .../metadata/glsa/glsa-201708-07.xml | 6 +- .../metadata/glsa/glsa-201708-08.xml | 4 +- .../metadata/glsa/glsa-201708-09.xml | 50 ++++++++ .../metadata/glsa/glsa-201708-10.xml | 55 +++++++++ .../metadata/glsa/glsa-201709-01.xml | 51 ++++++++ .../metadata/glsa/glsa-201709-02.xml | 115 ++++++++++++++++++ .../metadata/glsa/glsa-201709-03.xml | 61 ++++++++++ .../metadata/glsa/glsa-201709-04.xml | 55 +++++++++ .../metadata/glsa/glsa-201709-05.xml | 50 ++++++++ .../metadata/glsa/glsa-201709-06.xml | 56 +++++++++ .../metadata/glsa/glsa-201709-07.xml | 60 +++++++++ .../metadata/glsa/glsa-201709-08.xml | 66 ++++++++++ .../metadata/glsa/glsa-201709-09.xml | 75 ++++++++++++ .../metadata/glsa/glsa-201709-10.xml | 61 ++++++++++ .../metadata/glsa/glsa-201709-11.xml | 55 +++++++++ .../metadata/glsa/glsa-201709-12.xml | 80 ++++++++++++ .../metadata/glsa/glsa-201709-13.xml | 50 ++++++++ .../metadata/glsa/glsa-201709-14.xml | 62 ++++++++++ .../metadata/glsa/timestamp.chk | 2 +- .../metadata/glsa/timestamp.commit | 2 +- 21 files changed, 1012 insertions(+), 10 deletions(-) create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-09.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-10.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-01.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-02.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-03.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-04.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-05.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-06.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-07.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-08.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-09.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-10.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-11.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-12.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-13.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-14.xml diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-04.xml index 09bf5c4fc7..70915b9814 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-04.xml @@ -7,12 +7,12 @@ kedpm 2017-08-21 - 2017-08-21: 1 + 2017-08-26: 3 616690 local, remote - 0.4.0-r2 + 0.4.0-r2 @@ -45,5 +45,5 @@ CVE-2017-8296 b-man - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-07.xml index 4db322cb46..82a0c3974d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-07.xml @@ -7,12 +7,12 @@ evilvte 2017-08-21 - 2017-08-21: 1 + 2017-08-26: 2 611290 remote - 0.5.1 + 0.5.1 @@ -45,5 +45,5 @@ b-man - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-08.xml index 1055905bd4..3cc37835c8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-08.xml @@ -12,8 +12,8 @@ remote - 1.0.6-r8 - 1.0.6-r8 + 1.0.6-r8 + 1.0.6-r8 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-09.xml new file mode 100644 index 0000000000..8a4b54e0c2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-09.xml @@ -0,0 +1,50 @@ + + + + AutoTrace: Multiple vulnerabilities + Multiple vulnerabilities have been found in AutoTrace, the worst of + which could cause a Denial of Service condition. + + autotrace + 2017-08-26 + 2017-08-26: 1 + 613992 + 619040 + remote + + + 0.31.1-r8 + + + +

AutoTrace converts bitmap to vector graphics.

+
+ +

Heap-based buffer overflows have been discovered in the + pstoedit_suffix_table_init and pnm_load_rawpbm functions of AutoTrace. +

+
+ +

Remote attackers, by enticing a user to process a crafted bmp image + file, could cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for AutoTrace. We recommend that users + unmerge AutoTrace: +

+ + + # emerge --unmerge "media-gfx/autotrace" + +
+ + CVE-2016-7392 + CVE-2017-9153 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-10.xml new file mode 100644 index 0000000000..a65b1b12d8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-10.xml @@ -0,0 +1,55 @@ + + + + jbig2dec: User-assisted execution of arbitrary code + Multiple integer overflow flaws have been discovered in jbig2dec, + possibly resulting in execution of arbitrary code or Denial of Service. + + jbig2dec + 2017-08-26 + 2017-08-26: 1 + 616464 + remote + + + 0.13-r4 + 0.13-r4 + + + +

jbig2dec is a decoder implementation of the JBIG2 image compression + format. +

+
+ +

Integer overflow errors have been discovered in the + jbig2_decode_symbol_dict, jbig2_build_huffman_table, and + jbig2_image_compose functions of jbig2dec. +

+
+ +

A remote attacker, by enticing a user to open a specially crafted JBIG2 + file using an application linked against jbig2dec, could possibly execute + arbitrary code with the privileges of the process or cause a Denial of + Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All jbig2dec users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/jbig2dec-0.13-r4" + +
+ + CVE-2017-7885 + CVE-2017-7975 + CVE-2017-7976 + + BlueKnight + ackle +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-01.xml new file mode 100644 index 0000000000..3aa8b6e95c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-01.xml @@ -0,0 +1,51 @@ + + + + MCollective: Remote Code Execution + A vulnerability in MCollective might allow remote attackers to + execute arbitrary code. + + mcollective + 2017-09-04 + 2017-09-04: 1 + 624704 + remote + + + 2.11.0 + 2.11.0 + + + +

MCollective is a framework to build server orchestration or parallel job + execution systems. +

+
+ +

A vulnerability was discovered in MCollective which allowed for + deserialized YAML from agents without calling safe_load. This allows the + potential for arbitrary code execution on the server. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All MCollective users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/mcollective-2.11.0" + +
+ + CVE-2017-2292 + + Zlogene + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-02.xml new file mode 100644 index 0000000000..9a5f02e501 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-02.xml @@ -0,0 +1,115 @@ + + + + Binutils: Multiple vulnerabilities + Multiple vulnerabilities have been found in Binutils, the worst of + which may allow remote attackers to cause a Denial of Service condition. + + binutils + 2017-09-17 + 2017-09-17: 1 + 618006 + 618514 + 618516 + 618520 + 618826 + 621130 + 624524 + 624702 + remote + + + 2.28.1 + 2.28.1 + + + +

The GNU Binutils are a collection of tools to create, modify and analyse + binary files. Many of the files use BFD, the Binary File Descriptor + library, to do low-level manipulation. +

+
+ +

Multiple vulnerabilities have been discovered in Binutils. Please review + References for additional information. +

+
+ +

A remote attacker, by enticing a user to compile/execute a specially + crafted ELF file, PE File, or binary file, could possibly cause a Denial + of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Binutils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-devel/binutils-2.28.1" + +
+ + + CVE-2017-6965 + + + CVE-2017-6966 + + + CVE-2017-6969 + + + CVE-2017-7614 + + + CVE-2017-8392 + + + CVE-2017-8393 + + + CVE-2017-8394 + + + CVE-2017-8395 + + + CVE-2017-8396 + + + CVE-2017-8397 + + + CVE-2017-8398 + + + CVE-2017-8421 + + + CVE-2017-9038 + + + CVE-2017-9039 + + + CVE-2017-9040 + + + CVE-2017-9041 + + + CVE-2017-9042 + + + CVE-2017-9742 + + + CVE-2017-9954 + + + b-man + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-03.xml new file mode 100644 index 0000000000..0ffee333d0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-03.xml @@ -0,0 +1,61 @@ + + + + WebKitGTK+: Multiple vulnerabilities + Multiple vulnerabilities have been found in WebkitGTK+, the worst + of which may allow remote attackers to execute arbitrary code. + + webkit-gtk + 2017-09-17 + 2017-09-17: 1 + 622442 + remote + + + 2.16.5 + 2.16.5 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, + suitable for projects requiring any kind of web integration, offers + Webkit’s full functionality and is used on a wide range of systems. +

+
+ +

Multiple vulnerabilities have been discovered in WebkitGTK+. Please + review the references below for details. +

+
+ +

A remote attacker could execute arbitrary code via crafted web content.

+
+ +

There is no known workaround at this time.

+
+ +

All WebkitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.16.5" + + +

Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +

+
+ + + CVE-2017-2424 + + + CVE-2017-2538 + + WebkitGTK+ + Security Announce + + + BlueKnight + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-04.xml new file mode 100644 index 0000000000..d649344554 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-04.xml @@ -0,0 +1,55 @@ + + + + mod_gnutls: Certificate validation error + A vulnerability in mod_gnutls allows remote attackers to spoof + clients via crafted certificates. + + mod_gnutls + 2017-09-17 + 2017-09-17: 1 + 541038 + remote + + + 0.7.3 + 0.7.3 + + + +

mod_gnutls is an extension for ​Apache’s httpd. It uses the + ​GnuTLS library to provide HTTPS. It supports some protocols and + features that mod_ssl does not. +

+ +
+ +

It was discovered that the authentication hook in mod_gnutls does not + validate client’s certificates even when option + “GnuTLSClientVerify” is set to “require”. +

+
+ +

A remote attacker could present a crafted certificate and spoof clients + data. +

+
+ +

There is no known workaround at this time.

+
+ +

All mod_gnutls users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apache/mod_gnutls-0.7.3" + +
+ + + CVE-2015-2091 + + + whissi + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-05.xml new file mode 100644 index 0000000000..771f0cdc9c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-05.xml @@ -0,0 +1,50 @@ + + + + chkrootkit: Local privilege escalation + A vulnerability in chkrootkit may allow local users to gain root + privileges. + + chkrootkit + 2017-09-17 + 2017-09-17: 1 + 512356 + local + + + 0.50 + 0.50 + + + +

chkrootkit is a tool to locally check for signs of a rootkit.

+
+ +

When /tmp is mounted without the noexec option chkrootkit will execute + files in /tmp with root privileges. +

+
+ +

A local attacker could possibly execute arbitrary code with root + privileges. +

+
+ +

Users should mount /tmp with noexec option.

+
+ +

All chkrootkit users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-forensics/chkrootkit-0.50" + +
+ + + CVE-2014-0476 + + + BlueKnight + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-06.xml new file mode 100644 index 0000000000..e7fa1c1623 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-06.xml @@ -0,0 +1,56 @@ + + + + Supervisor: command injection vulnerability + A vulnerability in Supervisor might allow remote attackers to + execute arbitrary code. + + + supervisor + 2017-09-17 + 2017-09-17: 1 + 626100 + remote + + + 3.1.4 + 3.1.4 + + + +

Supervisor is a client/server system that allows its users to monitor + and control a number of processes on UNIX-like operating systems. +

+
+ +

A vulnerability in Supervisor was discovered in which an authenticated + client could send malicious XML-RPC requests and supervidord will run + them as shell commands with process privileges. In some cases, + supervisord is configured with root permissions. +

+
+ +

A remote attacker could execute arbitrary code with the privileges of + the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All Supervisor users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose "=app-admin/supervisor-3.1.4" + + +
+ + + CVE-2017-11610 + + + b-man + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-07.xml new file mode 100644 index 0000000000..aebd775ed1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-07.xml @@ -0,0 +1,60 @@ + + + + Kpathsea: User-assisted execution of arbitrary code + A vulnerability in Kpathsea allows remote attackers to execute + arbitrary commands by manipulating the -tex option from mpost program. + + kpathsea + 2017-09-17 + 2017-09-17: 1 + 612328 + remote + + + 6.2.2_p20160523 + 6.2.2_p20160523 + + + +

Kpathsea is a library to do path searching. It is used by TeX Live and + others TeX related software. +

+
+ +

It was discovered that the mpost program from the shell_escape_commands + list is capable of executing arbitrary external programs during the + conversion of .tex files. The responsible function is runpopen() + (texmfmp.c). +

+
+ +

A remote attacker, by enticing a user to open a specially crafted .tex + file, could possibly execute arbitrary code with the privileges of the + process. +

+
+ +

There is no known workaround at this time.

+
+ +

All Kpathsea users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-libs/kpathsea-6.2.2_p20160523" + + +

Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +

+
+ + + CVE-2016-10243 + + + whissi + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-08.xml new file mode 100644 index 0000000000..4ae457a5b5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-08.xml @@ -0,0 +1,66 @@ + + + + GDK-PixBuf: Multiple vulnerabilities + Multiple vulnerabilities have been found in GDK-PixBuf, the worst + of which could result in the execution of arbitrary code. + + gdk-pixbuf + 2017-09-17 + 2017-09-17: 1 + 592976 + 611390 + 630026 + remote + + + 2.36.9 + 2.36.9 + + + +

GDK-PixBuf is an image loading library for GTK+.

+
+ +

Multiple vulnerabilities have been discovered in GDK-PixBuf. Please + review the referenced CVE identifiers for details. +

+
+ +

A remote attacker, by sending a specially crafted TIFF, JPEG, or URL, + could execute arbitrary code with the privileges of the process or cause + a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All GDK-PixBuf users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/gdk-pixbuf-2.36.9" + + +

Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +

+
+ + + CVE-2017-6311 + + + CVE-2017-6312 + + + CVE-2017-6313 + + + CVE-2017-6314 + + + b-man + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-09.xml new file mode 100644 index 0000000000..b0fb60e8ed --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-09.xml @@ -0,0 +1,75 @@ + + + + Subversion: Arbitrary code execution + A command injection vulnerability in Subversion may allow remote + attackers to execute arbitrary code. + + subversion + 2017-09-17 + 2017-09-17: 1 + 627480 + remote + + + 1.9.7 + 1.8.18 + 1.9.7 + + + +

Subversion is a version control system intended to eventually replace + CVS. Like CVS, it has an optional client-server architecture (where the + server can be an Apache server running mod_svn, or an ssh program as in + CVS’s :ext: method). In addition to supporting the features found in + CVS, Subversion also provides support for moving and copying files and + directories. +

+
+ +

Specially crafted ‘ssh://...’ URLs may allow the owner of the + repository to execute arbitrary commands on client’s machine if those + commands are already installed on the client’s system. This is + especially dangerous when the third-party repository has one or more + submodules with specially crafted ‘ssh://...’ URLs. Each time the + repository is recursively cloned or submodules are updated the payload + will be triggered. +

+
+ +

A remote attacker, by enticing a user to clone a specially crafted + repository, could possibly execute arbitrary code with the privileges of + the process. +

+
+ +

There are several alternative ways to fix this vulnerability. Please + refer to Subversion Team Announce for more details. +

+
+ +

All Subversion 1.9.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-vcs/subversion-1.9.7" + + +

All Subversion 1.8.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-vcs/subversion-1.8.18" + +
+ + + CVE-2017-9800 + + + Subversion Team Announce + + + b-man + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-10.xml new file mode 100644 index 0000000000..1583ae4cf4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-10.xml @@ -0,0 +1,61 @@ + + + + Git: Command injection + A command injection vulnerability in Git may allow remote attackers + to execute arbitrary code. + + git + 2017-09-17 + 2017-09-17: 1 + 627488 + remote + + + 2.13.5 + 2.13.5 + + + +

Git is a small and fast distributed version control system designed to + handle small and large projects. +

+
+ +

Specially crafted ‘ssh://...’ URLs may allow the owner of the + repository to execute arbitrary commands on client’s machine if those + commands are already installed on the client’s system. This is + especially dangerous when the third-party repository has one or more + submodules with specially crafted ‘ssh://...’ URLs. Each time the + repository is recursively cloned or submodules are updated the payload + will be triggered. +

+
+ +

A remote attacker, by enticing a user to clone a specially crafted + repository, could possibly execute arbitrary code with the privileges of + the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All Git users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.13.5" + +
+ + + CVE-2017-1000117 + + Mailing + list ARChives (MARC) Git Team Announce + + + b-man + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-11.xml new file mode 100644 index 0000000000..c9bbbce3d8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-11.xml @@ -0,0 +1,55 @@ + + + + GIMPS: Root privilege escalation + Gentoo's GIMPS ebuilds are vulnerable to privilege escalation due + to improper permissions. A local attacker could use it to gain root + privileges. + + gimps + 2017-09-17 + 2017-09-17: 1 + 603408 + local + + + 28.10-r1 + 28.10-r1 + + + +

GIMPS, the Great Internet Mersenne Prime Search, is a software capable + of find Mersenne Primes, which are used in cryptography. GIMPS is also + used for hardware testing. +

+
+ +

It was discovered that Gentoo’s default GIMPS installation suffered + from a privilege escalation vulnerability in the init script. This script + calls an unsafe “chown -R” command in checkconfig() function. +

+
+ +

A local attacker who does not belong to the root group, but has the + ability to modify the /var/lib/gimps directory can escalate privileges to + the root group. +

+
+ +

There is no known workaround at this time.

+
+ +

All GIMPS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sci-mathematics/gimps-28.10-r1" + + +
+ + CVE-2017-14484 + + BlueKnight + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-12.xml new file mode 100644 index 0000000000..ccad06cd75 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-12.xml @@ -0,0 +1,80 @@ + + + + Perl: Race condition vulnerability + A vulnerability in module File::Path for Perl allows local + attackers to set arbitrary mode values on arbitrary files bypassing + security restrictions. + + perl + 2017-09-17 + 2017-09-17: 1 + 620304 + local + + + 5.24.1-r2 + 5.24.1-r2 + + + 2.130.0 + 2.130.0 + + + 2.130.0 + 2.130.0 + + + +

File::Path module provides a convenient way to create directories of + arbitrary depth and to delete an entire directory subtree from the + filesystem. +

+
+ +

A race condition occurs within concurrent environments. This condition + was discovered by The cPanel Security Team in the rmtree and remove_tree + functions in the File-Path module before 2.13 for Perl. This is due to + the time-of-check-to-time-of-use (TOCTOU) race condition between the + stat() that decides the inode is a directory and the chmod() that tries + to make it user-rwx. +

+
+ +

A local attacker could exploit this condition to set arbitrary mode + values on arbitrary files and hence bypass security restrictions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Perl users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/perl-5.24.1-r2" + + +

All File-Path users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=perl-core/File-Path-2.130.0" + + +

All Perl-File-Path users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=virtual/perl-File-Path-2.130.0" + +
+ + + CVE-2017-6512 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-13.xml new file mode 100644 index 0000000000..65d0d96e6e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-13.xml @@ -0,0 +1,50 @@ + + + + SquirrelMail: Remote Code Execution + A vulnerability in SquirrelMail might allow remote attackers to + execute arbitrary code. + + squirrelmail + 2017-09-17 + 2017-09-17: 1 + 616700 + remote + + + 1.4.23_pre20140426 + + + +

SquirrelMail is a webmail package written in PHP. It supports IMAP and + SMTP and can optionally be installed with SQL support. +

+
+ +

It was discovered that the sendmail.cf file is mishandled in a popen + call. +

+
+ +

A remote attacker, by enticing a user to open an e-mail attachment, + could execute arbitrary shell commands. +

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for SquirrelMail and recommends that + users unmerge the package: +

+ + + # emerge --unmerge "mail-client/squirrelmail" + +
+ + CVE-2017-7692 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-14.xml new file mode 100644 index 0000000000..17ac2965f5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-14.xml @@ -0,0 +1,62 @@ + + + + cURL: Multiple vulnerabilities + Multiple vulnerabilities have been found in cURL, the worst of + which may allow attackers to bypass intended restrictions. + + curl + 2017-09-17 + 2017-09-17: 1 + 615870 + 615994 + 626776 + remote + + + 7.55.1 + 7.55.1 + + + +

cURL is a tool and libcurl is a library for transferring data with URL + syntax. +

+
+ +

Multiple vulnerabilities have been discovered in cURL. Please review the + CVE identifiers referenced below for details. +

+
+ +

Remote attackers could cause a Denial of Service condition, obtain + sensitive information, or bypass intended restrictions for TLS sessions. +

+
+ +

There is no known workaround at this time.

+
+ +

All cURL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.55.1" + +
+ + + CVE-2017-1000099 + + + CVE-2017-1000100 + + + CVE-2017-1000101 + + CVE-2017-7407 + CVE-2017-7468 + + BlueKnight + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 87171a4dae..8d0bb23cfd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 21 Aug 2017 16:39:23 +0000 +Mon, 18 Sep 2017 19:39:14 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 2c23e69a25..defda47548 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -e6b03f4f47a8d3f64f4dc686f054a6ecc4d23f8e 1503278719 2017-08-21T01:25:19+00:00 +1426d2aa885beb439e28d2ecdcbbb79fc0b7b9f9 1505683118 2017-09-17T21:18:38+00:00 From ab43f818bc910381428ee1d7a02d7c2c5ebf9b25 Mon Sep 17 00:00:00 2001 From: David Michael Date: Mon, 18 Sep 2017 13:03:53 -0700 Subject: [PATCH 02/14] bump(sys-devel/binutils): sync with upstream --- .../md5-cache/sys-devel/binutils-2.22-r1 | 13 - .../md5-cache/sys-devel/binutils-2.24-r3 | 13 - .../md5-cache/sys-devel/binutils-2.25.1-r1 | 2 +- .../{binutils-2.23.2 => binutils-2.26.1} | 16 +- .../{binutils-2.25-r1 => binutils-2.27-r1} | 14 +- .../{binutils-2.21.1-r1 => binutils-2.28.1} | 16 +- .../{binutils-2.25 => binutils-2.29} | 14 +- .../md5-cache/sys-devel/binutils-9999 | 4 +- .../sys-devel/binutils/ChangeLog | 141 - .../sys-devel/binutils/ChangeLog-2015 | 2496 ----------------- .../sys-devel/binutils/Manifest | 31 +- .../binutils/binutils-2.21.1-r1.ebuild | 11 - .../binutils/binutils-2.22-r1.ebuild | 11 - .../binutils/binutils-2.24-r3.ebuild | 9 - .../binutils/binutils-2.25.1-r1.ebuild | 1 - ...s-2.23.2.ebuild => binutils-2.26.1.ebuild} | 8 +- ...ls-2.25.ebuild => binutils-2.27-r1.ebuild} | 5 +- .../sys-devel/binutils/binutils-2.28.1.ebuild | 10 + ...ls-2.25-r1.ebuild => binutils-2.29.ebuild} | 7 +- .../sys-devel/binutils/binutils-9999.ebuild | 5 +- .../sys-devel/binutils/metadata.xml | 1 - 21 files changed, 61 insertions(+), 2767 deletions(-) delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.22-r1 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.24-r3 rename sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/{binutils-2.23.2 => binutils-2.26.1} (58%) rename sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/{binutils-2.25-r1 => binutils-2.27-r1} (62%) rename sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/{binutils-2.21.1-r1 => binutils-2.28.1} (54%) rename sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/{binutils-2.25 => binutils-2.29} (62%) delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils/ChangeLog delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils/ChangeLog-2015 delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.21.1-r1.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.22-r1.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.24-r3.ebuild rename sdk_container/src/third_party/portage-stable/sys-devel/binutils/{binutils-2.23.2.ebuild => binutils-2.26.1.ebuild} (61%) rename sdk_container/src/third_party/portage-stable/sys-devel/binutils/{binutils-2.25.ebuild => binutils-2.27-r1.ebuild} (82%) create mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.28.1.ebuild rename sdk_container/src/third_party/portage-stable/sys-devel/binutils/{binutils-2.25-r1.ebuild => binutils-2.29.ebuild} (77%) diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.22-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.22-r1 deleted file mode 100644 index d8db3a394a..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.22-r1 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install postinst postrm prepare test unpack -DEPEND=>=app-portage/elt-patches-20170317 sys-devel/gnuconfig >=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) test? ( dev-util/dejagnu ) nls? ( sys-devel/gettext ) sys-devel/flex virtual/yacc -DESCRIPTION=Tools necessary to build programs -EAPI=4 -HOMEPAGE=https://sourceware.org/binutils/ -IUSE=cxx multitarget nls static-libs test vanilla zlib -KEYWORDS=alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd -LICENSE=|| ( GPL-3 LGPL-3 ) -RDEPEND=>=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) -SLOT=2.22 -SRC_URI=mirror://gnu/binutils/binutils-2.22.tar.bz2 mirror://gentoo/binutils-2.22-patches-1.5.tar.bz2 https://dev.gentoo.org/~vapier/dist/binutils-2.22-patches-1.5.tar.bz2 https://dev.gentoo.org/~tamiko/distfiles/binutils-2.22-patches-1.5.tar.bz2 -_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b gnuconfig b8ec1c34be4ff9dac7ad4034d277936b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 97f470f374f2e94ccab04a2fb21d811e toolchain-binutils 1edb7168d2c42b39826e5dcaa8232aec toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 unpacker f40f7b4bd5aa88c2a4ba7b0d1e0ded70 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=8742ea51f55b5bc9d49ccf141cdb15ed diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.24-r3 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.24-r3 deleted file mode 100644 index 5ec0123533..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.24-r3 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile install postinst postrm test unpack -DEPEND=>=app-portage/elt-patches-20170317 sys-devel/gnuconfig >=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) test? ( dev-util/dejagnu ) nls? ( sys-devel/gettext ) sys-devel/flex virtual/yacc -DESCRIPTION=Tools necessary to build programs -EAPI=0 -HOMEPAGE=https://sourceware.org/binutils/ -IUSE=cxx multitarget nls static-libs test vanilla zlib -KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 -amd64-fbsd -sparc-fbsd ~x86-fbsd -LICENSE=|| ( GPL-3 LGPL-3 ) -RDEPEND=>=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) -SLOT=2.24 -SRC_URI=mirror://gnu/binutils/binutils-2.24.tar.bz2 mirror://gentoo/binutils-2.24-patches-1.4.tar.xz https://dev.gentoo.org/~vapier/dist/binutils-2.24-patches-1.4.tar.xz https://dev.gentoo.org/~tamiko/distfiles/binutils-2.24-patches-1.4.tar.xz -_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b gnuconfig b8ec1c34be4ff9dac7ad4034d277936b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 97f470f374f2e94ccab04a2fb21d811e toolchain-binutils 1edb7168d2c42b39826e5dcaa8232aec toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 unpacker f40f7b4bd5aa88c2a4ba7b0d1e0ded70 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=d7a0389094ad8399f6880f3340fb0079 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.25.1-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.25.1-r1 index 7bf2215b30..1f944b7e7d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.25.1-r1 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.25.1-r1 @@ -10,4 +10,4 @@ RDEPEND=>=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) SLOT=2.25.1 SRC_URI=mirror://gnu/binutils/binutils-2.25.1.tar.bz2 mirror://gentoo/binutils-2.25.1-patches-1.1.tar.xz https://dev.gentoo.org/~vapier/dist/binutils-2.25.1-patches-1.1.tar.xz https://dev.gentoo.org/~tamiko/distfiles/binutils-2.25.1-patches-1.1.tar.xz _eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b gnuconfig b8ec1c34be4ff9dac7ad4034d277936b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 97f470f374f2e94ccab04a2fb21d811e toolchain-binutils 1edb7168d2c42b39826e5dcaa8232aec toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 unpacker f40f7b4bd5aa88c2a4ba7b0d1e0ded70 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=ca8181f58cc6ee426330830408e7506e +_md5_=6b6b35ff56af59982f2c6fdffa8414b5 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.23.2 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.26.1 similarity index 58% rename from sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.23.2 rename to sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.26.1 index b897fb7b67..e4d1e7a64a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.23.2 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.26.1 @@ -1,13 +1,13 @@ DEFINED_PHASES=compile configure install postinst postrm prepare test unpack -DEPEND=>=app-portage/elt-patches-20170317 sys-devel/gnuconfig >=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) test? ( dev-util/dejagnu ) nls? ( sys-devel/gettext ) sys-devel/flex virtual/yacc +DEPEND=>=app-portage/elt-patches-20170317 sys-devel/gnuconfig >=sys-devel/binutils-config-3 sys-libs/zlib test? ( dev-util/dejagnu ) nls? ( sys-devel/gettext ) sys-devel/flex virtual/yacc DESCRIPTION=Tools necessary to build programs -EAPI=4 +EAPI=5 HOMEPAGE=https://sourceware.org/binutils/ -IUSE=cxx multitarget nls static-libs test vanilla zlib -KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 -amd64-fbsd -sparc-fbsd -x86-fbsd +IUSE=cxx multitarget nls static-libs test vanilla +KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd LICENSE=|| ( GPL-3 LGPL-3 ) -RDEPEND=>=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) -SLOT=2.23.2 -SRC_URI=mirror://gnu/binutils/binutils-2.23.2.tar.bz2 mirror://gentoo/binutils-2.23.2-patches-1.0.tar.xz https://dev.gentoo.org/~vapier/dist/binutils-2.23.2-patches-1.0.tar.xz https://dev.gentoo.org/~tamiko/distfiles/binutils-2.23.2-patches-1.0.tar.xz +RDEPEND=>=sys-devel/binutils-config-3 sys-libs/zlib +SLOT=2.26.1 +SRC_URI=mirror://gnu/binutils/binutils-2.26.1.tar.bz2 mirror://gentoo/binutils-2.26.1-patches-1.0.tar.xz https://dev.gentoo.org/~vapier/dist/binutils-2.26.1-patches-1.0.tar.xz https://dev.gentoo.org/~tamiko/distfiles/binutils-2.26.1-patches-1.0.tar.xz _eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b gnuconfig b8ec1c34be4ff9dac7ad4034d277936b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 97f470f374f2e94ccab04a2fb21d811e toolchain-binutils 1edb7168d2c42b39826e5dcaa8232aec toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 unpacker f40f7b4bd5aa88c2a4ba7b0d1e0ded70 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=3beaec6327c9f6807627a02e7e0c9031 +_md5_=f1f8c0d541091501e2d049f6668be0bf diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.25-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.27-r1 similarity index 62% rename from sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.25-r1 rename to sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.27-r1 index fa3a1c9506..0b8f04faa1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.25-r1 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.27-r1 @@ -1,13 +1,13 @@ DEFINED_PHASES=compile configure install postinst postrm prepare test unpack -DEPEND=>=app-portage/elt-patches-20170317 sys-devel/gnuconfig >=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) test? ( dev-util/dejagnu ) nls? ( sys-devel/gettext ) sys-devel/flex virtual/yacc +DEPEND=>=app-portage/elt-patches-20170317 sys-devel/gnuconfig >=sys-devel/binutils-config-3 sys-libs/zlib test? ( dev-util/dejagnu ) nls? ( sys-devel/gettext ) sys-devel/flex virtual/yacc DESCRIPTION=Tools necessary to build programs -EAPI=4 +EAPI=5 HOMEPAGE=https://sourceware.org/binutils/ -IUSE=cxx multitarget nls static-libs test vanilla zlib +IUSE=cxx multitarget nls static-libs test vanilla KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd LICENSE=|| ( GPL-3 LGPL-3 ) -RDEPEND=>=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) -SLOT=2.25 -SRC_URI=mirror://gnu/binutils/binutils-2.25.tar.bz2 mirror://gentoo/binutils-2.25-patches-1.2.tar.xz https://dev.gentoo.org/~vapier/dist/binutils-2.25-patches-1.2.tar.xz https://dev.gentoo.org/~tamiko/distfiles/binutils-2.25-patches-1.2.tar.xz +RDEPEND=>=sys-devel/binutils-config-3 sys-libs/zlib +SLOT=2.27 +SRC_URI=mirror://gnu/binutils/binutils-2.27.tar.bz2 mirror://gentoo/binutils-2.27-patches-1.1.tar.xz https://dev.gentoo.org/~vapier/dist/binutils-2.27-patches-1.1.tar.xz https://dev.gentoo.org/~tamiko/distfiles/binutils-2.27-patches-1.1.tar.xz _eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b gnuconfig b8ec1c34be4ff9dac7ad4034d277936b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 97f470f374f2e94ccab04a2fb21d811e toolchain-binutils 1edb7168d2c42b39826e5dcaa8232aec toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 unpacker f40f7b4bd5aa88c2a4ba7b0d1e0ded70 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=3fd2fa56ac810763ae15175f5f1381f5 +_md5_=3fc99d09f5cfce3fd507c28254c8905c diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.21.1-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.28.1 similarity index 54% rename from sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.21.1-r1 rename to sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.28.1 index c9ee874cd3..5053afc808 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.21.1-r1 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.28.1 @@ -1,13 +1,13 @@ DEFINED_PHASES=compile configure install postinst postrm prepare test unpack -DEPEND=>=app-portage/elt-patches-20170317 sys-devel/gnuconfig >=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) test? ( dev-util/dejagnu ) nls? ( sys-devel/gettext ) sys-devel/flex virtual/yacc +DEPEND=>=app-portage/elt-patches-20170317 sys-devel/gnuconfig >=sys-devel/binutils-config-3 sys-libs/zlib test? ( dev-util/dejagnu ) nls? ( sys-devel/gettext ) sys-devel/flex virtual/yacc DESCRIPTION=Tools necessary to build programs -EAPI=4 +EAPI=5 HOMEPAGE=https://sourceware.org/binutils/ -IUSE=cxx multitarget nls static-libs test vanilla zlib -KEYWORDS=alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 -sparc-fbsd -x86-fbsd +IUSE=cxx multitarget nls static-libs test vanilla +KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd LICENSE=|| ( GPL-3 LGPL-3 ) -RDEPEND=>=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) -SLOT=2.21.1 -SRC_URI=mirror://gnu/binutils/binutils-2.21.1.tar.bz2 mirror://gentoo/binutils-2.21.1-patches-1.4.tar.bz2 https://dev.gentoo.org/~vapier/dist/binutils-2.21.1-patches-1.4.tar.bz2 https://dev.gentoo.org/~tamiko/distfiles/binutils-2.21.1-patches-1.4.tar.bz2 +RDEPEND=>=sys-devel/binutils-config-3 sys-libs/zlib +SLOT=2.28.1 +SRC_URI=mirror://gnu/binutils/binutils-2.28.1.tar.bz2 mirror://gentoo/binutils-2.28.1-patches-1.0.tar.xz https://dev.gentoo.org/~vapier/dist/binutils-2.28.1-patches-1.0.tar.xz https://dev.gentoo.org/~tamiko/distfiles/binutils-2.28.1-patches-1.0.tar.xz _eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b gnuconfig b8ec1c34be4ff9dac7ad4034d277936b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 97f470f374f2e94ccab04a2fb21d811e toolchain-binutils 1edb7168d2c42b39826e5dcaa8232aec toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 unpacker f40f7b4bd5aa88c2a4ba7b0d1e0ded70 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=7490f14f51326ba63b5f92673d9f3ed4 +_md5_=20a24bb0d5ff117a4fa3d150319d0fbc diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.25 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.29 similarity index 62% rename from sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.25 rename to sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.29 index 3c0abb809b..08b5038a5e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.25 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-2.29 @@ -1,13 +1,13 @@ DEFINED_PHASES=compile configure install postinst postrm prepare test unpack -DEPEND=>=app-portage/elt-patches-20170317 sys-devel/gnuconfig >=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) test? ( dev-util/dejagnu ) nls? ( sys-devel/gettext ) sys-devel/flex virtual/yacc +DEPEND=>=app-portage/elt-patches-20170317 sys-devel/gnuconfig >=sys-devel/binutils-config-3 sys-libs/zlib test? ( dev-util/dejagnu ) nls? ( sys-devel/gettext ) sys-devel/flex virtual/yacc DESCRIPTION=Tools necessary to build programs -EAPI=4 +EAPI=5 HOMEPAGE=https://sourceware.org/binutils/ -IUSE=cxx multitarget nls static-libs test vanilla zlib +IUSE=cxx multitarget nls static-libs test vanilla KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd LICENSE=|| ( GPL-3 LGPL-3 ) -RDEPEND=>=sys-devel/binutils-config-3 zlib? ( sys-libs/zlib ) -SLOT=2.25 -SRC_URI=mirror://gnu/binutils/binutils-2.25.tar.bz2 mirror://gentoo/binutils-2.25-patches-1.1.tar.xz https://dev.gentoo.org/~vapier/dist/binutils-2.25-patches-1.1.tar.xz https://dev.gentoo.org/~tamiko/distfiles/binutils-2.25-patches-1.1.tar.xz +RDEPEND=>=sys-devel/binutils-config-3 sys-libs/zlib +SLOT=2.29 +SRC_URI=mirror://gnu/binutils/binutils-2.29.tar.bz2 mirror://gentoo/binutils-2.29-patches-1.0.tar.xz https://dev.gentoo.org/~vapier/dist/binutils-2.29-patches-1.0.tar.xz https://dev.gentoo.org/~tamiko/distfiles/binutils-2.29-patches-1.0.tar.xz _eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b gnuconfig b8ec1c34be4ff9dac7ad4034d277936b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 97f470f374f2e94ccab04a2fb21d811e toolchain-binutils 1edb7168d2c42b39826e5dcaa8232aec toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 unpacker f40f7b4bd5aa88c2a4ba7b0d1e0ded70 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=083e754f12312e721e12e06c4a57d2d5 +_md5_=24f2f60a945af2707d0c9619cd761b42 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-9999 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-9999 index f613d0d260..4c121ed4ce 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-9999 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-9999 @@ -1,11 +1,11 @@ DEFINED_PHASES=compile configure install postinst postrm prepare test unpack DEPEND=dev-vcs/git >=app-portage/elt-patches-20170317 sys-devel/gnuconfig >=sys-devel/binutils-config-3 sys-libs/zlib test? ( dev-util/dejagnu ) nls? ( sys-devel/gettext ) sys-devel/flex virtual/yacc DESCRIPTION=Tools necessary to build programs -EAPI=4 +EAPI=5 HOMEPAGE=https://sourceware.org/binutils/ IUSE=cxx multitarget nls static-libs test vanilla LICENSE=|| ( GPL-3 LGPL-3 ) RDEPEND=>=sys-devel/binutils-config-3 sys-libs/zlib SLOT=git _eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b git-2 195a672bfaf52d868442171c9469bbb6 gnuconfig b8ec1c34be4ff9dac7ad4034d277936b libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multilib 97f470f374f2e94ccab04a2fb21d811e toolchain-binutils 1edb7168d2c42b39826e5dcaa8232aec toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 unpacker f40f7b4bd5aa88c2a4ba7b0d1e0ded70 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=aea334f6873c46c492cada17c05a7a48 +_md5_=6302eb1a0e9111cc634d6b7550d215a3 diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/ChangeLog b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/ChangeLog deleted file mode 100644 index 5888f0abaf..0000000000 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/ChangeLog +++ /dev/null @@ -1,141 +0,0 @@ -# ChangeLog for sys-devel/binutils -# Copyright 1999-2016 Gentoo Foundation; Distributed under the GPL v2 -# (auto-generated from git log) - -*binutils-9999 (09 Aug 2015) -*binutils-2.25.1 (09 Aug 2015) -*binutils-2.25-r1 (09 Aug 2015) -*binutils-2.25 (09 Aug 2015) -*binutils-2.24-r3 (09 Aug 2015) -*binutils-2.23.2 (09 Aug 2015) -*binutils-2.22-r1 (09 Aug 2015) -*binutils-2.21.1-r1 (09 Aug 2015) - - 09 Aug 2015; Robin H. Johnson - +binutils-2.21.1-r1.ebuild, +binutils-2.22-r1.ebuild, - +binutils-2.23.2.ebuild, +binutils-2.24-r3.ebuild, +binutils-2.25.ebuild, - +binutils-2.25-r1.ebuild, +binutils-2.25.1.ebuild, +binutils-9999.ebuild, - +files/binutils-configure-LANG.patch, +metadata.xml: - proj/gentoo: Initial commit - - This commit represents a new era for Gentoo: - Storing the gentoo-x86 tree in Git, as converted from CVS. - - This commit is the start of the NEW history. - Any historical data is intended to be grafted onto this point. - - Creation process: - 1. Take final CVS checkout snapshot - 2. Remove ALL ChangeLog* files - 3. Transform all Manifests to thin - 4. Remove empty Manifests - 5. Convert all stale $Header$/$Id$ CVS keywords to non-expanded Git $Id$ - 5.1. Do not touch files with -kb/-ko keyword flags. - - Signed-off-by: Robin H. Johnson - X-Thanks: Alec Warner - did the GSoC 2006 migration - tests - X-Thanks: Robin H. Johnson - infra guy, herding this - project - X-Thanks: Nguyen Thai Ngoc Duy - Former Gentoo - developer, wrote Git features for the migration - X-Thanks: Brian Harring - wrote much python to improve - cvs2svn - X-Thanks: Rich Freeman - validation scripts - X-Thanks: Patrick Lauer - Gentoo dev, running new 2014 - work in migration - X-Thanks: Michał Górny - scripts, QA, nagging - X-Thanks: All of other Gentoo developers - many ideas and lots of paint on - the bikeshed - - 24 Aug 2015; Justin Lecher metadata.xml: - Use https by default - - Convert all URLs for sites supporting encrypted connections from http to - https - - Signed-off-by: Justin Lecher - - 24 Aug 2015; Mike Gilbert metadata.xml: - Revert DOCTYPE SYSTEM https changes in metadata.xml - - repoman does not yet accept the https version. - This partially reverts eaaface92ee81f30a6ac66fe7acbcc42c00dc450. - - Bug: https://bugs.gentoo.org/552720 - -*binutils-2.25.1-r1 (27 Aug 2015) - - 27 Aug 2015; Mike Frysinger -binutils-2.25.1.ebuild, - +binutils-2.25.1-r1.ebuild: - add upstream fixes for ld reloc processing #558382 - - Package-Manager: portage-2.2.20.1 - - 19 Sep 2015; Agostino Sarubbo binutils-2.25.1-r1.ebuild: - amd64 stable wrt bug #560792 - - Package-Manager: portage-2.2.20.1 - RepoMan-Options: --include-arches="amd64" - - 19 Sep 2015; Tobias Klausmann - binutils-2.25.1-r1.ebuild: - add alpha keyword - - Gentoo-Bug: 560792 - - Package-Manager: portage-2.2.20.1 - - 20 Sep 2015; Agostino Sarubbo binutils-2.25.1-r1.ebuild: - x86 stable wrt bug #560792 - - Package-Manager: portage-2.2.20.1 - RepoMan-Options: --include-arches="x86" - - 20 Sep 2015; Mike Frysinger binutils-2.25.1-r1.ebuild: - mark 2.25.1-r1 stable for arm64/ia64/m68k/s390/sh #560792 - - 21 Sep 2015; Agostino Sarubbo binutils-2.25.1-r1.ebuild: - sparc stable wrt bug #560792 - - Package-Manager: portage-2.2.20.1 - RepoMan-Options: --include-arches="sparc" - - 22 Sep 2015; Agostino Sarubbo binutils-2.25.1-r1.ebuild: - ppc stable wrt bug #560792 - - Package-Manager: portage-2.2.20.1 - RepoMan-Options: --include-arches="ppc" - - 23 Sep 2015; Agostino Sarubbo binutils-2.25.1-r1.ebuild: - ppc64 stable wrt bug #560792 - - Package-Manager: portage-2.2.20.1 - RepoMan-Options: --include-arches="ppc64" - - 30 Sep 2015; Jeroen Roovers binutils-2.25.1-r1.ebuild: - Stable for HPPA (bug #560792). - - Package-Manager: portage-2.2.20.1 - RepoMan-Options: --ignore-arches - - 03 Oct 2015; Mike Frysinger binutils-2.25.1-r1.ebuild: - mark 2.25.1-r1 stable #560792 - - 24 Jan 2016; Michał Górny metadata.xml: - Unify quoting in metadata.xml files for machine processing - - Force unified quoting in all metadata.xml files since lxml does not - preserve original use of single and double quotes. Ensuring unified - quoting before the process allows distinguishing the GLEP 67-related - metadata.xml changes from unrelated quoting changes. - - 24 Jan 2016; Michał Górny metadata.xml: - Replace all herds with appropriate projects (GLEP 67) - - Replace all uses of herd with appropriate project maintainers, or no - maintainers in case of herds requested to be disbanded. - - 24 Jan 2016; Michał Górny metadata.xml: - Set appropriate maintainer types in metadata.xml (GLEP 67) - diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/ChangeLog-2015 b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/ChangeLog-2015 deleted file mode 100644 index 8213f2290a..0000000000 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/ChangeLog-2015 +++ /dev/null @@ -1,2496 +0,0 @@ -# ChangeLog for sys-devel/binutils -# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sys-devel/binutils/ChangeLog,v 1.532 2015/07/27 03:27:18 vapier Exp $ - -*binutils-2.25.1 (27 Jul 2015) - - 27 Jul 2015; Mike Frysinger +binutils-2.25.1.ebuild: - Version bump. - -*binutils-2.25-r1 (25 May 2015) - - 25 May 2015; Mike Frysinger +binutils-2.25-r1.ebuild: - Add fix from upstream for gold and COPY relocs #549276 by Marcin Mirosław. - - 21 Apr 2015; Mike Frysinger binutils-2.25.ebuild: - Add fix from upstream for enabling mips/gold. - - 15 Mar 2015; Michał Górny binutils-2.25.ebuild: - Mark ~amd64-fbsd, bug #499212. Tested by nigoro. - - 14 Mar 2015; Mike Frysinger -binutils-2.19.1-r1.ebuild, - -binutils-2.20.1-r1.ebuild, -binutils-2.24.90.ebuild: - Move old ebuilds to toolchain overlay. - - 15 Feb 2015; Mike Frysinger binutils-2.25.ebuild: - Move into ~arch. - -*binutils-2.25 (09 Feb 2015) - - 09 Feb 2015; Mike Frysinger +binutils-2.25.ebuild: - Version bump #533454 by Lars Wendler. - - 08 Nov 2014; Mike Frysinger -binutils-2.22.52.0.4.ebuild, - -binutils-2.22.90.ebuild, -binutils-2.23.1.ebuild, - -binutils-2.23.51.0.1.ebuild, -binutils-2.23.51.0.2.ebuild, - -binutils-2.23.51.0.3.ebuild, -binutils-2.23.51.0.5.ebuild, - -binutils-2.23.51.0.6.ebuild, -binutils-2.23.51.0.7.ebuild, - -binutils-2.23.51.0.8.ebuild, -binutils-2.23.51.0.9.ebuild, - -binutils-2.23.52.0.1.ebuild, -binutils-2.23.52.0.2.ebuild, - -binutils-2.23.ebuild, -binutils-2.24-r2.ebuild, -binutils-2.24.51.0.1.ebuild, - -binutils-2.24.51.0.2.ebuild, -binutils-2.24.51.0.3.ebuild: - Move old versions to toolchain overlay. - - 08 Nov 2014; Mike Frysinger binutils-2.19.1-r1.ebuild, - binutils-2.20.1-r1.ebuild, binutils-2.21.1-r1.ebuild, binutils-2.22-r1.ebuild, - binutils-2.22.52.0.4.ebuild, binutils-2.22.90.ebuild, binutils-2.23.1.ebuild, - binutils-2.23.2.ebuild, binutils-2.23.51.0.1.ebuild, - binutils-2.23.51.0.2.ebuild, binutils-2.23.51.0.3.ebuild, - binutils-2.23.51.0.5.ebuild, binutils-2.23.51.0.6.ebuild, - binutils-2.23.51.0.7.ebuild, binutils-2.23.51.0.8.ebuild, - binutils-2.23.51.0.9.ebuild, binutils-2.23.52.0.1.ebuild, - binutils-2.23.52.0.2.ebuild, binutils-2.23.ebuild, binutils-2.24-r2.ebuild, - binutils-2.24.51.0.1.ebuild, binutils-2.24.51.0.2.ebuild: - Migrate older ebuilds to EAPI=4. - - 04 Nov 2014; Agostino Sarubbo binutils-2.24-r3.ebuild: - Stable for sparc, wrt bug #526482 - - 02 Nov 2014; Agostino Sarubbo binutils-2.24-r3.ebuild: - Stable for alpha, wrt bug #526482 - - 30 Oct 2014; Agostino Sarubbo binutils-2.24-r3.ebuild: - Stable for x86, wrt bug #526482 - - 29 Oct 2014; Agostino Sarubbo binutils-2.24-r3.ebuild: - Stable for amd64, wrt bug #526482 - - 23 Oct 2014; Anthony G. Basile binutils-2.24-r3.ebuild: - Stable ppc and ppc64, bug #526482 - - 22 Oct 2014; Mike Frysinger binutils-2.24-r3.ebuild: - Mark arm/arm64/ia64/m68k/s390/sh stable #526482. - - 22 Oct 2014; Jeroen Roovers binutils-2.24-r3.ebuild: - Stable for HPPA (bug #526482). - -*binutils-2.24.90 (22 Oct 2014) - - 22 Oct 2014; Mike Frysinger +binutils-2.24.90.ebuild: - Version bump. - - 14 Jun 2014; Mike Frysinger metadata.xml: - Add upstream CPE tag (security info). - -*binutils-2.24-r3 (03 Jun 2014) - - 03 Jun 2014; Mike Frysinger +binutils-2.24-r3.ebuild: - Fix from upstream for relax on alpha #366025 by Matt Turner. Fix from - upstream for as-needed on hppa #466924 by Jeroen Roovers. - -*binutils-2.24.51.0.3 (01 Feb 2014) - - 01 Feb 2014; Mike Frysinger +binutils-2.24.51.0.3.ebuild: - Version bump. - - 29 Jan 2014; Naohiro Aota binutils-2.24-r2.ebuild: - Add ~x86-fbsd. #499212 - -*binutils-2.24-r2 (19 Jan 2014) - - 19 Jan 2014; Mike Frysinger +binutils-2.24-r2.ebuild, - -binutils-2.24-r1.ebuild: - Add fix from upstream for --as-needed handling #497976 by Lars Wendler. - - 17 Jan 2014; Mike Frysinger binutils-2.23.2.ebuild, - binutils-2.24-r1.ebuild: - Add arm64 keywords. - - 16 Jan 2014; Mike Frysinger binutils-2.23.2.ebuild: - Mark m68k/s390/sh stable. - - 13 Jan 2014; Mike Frysinger binutils-2.24-r1.ebuild: - Add upstream fix for libdl checks in gold #347931 by Andreas Turriff. - -*binutils-2.24-r1 (07 Jan 2014) - - 07 Jan 2014; Patrick Lauer +binutils-2.24-r1.ebuild, - -binutils-2.24.ebuild: - Bump 2.24 so that all users get the fixes - - 06 Jan 2014; Mike Frysinger binutils-2.24.51.0.1.ebuild, - binutils-2.24.51.0.2.ebuild, binutils-2.24.ebuild: - Fix install of libiberty #497268 by Small_Penguin. - -*binutils-2.24 (31 Dec 2013) - - 31 Dec 2013; Mike Frysinger +binutils-2.24.ebuild: - Version bump. - - 31 Dec 2013; Mike Frysinger binutils-9999.ebuild: - Start testing out EAPI=4. - - 26 Dec 2013; Markus Meier binutils-2.23.2.ebuild: - arm stable, bug #494670 - - 24 Dec 2013; Agostino Sarubbo binutils-2.23.2.ebuild: - Stable for x86, wrt bug #494670 - - 23 Dec 2013; Agostino Sarubbo binutils-2.23.2.ebuild: - Stable for sparc, wrt bug #494670 - - 23 Dec 2013; Mike Frysinger binutils-2.23.2.ebuild: - Mark ia64 stable #494670. - -*binutils-2.24.51.0.2 (22 Dec 2013) - - 22 Dec 2013; Mike Frysinger +binutils-2.24.51.0.2.ebuild: - Version bump. - - 22 Dec 2013; Pacho Ramos binutils-2.23.2.ebuild: - amd64 stable, bug #494670 - - 22 Dec 2013; Agostino Sarubbo binutils-2.23.2.ebuild: - Stable for ppc64, wrt bug #494670 - - 21 Dec 2013; Agostino Sarubbo binutils-2.23.2.ebuild: - Stable for ppc, wrt bug #494670 - - 20 Dec 2013; Matt Turner binutils-2.23.2.ebuild: - alpha stable, bug 494670. - - 19 Dec 2013; Jeroen Roovers binutils-2.23.2.ebuild: - Stable for HPPA (bug #494670). - -*binutils-2.24.51.0.1 (30 Nov 2013) - - 30 Nov 2013; Mike Frysinger +binutils-2.24.51.0.1.ebuild: - Version bump. - - 12 Aug 2013; Mike Frysinger binutils-2.23.2.ebuild: - Unmask again since we know better what is failing (the packages themselves) - #464152. - - 06 Aug 2013; Agostino Sarubbo binutils-2.23.1.ebuild: - Stable for s390, wrt bug #475570 - - 03 Aug 2013; Agostino Sarubbo binutils-2.23.1.ebuild: - Stable for sparc, wrt bug #475570 - - 07 Jul 2013; Agostino Sarubbo binutils-2.23.1.ebuild: - Stable for ia64, wrt bug #475570 - - 07 Jul 2013; Agostino Sarubbo binutils-2.23.1.ebuild: - Stable for arm, wrt bug #475570 - - 06 Jul 2013; Agostino Sarubbo binutils-2.23.1.ebuild: - Stable for alpha, wrt bug #475570 - - 04 Jul 2013; Agostino Sarubbo binutils-2.23.1.ebuild: - Stable for ppc64, wrt bug #475570 - - 04 Jul 2013; Agostino Sarubbo binutils-2.23.1.ebuild: - Stable for ppc, wrt bug #475570 - - 03 Jul 2013; Agostino Sarubbo binutils-2.23.1.ebuild: - Stable for x86, wrt bug #475570 - - 03 Jul 2013; Agostino Sarubbo binutils-2.23.1.ebuild: - Stable for amd64, wrt bug #475570 - - 03 Jul 2013; Jeroen Roovers binutils-2.23.1.ebuild: - Stable for HPPA (bug #475570). - -*binutils-2.23.52.0.2 (05 May 2013) - - 05 May 2013; Mike Frysinger +binutils-2.23.52.0.2.ebuild: - Version bump. - - 02 Apr 2013; Mike Frysinger binutils-2.23.2.ebuild: - Dekeyword until we can get a handle on missing symbol linkage errors #464152 - by Ryan Hill. - -*binutils-2.23.52.0.1 (26 Mar 2013) - - 26 Mar 2013; Mike Frysinger +binutils-2.23.52.0.1.ebuild: - Version bump. - -*binutils-2.23.2 (26 Mar 2013) - - 26 Mar 2013; Mike Frysinger +binutils-2.23.2.ebuild: - Version bump. - -*binutils-2.23.51.0.9 (03 Feb 2013) - - 03 Feb 2013; Mike Frysinger +binutils-2.23.51.0.9.ebuild: - Version bump. - -*binutils-2.23.51.0.8 (29 Dec 2012) - - 29 Dec 2012; Mike Frysinger +binutils-2.23.51.0.8.ebuild: - Version bump #449124 by Arfrever Frehtes Taifersar Arahesis. - -*binutils-2.23.51.0.7 (20 Dec 2012) - - 20 Dec 2012; Mike Frysinger +binutils-2.23.51.0.7.ebuild: - Version bump. - -*binutils-2.23.51.0.6 (26 Nov 2012) - - 26 Nov 2012; Mike Frysinger +binutils-2.23.51.0.6.ebuild: - Version bump. - -*binutils-2.23.1 (15 Nov 2012) - - 15 Nov 2012; Mike Frysinger +binutils-2.23.1.ebuild: - Version bump. - -*binutils-2.23.51.0.5 (13 Nov 2012) - - 13 Nov 2012; Mike Frysinger +binutils-2.23.51.0.5.ebuild: - Version bump. - - 02 Nov 2012; Mike Frysinger binutils-2.23.51.0.3.ebuild, - binutils-2.23.ebuild: - Drop ld sysroot patch since upstream has merged a proper fix. - -*binutils-2.23 (24 Oct 2012) - - 24 Oct 2012; Mike Frysinger +binutils-2.23.ebuild: - Version bump. - - 29 Sep 2012; Raúl Porcel binutils-2.22-r1.ebuild: - alpha/ia64/sh/sparc stable wrt #414865 - -*binutils-2.23.51.0.3 (19 Sep 2012) - - 19 Sep 2012; Mike Frysinger +binutils-2.23.51.0.3.ebuild: - Version bump. - -*binutils-2.23.51.0.2 (11 Sep 2012) - - 11 Sep 2012; Mike Frysinger +binutils-2.23.51.0.2.ebuild: - Version bump. - - 22 Aug 2012; Michael Weber binutils-2.22-r1.ebuild: - ppc stable (bug 414865). - - 10 Aug 2012; Mike Frysinger binutils-2.22-r1.ebuild: - Build with -fPIC on s390x #430554 by Raúl Porcel. - - 08 Aug 2012; Mike Frysinger binutils-2.23.51.0.1.ebuild: - Fix applying of lib32 patch as reported by Arfrever. - -*binutils-2.23.51.0.1 (07 Aug 2012) - - 07 Aug 2012; Mike Frysinger +binutils-2.23.51.0.1.ebuild: - Version bump. - - 07 Aug 2012; Mike Frysinger -binutils-2.16.1-r3.ebuild, - -binutils-2.16.91.0.6.ebuild, -binutils-2.18-r3.ebuild, - -binutils-2.18-r4.ebuild, -binutils-2.22.52.0.1.ebuild, - -binutils-2.22.52.0.2.ebuild, -binutils-2.22.52.0.3.ebuild: - Move older versions to toolchain overlay. - - 07 Aug 2012; Brent Baude binutils-2.22-r1.ebuild: - Marking binutils-2.22-r1 ppc64 for bug 414865 - - 07 Aug 2012; Agostino Sarubbo binutils-2.22-r1.ebuild: - Stable for X86, wrt bug #414865 - - 07 Aug 2012; Agostino Sarubbo binutils-2.22-r1.ebuild: - Stable for amd64, wrt bug #424865 - - 07 Aug 2012; Raúl Porcel binutils-2.22-r1.ebuild: - s390 stable wrt #414865 - - 06 Aug 2012; Brent Baude binutils-2.22-r1.ebuild: - Marking binutils-2.22-r1 ppc64 for bug 414865 - - 05 Aug 2012; Markus Meier binutils-2.22-r1.ebuild: - arm stable, bug #414865 - - 02 Aug 2012; Richard Yao binutils-2.22.90.ebuild: - Set -*-fbsd keywords due to -ldl issue - - 01 Aug 2012; Jeroen Roovers binutils-2.22-r1.ebuild: - Stable for HPPA (bug #414865). - - 28 Jul 2012; Mike Frysinger binutils-2.22.90.ebuild: - Fix applying of lib32 patch #428366 by Alexandre. - -*binutils-2.22.90 (27 Jul 2012) - - 27 Jul 2012; Mike Frysinger +binutils-2.22.90.ebuild: - Version bump. - -*binutils-2.22.52.0.4 (06 Jul 2012) - - 06 Jul 2012; Mike Frysinger +binutils-2.22.52.0.4.ebuild: - Version bump. - - 15 Jun 2012; Naohiro Aota binutils-2.22-r1.ebuild: - Add ~x86-fbsd. - - 15 Jun 2012; Richard Yao binutils-2.22-r1.ebuild: - Modify FBSD patch to include update to ./configure script, bug #421069 - - 13 Jun 2012; Richard Yao binutils-2.22-r1.ebuild: - Push out fix for build failure on FreeBSD (bug #347931) by Naohiro Aota and keyword ~amd64-fbsd - - 31 May 2012; Mike Frysinger binutils-2.20.1-r1.ebuild: - Push out fix for POSIX test behavior #417549 by Richard Yao. - - 22 May 2012; Mike Frysinger binutils-2.22-r1.ebuild, - binutils-2.22.52.0.1.ebuild, binutils-2.22.52.0.2.ebuild, - binutils-2.22.52.0.3.ebuild: - Drop patch-2.6 requirement now that the profile pulls it in. - -*binutils-2.22.52.0.3 (09 May 2012) - - 09 May 2012; Mike Frysinger +binutils-2.22.52.0.3.ebuild: - Version bump. - - 26 Apr 2012; Alexis Ballier binutils-2.20.1-r1.ebuild: - keyword ~amd64-fbsd - - 26 Apr 2012; Mike Frysinger -binutils-2.21.1.ebuild, - -binutils-2.21.52.0.1.ebuild, -binutils-2.21.52.0.2.ebuild, - -binutils-2.21.53.0.1.ebuild, -binutils-2.21.53.0.2.ebuild, - -binutils-2.21.ebuild, -binutils-2.22.ebuild: - Move older versions to the toolchain overlay. - -*binutils-2.22.52.0.2 (26 Apr 2012) - - 26 Apr 2012; Mike Frysinger +binutils-2.22.52.0.2.ebuild: - Version bump. - - 04 Mar 2012; Mike Frysinger binutils-2.22-r1.ebuild: - Add fix from upstream for hppa/plt handling #406349 by Jeroen Roovers. - - 06 Feb 2012; Mike Frysinger binutils-2.22.52.0.1.ebuild: - Drop KEYWORDS -- didn't mean to add those. - -*binutils-2.22.52.0.1 (05 Feb 2012) - - 05 Feb 2012; Mike Frysinger +binutils-2.22.52.0.1.ebuild: - Version bump. - -*binutils-9999 (05 Feb 2012) - - 05 Feb 2012; Mike Frysinger +binutils-9999.ebuild: - Add live git version. - - 28 Dec 2011; Mark Loeser binutils-2.21.1-r1.ebuild: - Stable for ppc/ppc64; bug #378485 - -*binutils-2.22-r1 (11 Dec 2011) - - 11 Dec 2011; Mike Frysinger +binutils-2.22-r1.ebuild: - Add fixes from upstream for ppc/hppa/s390x, and a hardened fix for static - linking. - - 11 Dec 2011; Raúl Porcel binutils-2.21.1-r1.ebuild: - sparc stable wrt #378485 - - 05 Dec 2011; Mike Frysinger Manifest: - Update patch tarball digests to match published one #393233 by Jerome Kurtz. - - 05 Dec 2011; Mike Frysinger binutils-2.21.1-r1.ebuild: - Fix building on s390x systems #391431 by Raúl Porcel. - - 23 Nov 2011; Diego E. Pettenò binutils-2.22.ebuild: - QA: make sure to depend on a patch(1) version that actually applies all the - patches. - -*binutils-2.22 (21 Nov 2011) - - 21 Nov 2011; Mike Frysinger +binutils-2.22.ebuild: - Version bump. - - 19 Nov 2011; Mike Frysinger binutils-2.21.1-r1.ebuild: - Mark alpha/arm/ia64/m68k/s390/sh stable #378485. - - 17 Nov 2011; Pawel Hajdan jr - binutils-2.21.1-r1.ebuild: - x86 stable wrt bug #378485 - - 16 Oct 2011; Mike Frysinger binutils-2.21.1-r1.ebuild: - Add fix from upstream for mips ld segfaults #387055 by Matt Turner. - - 06 Oct 2011; Jeroen Roovers binutils-2.21.1-r1.ebuild: - Stable for HPPA (bug #378485). - - 22 Sep 2011; Mike Frysinger binutils-2.18-r3.ebuild, - binutils-2.18-r4.ebuild, binutils-2.19.1-r1.ebuild, - binutils-2.20.1-r1.ebuild, binutils-2.21.1.ebuild, binutils-2.21.1-r1.ebuild: - Drop mirror restrict now that most should be synced. - - 19 Sep 2011; Mike Frysinger binutils-2.21.1-r1.ebuild: - Fix up most test failures #379105. - - 18 Sep 2011; Mike Frysinger binutils-2.18-r3.ebuild, - binutils-2.18-r4.ebuild, binutils-2.19.1-r1.ebuild, - binutils-2.20.1-r1.ebuild, binutils-2.21.1.ebuild, binutils-2.21.1-r1.ebuild: - Temporarily set some ebuilds to ignore Gentoo mirrors since upstream - regenerated their tarballs #381831 by Randy Barlow. - - 25 Aug 2011; Markos Chandras binutils-2.21.1.ebuild, - binutils-2.21.1-r1.ebuild: - Restore ~amd64 to 2.21.1 and stabilize 2.21.1-r1 instead. Bug #378485 - - 22 Aug 2011; Tony Vroon binutils-2.21.1.ebuild: - Marked stable on AMD64 based on arch testing by Ian "idella4" Delaney & - Agostino "ago" Sarubbo in bug #378485. The test suite has gained a failure, - but the package was deemed functional. - -*binutils-2.21.1-r1 (22 Aug 2011) - - 22 Aug 2011; Mike Frysinger +binutils-2.21.1-r1.ebuild: - Fix up pax patch due to local variable renames #379321 by Sven Vermeulen. - - 22 Aug 2011; Mike Frysinger -binutils-2.21.51.0.1.ebuild, - -binutils-2.21.51.0.2.ebuild, -binutils-2.21.51.0.3.ebuild, - -binutils-2.21.51.0.4.ebuild, -binutils-2.21.51.0.5.ebuild, - -binutils-2.21.51.0.6.ebuild, -binutils-2.21.51.0.7.ebuild, - -binutils-2.21.51.0.8.ebuild, -binutils-2.21.51.0.9.ebuild: - Move old ebuilds to toolchain overlay. - -*binutils-2.21.53.0.2 (11 Aug 2011) -*binutils-2.21.53.0.1 (11 Aug 2011) - - 11 Aug 2011; Mike Frysinger +binutils-2.21.53.0.1.ebuild, - +binutils-2.21.53.0.2.ebuild: - Version bumps. - -*binutils-2.21.1 (28 Jun 2011) - - 28 Jun 2011; Mike Frysinger +binutils-2.21.1.ebuild: - Version bump. - -*binutils-2.21.52.0.2 (17 Jun 2011) - - 17 Jun 2011; Mike Frysinger +binutils-2.21.52.0.2.ebuild: - Version bump. - - 11 Jun 2011; Alexis Ballier binutils-2.21.ebuild: - keyword -x86-fbsd and -sparc-fbsd until bug #347931 is solved; it doesnt - build - -*binutils-2.21.52.0.1 (09 Jun 2011) - - 09 Jun 2011; Mike Frysinger +binutils-2.21.52.0.1.ebuild: - Version bump. - -*binutils-2.21.51.0.9 (09 May 2011) - - 09 May 2011; Mike Frysinger +binutils-2.21.51.0.9.ebuild: - Version bump. - -*binutils-2.21.51.0.8 (10 Apr 2011) - - 10 Apr 2011; Mike Frysinger +binutils-2.21.51.0.8.ebuild: - Version bump. - -*binutils-2.21.51.0.7 (14 Mar 2011) - - 14 Mar 2011; Mike Frysinger +binutils-2.21.51.0.7.ebuild: - Version bump. - - 06 Feb 2011; Mart Raudsepp binutils-2.16.1-r3.ebuild: - Drop to ~mips - -*binutils-2.21.51.0.6 (20 Jan 2011) - - 20 Jan 2011; Mike Frysinger - +binutils-2.21.51.0.6.ebuild: - Version bump. - -*binutils-2.21.51.0.5 (12 Jan 2011) - - 12 Jan 2011; Mike Frysinger - +binutils-2.21.51.0.5.ebuild: - Version bump. - -*binutils-2.21.51.0.4 (17 Dec 2010) - - 17 Dec 2010; Mike Frysinger - +binutils-2.21.51.0.4.ebuild: - Version bump. - -*binutils-2.21.51.0.3 (16 Dec 2010) - - 16 Dec 2010; Mike Frysinger - +binutils-2.21.51.0.3.ebuild: - Version bump. - -*binutils-2.21 (09 Dec 2010) - - 09 Dec 2010; Mike Frysinger +binutils-2.21.ebuild: - Version bump. - -*binutils-2.21.51.0.2 (07 Dec 2010) - - 07 Dec 2010; Mike Frysinger - +binutils-2.21.51.0.2.ebuild: - Version bump. - -*binutils-2.21.51.0.1 (13 Nov 2010) -*binutils-2.20.51.0.12 (13 Nov 2010) - - 13 Nov 2010; Mike Frysinger - +binutils-2.20.51.0.12.ebuild, +binutils-2.21.51.0.1.ebuild: - Version bumps. - - 30 Aug 2010; Mike Frysinger binutils-2.20.1-r1.ebuild: - Mark s390 stable #298571. - -*binutils-2.20.51.0.11 (14 Aug 2010) - - 14 Aug 2010; Mike Frysinger - +binutils-2.20.51.0.11.ebuild: - Version bump. - -*binutils-2.20.51.0.10 (27 Jul 2010) - - 27 Jul 2010; Mike Frysinger - +binutils-2.20.51.0.10.ebuild: - Version bump #329023 by Arfrever Frehtes Taifersar Arahesis. - - 18 Jul 2010; Raúl Porcel binutils-2.20.1-r1.ebuild: - sh/sparc stable wrt #298571 - - 11 Jul 2010; Tobias Klausmann - binutils-2.20.1-r1.ebuild: - Stable on alpha, bug #298571 - - 05 Jul 2010; Samuli Suominen - binutils-2.20.1-r1.ebuild: - ppc64 stable wrt #298571 - - 27 Jun 2010; binutils-2.20.1-r1.ebuild: - ppc stable #298571 - - 25 Jun 2010; Mike Frysinger binutils-2.20.1-r1.ebuild: - Mark ia64 stable #298571. - - 24 Jun 2010; Jeroen Roovers binutils-2.20.1-r1.ebuild: - Stable for HPPA (bug #298571). - - 21 Jun 2010; Markus Meier binutils-2.20.1-r1.ebuild: - arm stable, bug #298571 - - 13 Jun 2010; Christoph Mende - binutils-2.20.1-r1.ebuild: - Stable on amd64 wrt bug #298571 - - 08 Jun 2010; Pawel Hajdan jr - binutils-2.20.1-r1.ebuild: - x86 stable wrt bug #298571 - -*binutils-2.20.51.0.9 (28 May 2010) - - 28 May 2010; Mike Frysinger - +binutils-2.20.51.0.9.ebuild: - Version bump. - -*binutils-2.20.1-r1 (09 May 2010) - - 09 May 2010; Mike Frysinger - +binutils-2.20.1-r1.ebuild: - Add fix from upstream for ld internal error #317549, add fix from upstream - for dynamic PIEs #311081, and fix patching on mips systems #310279. - -*binutils-2.20.51.0.8 (14 Apr 2010) - - 14 Apr 2010; Mike Frysinger - +binutils-2.20.51.0.8.ebuild: - Version bump. - -*binutils-2.20.51.0.7 (11 Apr 2010) - - 11 Apr 2010; Mike Frysinger - +binutils-2.20.51.0.7.ebuild: - Version bump #312303. - -*binutils-2.20.1 (08 Mar 2010) - - 08 Mar 2010; Mike Frysinger +binutils-2.20.1.ebuild: - Version bump. - - 08 Mar 2010; Mike Frysinger binutils-2.20-r1.ebuild: - Fix random test failures due to our patches #242104 #245124 #267131 #292750. - -*binutils-2.20-r1 (26 Feb 2010) - - 26 Feb 2010; Mark Loeser -binutils-2.20.ebuild, - +binutils-2.20-r1.ebuild: - Bump for new patchset which fixes bug #302696 - -*binutils-2.20.51.0.6 (07 Feb 2010) - - 07 Feb 2010; Mike Frysinger - +binutils-2.20.51.0.6.ebuild: - Version bump. - - 03 Feb 2010; Jeroen Roovers binutils-2.19.1-r1.ebuild: - Stable for HPPA too. - - 28 Jan 2010; Mike Frysinger metadata.xml: - Drop USE=gold per #301480 -- gold is always enabled as a secondary linker - now (ld.gold). - -*binutils-2.20.51.0.5 (16 Jan 2010) - - 16 Jan 2010; Mike Frysinger - +binutils-2.20.51.0.5.ebuild: - Version bump. - - 11 Jan 2010; Raúl Porcel binutils-2.19.1-r1.ebuild: - arm stable - -*binutils-2.20.51.0.4 (18 Dec 2009) - - 18 Dec 2009; Mike Frysinger - +binutils-2.20.51.0.4.ebuild: - Version bump. - - 01 Dec 2009; Tom Gall binutils-2.19.1-r1.ebuild: - stable on ppc64 - -*binutils-2.20.51.0.3 (21 Nov 2009) - - 21 Nov 2009; Mike Frysinger - +binutils-2.20.51.0.3.ebuild: - Version bump #293141. - - 14 Nov 2009; Mike Frysinger binutils-2.20.ebuild: - Add fix from upstream for USE=multitarget #289756 by Rafał Mużyło. - -*binutils-2.20 (19 Oct 2009) - - 19 Oct 2009; Mike Frysinger +binutils-2.20.ebuild: - Version bump #289673 by Lars Wendler. - -*binutils-2.20.51.0.2 (10 Oct 2009) - - 10 Oct 2009; Mike Frysinger - +binutils-2.20.51.0.2.ebuild: - Version bump. - - 14 Sep 2009; Raúl Porcel binutils-2.19.1-r1.ebuild: - s390 stable - - 09 Sep 2009; Mike Frysinger binutils-2.19.1-r1.ebuild: - Fix gold build with gcc-4.4 #269260. - -*binutils-2.20.51.0.1 (09 Sep 2009) - - 09 Sep 2009; Mike Frysinger - +binutils-2.20.51.0.1.ebuild: - Version bump. - -*binutils-2.19.51.0.14 (23 Jul 2009) - - 23 Jul 2009; Mark Loeser - -binutils-2.19.51.0.12.ebuild, +binutils-2.19.51.0.14.ebuild: - Version bump, remove old - -*binutils-2.19.51.0.13 (22 Jul 2009) - - 22 Jul 2009; Mark Loeser - -binutils-2.19.51.0.10.ebuild, -binutils-2.19.51.0.11.ebuild, - +binutils-2.19.51.0.13.ebuild: - Version bump - -*binutils-2.19.51.0.12 (20 Jul 2009) - - 20 Jul 2009; Mike Frysinger - +binutils-2.19.51.0.12.ebuild: - Version bump. - -*binutils-2.19.51.0.11 (12 Jul 2009) - - 12 Jul 2009; Mark Loeser - +binutils-2.19.51.0.11.ebuild: - Version bump; bug #276498 - -*binutils-2.19.51.0.10 (19 Jun 2009) - - 19 Jun 2009; Mike Frysinger - +binutils-2.19.51.0.10.ebuild: - Version bump. - -*binutils-2.19.51.0.9 (07 Jun 2009) - - 07 Jun 2009; Mike Frysinger - +binutils-2.19.51.0.9.ebuild: - Version bump. - -*binutils-2.19.51.0.8 (03 Jun 2009) - - 03 Jun 2009; Mike Frysinger - +binutils-2.19.51.0.8.ebuild: - Version bump. - -*binutils-2.19.51.0.7 (01 Jun 2009) - - 01 Jun 2009; Mike Frysinger - +binutils-2.19.51.0.7.ebuild: - Version bump. - -*binutils-2.19.51.0.6 (30 May 2009) - - 30 May 2009; Mike Frysinger - +binutils-2.19.51.0.6.ebuild: - Version bump. - - 26 May 2009; Diego E. Pettenò - binutils-2.19.51.0.5.ebuild: - Update patchlevel to pick up the new patch to update ld(1) wrt - --enable-new-dtags. - -*binutils-2.19.51.0.5 (26 May 2009) - - 26 May 2009; Mike Frysinger - +binutils-2.19.51.0.5.ebuild: - Version bump. - - 14 May 2009; Ryan Hill metadata.xml: - Set proper expectations for the gold linker. - - 09 May 2009; Mike Frysinger metadata.xml: - Add new USE=gold flag #266282 by Dror Levin. - -*binutils-2.19.51.0.4 (09 May 2009) - - 09 May 2009; Mike Frysinger - +binutils-2.19.51.0.4.ebuild: - Version bump #267297 by Arfrever Frehtes Taifersar Arahesis. - -*binutils-2.19.1-r1 (14 Mar 2009) - - 14 Mar 2009; Mike Frysinger - +binutils-2.19.1-r1.ebuild: - Add strip fixes from upstream for #183725 by Harald van Dijk and #257783 - by Alexey Shvetsov and Raúl Porcel. - -*binutils-2.19.51.0.3 (10 Mar 2009) - - 10 Mar 2009; Mike Frysinger - +binutils-2.19.51.0.3.ebuild: - Version bump. - -*binutils-2.19.51.0.2 (05 Feb 2009) - - 05 Feb 2009; Mike Frysinger - +binutils-2.19.51.0.2.ebuild: - Version bump. - -*binutils-2.19.1 (05 Feb 2009) - - 05 Feb 2009; Mike Frysinger +binutils-2.19.1.ebuild: - Version bump. - -*binutils-2.19.51.0.1 (10 Jan 2009) - - 10 Jan 2009; Mike Frysinger - +binutils-2.19.51.0.1.ebuild: - Version bump. - - 08 Jan 2009; Javier Villavicencio - binutils-2.19.ebuild: - Keyworded ~x86-fbsd. - - 14 Dec 2008; Alexis Ballier binutils-2.19.ebuild: - keyword ~sparc-fbsd - - 28 Nov 2008; Mike Frysinger binutils-2.19.ebuild, - binutils-2.19.50.0.1.ebuild: - Fix a bunch of PaX test failures #245124 and fix cross-compiling #245478. - - 17 Nov 2008; Joshua Kinard binutils-2.19.ebuild: - Add ~mips to KEYWORDS for binutils-2.19. - - 05 Nov 2008; Jeroen Roovers binutils-2.19.ebuild: - Marked ~hppa too. - - 02 Nov 2008; Mike Frysinger binutils-2.19.ebuild: - Add ~alpha/~sparc love. - -*binutils-2.19 (01 Nov 2008) - - 01 Nov 2008; Mike Frysinger +binutils-2.19.ebuild: - Version bump. - -*binutils-2.19.50.0.1 (26 Oct 2008) - - 26 Oct 2008; Mike Frysinger - +binutils-2.19.50.0.1.ebuild: - Version bump #241482. - -*binutils-2.18-r4 (25 Oct 2008) - - 25 Oct 2008; Mark Loeser +binutils-2.18-r4.ebuild: - Patchset bump to fix usage on mips; bug #223229 - -*binutils-2.18.50.0.9 (21 Sep 2008) - - 21 Sep 2008; Mike Frysinger - +binutils-2.18.50.0.9.ebuild: - Version bump #236197. - - 20 Aug 2008; Mike Frysinger binutils-2.18-r3.ebuild: - Disable gnu hash for mips #233233. - -*binutils-2.18.50.0.8 (20 Aug 2008) - - 20 Aug 2008; Mike Frysinger - +binutils-2.18.50.0.8.ebuild: - Version bump #231687. - - 02 Aug 2008; Panagiotis Christopoulos metadata.xml: - Update metadata.xml to include USE flag descriptions. Entries taken from - profiles/use.local.desc. GLEP 56 - - 20 Jul 2008; Ryan Hill binutils-2.18-r3.ebuild: - Bump patchset for bug #194949. - - 07 Jul 2008; Markus Meier binutils-2.18-r3.ebuild: - amd64 stable, bug #230593 - - 07 Jul 2008; Raúl Porcel binutils-2.18-r3.ebuild: - alpha/ia64/sparc stable wrt security #230593 - - 07 Jul 2008; Christian Faulhammer - binutils-2.18-r3.ebuild: - stable x86, security bug 230593 - - 07 Jul 2008; Brent Baude binutils-2.18-r3.ebuild: - Marking binutils-2.18-r3 ppc64 and ppc for bug 230593 - - 06 Jul 2008; Jeroen Roovers binutils-2.18-r3.ebuild: - Stable for HPPA (bug #230593). - -*binutils-2.18-r3 (05 Jul 2008) - - 05 Jul 2008; Mark Loeser +binutils-2.18-r3.ebuild: - Version bump for bug #230593 - -*binutils-2.18-r2 (23 Jun 2008) - - 23 Jun 2008; Mike Frysinger +binutils-2.18-r2.ebuild: - Drop gnu hash patch for mips #211680 and backport freebsd fixups #223249. - -*binutils-2.18.50.0.7 (10 May 2008) - - 10 May 2008; Mike Frysinger - +binutils-2.18.50.0.7.ebuild: - Version bump. - -*binutils-2.18.50.0.6 (03 Apr 2008) - - 03 Apr 2008; Mike Frysinger - +binutils-2.18.50.0.6.ebuild: - Version bump. - -*binutils-2.18.50.0.5 (17 Mar 2008) - - 17 Mar 2008; Mike Frysinger - +binutils-2.18.50.0.5.ebuild: - Version bump #213618 by Arfrever Frehtes Taifersar Arahesis. - -*binutils-2.18.50.0.4 (09 Feb 2008) - - 09 Feb 2008; Mike Frysinger - +binutils-2.18.50.0.4.ebuild: - Version bump. - - 20 Nov 2007; Joshua Kinard binutils-2.18-r1.ebuild: - Stable on mips, per #195511. - - 14 Nov 2007; Jeroen Roovers binutils-2.18-r1.ebuild: - Stable for HPPA too (not quite bug #195511). - -*binutils-2.18.50.0.3 (04 Nov 2007) - - 04 Nov 2007; Mike Frysinger - +binutils-2.18.50.0.3.ebuild: - Version bump. - - 17 Oct 2007; Raúl Porcel binutils-2.18-r1.ebuild: - alpha/ia64/sparc stable wrt #195511 - - 16 Oct 2007; Christoph Mende binutils-2.18-r1.ebuild: - Stable on amd64 wrt bug #195511 - - 15 Oct 2007; Markus Rothe binutils-2.18-r1.ebuild: - Stable on ppc64; bug #195511 - - 14 Oct 2007; Christian Faulhammer - binutils-2.18-r1.ebuild: - stable x86, bug 195511 - - 12 Oct 2007; Lars Weiler binutils-2.18-r1.ebuild: - stable ppc, bug #195511 - - 08 Oct 2007; Mike Frysinger binutils-2.18-r1.ebuild: - Fix makeinfo version check to work with texinfo-4.11 #195074. - - 07 Oct 2007; Mike Frysinger binutils-2.17-r2.ebuild: - Add support for DragonFly BSD #189079. - - 06 Oct 2007; Mike Frysinger binutils-2.17-r2.ebuild, - binutils-2.18-r1.ebuild: - Fix incorrect CFLAGS being used for build utils #192959 by Woodward Crim - Hoffman. - - 06 Oct 2007; Mike Frysinger binutils-2.18-r1.ebuild: - Prevent makeinfo from being run #193364. - -*binutils-2.18-r1 (06 Oct 2007) - - 06 Oct 2007; Mike Frysinger +binutils-2.18-r1.ebuild: - Fix from upstream for GNU RELRO stripping, disable false positive tests, - and add fix from upstream for multitarget on x86_64. - -*binutils-2.17-r2 (06 Oct 2007) - - 06 Oct 2007; Mike Frysinger +binutils-2.17-r2.ebuild: - Add backwards compat support for GNU_HASH for a few anal targets, disable - false positive tests, and add fix from upstream for multitarget on x86_64. - -*binutils-2.18.50.0.2 (06 Oct 2007) - - 06 Oct 2007; Mike Frysinger - +binutils-2.18.50.0.2.ebuild: - Version bump. - - 26 Sep 2007; Raúl Porcel binutils-2.17-r1.ebuild: - sparc stable wrt #192258 - - 26 Sep 2007; Joshua Kinard binutils-2.17-r1.ebuild: - Stable on mips, per #192258. - - 17 Sep 2007; Lars Weiler binutils-2.17-r1.ebuild: - Stable on ppc; bug #192258. - - 16 Sep 2007; Christoph Mende binutils-2.17-r1.ebuild: - Stable on amd64 wrt bug #192258 - - 13 Sep 2007; Raúl Porcel binutils-2.17-r1.ebuild: - ia64/x86 stable wrt #192258 - - 12 Sep 2007; Mike Frysinger - binutils-2.18.50.0.1.ebuild: - Ack mein leapen! This shouldnt be in ~arch. - -*binutils-2.18.50.0.1 (09 Sep 2007) - - 09 Sep 2007; Mike Frysinger - +binutils-2.18.50.0.1.ebuild: - Version bump. - - 04 Sep 2007; Joshua Kinard binutils-2.18.ebuild: - Update the patchset to 1.1 to pull in a patch for mips to enable support for - .gnu.hash capabilities, and mark unstable on mips. - -*binutils-2.18 (29 Aug 2007) - - 29 Aug 2007; Mike Frysinger +binutils-2.18.ebuild: - Version bump. - - 17 Aug 2007; Christoph Mende - binutils-2.17.50.0.18.ebuild: - Keyworded ~amd64 to fix PIC generation with gcc-4.2, bug #186089 - -*binutils-2.17.50.0.18 (01 Aug 2007) - - 01 Aug 2007; Mike Frysinger - +binutils-2.17.50.0.18.ebuild: - Version bump. - -*binutils-2.17-r1 (29 Jul 2007) - - 29 Jul 2007; Mike Frysinger +binutils-2.17-r1.ebuild: - Fix building with sanitized linux-headers, fix stripping of .o objects, and - discard GNU debuglink sections. - - 03 Jul 2007; Tom Gall binutils-2.17.50.0.17.ebuild: - stable on ppc64, addresses power6, ps3 and other gcc issues - - 01 Jul 2007; Jose Luis Rivero - binutils-2.17.50.0.16.ebuild: - Stable on alpha. This fixes the compilation error (CFI related) when - compiling glibc. Details in bug #179353 - - 25 Jun 2007; Christian Faulhammer binutils-2.17.ebuild: - stable x86, security bug 134112 - - 24 Jun 2007; Christoph Mende binutils-2.17.ebuild: - Stable on amd64 wrt security bug 134112 - - 24 Jun 2007; Piotr Jaroszyński - binutils-2.17.50.0.9.ebuild, binutils-2.17.50.0.10.ebuild, - binutils-2.17.50.0.11.ebuild, binutils-2.17.50.0.13.ebuild, - binutils-2.17.50.0.14.ebuild, binutils-2.17.50.0.15.ebuild: - (QA) Don't use KEYWORDS="-*". bug #160519. - -*binutils-2.17.50.0.17 (19 Jun 2007) - - 19 Jun 2007; Mike Frysinger - +binutils-2.17.50.0.17.ebuild: - Version bump. - - 14 May 2007; Bryan Østergaard - binutils-2.17.50.0.16.ebuild: - Add ~alpha keyword as .15 and newer fixes an ugly bug in ld on Alpha. - - 13 May 2007; Joshua Kinard binutils-2.17.ebuild: - Stable on mips. - -*binutils-2.17.50.0.16 (12 May 2007) - - 12 May 2007; Mike Frysinger - +binutils-2.17.50.0.16.ebuild: - Version bump. - - 23 Apr 2007; Jeroen Roovers binutils-2.17.50.0.12.ebuild: - Stable for HPPA (bug #168131). - -*binutils-2.17.50.0.15 (20 Apr 2007) - - 20 Apr 2007; Mike Frysinger - +binutils-2.17.50.0.15.ebuild: - Version bump. - - 28 Mar 2007; Jeroen Roovers binutils-2.17.50.0.12.ebuild: - Marked ~hppa (bug #168131). - -*binutils-2.17.50.0.14 (24 Mar 2007) - - 24 Mar 2007; Mike Frysinger - +binutils-2.17.50.0.14.ebuild: - Version bump. - -*binutils-2.17.50.0.13 (16 Mar 2007) - - 16 Mar 2007; Mike Frysinger - +binutils-2.17.50.0.13.ebuild: - Version bump. - - 13 Feb 2007; Bryan Østergaard binutils-2.17.ebuild: - Stable on Alpha. - -*binutils-2.17.50.0.12 (28 Jan 2007) - - 28 Jan 2007; Mike Frysinger - +binutils-2.17.50.0.12.ebuild: - Version bump. - -*binutils-2.17.50.0.11 (26 Jan 2007) - - 26 Jan 2007; Mike Frysinger - +binutils-2.17.50.0.11.ebuild: - Version bump. - -*binutils-2.17.50.0.10 (23 Jan 2007) - - 23 Jan 2007; Mike Frysinger - +binutils-2.17.50.0.10.ebuild: - Version bump. - -*binutils-2.17.50.0.9 (04 Jan 2007) - - 04 Jan 2007; Mike Frysinger - +binutils-2.17.50.0.9.ebuild: - Version bump. - - 18 Dec 2006; Tom Gall - binutils-2.17.ebuild: - stable on ppc64 - -*binutils-2.17.50.0.8 (03 Dec 2006) - - 03 Dec 2006; Mike Frysinger - +binutils-2.17.50.0.8.ebuild: - Version bump. - -*binutils-2.17.50.0.7 (29 Nov 2006) - - 29 Nov 2006; Mike Frysinger - +binutils-2.17.50.0.7.ebuild: - Version bump. - -*binutils-2.17.50.0.6 (21 Oct 2006) - - 21 Oct 2006; Mike Frysinger - +binutils-2.17.50.0.6.ebuild: - Version bump. - - 19 Oct 2006; Gustavo Zacarias binutils-2.17.ebuild: - Stable on sparc - - 19 Oct 2006; Luca Barbato binutils-2.17.ebuild: - Marked ppc - - 17 Oct 2006; Roy Marples binutils-2.17.ebuild: - Added ~sparc-fbsd keyword. - - 10 Oct 2006; Joel Martin binutils-2.17.ebuild: - Add ~mips to binutils-2.17 - -*binutils-2.17.50.0.5 (27 Sep 2006) - - 27 Sep 2006; Mike Frysinger - +binutils-2.17.50.0.5.ebuild: - Version bump. - -*binutils-2.17.50.0.4 (24 Sep 2006) - - 24 Sep 2006; Mike Frysinger - +binutils-2.17.50.0.4.ebuild: - Version bump. - - 28 Jul 2006; binutils-2.16.1-r3.ebuild: - Stable on IA64; fix bug #141681. - -*binutils-2.17.50.0.3 (17 Jul 2006) - - 17 Jul 2006; Mike Frysinger - +binutils-2.17.50.0.3.ebuild: - Version bump. - - 04 Jul 2006; Bryan Østergaard - binutils-2.16.1-r3.ebuild: - Stable on alpha. - -*binutils-2.16.1-r3 (30 Jun 2006) - - 30 Jun 2006; Mike Frysinger - +binutils-2.16.1-r3.ebuild: - Backport -z lazy patch to make solar happy #134514. - - 27 Jun 2006; Gustavo Zacarias binutils-2.17.ebuild: - Keyworded ~sparc - - 27 Jun 2006; Diego Pettenò binutils-2.17.ebuild: - Add ~x86-fbsd keyword. - - 25 Jun 2006; Markus Rothe binutils-2.17.ebuild: - Added ~ppc64 - -*binutils-2.17 (24 Jun 2006) - - 24 Jun 2006; Mike Frysinger +binutils-2.17.ebuild: - Version bump. - -*binutils-2.16.94 (15 Jun 2006) - - 15 Jun 2006; Mike Frysinger +binutils-2.16.94.ebuild: - Version bump #136553 by Cory Grunden. - -*binutils-2.17.50.0.2 (10 Jun 2006) - - 10 Jun 2006; Mike Frysinger - +binutils-2.17.50.0.2.ebuild: - Version bump. - - 10 Jun 2006; Michael Hanselmann - binutils-2.16.1-r2.ebuild: - Stable on ppc. - - 09 Jun 2006; Markus Rothe binutils-2.16.1-r2.ebuild: - Stable on ppc64 - - 01 Jun 2006; Joshua Kinard binutils-2.16.1-r2.ebuild: - Marked stable on mips. - - 29 May 2006; Mark Loeser binutils-2.16.1-r2.ebuild: - Stable on x86 - - 26 May 2006; Danny van Dyk - binutils-2.16.1-r2.ebuild: - Marked stable on amd64. - -*binutils-2.16.93 (22 May 2006) - - 22 May 2006; Mike Frysinger +binutils-2.16.93.ebuild: - Version bump. - - 25 Apr 2006; Gustavo Zacarias - binutils-2.16.1-r2.ebuild: - Stable on sparc - -*binutils-2.16.92 (17 Apr 2006) - - 17 Apr 2006; Mike Frysinger +binutils-2.16.92.ebuild: - Version bump. - - 11 Apr 2006; Diego Pettenò - binutils-2.16.1-r2.ebuild: - Add ~x86-fbsd keyword. - - 30 Mar 2006; Diego Pettenò binutils-2.15.ebuild: - Add ~x86-fbsd keyword to binutils 2.15 that has FreeBSD patches. - -*binutils-2.16.91.0.7 (18 Mar 2006) - - 18 Mar 2006; Mike Frysinger - +binutils-2.16.91.0.7.ebuild: - Version bump. - -*binutils-2.16.1-r2 (02 Mar 2006) - - 02 Mar 2006; Mike Frysinger - +binutils-2.16.1-r2.ebuild: - Grab some fixes from upstream for PIE, lib search paths, and ld speedups. - -*binutils-2.16.91.0.6 (15 Feb 2006) - - 15 Feb 2006; Mike Frysinger - +binutils-2.16.91.0.6.ebuild: - Version bump. - -*binutils-2.16.91.0.5 (21 Dec 2005) - - 21 Dec 2005; Mike Frysinger - +binutils-2.16.91.0.5.ebuild: - Version bump. - - 07 Dec 2005; Guy Martin binutils-2.16.1.ebuild: - Stable on hppa. - -*binutils-2.16.1-r1 (03 Dec 2005) - - 03 Dec 2005; Mike Frysinger - +binutils-2.16.1-r1.ebuild: - Add support for -Bdirect #114008. - - 23 Nov 2005; Luis Medinas binutils-2.16.1.ebuild: - Stable on amd64. - - 23 Nov 2005; Gustavo Zacarias - binutils-2.16.1.ebuild: - Stable on sparc - - 23 Nov 2005; Mark Loeser binutils-2.16.1.ebuild: - Stable on x86; bug #112666 - - 18 Nov 2005; Joshua Kinard binutils-2.16.90.0.3.ebuild, - binutils-2.16.91.0.2.ebuild: - -mips to binutils-2.16.90.0.3, as it has unfixable quirks; ~mips to - binutils-2.16.91.0.2 for testing. - -*binutils-2.16.91.0.4 (13 Nov 2005) - - 13 Nov 2005; Mike Frysinger - +binutils-2.16.91.0.4.ebuild: - Version bump. - - 18 Oct 2005; Joseph Jezak binutils-2.16.1.ebuild: - Marked ppc stable. - - 06 Sep 2005; Markus Rothe binutils-2.16.1.ebuild: - Stable on ppc64 - - 28 Aug 2005; Joshua Kinard binutils-2.16.1.ebuild, - binutils-2.16.90.0.3.ebuild: - Bump 2.16.1 to stable on mips, and 2.16.90.0.3 to unstable. - -*binutils-2.16.91.0.3 (23 Aug 2005) - - 23 Aug 2005; Mike Frysinger - +binutils-2.16.91.0.3.ebuild: - Version bump. - -*binutils-2.16.91.0.2 (02 Aug 2005) - - 02 Aug 2005; Mike Frysinger - +binutils-2.16.91.0.2.ebuild: - Version bump. - - 13 Jul 2005; MATSUU Takuto - binutils-2.15.92.0.2-r10.ebuild: - Stable on sh. - - 13 Jul 2005; bret curtis binutils-2.16.1.ebuild, - binutils-2.16-r1.ebuild: - added to ~mips - - 12 Jul 2005; MATSUU Takuto - binutils-2.15.92.0.2-r10.ebuild: - Added ~sh to KEYWORDS. - - 07 Jul 2005; Hardave Riar - binutils-2.15.92.0.2-r10.ebuild: - Stable on mips. - - 28 Jun 2005; Markus Rothe binutils-2.16-r1.ebuild: - Back to ~ppc64; ld problem with current stable glibc :-/ - - 28 Jun 2005; Markus Rothe binutils-2.16-r1.ebuild: - Stable on ppc64 - -*binutils-2.16.91.0.1 (28 Jun 2005) - - 28 Jun 2005; Mike Frysinger - +binutils-2.16.91.0.1.ebuild: - Version bump. - -*binutils-2.16.1 (12 Jun 2005) - - 12 Jun 2005; Mike Frysinger +binutils-2.16.1.ebuild: - Version bump. - - 31 May 2005; Gustavo Zacarias - binutils-2.15.92.0.2-r10.ebuild: - Stable on sparc wrt #91398 - - 31 May 2005; Markus Rothe binutils-2.16.ebuild, - binutils-2.16-r1.ebuild: - Added ~ppc64 to KEYWORDS - - 29 May 2005; Bryan Østergaard - binutils-2.14.90.0.8-r3.ebuild: - Stable on ia64, bug 91398. - - 29 May 2005; Bryan Østergaard - binutils-2.14.90.0.8-r3.ebuild: - Stable on alpha, bug 91398. - - 28 May 2005; Rene Nussbaumer - binutils-2.15.92.0.2-r10.ebuild: - Stable on hppa; bug #91398 - - 28 May 2005; Markus Rothe - binutils-2.15.90.0.3-r5.ebuild: - Stable on ppc64 - - 28 May 2005; binutils-2.15.92.0.2-r10.ebuild: - Mark amd64 stable per bug #91398 - - 28 May 2005; Luca Barbato - binutils-2.15.90.0.3-r5.ebuild: - Marked ppc - -*binutils-2.16-r1 (28 May 2005) -*binutils-2.15.92.0.2-r10 (28 May 2005) -*binutils-2.15.91.0.2-r2 (28 May 2005) -*binutils-2.15.90.0.3-r5 (28 May 2005) -*binutils-2.15.90.0.1.1-r5 (28 May 2005) -*binutils-2.14.90.0.8-r3 (28 May 2005) - - 28 May 2005; Mike Frysinger - +binutils-2.14.90.0.8-r3.ebuild, binutils-2.15.ebuild, - +binutils-2.15.90.0.1.1-r5.ebuild, +binutils-2.15.90.0.3-r5.ebuild, - +binutils-2.15.91.0.2-r2.ebuild, +binutils-2.15.92.0.2-r10.ebuild, - +binutils-2.16-r1.ebuild, binutils-2.16.90.0.3.ebuild: - Add some more bfd checks and fix tls stripping. - -*binutils-2.15.92.0.2-r9 (17 May 2005) - - 17 May 2005; Mike Frysinger - +binutils-2.15.92.0.2-r9.ebuild: - Add patches to fix security issues #91398. - -*binutils-2.16.90.0.3 (11 May 2005) - - 11 May 2005; Mike Frysinger - +binutils-2.16.90.0.3.ebuild: - Version bump. - - 10 May 2005; Lars Weiler - binutils-2.15.92.0.2-r1.ebuild, binutils-2.15.92.0.2-r7.ebuild, - binutils-2.15.92.0.2-r8.ebuild: - Downgrading and masking on ppc due to compile errors; bug #91887. - - 07 May 2005; Michael Hanselmann - binutils-2.15.92.0.2-r8.ebuild: - Stable on hppa. - - 07 May 2005; Jan Brinkmann - binutils-2.15.92.0.2-r8.ebuild: - stable on amd64 wrt security bug #91813 - - 07 May 2005; Michael Hanselmann - binutils-2.15.92.0.2-r8.ebuild: - Stable on ppc. - -*binutils-2.16 (04 May 2005) - - 04 May 2005; Mike Frysinger +binutils-2.16.ebuild: - Version bump. - -*binutils-2.16.90.0.2 (30 Apr 2005) - - 30 Apr 2005; Mike Frysinger - +binutils-2.16.90.0.2.ebuild: - Version bump. - -*binutils-2.15.97 (21 Apr 2005) - - 21 Apr 2005; Mike Frysinger +binutils-2.15.97.ebuild: - Version bump. - -*binutils-2.14 (17 Apr 2005) - - 17 Apr 2005; Mike Frysinger +binutils-2.14.ebuild: - Add older version for ps2 support. - -*binutils-2.16.90.0.1 (12 Apr 2005) - - 12 Apr 2005; Mike Frysinger - +binutils-2.16.90.0.1.ebuild: - Version bump. - - 11 Apr 2005; Markus Rothe - -binutils-2.15.91.0.1-r1.ebuild: - removed for bug #88678 - - 09 Apr 2005; Markus Rothe - binutils-2.15.92.0.2-r8.ebuild, binutils-2.15.94.0.2.2.ebuild: - Added ~ppc64 to KEYWORDS - -*binutils-2.15.92.0.2-r8 (06 Apr 2005) - - 06 Apr 2005; Mike Frysinger - +binutils-2.15.92.0.2-r8.ebuild: - Add ld speedup / readelf buffer fix patches from redhat and a better - unlink() patch from solar/upstream. - - 30 Mar 2005; Joshua Kinard - binutils-2.14.90.0.8-r2.ebuild, binutils-2.15.91.0.2-r1.ebuild, - binutils-2.15.94.0.2.2.ebuild: - Marked 2.14.90.0.8-r2 and 2.15.91.0.2-r1 as stable on mips, and moved - 2.15.94.0.2.2 to unstable. - -*binutils-2.15.92.0.2-r7 (22 Mar 2005) - - 22 Mar 2005; Mike Frysinger - +binutils-2.15.92.0.2-r7.ebuild: - Add a TEXTREL fix for arm and warn about TEXTRELs in ld. - -*binutils-2.15.92.0.2-r6 (11 Mar 2005) - - 11 Mar 2005; Mike Frysinger - +binutils-2.15.92.0.2-r6.ebuild: - Delete old/duplicated patches and add newer/spiffier ones. See the - patchtarball and/or CVS commits for more info :P. Just be happy this one - passes make check on amd64. - - 09 Mar 2005; binutils-2.15.92.0.2-r5.ebuild: - - uClibc supports relro now. remove exception from ebuild - -*binutils-2.15.92.0.2-r5 (08 Mar 2005) - - 08 Mar 2005; Mike Frysinger - +binutils-2.15.92.0.2-r5.ebuild: - Fix up gcc-4 support for real #82907 by richard juckes. - -*binutils-2.15.92.0.2-r4 (23 Feb 2005) - - 23 Feb 2005; Mike Frysinger - -binutils-2.15.92.0.2-r3.ebuild, +binutils-2.15.92.0.2-r4.ebuild: - Fix gcc-4 patch to not break gcc-3 #83047. - - 23 Feb 2005; Jon Portnoy binutils-2.15.92.0.2-r3.ebuild : - Reverted PATCHVER=1.4 to PATCHVER=1.3 due to bug - #83047 - -*binutils-2.15.92.0.2-r3 (20 Feb 2005) - - 20 Feb 2005; +binutils-2.15.92.0.2-r3.ebuild: - - bump the binutils-patches 1.2 -> 1.3. New option ld -z nonow/-Wl,-z,nonow - -*binutils-2.15.94.0.2.2 (19 Feb 2005) - - 19 Feb 2005; Mike Frysinger - +binutils-2.15.94.0.2.2.ebuild: - Version bump. - - 23 Jan 2005; Jeremy Huddleston - binutils-2.15.92.0.2-r1.ebuild: - Stable on amd64. - - 22 Jan 2005; binutils-2.15.92.0.2-r1.ebuild, - binutils-2.15.92.0.2-r2.ebuild: - Converting 2.1.95 ~IA64 KEYWORDS into -IA64 KEYWORDS as kernels as well as - gnu-efi fail to compile with these versions... - - 11 Jan 2005; Gustavo Zacarias - binutils-2.15.92.0.2-r1.ebuild: - Stable on sparc, it's about time - - 03 Jan 2005; Ciaran McCreesh : - Change encoding to UTF-8 for GLEP 31 compliance - -*binutils-2.15.91.0.2-r1 (28 Dec 2004) - - 28 Dec 2004; Mike Frysinger - +binutils-2.15.91.0.2-r1.ebuild: - New versions to support binutils-config. - -*binutils-2.15.91.0.1-r1 (28 Dec 2004) - - 28 Dec 2004; Mike Frysinger - +binutils-2.15.91.0.1-r1.ebuild: - New versions to support binutils-config. - -*binutils-2.15.90.0.3-r4 (28 Dec 2004) - - 28 Dec 2004; Mike Frysinger - +binutils-2.15.90.0.3-r4.ebuild: - New versions to support binutils-config. - - 28 Dec 2004; Jeremy Huddleston - binutils-2.15.92.0.2-r2.ebuild: - Added to ~sparc. - - 26 Dec 2004; Jeremy Huddleston - binutils-2.15.92.0.2-r1.ebuild: - Removing sparc64-multilib stuff as we're just using the superior - binutils-config versions in that profile. - -*binutils-2.15.94.0.2 (21 Dec 2004) - - 21 Dec 2004; Mike Frysinger - +binutils-2.15.94.0.2.ebuild: - Version bump. - - 13 Dec 2004; Jeremy Huddleston - binutils-2.15.92.0.2-r1.ebuild: - Updated sparc64-multilib to use MULTILIB_CHOSTS example. - -*binutils-2.14.90.0.8-r2 (12 Dec 2004) - - 12 Dec 2004; Mike Frysinger - +binutils-2.14.90.0.8-r2.ebuild: - Use toolchain eclass. - - 10 Dec 2004; Jeremy Huddleston - binutils-2.15.92.0.2-r1.ebuild: - Updated for sparc64-multilib. - -*binutils-2.15.90.0.1.1-r4 (04 Dec 2004) - - 04 Dec 2004; Mike Frysinger - +binutils-2.15.90.0.1.1-r4.ebuild: - Version bump for toolchain-binutils support. - -*binutils-2.14.90.0.6-r8 (02 Dec 2004) - - 02 Dec 2004; Mike Frysinger - +binutils-2.14.90.0.6-r8.ebuild: - Use toolchain eclass. - - 30 Nov 2004; Guy Martin binutils-2.15.92.0.2-r1.ebuild: - Stable on hppa. Fix problems with libxml2 and others. - - 24 Nov 2004; Gustavo Zacarias - binutils-2.15.92.0.2-r1.ebuild: - Keyworded ~sparc - -*binutils-2.15.94.0.1 (23 Nov 2004) - - 23 Nov 2004; Mike Frysinger - +binutils-2.15.94.0.1.ebuild: - Version bump. - - 21 Nov 2004; Mike Frysinger - binutils-2.15.90.0.1.1-r3.ebuild: - Move to x86 stable finally. - - 21 Nov 2004; Mike Frysinger - binutils-2.15.90.0.1.1-r3.ebuild: - Move to x86 stable finally. - -*binutils-2.15.92.0.2-r2 (20 Oct 2004) - - 20 Oct 2004; Mike Frysinger - +binutils-2.15.92.0.2-r2.ebuild: - Clean up ebuild. Try to handle $CTARGET/$CHOST correctly. Use symlinks - instead of hard links in src_install(). - - 18 Oct 2004; Guy Martin binutils-2.15.92.0.2-r1.ebuild: - Added ~hppa. - -*binutils-2.15.92.0.2-r1 (11 Oct 2004) - - 11 Oct 2004; Travis Tilley +binutils-2.15.92.0.2-r1.ebuild: - removed a few unused patches from the tarball. removed an old ppc -fPIC patch - that was causing the compile to fail, closes bug 66738. updated a few patches - borrowed from fedora to their latest versions, closes bug 66871. updated pax - patch to the latest version available on pax.grsecurity.net, version - 2.15.91.0.2-200410091215 - - 06 Oct 2004; Travis Tilley binutils-2.15.92.0.2.ebuild: - added ~x86 keyword, as requested in bug 66555 - - 03 Oct 2004; Travis Tilley binutils-2.15.92.0.2.ebuild: - added ~amd64 keyword. among other things, this release fixes an x86-64 linker - warning while building the Linux kernel. - -*binutils-2.15.92.0.2 (01 Oct 2004) - - 01 Oct 2004; Joshua Kinard +binutils-2.15.92.0.2.ebuild: - Version bump. - - 01 Oct 2004; Joshua Kinard binutils-2.15.91.0.2.ebuild: - Added ~sparc to KEYWORDS. - - 01 Oct 2004; Joshua Kinard binutils-2.15.91.0.2.ebuild: - Marked ~mips. Works great for o32, n32 has problems, and is thus masked in - cascade profiles. - - 28 Sep 2004; Mike Frysinger - +files/2.15/40_all_binutils-uclibc-linker.patch, - binutils-2.15.90.0.1.1-r1.ebuild, binutils-2.15.90.0.1.1-r3.ebuild: - Add a patch to fix uclibc linking/ld.so.con. - - 08 Sep 2004; Mike Frysinger - binutils-2.14.90.0.8-r1.ebuild, -binutils-2.14.90.0.8-r2.ebuild: - Merge the changes from -r2 back into -r1 since it was just uclibc specific. - - 06 Sep 2004; - +files/2.15/binutils-2.15-elf32-arm-textrel.patch, - binutils-2.15.90.0.1.1-r3.ebuild: - added patch from RH which allows ARCH=arm to compile & link correctly with - binutils-2.15 - - 06 Sep 2004; Luca Barbato - binutils-2.15.90.0.3-r3.ebuild: - Marked ppc - - 02 Sep 2004; Mike Frysinger - binutils-2.14.90.0.8-r1.ebuild, binutils-2.14.90.0.8-r2.ebuild, - binutils-2.15.90.0.3-r3.ebuild: - Versions 2.15 <= x <= 2.15.91.0.2 are known to produce bad code for arm under - certain circumstances. - - 01 Sep 2004; binutils-2.15.90.0.1.1-r1.ebuild, - binutils-2.15.90.0.1.1-r3.ebuild: - marking binutils-2.15.91.0.1 ~x86 again - - 31 Aug 2004; Gustavo Zacarias - binutils-2.14.90.0.8-r1.ebuild: - Stable on sparc - - 26 Aug 2004; Rob Holland binutils-2.14.90.0.8-r2.ebuild, - binutils-2.15.91.0.1-r2.ebuild, binutils-2.15.91.0.2.ebuild: - gnuconfig_update belongs in src_unpack, not src_compile - - 11 Aug 2004; Travis Tilley binutils-2.15.91.0.2.ebuild: - masking this release -amd64. most software builds fine, but on mozilla firefox - and occasionally glibc this release will segfault - - 09 Aug 2004; Travis Tilley binutils-2.15.91.0.2.ebuild: - adding ~amd64 keyword for testing - -*binutils-2.15.91.0.2 (02 Aug 2004) - - 02 Aug 2004; Joshua Kinard +binutils-2.15.91.0.2.ebuild: - New revision of binutils. Doesn't include 51* or 52* uclibc patches. - - 27 Jul 2004; Mike Frysinger - +files/2.14/binutils-2.14.90.0.6-build_modules.patch, - +files/2.14/binutils-2.14.90.0.6-cflags.patch, - +files/2.14/binutils-2.14.90.0.6-conf.patch, - +files/2.14/binutils-2.14.90.0.6-debian.patch, - binutils-2.14.90.0.6-r7.ebuild: - Add patches from uClibc build root. - - 24 Jul 2004; Travis Tilley binutils-2.15.91.0.1-r1.ebuild: - removing ~amd64 keyword - - 22 Jul 2004; binutils-2.14.90.0.8-r2.ebuild: - uclibc update - - 08 Jul 2004; Travis Tilley binutils-2.15.91.0.1-r1.ebuild: - adding ~amd64 keyword for wider testing - - 08 Jul 2004; Alexander Gabert - binutils-2.14.90.0.8-r2.ebuild: - added filter-flags for freduce-all-givs (bug id 27456) - - 03 Jul 2004; Bryan Østergaard - binutils-2.14.90.0.8-r1.ebuild: - Stable on alpha. - - 02 Jul 2004; Jeremy Huddleston - binutils-2.11.92.0.12.3-r2.ebuild, binutils-2.11.92.0.7.ebuild, - binutils-2.12.90.0.15.ebuild, binutils-2.13.90.0.16-r1.ebuild, - binutils-2.13.90.0.18-r1.ebuild, binutils-2.13.90.0.18.ebuild, - binutils-2.14.90.0.2.ebuild, binutils-2.14.90.0.4.1-r1.ebuild, - binutils-2.14.90.0.5-r1.ebuild, binutils-2.14.90.0.6-r2.ebuild, - binutils-2.14.90.0.6-r3.ebuild, binutils-2.14.90.0.6-r6.ebuild, - binutils-2.14.90.0.6-r7.ebuild, binutils-2.14.90.0.7-r4.ebuild, - binutils-2.14.90.0.7.ebuild, binutils-2.14.90.0.8-r1.ebuild, - binutils-2.14.90.0.8-r2.ebuild, binutils-2.14.90.0.8.ebuild, - binutils-2.15.90.0.1.1-r1.ebuild, binutils-2.15.90.0.1.1-r3.ebuild, - binutils-2.15.90.0.3-r3.ebuild, binutils-2.15.91.0.1-r1.ebuild, - binutils-2.15.91.0.1-r2.ebuild, binutils-2.15.91.0.1.ebuild: - virtual/glibc -> virtual/libc - - 27 Jun 2004; binutils-2.15.91.0.1-r2.ebuild: - remove unused patches from tarball an no_rel_ro patches - - 23 Jun 2004; Aron Griffis - binutils-2.11.92.0.12.3-r2.ebuild, binutils-2.11.92.0.7.ebuild, - binutils-2.12.90.0.15.ebuild, binutils-2.13.90.0.16-r1.ebuild, - binutils-2.13.90.0.18-r1.ebuild, binutils-2.13.90.0.18.ebuild, - binutils-2.14.90.0.2.ebuild, binutils-2.14.90.0.4.1-r1.ebuild, - binutils-2.14.90.0.5-r1.ebuild, binutils-2.14.90.0.6-r2.ebuild, - binutils-2.14.90.0.6-r3.ebuild, binutils-2.14.90.0.6-r6.ebuild, - binutils-2.14.90.0.6-r7.ebuild, binutils-2.14.90.0.7-r4.ebuild, - binutils-2.14.90.0.7.ebuild, binutils-2.14.90.0.8-r1.ebuild, - binutils-2.14.90.0.8.ebuild: - QA - fix use invocation - - 20 Jun 2004; Daniel Black - binutils-2.14.90.0.8-r2.ebuild, binutils-2.15.91.0.1-r2.ebuild: - Fix unpacks for bugs #54316 and #54059. Added sample test routine to - binutils-2.15.91.0.1-r2 - - 15 Jun 2004; Travis Tilley binutils-2.14.90.0.8-r2.ebuild: - changed the ebuild to not have "use uclibc ... || die", but it still doesnt - patch cleanly so it is still masked - - 15 Jun 2004; Travis Tilley binutils-2.14.90.0.8-r2.ebuild: - masking -* due to bug 54059 - -*binutils-2.15.91.0.1-r2 (16 Jun 2004) - - 16 Jun 2004; Daniel Black - +binutils-2.14.90.0.8-r2.ebuild, +binutils-2.15.91.0.1-r2.ebuild: - uclibc fixes thanks to Peter S. Mazinger - - 13 Jun 2004; Luca Barbato - binutils-2.15.90.0.3-r3.ebuild: - Fixes a problem with kdeutils not linking - - 08 Jun 2004; Mike Frysinger - binutils-2.15.91.0.1-r1.ebuild: - This version breaks pretty bad on ppc/altivec ... cant build kernel/gcc/etc... - :( - - 05 Jun 2004; Ilya A. Volynets-Evenbach - binutils-2.14.90.0.8-r1.ebuild: - Mark binutils-2.14.90.0.8-r1 ~mips - -*binutils-2.15.91.0.1-r1 (04 Jun 2004) - - 04 Jun 2004; Travis Tilley +files/libiberty-pic.patch, - +binutils-2.15.91.0.1-r1.ebuild: - new ebuild with patch updates from Peter Mazinger - - 03 Jun 2004; Tom Gall binutils-2.15.90.0.3-r3.ebuild, - binutils-2.15.91.0.1.ebuild: - binutils-2.15.90.0.3-r3.ebuild stable on ppc64, binutils-2.15.91.0.1.ebuild - ~ppc64 - - 02 Jun 2004; Travis Tilley binutils-2.15.90.0.1.1-r3.ebuild: - stable on amd64 - -*binutils-2.15.91.0.1 (28 May 2004) - - 28 May 2004; Joshua Kinard - binutils-2.15.90.0.3-r3.ebuild, +binutils-2.15.91.0.1.ebuild: - New revision, keyword masked for now, needs testing. - - 26 May 2004; Luca Barbato - binutils-2.15.90.0.1.1-r3.ebuild, binutils-2.15.90.0.3-r3.ebuild: - Marked ~ppc - -*binutils-2.15.90.0.1.1-r3 (23 May 2004) - - 23 May 2004; Travis Tilley - -binutils-2.15.90.0.1.1-r2.ebuild, +binutils-2.15.90.0.1.1-r3.ebuild: - make patchset apply all patches on all archs and re-added hppa keyword since - the relro backport should apply cleanly now - - 16 May 2004; binutils-2.14.90.0.8-r1.ebuild, - binutils-2.15.90.0.1.1-r1.ebuild, binutils-2.15.90.0.1.1-r2.ebuild, - binutils-2.15.90.0.1.1.ebuild, binutils-2.15.90.0.3-r3.ebuild: - added gprof/bbconv.pl install phase of >=binutils-2.14.90.0.8-r1, added - multitarget USE flag for canadian cross compiling bug #49934 also - >=binutils-2.14.90.0.8-r1. marked 2.14.90.0.8-r1 stable on x86 - - 13 May 2004; binutils-2.15.90.0.3-r3.ebuild: - bbconv.pl script is needed to convert profiling information in bb.out files to - format understood by gprof. reported by pasi valminen bug 50911 - -*binutils-2.15.90.0.3-r3 (11 May 2004) - - 11 May 2004; binutils-2.15.90.0.3-r2.ebuild, - binutils-2.15.90.0.3-r3.ebuild: - updated patches to match upstream fixes. Includes fix s390{,x} .{,b,p2}align - handling, ppc/ppc64 testsuite fixes. -z relro ppc/ppc64/ia64 fixes, change - x86-64 .plt symbol st_size handling to match ia32, prettify objdump -d output, - several SPARC fixes. Submitted by Peter S. Mazinger - -*binutils-2.15.90.0.3-r2 (10 May 2004) - - 10 May 2004; binutils-2.15.90.0.3-r1.ebuild, - binutils-2.15.90.0.3-r2.ebuild: - Fix .tbss handling - - 08 May 2004; Joshua Kinard - binutils-2.14.90.0.8-r1.ebuild: - Originally masked because these binutils would produce non-booting kernels on - mips. That problem has been resolved in the kernel sources now, so it's safe - to put these into unstable (2.15 needs more testing). - -*binutils-2.15.90.0.1.1-r2 (10 May 2004) - - 10 May 2004; Travis Tilley - +binutils-2.15.90.0.1.1-r2.ebuild: - added backports of the tbss fix and relro patch - -*binutils-2.15.90.0.1.1-r1 (04 May 2004) - - 04 May 2004; Travis Tilley - +binutils-2.15.90.0.1.1-r1.ebuild: - added a more amd64-friendly revision of 2.15.90.0.1.1. besides the patches - included in the previous ebuild, the following have been added: - 34_all_binutils-2.15.90.0.3-place-orphan.patch, - 70_amd64_binutils_x86_64_testsuite.patch, - 71_ppc_binutils-2.13-ppc32-fPIC.patch, 72_all_fde-alignment.patch, - 73_amd64_x86-64-gotpcrel.patch, 74_all_gcc34-no-unit-at-a-time.patch, - 75_amd64_sysenter-sysexit-are-valid-IA32e-assembly.patch, - 76_all_use-new-ld-dtags.patch, 77_x86_via-padlock-gas.patch, and - 78_x86_via-padlock-tests.patch. this ebuild /should/ work with gcc 3.4 more - consistantly than the previous one. - - 24 Apr 2004; Travis Tilley binutils-2.14.90.0.7-r1.ebuild, - binutils-2.14.90.0.7-r2.ebuild, binutils-2.14.90.0.7-r3.ebuild, - binutils-2.14.90.0.7-r4.ebuild, binutils-2.14.90.0.7.ebuild, - binutils-2.14.90.0.8-r1.ebuild, binutils-2.14.90.0.8.ebuild, - binutils-2.15.90.0.1.1.ebuild, binutils-2.15.90.0.3-r1.ebuild, - binutils-2.15.90.0.3.ebuild: - GCC 3.4 breaks binutils if CFLAGS arent conservative. Adding fix for bug #47581 - - 23 Apr 2004; Travis Tilley binutils-2.15.90.0.1.1.ebuild: - added ~amd64 keyword for testing - -*binutils-2.15.90.0.3-r1 (19 Apr 2004) - - 19 Apr 2004; binutils-2.15.90.0.3-r1.ebuild: - - the patches 03,04,07 were replaced w/ the redhat ones - the patch 01 was - moved to apply after the uclibc patches (59) - the 20 patch got a replacement - 64 for the case relro is used (default in ebuild) - the 90 patch (pt_pax) has - also a replacement as 63 to apply after relro - the patches 3x_ are from - redhat having the same patch number 3x coresponds in redhat to x, (unmodified - patches) - the patches 5x_ are uclibc related coming from buildroot (51 and 52 - are ports of the buildroot versions to this binutils, 51 is generic, only 52 - is uclibc specific), the 59 patch is really the 01 one, but the 52 patch is so - big, that I didn't want to patch it again, it applies correctly in the reverse - order - the patches 6x_ are from me: 61_ I had a situation on cross-compiling - where I needed it 62_ is an uclibc addon (missing configure stuff to recognize - uclibc) 63_ pt_pax patch to apply after relro 64_ is a 20_ patch replacement - for amd64. - I have left in all the patches, so that some can build w/ and w/o relro. The - ebuild offers this possibility, see comment inside. - The uclibc stuff shouldn't disturb normal functionality, mainly the configure - stuff is enabled to recognize uclibc systems. Peter S. Mazinger - -*binutils-2.15.90.0.3 (15 Apr 2004) - - 15 Apr 2004; Joshua Kinard binutils-2.12.90.0.15.ebuild, - binutils-2.13.90.0.16-r1.ebuild, binutils-2.13.90.0.18-r1.ebuild, - binutils-2.13.90.0.18.ebuild, binutils-2.14.90.0.2.ebuild, - binutils-2.14.90.0.4.1-r1.ebuild, binutils-2.14.90.0.5-r1.ebuild, - binutils-2.14.90.0.6-r2.ebuild, binutils-2.14.90.0.6-r3.ebuild, - binutils-2.14.90.0.6-r6.ebuild, binutils-2.14.90.0.6-r7.ebuild, - binutils-2.15.90.0.3.ebuild: - New ebuild for binutils-2.15.90.0.3, and removed portage from DEPEND in older - ebuilds as it caused repoman troubles. - - 14 Mar 2004; Joshua Kinard : - Added a patch to the patchball for mips that reverses a patch added in - Dec-2003 that seemingly makes unbootable kernels. The issue needs to be - investigated further to make sure that this doesn't not affect 2.6 kernels as - well (tested with 2.4 kernels for now). - -*binutils-2.15.90.0.1.1 (06 Mar 2004) - - 06 Mar 2004; Joshua Kinard binutils-2.15.90.0.1.1.ebuild, - binutils-2.15.90.0.1.ebuild: - New minor revision that fixes the as.1 manpage issue and an ia64 linker bug. - -*binutils-2.15.90.0.1 (04 Mar 2004) - - 04 Mar 2004; Joshua Kinard binutils-2.15.90.0.1.ebuild: - New Version + fix for generating as.1 manpage. Keyword masked on all archs, - test and keyword as necessary. - - 21 Feb 2004; Brad House - binutils-2.14.90.0.8-r1.ebuild: - stable on amd64 for 2004.0 release - - 17 Feb 2004; Martin Schlemmer - binutils-2.14.90.0.8-r1.ebuild: - Move to unstable to give the PAX_FLAGS stuff a test run. - - 10 Feb 2004; Joshua Kinard binutils-2.14.90.0.8.ebuild: - Masked on mips because this version of binutils won't produce bootable kernel - images. could be a missing patch or such. - -*binutils-2.14.90.0.8-r1 (27 Jan 2004) - - 27 Jan 2004; binutils-2.14.90.0.8-r1.ebuild: - Added support for new PT_PAX_FLAGS markings for program headers. - - 19 Jan 2004; binutils-2.14.90.0.7-r4.ebuild: - stable on alpha and ia64 for bug 37033 - -*binutils-2.14.90.0.8 (18 Jan 2004) - - 18 Jan 2004; Martin Schlemmer - binutils-2.14.90.0.8.ebuild: - Update version. Move patches to tarball. Many thanks to - Kumba for updating the pni (prescott support) patch - and the mips-brswap patch. - -*binutils-2.14.90.0.7-r4 (18 Jan 2004) - - 18 Jan 2004; Martin Schlemmer - binutils-2.14.90.0.7-r4.ebuild, - files/2.14/binutils-2.14.90.0.7-bfd-pt-gnu-segment-fix.patch: - Do not add sections to a PT_GNU_STACK segment, which might be - a possible security issue, bug #37033. - - http://sources.redhat.com/ml/binutils/2003-12/msg00205.html - - Also bump x86 to stable, and do not drop already stable archs from - -r3 to testing, as it is a crusial patch. - - 07 Jan 2004; Jason Wever binutils-2.14.90.0.7-r3.ebuild: - Marked stable on sparc. - - 30 Dec 2003; Sven Blumenstein - binutils-2.11.92.0.12.3-r2.ebuild, binutils-2.11.92.0.7.ebuild, - binutils-2.14.90.0.6-r6.ebuild: - Marked stable on sparc. - - 28 Dec 2003; Joshua Kinard - binutils-2.14.90.0.7-r3.ebuild: - Move to mips stable (~mips -> mips) - - 29 Nov 2003; Brad House - binutils-2.14.90.0.7-r3.ebuild: - mark stable on amd64 - -*binutils-2.14.90.0.7-r3 (09 Nov 2003) - - 08 Dec 2003; Guy Martin binutils-2.14.90.0.7-r3.ebuild: - Marked stable on hppa. - - 09 Nov 2003; Martin Schlemmer - binutils-2.14.90.0.2.ebuild, binutils-2.14.90.0.4.1-r1.ebuild, - binutils-2.14.90.0.6-r7.ebuild, binutils-2.14.90.0.7-r1.ebuild, - binutils-2.14.90.0.7-r2.ebuild, binutils-2.14.90.0.7-r3.ebuild, - binutils-2.14.90.0.7.ebuild: - Fix sparc64/mips64 symlinks to point to /usr/sparc-*/bin/*. Do not apply - -ppc-reloc.patch to sparc as ld quits with SIGBUS. - - 08 Nov 2003; Jason Wever binutils-2.14.90.0.7-r2.ebuild: - Masked on sparc until ld issue is fixed. - -*binutils-2.14.90.0.7-r2 (08 Nov 2003) - - 08 Nov 2003; Martin Schlemmer - binutils-2.14.90.0.7-r2.ebuild, - files/2.14/binutils-2.14.90.0.7-ppc-reloc.patch, - files/2.14/binutils-2.14.90.0.7-tls-section-alignment.patch: - Cleanup -ppc-reloc.patch (had cruft like .orig in) and apply for all, as it - fixes dynamic relocs for more archs than ppc. - Add -tls-section-alignment.patch and put into testing for all. - -*binutils-2.14.90.0.7-r1 (07 Nov 2003) - - 07 Nov 2003; Luca Barbato - binutils-2.14.90.0.7-r1.ebuild, - files/2.14/binutils-2.14.90.0.7-ppc-reloc.patch: - Fix to bug #32755 - - 05 Nov 2003; Luca Barbato binutils-2.14.90.0.7.ebuild: - Maked -ppc :seems to have too many issues - - 04 Nov 2003; Brad House - binutils-2.14.90.0.6-r7.ebuild: - mark as stable on amd64 - - 04 Nov 2003; Martin Schlemmer - binutils-2.14.90.0.2.ebuild, binutils-2.14.90.0.4.1-r1.ebuild, - binutils-2.14.90.0.6-r7.ebuild, binutils-2.14.90.0.7.ebuild: - Enable building of 64bit apps on Sparc and Mips, closing bug #24631. - Fix is an modified one from Jason Wever . - -*binutils-2.14.90.0.7 (01 Nov 2003) - - 08 Nov 2003; Guy Martin binutils-2.14.90.0.7.ebuild, - binutils-2.14.90.0.7-r1.ebuild : Marked -hppa as it can't even compile glibc. - - 01 Nov 2003; Martin Schlemmer - binutils-2.14.90.0.7.ebuild: - Update version. - -*binutils-2.14.90.0.6-r7 (26 Oct 2003) - - 26 Oct 2003; Martin Schlemmer - binutils-2.14.90.0.6-r7.ebuild, - files/2.14/binutils-2.14.90.0.6-bfd-elf-interp-4.patch: - Add the official binutils-2.14.90.0.6-bfd-elf-interp.patch patch. - - 26 Oct 2003; Martin Schlemmer - binutils-2.14.90.0.6-r6.ebuild: - Bump ppc to stable, as the .interp fix in -r5 is wrong. Bump x86, amd64 and - ia64 to stable. - - 22 Oct 2003; Aron Griffis - binutils-2.14.90.0.6-r6.ebuild: - Stable on alpha - - 22 Oct 2003; Bartosch Pixa - binutils-2.14.90.0.6-r5.ebuild: - set ppc in keywords - -*binutils-2.14.90.0.6-r6 (07 Oct 2003) - - 07 Oct 2003; Martin Schlemmer - binutils-2.14.90.0.6-r6.ebuild, - files/2.14/binutils-2.14.90.0.6-bfd-elf-interp-3.patch: - Add correct patch to fix attributes on .interp section, thanks to feedback - from pipcas and Ned Ludd . - -*binutils-2.14.90.0.6-r5 (05 Oct 2003) - - 05 Oct 2003; Martin Schlemmer - binutils-2.14.90.0.6-r5.ebuild, - files/2.14/binutils-2.14.90.0.6-ppc-bfd.patch: - Add ppc-bfd.patch to fix ppc issues, bug #28011. Remove bfd-elf-interp.patch, - as it breaks section attibutes as in - http://gcc.gnu.org/ml/gcc/2003-10/msg00141.html. - -*binutils-2.14.90.0.6-r4 (05 Oct 2003) - - 05 Oct 2003; Martin Schlemmer - binutils-2.14.90.0.6-r4.ebuild, - files/2.14/binutils-2.14.90.0.6-eh-frame-ro-2.patch, - files/2.14/binutils-2.14.90.0.6-ia64-howto.patch, - files/2.14/binutils-2.14.90.0.6-ia64-sdata.patch, - files/2.14/binutils-2.14.90.0.6-ia64-speedup.patch, - files/2.14/binutils-2.14.90.0.6-merge-speedup.patch, - files/2.14/binutils-2.14.90.0.6-sparc-cfi.patch: - Update eh-frame-ro patch - seems as if I might have missed a needed change or - two. Also update merge patch, as well as add some ia64 and sparc patches. - - 03 Oct 2003; Brad House - binutils-2.14.90.0.6-r3.ebuild, - files/binutils-2.14.amd64-32bit-path-fix.patch: - 32bit search path for amd64 was /lib and /usr/lib. That is obviously wrong. - Make the search path /lib32 and /usr/lib32 instead, which should be symlinks - to the real location of your 32bit install. This patch is amd64 ONLY - -*binutils-2.14.90.0.6-r3 (13 Sep 2003) - - 20 Sep 2003; Alexander Gabert - binutils-2.14.90.0.6-r3.ebuild: - added hppa static fpic bugfix by tausq - - 20 Sep 2003; binutils-2.14.90.0.6-r3.ebuild, - files/2.14/binutils-2.14.90.0.6-bfd-elf-interp.patch: - A change that defines expected section attributes for a select set of - hardcoded section names was incorrectly added to binutils by redhat. This fix - is for bfd/elf.c for the .interp entry which should have SHF_ALLOC instead of 0 - - 17 Sep 2003; Jon Portnoy binutils-2.14.90.0.6-r3.ebuild : - ia64 keywords. - - 13 Sep 2003; Martin Schlemmer - binutils-2.14.90.0.6-r3.ebuild, - files/2.14/binutils-2.14.90.0.6-cxx-speedup.patch: - Add patch that speedup C++ linking. Originally submitted by - (got from Nove Hrady KDE hackfest), updated to - latest binutls by Chris Lee , bug #27540. - -*binutils-2.14.90.0.6-r2 (01 Sep 2003) - - 21 Sep 2003; Joshua Kinard binutils-2.14.90.0.6-r2.ebuild: - Changed ~mips to mips in KEYWORDS - - 03 Sep 2003; Stefan Jones - binutils-2.14.90.0.6-r2.ebuild : - Move to stable for x86, to fix bug #27440 - - 01 Sep 2003; Martin Schlemmer - binutils-2.14.90.0.2.ebuild, binutils-2.14.90.0.4.1-r1.ebuild, - binutils-2.14.90.0.5-r1.ebuild, binutils-2.14.90.0.6-r2.ebuild, - files/2.14/binutils-2.14.90.0.6-dont-crash-on-null-owner.patch: - There is a bug in binutils 2.14.* which causes a segfault in certain - circumstances when linking. This bug does not exist in binutils 2.11.*. - - More details on the bug can be found here: - http://sources.redhat.com/ml/bug-binutils/2003-q3/msg00559.html - http://sources.redhat.com/ml/bug-binutils/2003-q3/msg00735.html - - Bug #27492, thanks to Adam Chodorowski for reporting. - -*binutils-2.14.90.0.6-r1 (26 Aug 2003) - - 26 Aug 2003; Martin Schlemmer - binutils-2.14.90.0.6-r1.ebuild: - Remove the place-orphan.patch patch, as it causes failures in sash and - util-linux-2.12 (bug #27330) - -*binutils-2.14.90.0.6 (24 Aug 2003) - - 24 Aug 2003; Martin Schlemmer - binutils-2.14.90.0.6.ebuild, - files/2.14/binutils-2.14.90.0.5-place-orphan.patch, - files/2.14/binutils-2.14.90.0.6-eh-frame-ro.patch: - Update version. - - 20 Aug 2003; Luca Barbato binutils-2.14.90.0.5-r1.ebuild: - Marked ~ppc - -*binutils-2.14.90.0.5-r1 (10 Aug 2003) - - 10 Aug 2003; Joshua Kinard binutils-2.14.90.0.5-r1.ebuild: - Moved binutils-2.14.90.0.5-r1 to mips unstable, since latest CVS this comes - from includes major mips updates. And to test it in Stager. - Also moved it to sparc unstable for testing. - - -*binutils-2.14.90.0.5 (23 Jul 2003) - - 23 Jul 2003; Joshua Kinard binutils-2.14.90.0.5.ebuild: - Changed "mips" to "-mips" in KEYWORDS until further testing can be done. - - 23 Jul 2003; Martin Schlemmer - binutils-2.14.90.0.5.ebuild: - New release. - -*binutils-2.14.90.0.4.1-r1 (28 Jun 2003) - - 12 Jul 2003; Joshua Kinard binutils-2.14.90.0.4.1-r1.ebuild: - Changed -mips to ~mips in KEYWORDS. Experimentation seems to prove that - binutils-2.14.90.0.2 has some issue triggered at random in which a compile - errors out claiming "linking abicalls to non-abicalls". Some google searching - indicates binutils-2.14.90.0.4 or greater fixes this issue. - Has been tested in a mips stage1 rebuild and is currently used in building a - mipsel stage1 for Cobalt servers. - - 28 Jun 2003; Martin Schlemmer - binutils-2.14.90.0.4.1-r1.ebuild, files/2.14/binutils-2.14.90.0.4-cfi.patch, - files/2.14/binutils-2.14.90.0.4-cfi2.patch, - files/2.14/binutils-2.14.90.0.4-cfi3.patch, - files/2.14/binutils-2.14.90.0.4-cfi4.patch, - files/2.14/binutils-2.14.90.0.4-eh-frame-ro.patch, - files/2.14/binutils-2.14.90.0.4-gas-execstack.patch, - files/2.14/binutils-2.14.90.0.4-gas-pred.patch, - files/2.14/binutils-2.14.90.0.4-ltconfig-multilib.patch, - files/2.14/binutils-2.14.90.0.4-pie.patch, - files/2.14/binutils-2.14.90.0.4-pie2.patch, - files/2.14/binutils-2.14.90.0.4-pni.patch, - files/2.14/binutils-2.14.90.0.4-ppc-bigplt.patch, - files/2.14/binutils-2.14.90.0.4-ppc64-ctors.patch, - files/2.14/binutils-2.14.90.0.4-ppc64-prelink.patch, - files/2.14/binutils-2.14.90.0.4-pt-gnu-stack.patch, - files/2.14/binutils-2.14.90.0.4-sparc-nonpic.patch: - Add patches from Redhat. Add fix for libtool borkage. - -*binutils-2.14.90.0.4.1 (25 Jun 2003) - - 25 Jun 2003; Martin Schlemmer - binutils-2.11.92.0.12.3-r2.ebuild, binutils-2.13.90.0.20-r1.ebuild, - binutils-2.14.90.0.2.ebuild, binutils-2.14.90.0.4.1.ebuild, - binutils-2.14.90.0.4.ebuild: - New version with some amd64 fixes. Also fix SRC_URI for some of the newer - ebuilds. - - 14 Jun 2003; Joshua Kinard binutils-2.14.90.0.2.ebuild: - Changes ~mips to mips in KEYWORDS - - 08 Jun 2003; Luca Barbato - binutils-2.14.90.0.1-r1.ebuild, binutils-2.14.90.0.2.ebuild: - marked stable on ppc. - -*binutils-2.14.90.0.4 (26 May 2003) - - 07 Jun 2003; Joshua Kinard binutils-2.14.90.0.4.ebuild: - Changed ~mips to -mips. This package should stay masked until dragon - can release a fixed version that fixes the bad libbfd linkage. - - 26 May 2003; Joshua Kinard - binutils-2.14.90.0.4.ebuild: - New Version. Masked for all archs except unstable/testing on mips. - - 26 May 2003; Joshua Kinard - binutils-2.14.90.0.2.ebuild, binutils-2.14.90.0.4.ebuild: - Added a patch for MIPS arch which fixes binutils so that it does not generate - a broken dynamic relocation table for the OpenSSL libs. This happens because - the global GOT entry count is too low. The bug itself was introduced in - binutils CVS by the following patch: - http://sources.redhat.com/cgi-bin/cvsweb.cgi/src/bfd/elfxx-mips.c.diff?r1=1.38 - &r2=1.39&cvsroot=src - - 26 May 2003; Joshua Kinard - binutils-2.14.90.0.2.ebuild, binutils-2.14.90.0.4.ebuild: - Corrected a minor error in SRC_URI so that the - package is found in the right location on the kernel.org website. - -*binutils-2.11.92.0.7 (25 May 2003) - - 25 May 2003; Martin Holzer - binutils-2.11.92.0.12.3-r2.ebuild, binutils-2.11.92.0.7.ebuild, - binutils-2.12.90.0.15.ebuild, binutils-2.12.90.0.7.ebuild, - binutils-2.13.90.0.16-r1.ebuild, binutils-2.13.90.0.18-r1.ebuild, - binutils-2.13.90.0.18.ebuild, binutils-2.13.90.0.20-r1.ebuild, - binutils-2.14.90.0.1-r1.ebuild, binutils-2.14.90.0.2.ebuild: - now uses mirror://kernel - -*binutils-2.14.90.0.2 (17 May 2003) - - 16 Jul 2003; Jay Pfeifer binutils-2.14.90.0.2.ebuild: - set stable on x86 - - 01 Jul 2003; Todd Sunderlin binutils-2.14.90.0.2.ebuild: - set stable on sparc - - 17 May 2003; Martin Schlemmer - binutils-2.14.90.0.2.ebuild: - New version. - - 17 May 2003; Martin Schlemmer - binutils-2.13.90.0.10.ebuild, binutils-2.13.90.0.10.ebuild, - binutils-2.13.90.0.14.ebuild, binutils-2.13.90.0.14.ebuild, - binutils-2.13.90.0.16-r1.ebuild, binutils-2.13.90.0.16.ebuild, - binutils-2.13.90.0.16.ebuild, binutils-2.13.90.0.18-r1.ebuild, - binutils-2.13.90.0.18.ebuild, binutils-2.13.90.0.20-r1.ebuild, - binutils-2.13.90.0.4.ebuild, binutils-2.13.90.0.4.ebuild, - binutils-2.14.90.0.1-r1.ebuild, binutils-2.14.90.0.1.ebuild, - binutils-2.14.90.0.1.ebuild : - Add c++filt back in anticipation for gcc-3.3. Cleanup. - -*binutils-2.14.90.0.1-r1 (08 May 2003) - - 09 May 2003; Joshua Kinard - binutils-2.14.90.0.1-r1.ebuild: - Changed -sparc to ~sparc. Merges fine on sparc, - but further testing to be done. With mips, edited out the - gas-mips-gprel from binutils-2.13.90.0.20, as this patch already - appears to be included in 2.14.90.0.1 (emerge failed on attempting to - patch it). Mips testing is underway via "emerge system". - - 08 May 2003; Nicholas Wourms - binutils-2.14.90.0.1-r1.ebuild: - Fix a small typo in the patch section. - - 08 May 2003; Nicholas Wourms - binutils-2.14.90.0.1-r1.ebuild, - files/2.14/binutils-2.14.90.0.1-eh-frame-ro.patch, - files/2.14/binutils-2.14.90.0.1-sparc-nonpic.patch: - Added patch to resync with CVS head, bumped revision to reflect this. This - version should resolve any outstanding testsuite & weak symbol issues. I - have also added the previous patches back into the ebuild, compiles and - passes the testsuite on x86 w/o any regressions. - -*binutils-2.14.90.0.1 (06 May 2003) - - 06 May 2003; Luca Barbato - binutils-2.14.90.0.1.ebuild: - New version, seems to solve the ppc relocation issues. - -*binutils-2.13.90.0.20-r1 (09 Apr 2003) - - 09 Apr 2003; Nicholas Wourms - binutils-2.13.90.0.20-r1.ebuild: - Added cvs update patch to (hopefully) address the problems reported in - bugs #16363, #17986, & #18873. This also includes the fix from Alan - Modra for the problem where ld would segfault when building kde on - ppc. In addition to that, it also has some more mips/mips64 updates - which should address a few of the current problems we were experiencing - initially. As with the previous version, "Handle With Care..." That - being said, testing would be greatly appreciated and arches unmasked - as they are confirmed stable. I removed the previous ebuild since it - has been causing lots of trouble. - - 23 Mar 2003; Martin Schlemmer binutils-2.13.90.0.20.ebuild : - Add '~x86' to KEYWORDS. - -*binutils-2.13.90.0.20 (22 Mar 2003) - - 22 Mar 2003; Nicholas Wourms - binutils-2.13.90.0.20.ebuild, - files/2.13/binutils-2.13.90.0.10-x86_64-gotpcrel.patch, - files/2.13/binutils-2.13.90.0.18-testsuite-Wall-fixes.patch, - files/2.13/binutils-2.13.90.0.20-array-sects-compat.patch, - files/2.13/binutils-2.13.90.0.20-gas-mips-gprel.patch: - Bump to new beta version. This release contains a boatload of fixes for - a wide variety of platforms. It also fixes a critical bug in the previous - version for the mips platform. Due to the beta nature of this version and - the proximity to a new gentoo release, I have set keywords to "-arch" for - all platforms except mips. However, it should be tested on these other - platforms and keywords modified as necessary. - -*binutils-2.13.90.0.18-r1 (08 Mar 2003) - - 31 Mar 2003; Christian Birchinger - binutils-2.13.90.0.18-r1.ebuild: - Commented out sparc-nonpic.patch and added ~sparc keyword - - 27 Mar 2003; Seemant Kulleen - binutils-2.13.90.0.18-r1.ebuild: - masked for sparc, it breaks, dunno why. see bug #17193 - - 08 Mar 2003; Martin Schlemmer binutils-2.13.90.0.18-r1.ebuild : - Update patches from Redhat. - - 18 Feb 2003; Zach Welch : - Added arm to keywords. - - -*binutils-2.13.90.0.18 (26 Jan 2003) - - 27 May 2003; Guy Martin binutils-2.13.90.0.18.ebuild: - Remasking binutils 2.13.90.0.18 for hppa which cause random segfault on - hppa1.1 stations. - - 29 Mar 2003; Christian Birchinger - binutils-2.13.90.0.18.ebuild: - Added sparc stable keyword - - 01 Mar 2003; Brandon Low - binutils-2.13.90.0.10.ebuild, binutils-2.13.90.0.14.ebuild, - binutils-2.13.90.0.16-r1.ebuild, binutils-2.13.90.0.16.ebuild, - binutils-2.13.90.0.18.ebuild, binutils-2.13.90.0.4.ebuild: - Filter another flag that was causing problems - - 26 Feb 2003; Zach Welch binutils-2.13.90.0.18.ebuild : - filter -O2 from ARM builds to prevent gcc ICE - - 24 Feb 2003; Martin Schlemmer binutils-2.13.90.0.18.ebuild : - Mark stable for x86. Rip out static stuff as it anyhow do not work. - - 22 Feb 2003; Guy Martin binutils-2.13.90.0.18.ebuild : - Commited stable for hppa. - - 21 Feb 2003; Aron Griffis binutils-2.13.90.0.18.ebuild : - Mark stable on alpha - - 08 Feb 2003; Guy Martin binutils-2.13.90.0.18.ebuild : - Added hppa to keywords. - - 01 Feb 2003; Jon Nall binutils-2.13.90.0.18.ebuild : - made stable for ppc. this is to allow kde to compile happily and closes bug - #14776 - - 29 Jan 2003; Nicholas Wourms binutils-2.13.90.0.18.ebuild : - Fixed Jakub's eh-frame-ro patch to apply and compile cleanly against - binutils-2.13.90.0.18. Passed all tests locally on x86, but please test on - other platforms. - - 26 Jan 2003; Martin Schlemmer binutils-2.13.90.0.18.ebuild : - New version. Some cleanups + patches. This closes bug #14518. - -*binutils-2.13.90.0.16-r1 (30 Dec 2002) - - 08 Jan 2003; Martin Schlemmer binutils-2.13.90.0.16-r1.ebuild : - Mark stable. - - 19 Jan 2003; Jan Seidel : - Add patches for mips - Added mips to keywords - - 30 Dec 2002; Martin Schlemmer binutils-2.13.90.0.16-r1.ebuild : - Update with patches from Redhat/Mandrake for various issues. - - 13 Dec 2002; Mark Guertin binutils-2.13.90.0.16.ebuild : - Marked stable for ppc. - - 10 Dec 2002; Martin Schlemmer binutils-2.13.90.0.16.ebuild : - Mark as stable for x86. - - 06 Dec 2002; Rodney Rees : - Changed sparc ~sparc keywords - -*binutils-2.13.90.0.16 (29 Nov 2002) - - 07 Jan 2003: Jan Seidel binutils-2.13.90.0.16.ebuild : - Add patches for mips - Added mips to keywords. - - 29 Nov 2002; Nick Hadaway - binutils-2.13.90.0.16.ebuild, files/digest-binutils-2.13.90.0.16 : - Version bump. No changes in the ebuild. Solves bug #11088 - -*binutils-2.13.90.0.14 (18 Nov 2002) - - 18 Nov 2002; Stefan Jones : - Version update, masked for testing. - -*binutils-2.13.90.0.10 (14 Oct 2002) - - 14 Oct 2002; Martin Schlemmer : - - Version update. Remove sparc until further testing - from Seemant. - -*binutils-2.13.90.0.8 (10 Oct 2002) - - 10 Oct 2002; Martin Schlemmer : - - New version. PPC and SPARC elf linkage fixes. More - TLS support code added. - -*binutils-2.13.90.0.4 (15 Aug 2002) - - 15 Aug 2002; Martin Schlemmer : - - Update to latest version. - - 1 Aug 2002; Martin Schlemmer : - - Updated DEPEND not to use if statements, but rather - new syntax of portage-2.0.21 and up. - -*binutils-2.12.90.0.15 (30 Jul 2002) - - 30 Jul 2002; Mark Guertin : - Added ppc to keywords - -*binutils-2.12.90.0.14 (6 Jul 2002) - - 6 Jul 2002; Martin Schlemmer : - Version update. - -*binutils-2.12.90.0.9 (10 Jun 2002) - - 9 Jun 2002; Martin Schlemmer : - Version update. - -*binutils-2.12.90.0.7 (25 Apr 2002) - -*binutils-2.12.90.0.4 (16 Apr 2002) - -*binutils-2.12.90.0.3 (7 Apr 2002) - -*binutils-2.12.90.0.1 (21 Mar 2002) - -*binutils-2.11.92.0.12.3-r2 (12 Mar 2002) - - 12 Mar 2002; Seemant Kulleen ChangeLog : - - Updated copyright year, and added USE dependent nls compilation. - -*binutils-2.11.92.0.12.3-r1 (1 Feb 2002) - - 1 Feb 2002; G.Bevin ChangeLog : - - Added initial ChangeLog which should be updated whenever the package is - updated in any way. This changelog is targetted to users. This means that the - comments should well explained and written in clean English. The details about - writing correct changelogs are explained in the skel.ChangeLog file which you - can find in the root directory of the portage repository. diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/Manifest b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/Manifest index 711bbee472..447fb9b14b 100644 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/Manifest +++ b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/Manifest @@ -1,25 +1,10 @@ -AUX binutils-configure-LANG.patch 2082 SHA256 316f75980bfcccc306bd466d72d0e20a0ac327b8b7642fa2e3cf8d95d65f24d6 SHA512 1caf25d5e332d7de313b6be73e753fdde7b02235af564a9c06517f5874127998eeed731388617b75f54be6fec21835b78a54ce6c7162a33e25411fe3c78efee7 WHIRLPOOL 7d36d954bdac43412de2197066fe1eeb3d6d28f8756c350fe94d7fd7aab3177382dd38473a2dd02d6ddeb76c224e08733825cd07949a3760f5fe67434b8bc882 -DIST binutils-2.21.1-patches-1.4.tar.bz2 20033 SHA256 51e50584a7364549649cc6c59f4a678b07595979811e8e2150264318c3b4493d SHA512 66b71031a782f9708dc5f8ac9171b2be0bbca102b44705155b292329e0664cc71b649f4d8fa50ad0d9123436c03b994da5a0fddc32e43bf2d50e74c68609e508 WHIRLPOOL 2bdc11027b3dcd27c766b4ca5f578a32838d15b3370b4093f1c30887200b82bfaa732df9af23f545d58bbbf373c9967a31fcbb19b3f9b855f0923143e77fa9f5 -DIST binutils-2.21.1.tar.bz2 18997755 SHA256 cdecfa69f02aa7b05fbcdf678e33137151f361313b2f3e48aba925f64eabf654 SHA512 3f550f6833a41e9b17d1f515eea0de8dc14aefb7dd69c65b821aa1336aea4c3f55b4457a1781ab7b32bda049798fef3cf989148e4acb0fca8baca5af74766f31 WHIRLPOOL 1025ac3714f2406ee5afcda3f7a23f788a35e354b928f4b11c7448150a5613f793c2aa471f4612c5015e89d5abbb61522a7a0265286fcf2788fbf1194fb60201 -DIST binutils-2.22-patches-1.5.tar.bz2 37350 SHA256 51cad7b3c2d18db0f7d2e4a3e46e37f00eb720cfa663ea396e16dcfbba12a07c SHA512 407490be54fec09faf26e8062cf28d2ea2d58df669642e7582fe51776726f00af8c18194a17438e18068c91b7634fca2d0f33c7231e847ba5141f901d9743ad7 WHIRLPOOL d62be803705d4e526324719fae69c06c303cc2500aeac04cb711eff383a2732ec3f47f9d91deef954c60877e08fed2c2659636dad07086ceaf12c8b899b075f1 -DIST binutils-2.22.tar.bz2 19973532 SHA256 6c7af8ed1c8cf9b4b9d6e6fe09a3e1d3d479fe63984ba8b9b26bf356b6313ca9 SHA512 ffe8ef263ef99183e8cc823fe8487ff7d0f7bf9a8efd2853b5f4636aca0023850d13de4eac7d77a5f69413d8a50e6f95bb14569be53df86c0bce38034525ab74 WHIRLPOOL 8bea2f2082600587649a5f9fffada9c6cf14f42ebddd1e6a4b4d7be25446d7ad76e1335cf8cefe30c812ced408c9dacb55d0033e4b0eaff83efbbfb5ea5f60dc -DIST binutils-2.23.2-patches-1.0.tar.xz 10884 SHA256 47df1338ee285548630dabb6e414cd7ffffaf068a56ea22a185608fcbd091703 SHA512 25d52694e653dd2642eb643ef3bd48a099876515d66b0b1ed8dfa5f60cadaa1bb92a589e370528ec52add7571c0ea1a98859bfde0821c73ec0ded492fff0915c WHIRLPOOL 2aba579641a1b8e701b25c9d0094c9991e151ddd0b02fae7273ca8c9e31fd344cbf3782c5a5f9960a9bee16b41bc898c8ad0ec76ba8ee396d28e878dac47ffc7 -DIST binutils-2.23.2.tar.bz2 21440347 SHA256 fe914e56fed7a9ec2eb45274b1f2e14b0d8b4f41906a5194eac6883cfe5c1097 SHA512 dec753bbba008f1526b89cf1bd85feba78f362f5333ffdf93953fd131eb755976dec82a0a4ba38c43d2434da007137780cfe674de5414be5cf7ce7fbc6af6d16 WHIRLPOOL 1be65f03569d599899c5b57ac7aedbf90b311f9a47c1883dc62c0717b0757ebfb33e17ab3def8d0b805daabba67cf554463f88675c9f552a6fd8dbe7ca77b442 -DIST binutils-2.24-patches-1.4.tar.xz 17488 SHA256 f018f140a52cddb1e4619b5caf4b4a37a27dfb29e8bf29ea5161ab13b33eed13 SHA512 dfd7c38cd978b7d6627579c338bf67641c799ce39936e3475dca3ecf5bade417e3f090253a2326582c64d5743a24f9078794f44e8fd41b6af728f1f375c91d3b WHIRLPOOL d6b414d5e5607fd8b2d0f52b508763110448cfbdcc08be6d7c1412043797bde8ed5fbd9a5ea4c141b7394b2cae0ac2ef24827f67813231129a507f49cbc40245 -DIST binutils-2.24.tar.bz2 22716802 SHA256 e5e8c5be9664e7f7f96e0d09919110ab5ad597794f5b1809871177a0f0f14137 SHA512 5ec95ad47d49b12c4558a8db0ca2109d3ee1955e3776057f3330c4506f8f4d1cf5e505fbf8a16b98403a0fcdeaaf986fe0a22be6456247dbdace63ce1f776b12 WHIRLPOOL 619634dfdc73b8f6e9933b4642f5f9faf147c388a6d39283cd7639d83f3d7a601981cf49a787c43c17a942c563f24dc8dcc682138b5d3102a5650e1b9d15bd50 -DIST binutils-2.25-patches-1.1.tar.xz 11440 SHA256 fb357d6a6fcb348584f30236c5c541d946496472c6bbd45e72d2a60e1182fbce SHA512 a236973ebfd72a069fbb578206baef0d35e12fe7fd19dd5a8fe002088db86d15b149b3de3dfc88a7e58c39df1c354a1caf3e20efc757c080301fa29d083020d3 WHIRLPOOL 03f6f7217c38c856f475cbb561e538d6a8a4368f420295b914fa77d1fc8e05bb96e6678fcd5100290be5d3ab3859182e901387d8ff58014acee0e2a957e27e34 -DIST binutils-2.25-patches-1.2.tar.xz 16480 SHA256 c5a65aefaf561e592961d22cf88e57dd304a73d3643581414b5a7c14667eef30 SHA512 5a8072c57ce393a50de8770885d6740b8835d656e357a12caf67c4ffbfce228f9a53ea0861199a1a08e2ca724702d0e013f3a9787b15de21178e99263fc43292 WHIRLPOOL 691cf14bfb2c1bb144db29917dea791c18eeb192f61325ef3265fed6c4ad870e23485c3505f74a688158bf862d6539aa5f036400dcf14b9c05a09327ab871133 DIST binutils-2.25.1-patches-1.1.tar.xz 18724 SHA256 3d4c0ab2d45d3a952f60246fa5a4353f057c03110130b50e3b2103bd49c345fa SHA512 209c55bf26b51d8c513b40abd2d95f687159c4e964a6c732924f277d04c97323c427fe452c63d5ec6962dcd8892d6d5d807ba88826739425bce6812a31f573dd WHIRLPOOL 2b650af352183d2b58abaee955b223606d63bd5f22a73360e79af1d3b575c5ea385f90be92348ec850534d96f7b6632b1e494f314ec1655eedc26108e849aab7 DIST binutils-2.25.1.tar.bz2 24163561 SHA256 b5b14added7d78a8d1ca70b5cb75fef57ce2197264f4f5835326b0df22ac9f22 SHA512 0b36dda0e6d32cd25613c0e64b56b28312515c54d6a159efd3db9a86717f114ab0a0a1f69d08975084d55713ebaeab64e4085c9b3d1c3fa86712869f80eb954d WHIRLPOOL daa804331ee880296c2fe29fd9b8a52cc695629d4bbe0b9889d96ffc54d330f00fac3f3cb12b3aaf6b7505521ef499c53760912cd7c9bb54f2d5e288224bd1eb -DIST binutils-2.25.tar.bz2 24049133 SHA256 22defc65cfa3ef2a3395faaea75d6331c6e62ea5dfacfed3e2ec17b08c882923 SHA512 49438970642f379978aba988e3d2e7b63dab6fd0b46d91f4100f083e87a84d242089daca58572245fe620457a77bbbe2d78588ff3fb79314e500d1a39bf96f30 WHIRLPOOL 92f963d6ffe7d2378726cb080e893f8c58c8b6de030e78da488d8c3fd157e064a90b62d9bd2f305707758aa016a9e48f0953425828a2a0432ddee8ffae89585f -EBUILD binutils-2.21.1-r1.ebuild 281 SHA256 c4c53e5f3dc4e6eef8b9ab09064f6ac478ab13bd7c064e57fd861309705d7900 SHA512 4ba8c88fcea996e22e039841874b692f8480408a4ef15aa04cdaead165572be0dfd4170ed7eaec7ea17bf52eaf3c7cce9ee93e4b357799d20144ce1c02afd17f WHIRLPOOL 63b6c685ae0e7c61230894092cb2ba71bc9f1dcda6117e913ad25148013b4d0d33ee5e1c54d0c16d02eda6c800ccdc511917380ae8215b26703406851ce05e67 -EBUILD binutils-2.22-r1.ebuild 293 SHA256 65126da5c70b3cf517e6fd74e45a2c1e13f5610032299b8fdc2d999eeacf89d2 SHA512 6d002827f9caaeb713d0779c13cc4914511a667c7725a6140b02b779a8a5412e4aad7e7f7aa968bc70e1510e74a2dc2c33c3dd1a451cc153c58c8dd79cb6d6e3 WHIRLPOOL 124f63dbe84e05d745b904bbab24d6adcee11e194982659d1f3d022bcd63bd0e96de4a9a225b2cfcc303d7e839f6a7d4f18a1ab7ca432b227eeeea81a8c80873 -EBUILD binutils-2.23.2.ebuild 313 SHA256 67df95d3abef9517080aca28c8552a3796370a9c53470447dcb46794f275ce19 SHA512 1c1a64423a38daa2eedc03c0ad81a4e07d927f42fad7b4e07e53c22de4f0906a58fb9b7cf3cc9d5b57e71536aa4fd352f532bff724e1b1eac2a37adc1597ae60 WHIRLPOOL 797c4a51d33251e8b0bcf855f81a315e327d5e62deb50a5b4c39ac91c83d875360419fcadbfd02fac252e53ffeb56ddaaf4f544d6c6777eb209ed8120114dbfe -EBUILD binutils-2.24-r3.ebuild 289 SHA256 72bdb4e88dec6922c6882bbefbed9ae5c576db883f9905f83cef16624d10ce5b SHA512 efa1c7fe76c2175f1729aaf2fbd7ce7c110cc672e025a6004c9513ed0b17358fee964cb126b4f4dd7b2d30d0bbbf4bbe23b596064d00ab4977448a27d925ef56 WHIRLPOOL 411e46989fb16e057aa08acf0a3996cb173fc04a82261a160ea0f9e9ab862cf0f549c7ea57766c20bcbf92de87a9e8ef2982c9977fb72dbfb48ed79407b0e8e8 -EBUILD binutils-2.25-r1.ebuild 312 SHA256 38308c9c7d12e4a09bfc03343d9a239c4b2887a55b4a2dd2e6870aedd4c0f9d6 SHA512 16de3d38ed81c679f5e8ba59b21ae55798b8665d54d5e201579862018e46bea84b22dc54f0ba5943b2bc265401133c231586df2f270b7710ce3bc0c4284579e2 WHIRLPOOL 351944f8dae4fe978ff9851aaaf07cdba6962e0d493a037991fc410829f64a3e8ee15a02ea674098c5064299960bd6c24064d10da4bd5c9b5fe30a9c458be815 -EBUILD binutils-2.25.1-r1.ebuild 299 SHA256 81434e2e2b817d7783df55eeb52e3eb4e2ca4133235ef28a967fda5cdbeb1968 SHA512 aef2a8eed1c734aac6ae2ab6b4eb03f8464ca6c69cde2c0aabe3f121ba9a5fbb112bbf72b8dedead866b0a2bac96dc040f279dce1b4d3568be67ab23151694c0 WHIRLPOOL 163ac1a22c52d1b6c6697affa7b0a6a7b50b4ada9d1bcfbace416b3b723e940545b4d12162ba3c5e833e5f45e9162ff199e777fb5a0dc67df95833346d781fa3 -EBUILD binutils-2.25.ebuild 312 SHA256 ce72d840e4d63afb1bb885af7d58e295029e02a3804e3696fac02dbac4761abe SHA512 cd9fb63f77b5e11105f00f712a2650257306e6d5de2ce67b87e6e260ea670d5bc9087b54f22e5957bcab5d315f0ceef2714c061847c9e65494c470b75ea29db1 WHIRLPOOL 3bd485fc916c3440e0daef20a8a166fb54b96f93da09783b612ad43da0c95371d75226c220977d5e2bde2e897cff2327d6f0d2c4c819860902b1a77e1323cfd0 -EBUILD binutils-9999.ebuild 152 SHA256 386f55e06f239ef815700346dbd115bd2a9dce799850c5a323c0d9aaa4ee7a4c SHA512 29857454c5f1a67b7d41b796a9501535fbaa201d869855189e858ec4c498d36bf8acf64f87bdeaafa2415fc13bcc4a0b86e7af0ae9f5e1466c95d5535efb97db WHIRLPOOL 1d533bd94c598b3aaa8959c21970d2b86fa642c2599edc5af23a40042450c6f2cb8b48dbff191a970e39cf5c3561c89db40b8b2acad5014896012b01e3b0b7ec -MISC ChangeLog 5025 SHA256 294b56f2cd63b34f4c3c7a38f617c01f91c561f658fab33bce9b9172708c3ab8 SHA512 8caf6a998eff7d2d5021c980371dbd77e496e6708a514ac6d000536d90fb70cb98f904d2f44b089d11ab305412dee906f2a9a48f719711c65898b310f70c810f WHIRLPOOL 4c9f46397b4a8cca42bc3246510817767c0b85316d3ec26f5418170556642cfbc18f998c25d846e496b65c2127133b6acba9186a734a842419296a0261e10da6 -MISC ChangeLog-2015 86934 SHA256 b5091cb7a03ce5eb673b017c8ebe45ffdd05589017b0d032b8ef5e0a7f294e30 SHA512 f14a5a3e066373ac212f9da4f687543dcf83d474fe589911b4f64b2fcf3a92ba67b9e0310947ea9b814008cd0ca94956a277b1dcd3e0f3c783df39dae3a4ae82 WHIRLPOOL f4ae6afd88ca200e3d2785a8d4277c636b44b8182525224d47270b5b7856ed5065c71f25ab5efa0fbe3025674ba24799fc686506a9c4b1099e139a87b3ec1c0e -MISC metadata.xml 556 SHA256 5190d488015dabc64517859b83c708e8c265c5c48aaf3304971649134ca04ad3 SHA512 9b4bc745ad1720c8234098add2fad18e7dd5d4936c9957fa0e66d5f8e61bcc05dfa915c443ed9bc3755f7f067447cc4021fa757437cb77591a2a8167f8482212 WHIRLPOOL 781fe35ac5ee4fbd87e1ca77866f702dc99c14a3d466282c92c99c488fdaf87b1e5dc32b02b320f285779bd2f1662a151104c72f3e249fce1e9211e2e0d547bd +DIST binutils-2.26.1-patches-1.0.tar.xz 11212 SHA256 e56e2a6b64b8abe2f4aed1a9b1517fc8cbb5fd661f40118d0163d93943870e77 SHA512 c520967659c66f05f7ad795bb0bc2522e139977ab3ae8cfd9ec0d093a412a7291d1cabaa6b429c618fcf7253458a6fbe5a7dc3f62e0ac9762667308067db075c WHIRLPOOL 027b6a864134e2690d309922009740338bbd927581c6657c640d3061447f308c2e27a8c06a9202ae3f4aac4bcbf9e28303b52f81745d4062bf5b8c638cd1a9b7 +DIST binutils-2.26.1.tar.bz2 25595243 SHA256 39c346c87aa4fb14b2f786560aec1d29411b6ec34dce3fe7309fe3dd56949fd8 SHA512 9d9165609fd3b0f20d616f9891fc8e2b466eb13e2bfce40125e12427f8f201d20e2b8322bb6cb2b45e8df812f0e8ac059149f8a1f69ba3ed9d86a35c6a540b67 WHIRLPOOL c33eecdf855dd17314c3b7bbb0060399148d4dba867eb038bfb7555010fd003ba8b5b86480e4df389e19bba7b1fd0b9264291e6af20be4ffd4ff504d2255d003 +DIST binutils-2.27-patches-1.1.tar.xz 9828 SHA256 fbabb2c1cb69ad0c83d97ec6342ea663dea12b61cd3858088071f5575d842f6f SHA512 5059a784344e0554965473808b9d72af34f793e5538e82010adbbf586d583ddfd9f5ca637e6ba658e566c406244ae79b2ab5135995bcfedc8a96b9293366199d WHIRLPOOL 23c10c3c71a6d7d5f1fca97dcb77cf3bdb0a4114321a3cb51d88a4549404da63d74c30e6732c1b7fdefc3380d28b2064752155dfd22fa345e62df8df25a9690d +DIST binutils-2.27.tar.bz2 26099568 SHA256 369737ce51587f92466041a97ab7d2358c6d9e1b6490b3940eb09fb0a9a6ac88 SHA512 cf276f84935312361a2ca077e04d0b469d23a3aed979d8ba5d92ea590904ffb2c2e7ed12cc842822bfc402836be86f479660cef3791aa62f3753d8a1a6f564cb WHIRLPOOL d3204b4900529f697285fb1fe622ecc949c43f064e6b83a1cecb1ea8810a214842c729266c9a44537dc0a86d6d2b3ac100f54c721cc284e54f9d6feb90930d15 +DIST binutils-2.28.1-patches-1.0.tar.xz 19772 SHA256 50cfce6ef7f546dcdb983a8b632507b5cdd51095e4acf1f15bfcd68027d438a4 SHA512 c2c7d22e1013e79040c4dcb4d70649e78a070976ba3a4bc2ceb4805827b9d93eea1805c85db4fcb6b31be5218c3d7b42a4990437a7c01dc01fd7e9dedb606828 WHIRLPOOL 2369fce643cc9b83724b486521621d744de0eaf3d95fdd34c7f1c785bc400f3ed31ae6105001870f33539664d84dd9caae854725e20007f136929d2ece755247 +DIST binutils-2.28.1.tar.bz2 28120394 SHA256 6924999be62d4464458eb53c11f27277cfb63755df8c1cd47b8d15d02c1942ea SHA512 5ec5212497b0fa8324f6a0884c284cb71c01942bbd39356d1ae745a5c9d97274c10f9d9c723f4bef6f0217662dfcd0c36e4e955a7599b11217658dc7b97553eb WHIRLPOOL 5c616f719827e5da7db23e89c761323cd4828b4779e79c3983d3ea429bce57ed40219982c478237b4dd728b77bae0a6447d912d96490ed1f5fc279ba5fd73bc6 +DIST binutils-2.29-patches-1.0.tar.xz 7548 SHA256 8ce4d1ea1224a305c4e36529e02dba87306075638ba0415b69ceeccedc77cd6e SHA512 5375bfb1b796b7692cf2adfc41bd2ae2e6dc19ff497db5f6beb35a456981b3adb8552ef14f32382faf655aa40da86c2d44177a658ec71e1c0e228dc27a4f2e18 WHIRLPOOL 73d2b78ea18e3427442bcb24440f671c1d35c0b559bf2141f30052b2bb8d6a8a6e29994cac741e4e50071c716d761f32b36358487a176d67e8cd226dfaaeafc2 +DIST binutils-2.29.tar.bz2 29073316 SHA256 29a29549869039aad75fdf507ac30366da5ad0b974fbff4a8e7148dbf4f40ebf SHA512 8148587d7e4f14ebcbcb3f984b116deaae5d4008228628acde14bc242a64a4b53faf1f6077a2c4ca4750e2f254b698ba506bd657f79e1202e87e7029b0069337 WHIRLPOOL 62b3e9ff6f85f8f4a13b71361f5abc4081a70de560931dcaaece1daef04c6bc7d3e0085cbacff0abbb750c4779863d45bc0d8d17273965472992c6b61b5cab20 diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.21.1-r1.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.21.1-r1.ebuild deleted file mode 100644 index 03c387ae8c..0000000000 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.21.1-r1.ebuild +++ /dev/null @@ -1,11 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="4" - -PATCHVER="1.4" -ELF2FLT_VER="" -inherit toolchain-binutils - -KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 -sparc-fbsd -x86-fbsd" diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.22-r1.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.22-r1.ebuild deleted file mode 100644 index bbff81ceb5..0000000000 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.22-r1.ebuild +++ /dev/null @@ -1,11 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="4" - -PATCHVER="1.5" -ELF2FLT_VER="" -inherit toolchain-binutils - -KEYWORDS="alpha amd64 arm hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd" diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.24-r3.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.24-r3.ebuild deleted file mode 100644 index cb11f0f124..0000000000 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.24-r3.ebuild +++ /dev/null @@ -1,9 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -PATCHVER="1.4" -ELF2FLT_VER="" -inherit toolchain-binutils - -KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 -amd64-fbsd -sparc-fbsd ~x86-fbsd" diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.25.1-r1.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.25.1-r1.ebuild index 772def69da..dff9b0c9a2 100644 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.25.1-r1.ebuild +++ b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.25.1-r1.ebuild @@ -1,6 +1,5 @@ # Copyright 1999-2015 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI="4" diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.23.2.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.26.1.ebuild similarity index 61% rename from sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.23.2.ebuild rename to sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.26.1.ebuild index 26b91e739a..63894d4eb4 100644 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.23.2.ebuild +++ b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.26.1.ebuild @@ -1,12 +1,10 @@ -# Copyright 1999-2014 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ -EAPI="4" +EAPI="5" PATCHVER="1.0" ELF2FLT_VER="" inherit toolchain-binutils -# See #464152 -KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 -amd64-fbsd -sparc-fbsd -x86-fbsd" +KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd" diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.25.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.27-r1.ebuild similarity index 82% rename from sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.25.ebuild rename to sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.27-r1.ebuild index 7834524dd1..441d4d8408 100644 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.25.ebuild +++ b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.27-r1.ebuild @@ -1,8 +1,7 @@ -# Copyright 1999-2015 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ -EAPI="4" +EAPI="5" PATCHVER="1.1" ELF2FLT_VER="" diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.28.1.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.28.1.ebuild new file mode 100644 index 0000000000..d57f8f8e71 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.28.1.ebuild @@ -0,0 +1,10 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI="5" + +PATCHVER="1.0" +ELF2FLT_VER="" +inherit toolchain-binutils + +KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd" diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.25-r1.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.29.ebuild similarity index 77% rename from sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.25-r1.ebuild rename to sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.29.ebuild index 9bc7025898..6fafa8ee88 100644 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.25-r1.ebuild +++ b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-2.29.ebuild @@ -1,10 +1,9 @@ -# Copyright 1999-2015 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ -EAPI="4" +EAPI="5" -PATCHVER="1.2" +PATCHVER="1.0" ELF2FLT_VER="" inherit toolchain-binutils diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-9999.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-9999.ebuild index ebdfb0b4a9..cf90a61b1d 100644 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-9999.ebuild +++ b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/binutils-9999.ebuild @@ -1,7 +1,6 @@ -# Copyright 1999-2013 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ -EAPI="4" +EAPI="5" inherit toolchain-binutils diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/metadata.xml b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/metadata.xml index f6850d050e..3b4e0782a8 100644 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils/metadata.xml +++ b/sdk_container/src/third_party/portage-stable/sys-devel/binutils/metadata.xml @@ -6,7 +6,6 @@ Gentoo Toolchain Project -Allow for multiple versions of binutils to be emerged at once for same CTARGET Adds support to binutils for cross compiling (does not work with gas) From 2dde0ce5d574f29d8052b9371141ca42c1472a66 Mon Sep 17 00:00:00 2001 From: David Michael Date: Mon, 18 Sep 2017 13:04:27 -0700 Subject: [PATCH 03/14] bump(sys-libs/binutils-libs): sync with upstream --- .../sys-libs/binutils-libs-2.25.1-r2 | 2 +- .../md5-cache/sys-libs/binutils-libs-2.27 | 13 +++ .../md5-cache/sys-libs/binutils-libs-2.28-r1 | 13 +++ .../md5-cache/sys-libs/binutils-libs-2.28.1 | 13 +++ .../md5-cache/sys-libs/binutils-libs-2.29 | 13 +++ .../sys-libs/binutils-libs/ChangeLog | 96 ------------------- .../sys-libs/binutils-libs/Manifest | 11 ++- .../binutils-libs-2.25.1-r2.ebuild | 1 - .../binutils-libs/binutils-libs-2.27.ebuild | 94 ++++++++++++++++++ .../binutils-libs-2.28-r1.ebuild | 95 ++++++++++++++++++ .../binutils-libs/binutils-libs-2.28.1.ebuild | 95 ++++++++++++++++++ .../binutils-libs/binutils-libs-2.29.ebuild | 95 ++++++++++++++++++ 12 files changed, 440 insertions(+), 101 deletions(-) create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-libs/binutils-libs-2.27 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-libs/binutils-libs-2.28-r1 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-libs/binutils-libs-2.28.1 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-libs/binutils-libs-2.29 delete mode 100644 sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/ChangeLog create mode 100644 sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.27.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.28-r1.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.28.1.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.29.ebuild diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-libs/binutils-libs-2.25.1-r2 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-libs/binutils-libs-2.25.1-r2 index e666c6ba16..7373a1b107 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-libs/binutils-libs-2.25.1-r2 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-libs/binutils-libs-2.25.1-r2 @@ -10,4 +10,4 @@ RDEPEND=zlib? ( sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_ SLOT=0/2.25.1 SRC_URI=mirror://gnu/binutils/binutils-2.25.1.tar.bz2 mirror://gentoo/binutils-2.25.1-patches-1.1.tar.xz _eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=2a2bb9a977fb2d30efbda50cac3269d2 +_md5_=d4701eb2a3bf41042b5e55987cbd63a0 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-libs/binutils-libs-2.27 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-libs/binutils-libs-2.27 new file mode 100644 index 0000000000..3ad4378acc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-libs/binutils-libs-2.27 @@ -0,0 +1,13 @@ +DEFINED_PHASES=compile configure install prepare test +DEPEND=sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] nls? ( sys-devel/gettext ) +DESCRIPTION=Core binutils libraries (libbfd, libopcodes, libiberty) for external packages +EAPI=5 +HOMEPAGE=https://sourceware.org/binutils/ +IUSE=64-bit-bfd multitarget nls static-libs abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=alpha amd64 arm arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +LICENSE=|| ( GPL-3 LGPL-3 ) +RDEPEND=sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=sys-devel/binutils-config-5 nls? ( !=sys-apps/texinfo-4.7 nls? ( sys-devel/gettext ) +DESCRIPTION=Core binutils libraries (libbfd, libopcodes, libiberty) for external packages +EAPI=5 +HOMEPAGE=https://sourceware.org/binutils/ +IUSE=64-bit-bfd multitarget nls static-libs abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=alpha amd64 arm ~arm64 ~hppa ~ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh ~sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +LICENSE=|| ( GPL-3 LGPL-3 ) +RDEPEND=sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=sys-devel/binutils-config-5 nls? ( !=sys-apps/texinfo-4.7 nls? ( sys-devel/gettext ) +DESCRIPTION=Core binutils libraries (libbfd, libopcodes, libiberty) for external packages +EAPI=5 +HOMEPAGE=https://sourceware.org/binutils/ +IUSE=64-bit-bfd multitarget nls static-libs abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +LICENSE=|| ( GPL-3 LGPL-3 ) +RDEPEND=sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=sys-devel/binutils-config-5 nls? ( !=sys-apps/texinfo-4.7 nls? ( sys-devel/gettext ) +DESCRIPTION=Core binutils libraries (libbfd, libopcodes, libiberty) for external packages +EAPI=5 +HOMEPAGE=https://sourceware.org/binutils/ +IUSE=64-bit-bfd multitarget nls static-libs abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +LICENSE=|| ( GPL-3 LGPL-3 ) +RDEPEND=sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=sys-devel/binutils-config-5 nls? ( ! - +binutils-libs-2.25.1.ebuild, +metadata.xml: - new package #528088 - - Since packages want to link against binutils libs (bfd/opcodes) and - properly track updates when the binutils SONAMEs change, split the - libs out into a dedicated package. This way we can continue with - the multi-SLOT-ed binutils package w/out making the library users - go crazy. - -*binutils-libs-2.25.1-r1 (29 Sep 2015) - - 29 Sep 2015; Mike Frysinger - -binutils-libs-2.25.1.ebuild, +binutils-libs-2.25.1-r1.ebuild: - add multilib support #558902 - - 29 Sep 2015; Mike Frysinger - binutils-libs-2.25.1-r1.ebuild: - add MULTILIB_USEDEP to zlib dep - - 01 Oct 2015; Michał Górny - binutils-libs-2.25.1-r1.ebuild: - Fix cross-ABI header mismatch - - Fixes: https://bugs.gentoo.org/show_bug.cgi?id=561918 - - Package-Manager: portage-2.2.20 - -*binutils-libs-2.25.1-r2 (23 Nov 2015) - - 23 Nov 2015; Mike Frysinger - -binutils-libs-2.25.1-r1.ebuild, +binutils-libs-2.25.1-r2.ebuild, - metadata.xml: - sys-devel/binutils-libs: add multitarget & 64-bit bfd support - - Some tools might want multitarget/64-bit bfd support, - so add flags to control support for these options. - - 23 Nov 2015; Mike Frysinger metadata.xml: - clarify USE=64-bit-bfd behavior on 64-bit hosts #566636 - - 15 Dec 2015; Fabian Groffen - binutils-libs-2.25.1-r2.ebuild: - marked *-macos, *-solaris - - Package-Manager: portage-2.2.20-prefix - - 24 Jan 2016; Michał Górny metadata.xml: - Unify quoting in metadata.xml files for machine processing - - Force unified quoting in all metadata.xml files since lxml does not - preserve original use of single and double quotes. Ensuring unified - quoting before the process allows distinguishing the GLEP 67-related - metadata.xml changes from unrelated quoting changes. - - 24 Jan 2016; Michał Górny metadata.xml: - Replace all herds with appropriate projects (GLEP 67) - - Replace all uses of herd with appropriate project maintainers, or no - maintainers in case of herds requested to be disbanded. - - 24 Jan 2016; Michał Górny metadata.xml: - Set appropriate maintainer types in metadata.xml (GLEP 67) - - 15 Mar 2016; Agostino Sarubbo - binutils-libs-2.25.1-r2.ebuild: - amd64 stable wrt bug #564174 - - Package-Manager: portage-2.2.26 - RepoMan-Options: --include-arches="amd64" - Signed-off-by: Agostino Sarubbo - - 24 Mar 2016; Markus Meier - binutils-libs-2.25.1-r2.ebuild: - arm stable, bug #564174 - - Package-Manager: portage-2.2.28 - RepoMan-Options: --include-arches="arm" - - 03 Apr 2016; Mike Frysinger - binutils-libs-2.25.1-r2.ebuild: - mark 2.25.1-r2 alpha/arm64/hppa/ia64/m68k/ppc/ppc64/s390/sh/sparc/x86 stable - #564174 - - 03 Apr 2016; Alexey Shvetsov - binutils-libs-2.25.1-r2.ebuild: - works on prefix - - Package-Manager: portage-2.2.28 - diff --git a/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/Manifest b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/Manifest index 0a5943fedf..2eab1028b2 100644 --- a/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/Manifest +++ b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/Manifest @@ -1,5 +1,10 @@ DIST binutils-2.25.1-patches-1.1.tar.xz 18724 SHA256 3d4c0ab2d45d3a952f60246fa5a4353f057c03110130b50e3b2103bd49c345fa SHA512 209c55bf26b51d8c513b40abd2d95f687159c4e964a6c732924f277d04c97323c427fe452c63d5ec6962dcd8892d6d5d807ba88826739425bce6812a31f573dd WHIRLPOOL 2b650af352183d2b58abaee955b223606d63bd5f22a73360e79af1d3b575c5ea385f90be92348ec850534d96f7b6632b1e494f314ec1655eedc26108e849aab7 DIST binutils-2.25.1.tar.bz2 24163561 SHA256 b5b14added7d78a8d1ca70b5cb75fef57ce2197264f4f5835326b0df22ac9f22 SHA512 0b36dda0e6d32cd25613c0e64b56b28312515c54d6a159efd3db9a86717f114ab0a0a1f69d08975084d55713ebaeab64e4085c9b3d1c3fa86712869f80eb954d WHIRLPOOL daa804331ee880296c2fe29fd9b8a52cc695629d4bbe0b9889d96ffc54d330f00fac3f3cb12b3aaf6b7505521ef499c53760912cd7c9bb54f2d5e288224bd1eb -EBUILD binutils-libs-2.25.1-r2.ebuild 2744 SHA256 fbe252a0652635aa6ea1be59964b7f9631193dd31da846d70656c5a25626bbf9 SHA512 143e343bc3b84acc2cde0c2d7b6f457d50d037c4c2a5d909f8cf6d9f7063c3a43824db7efde170d65c0eba9da4cb29070f66f906a934b55f819866d86277403d WHIRLPOOL ab635a5e063b80d077a3811d151cad9679b60ec47e4b4d3e8efe4379e13a48cca75bfbe1bc0a8b7d521a4da8119f8f248ddbf5f53812d641e32686a40c237c4f -MISC ChangeLog 3244 SHA256 14742245da6390b1a107f152089eecb829bef841e0fedb627623b80921757c1c SHA512 3692b67c9f620038cce9f6a849791310d93b6ed0719d5f9a24e84f8be6c7294736f78ac8466214dfd77759303517eff52313723957531244e23b19aa79c9a00d WHIRLPOOL 6db45aea19a9889c3f3a6a3272576688fa922932205be88837102a02e5726e289813e1e17a2ca7c27773033cc8fd8bb78d1eab552baee3e79d7f49668aebc707 -MISC metadata.xml 524 SHA256 03d92323b98033273689c9031e2a364b893f3796b4089ae6fe4ec9a96d958d7c SHA512 9db7c7a3082ee848ec4963831da06cced596d543e53660747fb56ac33998c219e1d7252892ffc32132d7db3c99ce9746fb6d9e85f866c3cba97552c31948342c WHIRLPOOL af84fdd4aca89713c10a087507e30631ddeea5b6002005db7c198588890df38573229618499eb0e7f4bb87782aaa38589c556d5fa4348a1e636561a1595309b0 +DIST binutils-2.27-patches-1.0.tar.xz 8852 SHA256 07be45786e1e56498aad2c52a43d4104ccd0ded3c6a84a930486bc418d7fa36d SHA512 489b5fff87886682d8e98eafa2f082e6dcf811d2a693b6c41d76bd1ac50815a6e7d26fb7c9e3811c2d8e0e1dc307557e6ffe46d1d0f7caeb581060cf14bda899 WHIRLPOOL cf73342292a6dd8450a420f62a6a28e1ae38eed2c0b62643619ac002f3e9233ba5a0df19deb862167e88bd2c4a7ef4e002fe4d76f971eba876014d145dc30171 +DIST binutils-2.27.tar.bz2 26099568 SHA256 369737ce51587f92466041a97ab7d2358c6d9e1b6490b3940eb09fb0a9a6ac88 SHA512 cf276f84935312361a2ca077e04d0b469d23a3aed979d8ba5d92ea590904ffb2c2e7ed12cc842822bfc402836be86f479660cef3791aa62f3753d8a1a6f564cb WHIRLPOOL d3204b4900529f697285fb1fe622ecc949c43f064e6b83a1cecb1ea8810a214842c729266c9a44537dc0a86d6d2b3ac100f54c721cc284e54f9d6feb90930d15 +DIST binutils-2.28-patches-1.2.tar.xz 17572 SHA256 d3fd98b218b0469f216a65676fdc899b9d777ea2d2f4b83af3d7fa6bbd36ca41 SHA512 00453fc1e3290868c23e2ca32214b5229fca23d4a551e4e136a62946b584992e9ef3f3e07819e35fb4eb83f083145330078db2631d5a089da7b5129d234aa856 WHIRLPOOL e52ca6eb5cc03fb0c3ebe27366019d38628a88d949dff873dc646ea1354ec432080818ddb212a6e94148bee3b230288eb245a5472c9c6e6ae9a5bdd162578cc4 +DIST binutils-2.28.1-patches-1.0.tar.xz 19772 SHA256 50cfce6ef7f546dcdb983a8b632507b5cdd51095e4acf1f15bfcd68027d438a4 SHA512 c2c7d22e1013e79040c4dcb4d70649e78a070976ba3a4bc2ceb4805827b9d93eea1805c85db4fcb6b31be5218c3d7b42a4990437a7c01dc01fd7e9dedb606828 WHIRLPOOL 2369fce643cc9b83724b486521621d744de0eaf3d95fdd34c7f1c785bc400f3ed31ae6105001870f33539664d84dd9caae854725e20007f136929d2ece755247 +DIST binutils-2.28.1.tar.bz2 28120394 SHA256 6924999be62d4464458eb53c11f27277cfb63755df8c1cd47b8d15d02c1942ea SHA512 5ec5212497b0fa8324f6a0884c284cb71c01942bbd39356d1ae745a5c9d97274c10f9d9c723f4bef6f0217662dfcd0c36e4e955a7599b11217658dc7b97553eb WHIRLPOOL 5c616f719827e5da7db23e89c761323cd4828b4779e79c3983d3ea429bce57ed40219982c478237b4dd728b77bae0a6447d912d96490ed1f5fc279ba5fd73bc6 +DIST binutils-2.28.tar.bz2 26556365 SHA256 6297433ee120b11b4b0a1c8f3512d7d73501753142ab9e2daa13c5a3edd32a72 SHA512 ede2e4e59a800260eea8c14eafbaee94e30abadafd5c419a3370f9f62213cf027d6400a1d4970b6958bd4d220e675dcd483a708107016e7abd5c99d7392ba8fd WHIRLPOOL 7fb876668c4fd8b10641fb8d831e7d23723ccb9b1051650c76a3a99696d37d120ef969e3c1cc144b0ffd765ef8e8698fe553c39cc65d0b9499a87d4886d6419d +DIST binutils-2.29-patches-1.0.tar.xz 7548 SHA256 8ce4d1ea1224a305c4e36529e02dba87306075638ba0415b69ceeccedc77cd6e SHA512 5375bfb1b796b7692cf2adfc41bd2ae2e6dc19ff497db5f6beb35a456981b3adb8552ef14f32382faf655aa40da86c2d44177a658ec71e1c0e228dc27a4f2e18 WHIRLPOOL 73d2b78ea18e3427442bcb24440f671c1d35c0b559bf2141f30052b2bb8d6a8a6e29994cac741e4e50071c716d761f32b36358487a176d67e8cd226dfaaeafc2 +DIST binutils-2.29.tar.bz2 29073316 SHA256 29a29549869039aad75fdf507ac30366da5ad0b974fbff4a8e7148dbf4f40ebf SHA512 8148587d7e4f14ebcbcb3f984b116deaae5d4008228628acde14bc242a64a4b53faf1f6077a2c4ca4750e2f254b698ba506bd657f79e1202e87e7029b0069337 WHIRLPOOL 62b3e9ff6f85f8f4a13b71361f5abc4081a70de560931dcaaece1daef04c6bc7d3e0085cbacff0abbb750c4779863d45bc0d8d17273965472992c6b61b5cab20 diff --git a/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.25.1-r2.ebuild b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.25.1-r2.ebuild index 1d0a21c0e1..95a918e346 100644 --- a/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.25.1-r2.ebuild +++ b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.25.1-r2.ebuild @@ -1,6 +1,5 @@ # Copyright 1999-2015 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI="5" diff --git a/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.27.ebuild b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.27.ebuild new file mode 100644 index 0000000000..17de45b112 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.27.ebuild @@ -0,0 +1,94 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI="5" + +PATCHVER="1.0" + +inherit eutils toolchain-funcs multilib-minimal + +MY_PN="binutils" +MY_P="${MY_PN}-${PV}" + +DESCRIPTION="Core binutils libraries (libbfd, libopcodes, libiberty) for external packages" +HOMEPAGE="https://sourceware.org/binutils/" +SRC_URI="mirror://gnu/binutils/${MY_P}.tar.bz2 + mirror://gentoo/${MY_P}-patches-${PATCHVER}.tar.xz" + +LICENSE="|| ( GPL-3 LGPL-3 )" +# The shared lib SONAMEs use the ${PV} in them. +SLOT="0/${PV}" +KEYWORDS="alpha amd64 arm arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +IUSE="64-bit-bfd multitarget nls static-libs" + +COMMON_DEPEND="sys-libs/zlib[${MULTILIB_USEDEP}]" +DEPEND="${COMMON_DEPEND} + nls? ( sys-devel/gettext )" +# Need a newer binutils-config that'll reset include/lib symlinks for us. +RDEPEND="${COMMON_DEPEND} + >=sys-devel/binutils-config-5 + nls? ( !=2.24) make this an explicit option. #497268 + --enable-install-libiberty + --disable-werror + --with-bugurl="https://bugs.gentoo.org/" + --with-pkgversion="$(pkgversion)" + $(use_enable static-libs static) + # The binutils eclass enables this flag for all bi-arch builds, + # but other tools often don't care about that support. Put it + # beyond a flag if people really want it, but otherwise leave + # it disabled as it can slow things down on 32bit arches. #438522 + $(use_enable 64-bit-bfd) + # This only disables building in the zlib subdir. + # For binutils itself, it'll use the system version. #591516 + --without-zlib + --with-system-zlib + # We only care about the libs, so disable programs. #528088 + --disable-{binutils,etc,ld,gas,gold,gprof} + # Disable modules that are in a combined binutils/gdb tree. #490566 + --disable-{gdb,libdecnumber,readline,sim} + # Strip out broken static link flags. + # https://gcc.gnu.org/PR56750 + --without-stage1-ldflags + ) + + use multitarget && myconf+=( --enable-targets=all --enable-64-bit-bfd ) + + use nls \ + && myconf+=( --without-included-gettext ) \ + || myconf+=( --disable-nls ) + + ECONF_SOURCE=${S} \ + econf "${myconf[@]}" +} + +multilib_src_install() { + default + # Provide libiberty.h directly. + dosym libiberty/libiberty.h /usr/include/libiberty.h +} + +multilib_src_install_all() { + use static-libs || find "${ED}"/usr -name '*.la' -delete +} diff --git a/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.28-r1.ebuild b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.28-r1.ebuild new file mode 100644 index 0000000000..71fb7dcb22 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.28-r1.ebuild @@ -0,0 +1,95 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI="5" + +PATCHVER="1.2" + +inherit eutils toolchain-funcs multilib-minimal + +MY_PN="binutils" +MY_P="${MY_PN}-${PV}" + +DESCRIPTION="Core binutils libraries (libbfd, libopcodes, libiberty) for external packages" +HOMEPAGE="https://sourceware.org/binutils/" +SRC_URI="mirror://gnu/binutils/${MY_P}.tar.bz2 + mirror://gentoo/${MY_P}-patches-${PATCHVER}.tar.xz" + +LICENSE="|| ( GPL-3 LGPL-3 )" +# The shared lib SONAMEs use the ${PV} in them. +SLOT="0/${PV}" +KEYWORDS="alpha amd64 arm ~arm64 ~hppa ~ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh ~sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +IUSE="64-bit-bfd multitarget nls static-libs" + +COMMON_DEPEND="sys-libs/zlib[${MULTILIB_USEDEP}]" +DEPEND="${COMMON_DEPEND} + >=sys-apps/texinfo-4.7 + nls? ( sys-devel/gettext )" +# Need a newer binutils-config that'll reset include/lib symlinks for us. +RDEPEND="${COMMON_DEPEND} + >=sys-devel/binutils-config-5 + nls? ( !=2.24) make this an explicit option. #497268 + --enable-install-libiberty + --disable-werror + --with-bugurl="https://bugs.gentoo.org/" + --with-pkgversion="$(pkgversion)" + $(use_enable static-libs static) + # The binutils eclass enables this flag for all bi-arch builds, + # but other tools often don't care about that support. Put it + # beyond a flag if people really want it, but otherwise leave + # it disabled as it can slow things down on 32bit arches. #438522 + $(use_enable 64-bit-bfd) + # This only disables building in the zlib subdir. + # For binutils itself, it'll use the system version. #591516 + --without-zlib + --with-system-zlib + # We only care about the libs, so disable programs. #528088 + --disable-{binutils,etc,ld,gas,gold,gprof} + # Disable modules that are in a combined binutils/gdb tree. #490566 + --disable-{gdb,libdecnumber,readline,sim} + # Strip out broken static link flags. + # https://gcc.gnu.org/PR56750 + --without-stage1-ldflags + ) + + use multitarget && myconf+=( --enable-targets=all --enable-64-bit-bfd ) + + use nls \ + && myconf+=( --without-included-gettext ) \ + || myconf+=( --disable-nls ) + + ECONF_SOURCE=${S} \ + econf "${myconf[@]}" +} + +multilib_src_install() { + default + # Provide libiberty.h directly. + dosym libiberty/libiberty.h /usr/include/libiberty.h +} + +multilib_src_install_all() { + use static-libs || find "${ED}"/usr -name '*.la' -delete +} diff --git a/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.28.1.ebuild b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.28.1.ebuild new file mode 100644 index 0000000000..0af572c85e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.28.1.ebuild @@ -0,0 +1,95 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI="5" + +PATCHVER="1.0" + +inherit eutils toolchain-funcs multilib-minimal + +MY_PN="binutils" +MY_P="${MY_PN}-${PV}" + +DESCRIPTION="Core binutils libraries (libbfd, libopcodes, libiberty) for external packages" +HOMEPAGE="https://sourceware.org/binutils/" +SRC_URI="mirror://gnu/binutils/${MY_P}.tar.bz2 + mirror://gentoo/${MY_P}-patches-${PATCHVER}.tar.xz" + +LICENSE="|| ( GPL-3 LGPL-3 )" +# The shared lib SONAMEs use the ${PV} in them. +SLOT="0/${PV}" +KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd -sparc-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +IUSE="64-bit-bfd multitarget nls static-libs" + +COMMON_DEPEND="sys-libs/zlib[${MULTILIB_USEDEP}]" +DEPEND="${COMMON_DEPEND} + >=sys-apps/texinfo-4.7 + nls? ( sys-devel/gettext )" +# Need a newer binutils-config that'll reset include/lib symlinks for us. +RDEPEND="${COMMON_DEPEND} + >=sys-devel/binutils-config-5 + nls? ( !=2.24) make this an explicit option. #497268 + --enable-install-libiberty + --disable-werror + --with-bugurl="https://bugs.gentoo.org/" + --with-pkgversion="$(pkgversion)" + $(use_enable static-libs static) + # The binutils eclass enables this flag for all bi-arch builds, + # but other tools often don't care about that support. Put it + # beyond a flag if people really want it, but otherwise leave + # it disabled as it can slow things down on 32bit arches. #438522 + $(use_enable 64-bit-bfd) + # This only disables building in the zlib subdir. + # For binutils itself, it'll use the system version. #591516 + --without-zlib + --with-system-zlib + # We only care about the libs, so disable programs. #528088 + --disable-{binutils,etc,ld,gas,gold,gprof} + # Disable modules that are in a combined binutils/gdb tree. #490566 + --disable-{gdb,libdecnumber,readline,sim} + # Strip out broken static link flags. + # https://gcc.gnu.org/PR56750 + --without-stage1-ldflags + ) + + use multitarget && myconf+=( --enable-targets=all --enable-64-bit-bfd ) + + use nls \ + && myconf+=( --without-included-gettext ) \ + || myconf+=( --disable-nls ) + + ECONF_SOURCE=${S} \ + econf "${myconf[@]}" +} + +multilib_src_install() { + default + # Provide libiberty.h directly. + dosym libiberty/libiberty.h /usr/include/libiberty.h +} + +multilib_src_install_all() { + use static-libs || find "${ED}"/usr -name '*.la' -delete +} diff --git a/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.29.ebuild b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.29.ebuild new file mode 100644 index 0000000000..05b0159658 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/sys-libs/binutils-libs/binutils-libs-2.29.ebuild @@ -0,0 +1,95 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI="5" + +PATCHVER="1.0" + +inherit eutils toolchain-funcs multilib-minimal + +MY_PN="binutils" +MY_P="${MY_PN}-${PV}" + +DESCRIPTION="Core binutils libraries (libbfd, libopcodes, libiberty) for external packages" +HOMEPAGE="https://sourceware.org/binutils/" +SRC_URI="mirror://gnu/binutils/${MY_P}.tar.bz2 + mirror://gentoo/${MY_P}-patches-${PATCHVER}.tar.xz" + +LICENSE="|| ( GPL-3 LGPL-3 )" +# The shared lib SONAMEs use the ${PV} in them. +SLOT="0/${PV}" +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +IUSE="64-bit-bfd multitarget nls static-libs" + +COMMON_DEPEND="sys-libs/zlib[${MULTILIB_USEDEP}]" +DEPEND="${COMMON_DEPEND} + >=sys-apps/texinfo-4.7 + nls? ( sys-devel/gettext )" +# Need a newer binutils-config that'll reset include/lib symlinks for us. +RDEPEND="${COMMON_DEPEND} + >=sys-devel/binutils-config-5 + nls? ( !=2.24) make this an explicit option. #497268 + --enable-install-libiberty + --disable-werror + --with-bugurl="https://bugs.gentoo.org/" + --with-pkgversion="$(pkgversion)" + $(use_enable static-libs static) + # The binutils eclass enables this flag for all bi-arch builds, + # but other tools often don't care about that support. Put it + # beyond a flag if people really want it, but otherwise leave + # it disabled as it can slow things down on 32bit arches. #438522 + $(use_enable 64-bit-bfd) + # This only disables building in the zlib subdir. + # For binutils itself, it'll use the system version. #591516 + --without-zlib + --with-system-zlib + # We only care about the libs, so disable programs. #528088 + --disable-{binutils,etc,ld,gas,gold,gprof} + # Disable modules that are in a combined binutils/gdb tree. #490566 + --disable-{gdb,libdecnumber,readline,sim} + # Strip out broken static link flags. + # https://gcc.gnu.org/PR56750 + --without-stage1-ldflags + ) + + use multitarget && myconf+=( --enable-targets=all --enable-64-bit-bfd ) + + use nls \ + && myconf+=( --without-included-gettext ) \ + || myconf+=( --disable-nls ) + + ECONF_SOURCE=${S} \ + econf "${myconf[@]}" +} + +multilib_src_install() { + default + # Provide libiberty.h directly. + dosym libiberty/libiberty.h /usr/include/libiberty.h +} + +multilib_src_install_all() { + use static-libs || find "${ED}"/usr -name '*.la' -delete +} From dea78eee56887f0b15220fd13995d45dc51c4ca0 Mon Sep 17 00:00:00 2001 From: David Michael Date: Mon, 18 Sep 2017 13:04:39 -0700 Subject: [PATCH 04/14] bump(sys-devel/binutils-config): sync with upstream --- .../md5-cache/sys-devel/binutils-config-4-r3 | 9 - .../md5-cache/sys-devel/binutils-config-4-r4 | 9 - .../md5-cache/sys-devel/binutils-config-5-r2 | 9 - ...utils-config-4-r2 => binutils-config-5-r3} | 9 +- .../sys-devel/binutils-config/ChangeLog | 140 ------ .../sys-devel/binutils-config/ChangeLog-2015 | 348 ------------- .../sys-devel/binutils-config/Manifest | 11 - .../binutils-config-4-r2.ebuild | 24 - .../binutils-config-4-r3.ebuild | 24 - .../binutils-config-4-r4.ebuild | 28 -- ...-r2.ebuild => binutils-config-5-r3.ebuild} | 11 +- .../binutils-config/files/binutils-config-4 | 465 ------------------ .../binutils-config/files/binutils-config-5 | 93 ++-- .../binutils-config/files/binutils-config.8 | 14 +- 14 files changed, 60 insertions(+), 1134 deletions(-) delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-config-4-r3 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-config-4-r4 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-config-5-r2 rename sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/{binutils-config-4-r2 => binutils-config-5-r3} (55%) delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/ChangeLog delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/ChangeLog-2015 delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/Manifest delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r2.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r3.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r4.ebuild rename sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/{binutils-config-5-r2.ebuild => binutils-config-5-r3.ebuild} (74%) delete mode 100644 sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/files/binutils-config-4 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-config-4-r3 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-config-4-r3 deleted file mode 100644 index 078e740be6..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-config-4-r3 +++ /dev/null @@ -1,9 +0,0 @@ -DEFINED_PHASES=install -DESCRIPTION=Utility to change the binutils version being used -EAPI=4 -HOMEPAGE=https://www.gentoo.org/ -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd -LICENSE=GPL-2 -RDEPEND=sys-apps/gentoo-functions -SLOT=0 -_md5_=508f1744c1727d95c0a956384da2a09d diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-config-4-r4 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-config-4-r4 deleted file mode 100644 index 05b48638db..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-devel/binutils-config-4-r4 +++ /dev/null @@ -1,9 +0,0 @@ -DEFINED_PHASES=install -DESCRIPTION=Utility to change the binutils version being used -EAPI=4 -HOMEPAGE=https://www.gentoo.org/ -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd -LICENSE=GPL-2 -RDEPEND=sys-apps/gentoo-functions ! - +binutils-config-1.9-r4.ebuild, +binutils-config-2-r1.ebuild, - +binutils-config-3-r3.ebuild, +binutils-config-4-r1.ebuild, - +binutils-config-4-r2.ebuild, +binutils-config-4-r3.ebuild, - +files/binutils-config-1.9, +files/binutils-config-2, - +files/binutils-config-3, +files/binutils-config-4, - +files/binutils-config.8, +metadata.xml: - proj/gentoo: Initial commit - - This commit represents a new era for Gentoo: - Storing the gentoo-x86 tree in Git, as converted from CVS. - - This commit is the start of the NEW history. - Any historical data is intended to be grafted onto this point. - - Creation process: - 1. Take final CVS checkout snapshot - 2. Remove ALL ChangeLog* files - 3. Transform all Manifests to thin - 4. Remove empty Manifests - 5. Convert all stale $Header$/$Id$ CVS keywords to non-expanded Git $Id$ - 5.1. Do not touch files with -kb/-ko keyword flags. - - Signed-off-by: Robin H. Johnson - X-Thanks: Alec Warner - did the GSoC 2006 migration - tests - X-Thanks: Robin H. Johnson - infra guy, herding this - project - X-Thanks: Nguyen Thai Ngoc Duy - Former Gentoo - developer, wrote Git features for the migration - X-Thanks: Brian Harring - wrote much python to improve - cvs2svn - X-Thanks: Rich Freeman - validation scripts - X-Thanks: Patrick Lauer - Gentoo dev, running new 2014 - work in migration - X-Thanks: Michał Górny - scripts, QA, nagging - X-Thanks: All of other Gentoo developers - many ideas and lots of paint on - the bikeshed - - 09 Aug 2015; Ulrich Müller files/binutils-config-1.9, - files/binutils-config-2, files/binutils-config-3, files/binutils-config-4: - [QA] Remove executable bit from files, bug 550434. - -*binutils-config-4-r4 (13 Aug 2015) - - 13 Aug 2015; Mike Frysinger - +binutils-config-4-r4.ebuild, +files/binutils.eselect: - add an eselect wrapper - - 13 Aug 2015; Ulrich Müller binutils-config-4-r4.ebuild: - Add keywords, update blocker against eselect. - - Package-Manager: portage-2.2.20.1 - - 24 Aug 2015; Justin Lecher binutils-config-1.9-r4.ebuild, - binutils-config-2-r1.ebuild, binutils-config-3-r3.ebuild, - binutils-config-4-r1.ebuild, binutils-config-4-r2.ebuild, - binutils-config-4-r3.ebuild, binutils-config-4-r4.ebuild, metadata.xml: - Use https by default - - Convert all URLs for sites supporting encrypted connections from http to - https - - Signed-off-by: Justin Lecher - - 24 Aug 2015; Mike Gilbert metadata.xml: - Revert DOCTYPE SYSTEM https changes in metadata.xml - - repoman does not yet accept the https version. - This partially reverts eaaface92ee81f30a6ac66fe7acbcc42c00dc450. - - Bug: https://bugs.gentoo.org/552720 - - 26 Sep 2015; Mike Frysinger - -binutils-config-1.9-r4.ebuild, -binutils-config-2-r1.ebuild, - -binutils-config-3-r3.ebuild, -binutils-config-4-r1.ebuild, - -files/binutils-config-1.9, -files/binutils-config-2, - -files/binutils-config-3: - drop old - -*binutils-config-5 (26 Sep 2015) - - 26 Sep 2015; Mike Frysinger +binutils-config-5.ebuild, - +files/binutils-config-5: - move libs/headers to binutils-libs #528088 - - The binutils-libs package will handle installing headers & libs for - the various binutils libraries. Update binutils-config to delete the - old symlinks so we don't run into collisions/inconsistent state. - -*binutils-config-5-r1 (16 Oct 2015) - - 16 Oct 2015; Mike Frysinger -binutils-config-5.ebuild, - +binutils-config-5-r1.ebuild, files/binutils-config-5: - clean out dwp binary too #562524 - -*binutils-config-5-r2 (23 Nov 2015) - - 23 Nov 2015; Mike Frysinger - -binutils-config-5-r1.ebuild, +binutils-config-5-r2.ebuild, - files/binutils-config-5: - detect broken cross-compiler rpaths #562460 - - We've fixed newer cross-binutils builds to use the correct rpaths to find - their internal libs, but existing builds remain broken. Add some logic to - detect & warn users, but also create the old symlinks so they keep working. - - 24 Jan 2016; Michał Górny metadata.xml: - Replace all herds with appropriate projects (GLEP 67) - - Replace all uses of herd with appropriate project maintainers, or no - maintainers in case of herds requested to be disbanded. - - 24 Jan 2016; Michał Górny metadata.xml: - Set appropriate maintainer types in metadata.xml (GLEP 67) - - 15 Mar 2016; Agostino Sarubbo binutils-config-5-r2.ebuild: - amd64 stable wrt bug #564174 - - Package-Manager: portage-2.2.26 - RepoMan-Options: --include-arches="amd64" - Signed-off-by: Agostino Sarubbo - - 24 Mar 2016; Markus Meier binutils-config-5-r2.ebuild: - arm stable, bug #564174 - - Package-Manager: portage-2.2.28 - RepoMan-Options: --include-arches="arm" - diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/ChangeLog-2015 b/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/ChangeLog-2015 deleted file mode 100644 index 1eac8c729b..0000000000 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/ChangeLog-2015 +++ /dev/null @@ -1,348 +0,0 @@ -# ChangeLog for sys-devel/binutils-config -# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/sys-devel/binutils-config/ChangeLog,v 1.79 2015/05/25 06:07:20 vapier Exp $ - -*binutils-config-4-r3 (25 May 2015) - - 25 May 2015; Mike Frysinger +binutils-config-4-r3.ebuild, - files/binutils-config-4: - Do not delete native ld.so.conf.d fragment when uninstalling cross binutils - #549708 by Alexander Tsoy. - - 25 May 2015; Mike Frysinger binutils-config-4-r2.ebuild: - Mark arm64/m68k/s390/sh stable. - - 26 Apr 2015; Mikle Kolyada binutils-config-4-r2.ebuild: - ia64 stable wrt bug #547330 - - 26 Apr 2015; Mikle Kolyada binutils-config-4-r2.ebuild: - alpha stable wrt bug #547330 - - 26 Apr 2015; Pacho Ramos binutils-config-4-r2.ebuild: - ppc stable wrt bug #547330 - - 24 Apr 2015; Mikle Kolyada binutils-config-4-r2.ebuild: - arm stable wrt bug #547330 - - 23 Apr 2015; Mikle Kolyada binutils-config-4-r2.ebuild: - sparc stable wrt bug #547330 - - 23 Apr 2015; Mikle Kolyada binutils-config-4-r2.ebuild: - x86 stable wrt bug #547330 - - 22 Apr 2015; Jeroen Roovers binutils-config-4-r2.ebuild: - Stable for PPC64 (bug #547330). - - 22 Apr 2015; Jeroen Roovers binutils-config-4-r2.ebuild: - Stable for HPPA (bug #547330). - - 22 Apr 2015; Mikle Kolyada binutils-config-4-r2.ebuild: - amd64 stable wrt bug #547330 - -*binutils-config-4-r2 (09 Feb 2015) - - 09 Feb 2015; Mike Frysinger +binutils-config-4-r2.ebuild, - files/binutils-config-4: - Fix by Ruud Koolen for ROOT handling with man/info paths #532610 by Ruud - Koolen. - -*binutils-config-4-r1 (30 Dec 2014) - - 30 Dec 2014; Anthony G. Basile - +binutils-config-4-r1.ebuild, -binutils-config-4.ebuild, - files/binutils-config-4: - Address bug #504120 - -*binutils-config-4 (29 Jul 2014) - - 29 Jul 2014; Mike Frysinger +binutils-config-4.ebuild, - +files/binutils-config-4, files/binutils-config.8: - Drop FAKE_TARGETS support as gcc dropped it a while ago too #467488. - - 18 Jan 2014; Mike Frysinger binutils-config-3-r3.ebuild: - Add arm64 love. - - 05 May 2013; Mike Frysinger files/binutils-config-3: - Also try to rmdir target bin/libexec paths when uninstalling. - - 18 Nov 2012; Mike Frysinger files/binutils-config-3: - Add elfedit and ld.{bfd,gold} to uninstall list. - - 18 Aug 2012; Mike Frysinger files/binutils-config-3: - Fix relative ROOT handling #431104 by Greg Turner. - - 29 Jul 2012; Raúl Porcel binutils-config-3-r3.ebuild: - alpha/ia64/m68k/s390/sh/sparc stable wrt #420355 - - 03 Jul 2012; Brent Baude binutils-config-3-r3.ebuild: - Marking binutils-config-3-r3 ppc for bug 420355 - - 22 Jun 2012; Brent Baude binutils-config-3-r3.ebuild: - Marking binutils-config-3-r3 ppc64 for bug 420355 - - 17 Jun 2012; Markus Meier binutils-config-3-r3.ebuild: - arm stable, bug #420355 - - 14 Jun 2012; Jeroen Roovers binutils-config-3-r3.ebuild: - Stable for HPPA (bug #420355). - - 11 Jun 2012; Agostino Sarubbo binutils-config-3-r3.ebuild: - Stable for amd64, wrt bug #420355 - - 09 Jun 2012; Jeff Horelick binutils-config-3-r3.ebuild: - marked x86 per bug 420355 - - 26 Apr 2012; Alexis Ballier - binutils-config-3-r3.ebuild: - keyword ~amd64-fbsd - -*binutils-config-3-r3 (02 Mar 2012) - - 02 Mar 2012; Mike Frysinger files/binutils-config-3, - -binutils-config-3-r2.ebuild, +binutils-config-3-r3.ebuild: - Fix uninstall handling to work even after most files are removed. - -*binutils-config-3-r2 (01 Mar 2012) - - 01 Mar 2012; Mike Frysinger files/binutils-config-3, - -binutils-config-3-r1.ebuild, +binutils-config-3-r2.ebuild: - Drop old upgrade logic that is only there for systems 4.5+ years old as it is - causing issues with newer ones, and 4.5+ upgrade time is plenty #381633 by - Tim Harder. - - 05 Dec 2011; Mike Frysinger binutils-config-3-r1.ebuild: - Use a blocker dep to avoid pulling in packages we do not need. - -*binutils-config-3-r1 (29 Sep 2011) - - 29 Sep 2011; Mike Frysinger files/binutils-config-3, - -binutils-config-3.ebuild, +binutils-config-3-r1.ebuild: - Make linker switching more general, and add a `die` helper. - - 29 Aug 2011; Mike Frysinger files/binutils-config-3: - Make profile switching more atomic #380759. - - 23 Aug 2011; Mike Frysinger files/binutils-config-3: - Make sure all the profile specs still work after previous rework. - - 12 Aug 2011; Mike Frysinger files/binutils-config-3, - files/binutils-config.8: - Add support for profile selection based on the active version of a specified - target. - - 12 Aug 2011; Mike Frysinger files/binutils-config-3: - Also support linker switching for current profile, and add some helpful user - output so they can see what is going on. - -*binutils-config-3 (12 Aug 2011) - - 12 Aug 2011; Mike Frysinger +files/binutils-config-3, - +binutils-config-3.ebuild, files/binutils-config.8: - Add options to switch the linker on the fly between gold and bfd, and clean - up the tangled profile/target logic. - - 10 Jul 2011; Mark Loeser binutils-config-2-r1.ebuild: - Stable for ppc64; bug #361849 - - 23 Apr 2011; Raúl Porcel binutils-config-2-r1.ebuild: - alpha/ia64/m68k/s390/sh/sparc/x86 stable wrt #361849 - - 13 Apr 2011; Brent Baude binutils-config-2-r1.ebuild: - Marking binutils-config-2-r1 ppc for bug 361849 - - 12 Apr 2011; Markus Meier binutils-config-2-r1.ebuild: - arm stable, bug #361849 - - 08 Apr 2011; Jeroen Roovers binutils-config-2-r1.ebuild: - Stable for HPPA (bug #361849). - - 05 Apr 2011; Christoph Mende - binutils-config-2-r1.ebuild: - Stable on amd64 wrt bug #361849 - - 06 Feb 2011; Mart Raudsepp binutils-config-1.9-r4.ebuild: - Drop to ~mips - -*binutils-config-2-r1 (15 Aug 2010) - - 15 Aug 2010; Mike Frysinger files/binutils-config-2, - +binutils-config-2-r1.ebuild: - Fix incorrect header deletion when switching profiles #330299 by Pinky. - -*binutils-config-2 (20 Dec 2009) - - 20 Dec 2009; Mike Frysinger +files/binutils-config-2, - +binutils-config-2.ebuild: - Touch up code a bit and add support for /etc/ld.so.conf.d/. - -*binutils-config-1.9-r4 (06 May 2007) - - 06 May 2007; Mike Frysinger files/binutils-config-1.9, - +binutils-config-1.9-r4.ebuild: - Fix ldscript symlink generation #171486 by Alan Hourihane. - -*binutils-config-1.9-r3 (26 Nov 2006) - - 26 Nov 2006; Mike Frysinger files/binutils-config-1.9, - +binutils-config-1.9-r3.ebuild: - Fix from James Le Cuirot for handling of $ROOT in ldscript cleanup #156118. - - 19 Oct 2006; Diego Pettenò - binutils-config-1.9-r2.ebuild: - Make findutils a dep only on GNU userland. - - 19 Oct 2006; Mike Frysinger files/binutils-config-1.9, - binutils-config-1.9-r2.ebuild: - Force newer findutils and use portable options #150352. - - 18 Oct 2006; Roy Marples - binutils-config-1.9-r2.ebuild: - Added ~sparc-fbsd keyword. - - 02 Oct 2006; Daniel Gryniewicz - binutils-config-1.9-r2.ebuild: - Marked stable on amd64 for bug #149050 - - 27 Sep 2006; Fernando J. Pereda - binutils-config-1.9-r2.ebuild: - Stable on alpha as per bug #149050 - - 26 Sep 2006; Gustavo Zacarias - binutils-config-1.9-r2.ebuild: - Stable on sparc wrt #149050 - - 26 Sep 2006; Gustavo Zacarias - binutils-config-1.9-r2.ebuild: - Stable on hppa wrt #149050 - - 26 Sep 2006; Joshua Jackson - binutils-config-1.9-r2.ebuild: - Stable x86; bug #149050 - - 25 Sep 2006; binutils-config-1.9-r2.ebuild: - Stable on ppc wrt bug 149050 - - 25 Sep 2006; Markus Rothe - binutils-config-1.9-r2.ebuild: - Stable on ppc64; bug #149050 - -*binutils-config-1.9-r2 (17 Sep 2006) - - 17 Sep 2006; Mike Frysinger files/binutils-config-1.9, - -binutils-config-1.9-r1.ebuild, +binutils-config-1.9-r2.ebuild: - Symlink ldscripts into gcc-exec path #147155 by Heiko Rosemann. - -*binutils-config-1.9-r1 (27 Aug 2006) - - 27 Aug 2006; Mike Frysinger files/binutils-config-1.9, - -binutils-config-1.9.ebuild, +binutils-config-1.9-r1.ebuild: - Now that we have moved binutils stuff, make sure the binaries can still be - found automatically by the gcc cross-compiler. - -*binutils-config-1.9 (27 Aug 2006) - - 27 Aug 2006; Mike Frysinger - +files/binutils-config-1.9, +binutils-config-1.9.ebuild: - Keep cross-compiler files in /usr/CHOST/CTARGET/ #144700. - -*binutils-config-1.8-r7 (10 Apr 2006) - - 10 Apr 2006; Mike Frysinger files/binutils-config-1.8, - -binutils-config-1.8-r6.ebuild, +binutils-config-1.8-r7.ebuild: - Use sysroot-ed path for the include dir. - - 30 Mar 2006; Diego Pettenò - binutils-config-1.8-r6.ebuild: - Add ~x86-fbsd keyword. - -*binutils-config-1.8-r6 (20 Nov 2005) - - 20 Nov 2005; Mike Frysinger files/binutils-config-1.8, - -binutils-config-1.8-r5.ebuild, +binutils-config-1.8-r6.ebuild: - Allow people to select profiles via version only. - -*binutils-config-1.8-r5 (27 Aug 2005) - - 27 Aug 2005; Mike Frysinger files/binutils-config-1.8, - -binutils-config-1.8-r4.ebuild, +binutils-config-1.8-r5.ebuild: - Ooops, last change removed a cd line by accident. - -*binutils-config-1.8-r3 (13 Jun 2005) - - 13 Jun 2005; Mike Frysinger files/binutils-config-1.8, - +binutils-config-1.8-r3.ebuild: - When uninstalling, clean out a few more dirs if they are empty. - -*binutils-config-1.8-r2 (03 Apr 2005) - - 03 Apr 2005; Mike Frysinger files/binutils-config-1.8, - -binutils-config-1.8-r1.ebuild, +binutils-config-1.8-r2.ebuild: - Touch up the unistall so it works with the eclass again. - -*binutils-config-1.8-r1 (22 Feb 2005) - - 22 Feb 2005; Mike Frysinger - +binutils-config-1.8-r1.ebuild: - Make sure manpage gets installed #81553 by Aron Griffis. - -*binutils-config-1.8 (30 Jan 2005) - - 30 Jan 2005; Mike Frysinger +files/binutils-config-1.8, - files/binutils-config.8, +binutils-config-1.8.ebuild: - Add support for generating fake arm/mips little/big targets. Also make it so - the user can select which profile to fake against. - -*binutils-config-1.7 (13 Jan 2005) - - 13 Jan 2005; Mike Frysinger - +files/binutils-config-1.7, +files/binutils-config.8, - +binutils-config-1.7.ebuild: - Allow users to install fake x86/amd64 symlinks easily and add a manpage. - -*binutils-config-1.6 (01 Jan 2005) - - 01 Jan 2005; Mike Frysinger - +files/binutils-config-1.6, +binutils-config-1.6.ebuild: - Upgrade support for FAKE_TARGETS. - -*binutils-config-1.5-r1 (31 Dec 2004) - - 31 Dec 2004; Jeremy Huddleston - files/binutils-config-1.5: - Fixed syntax error in binutils-condif-1.5. - -*binutils-config-1.5 (30 Dec 2004) - - 30 Dec 2004; Mike Frysinger - +files/binutils-config-1.5, +binutils-config-1.5.ebuild: - New version to support extra symlink generation for multilib systems. - -*binutils-config-1.4 (26 Dec 2004) - - 26 Dec 2004; Mike Frysinger - +files/binutils-config-1.4, +binutils-config-1.4.ebuild: - Fill out {INFO,LD,MAN}PATH variables to fix #74726 and #75636. - -*binutils-config-1.3 (15 Dec 2004) - - 15 Dec 2004; Mike Frysinger - +files/binutils-config-1.3, +binutils-config-1.3.ebuild: - Support $(get_libdir) for funky arches. - -*binutils-config-1.2 (15 Dec 2004) - - 15 Dec 2004; Mike Frysinger - +files/binutils-config-1.2, +binutils-config-1.2.ebuild: - Version bump to resolve upgrade issues #74348. - -*binutils-config-1.1 (08 Dec 2004) - - 08 Dec 2004; Mike Frysinger - +files/binutils-config-1.1, +binutils-config-1.1.ebuild: - Support unmerging of targets and move the symlink generation out of packages - and into binutils. - -*binutils-config-1.0 (14 Nov 2004) - - 14 Nov 2004; Mike Frysinger : - Initial import. Ebuild submitted by me. diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/Manifest b/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/Manifest deleted file mode 100644 index 6bf12a8a7b..0000000000 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/Manifest +++ /dev/null @@ -1,11 +0,0 @@ -AUX binutils-config-4 11570 SHA256 09ca8e043c07da03ea247bb8cff2777d989f8d435421299de59307c78db1cd8b SHA512 cd987bada67cc222230c3592edf5391caa6c5fcb15081f9acb40befdd351f8a539bde8b9d921cb5c13d6f246b5eecf4fdda9f49bf899f086c966ff6fe558c12e WHIRLPOOL e840e7c1137c4598bdd7989f584d18cefa820c86d74d8755718f5aa5e572e79e669cecff23ba6bfc0027110991e5f72c457cb15c910c4bb1e60b8d1e6f660b86 -AUX binutils-config-5 12435 SHA256 f836e65217f39f2b0854b3d210be1a03ea08da50c01c5dc5e3bd0170edf7b846 SHA512 f4073dd9991c8286c331b66f1a433d16e93c7eae06dc6cc5895922cf69448c3a7929590436a3ca19448e890e28d632834acc846296b15818690ab0ba175e0706 WHIRLPOOL 95a6878ccc719509af2e1a7c2f62801dc862c6c7901e2c1e20147c3a096e936a023466692247eb0612abf070b421b4e5797502846b4efde933faea59ad41ca1d -AUX binutils-config.8 2837 SHA256 20817cd2e6e3a8ace12ada7b73ada556d597527adcad02876e522e0b6396d4a3 SHA512 66a260499c1100dc71469e4ca1e2b0f71410382138c381e6a6ed4e4aa19520607407ffa6a28e0388e0abe5ee86769b662cec29cdb2ff02cc6c05af64314db5d9 WHIRLPOOL 8bbc5c525b1c7a3ec147458569d570a3312034da2c75c1f31c4cd888db5205aa0a8c8ec061b2354d8ac80b43bdbdf1559a92e904dae5f681345fe758794c2535 -AUX binutils.eselect 810 SHA256 e579d3bffc645730f396ebc01d9f9f1043ee8db5edb1f41d5aeadeedcf6aa295 SHA512 105d2c50fbe2a988e669810db3f2d278cb70c24ee85a16c85a3f63c6e8e9e32bd91f430e4f9ec347e0ccb1a88ca4edb2eba9cbda73356e44d0871cb7ab9eb203 WHIRLPOOL 5ae5fd07213e2be381824aea237aa2cc47a987a2ee6508fcd8f18424f8e3de89be71f1de781240af45b98f7525048be2ab7cb60893384efbcde8f8a92a32c73a -EBUILD binutils-config-4-r2.ebuild 589 SHA256 2ed036c4de98c14f8529cda7f20053fc46afa4f2d284a91c6dc2509f09823c5c SHA512 f4b5a3836a3e02a3c27ed30efe365feff8ace91c22fc9b53bce5e434b358067e2f6cdd5229c65df25794a1188327610423a76a216da96ea2a710e6c7c0e39e56 WHIRLPOOL ea5d882beb17908182762ac0159045b647858dbd73c535babfb82d67d4fd14da3c017e9ba729435ca6317175aaf5de896feecf52ba0e7e76cb47b5c3eeb02223 -EBUILD binutils-config-4-r3.ebuild 602 SHA256 15ce445a5ff179785bc453db3284387c9c4131adc49a7ac1552842ed41a6a3f0 SHA512 e53331878b1ac1b9c748ec167965f02769f46a6fae9cc24bed3237c9e593b3eca67b25d49ab8c1d2a8b9cd5bd9aae0b33c445b4c0c3e4e62b05f7594a79af104 WHIRLPOOL 8694df18f030fd023ac79a5df65da7920bbdd4db4f80bba3bc7dbb072b90dcc641d1efca5aaea33b056bd077e3ac2479d027a16a1530884605480b9cd162ee34 -EBUILD binutils-config-4-r4.ebuild 704 SHA256 fc57abc3f09896a2f89fa0ed0bf5be6160adf077c3d42d9af274d278f55e3687 SHA512 3df81f0b9d2a8257352239778bc7e153d03e081636eb5772d8e67625308ee2636cd9a1525df07ac44c743e80ccd285d060646e86c5656ace33ec04bbc1cf437b WHIRLPOOL fa222755455f5c7e93b592d641f29f7eb700c3158172bd4fc62452c2fdc1fa0fbb7dd08652ce550b1328750f9fc6386ac49a42a21450843c6872e4d4b1a32d5d -EBUILD binutils-config-5-r2.ebuild 1027 SHA256 08ff4a35d6627ee8b8257f892c4c3b436f30feb38a3d407baf516223fa46f913 SHA512 3a4ec21a06616bef8e41faf46d1d7f4ff66340a0a100e230c7c89dda1fd3250b080acfd7e64137d551ed2d156d295d8ccb5f7189df470a9fb044094cb9956c09 WHIRLPOOL cf7ef4747661af350d8ac290075b2db24598afe5833256a982dae5db7ae0d0809c2ac0d373a09793b2ca60cf988907ca3eb966d9a69d7a7727243297908ce2ce -MISC ChangeLog 5424 SHA256 fbfe45fd2573a98c5bcdf81d5138e3f59ba29cc7c86d736fa08cd96aa9a38acc SHA512 3989cbf99cf0eacc263caa8caaf77ed150ce9cae712324b5b0888abd8b25e7e644549a8607a8a12a220fc53ee54125bd510df6e1ada1b833b5fe6837b226c545 WHIRLPOOL 428d67726e3e50d73512a09e1d74e41fdf359c21ce533f08e835f346ace89f952cce167046e700cb227c0b6dea342f56411b4fee5c5c80ff05fb30d1e7504fef -MISC ChangeLog-2015 12757 SHA256 996edd94d7f8b82e690fa028e8e729ba1aafff0e2e8dd2fa358718ee990546df SHA512 bf644ca23b2dcd20d8a7279377711d976211e91bf4c41f10638383dc1a3e2c215864e3328984f50f0d2137474a9d07dcd499eca16a8e2df757f54295a52b5ac3 WHIRLPOOL 5de7f1e57ca53bca17deef27b6a2c52b816d7df586fbbfc92304d8a518a2fd6ef31911f4b2012fb9b8b10210038fcfab05a3871a67545b7f4dfd6eab04c85c4e -MISC metadata.xml 257 SHA256 fcb691c3299a07a5fe4f936baa5aa146b8aa3cb9491ba88fd12547cb540b02c2 SHA512 fd85d9cf15f6b7db96e4d184e32ae6f1503a5b70cb4cb1ce930ba13a1d5d4c4b24971781e95b7f3f9ead58b31760f84c368bc6fa2a793b4b5baf78259b047ff1 WHIRLPOOL 62b62e3e5489b8983ddd7bfc6017411d5e02f9710763206baa84b826388c8685fe7bdc0bb6a76c029e73ae4c160e9af6c8544406dc70a203c7c3d65d4aa15400 diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r2.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r2.ebuild deleted file mode 100644 index ed2999730e..0000000000 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r2.ebuild +++ /dev/null @@ -1,24 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="4" - -DESCRIPTION="Utility to change the binutils version being used" -HOMEPAGE="https://www.gentoo.org/" -SRC_URI="" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd" -IUSE="" - -# We also RDEPEND on sys-apps/findutils which is in base @system -RDEPEND="sys-apps/gentoo-functions" - -S=${WORKDIR} - -src_install() { - newbin "${FILESDIR}"/${PN}-${PV} ${PN} - doman "${FILESDIR}"/${PN}.8 -} diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r3.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r3.ebuild deleted file mode 100644 index 58ade48da3..0000000000 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r3.ebuild +++ /dev/null @@ -1,24 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="4" - -DESCRIPTION="Utility to change the binutils version being used" -HOMEPAGE="https://www.gentoo.org/" -SRC_URI="" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd" -IUSE="" - -# We also RDEPEND on sys-apps/findutils which is in base @system -RDEPEND="sys-apps/gentoo-functions" - -S=${WORKDIR} - -src_install() { - newbin "${FILESDIR}"/${PN}-${PV} ${PN} - doman "${FILESDIR}"/${PN}.8 -} diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r4.ebuild b/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r4.ebuild deleted file mode 100644 index c70e4bbc53..0000000000 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/binutils-config-4-r4.ebuild +++ /dev/null @@ -1,28 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="4" - -DESCRIPTION="Utility to change the binutils version being used" -HOMEPAGE="https://www.gentoo.org/" -SRC_URI="" - -LICENSE="GPL-2" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd" -IUSE="" - -# We also RDEPEND on sys-apps/findutils which is in base @system -RDEPEND="sys-apps/gentoo-functions - !&2 - exit 1 -} -esyslog() { :; } -die() { eerror "${argv0}: $*"; exit 1; } -umask 022 - -usage() { -cat << USAGE_END -Usage: ${HILITE}binutils-config${NORMAL} ${GOOD}[options]${NORMAL} ${BRACKET}[binutils profile]${NORMAL} - -${HILITE}General Options:${NORMAL} - ${GOOD}-c, --get-current-profile${NORMAL} Print current profile - ${GOOD}-l, --list-profiles${NORMAL} Print a list of available profiles - ${GOOD}-u, --uninstall${NORMAL} Remove all signs of specified target - ${GOOD}-d, --debug${NORMAL} Execute with debug output - -${HILITE}General Cruft:${NORMAL} - ${GOOD}--linker${NORMAL} Switch to specified linker (if supported) - -Profile names are of the form: ${BRACKET}-${NORMAL} -For example: ${BRACKET}i686-pc-linux-gnu-2.15.92.0.2${NORMAL} - -For more info, please see ${HILITE}binutils-config${NORMAL}(8). -USAGE_END - - exit ${1:-1} -} - -mv_if_diff() { - if cmp -s "$1" "$2" ; then - rm -f "$1" - else - mv -f "$1" "$2" - fi -} -atomic_ln() { - local target=$1 linkdir=$2 linkname=$3 linktmp linkfull - linktmp="${linkdir}/.binutils-config.tmp.${linkname}" - linkfull="${linkdir}/${linkname}" - if [[ -d ${linkfull} ]] ; then - # if linking to a dir, we need a little magic to - # make it atomic since `mv -T` is not portable - rm -rf "${linktmp}" - mkdir -p "${linktmp}" - ln -sf "${target}" "${linktmp}/${linkname}" - mv "${linktmp}/${linkname}" "${linktmp}/../" - rmdir "${linktmp}" - else - # `ln` will expand into unlink();symlink(); which - # is not atomic for a small amount of time, but - # `mv` is a single rename() call - ln -sf "${target}" "${linktmp}" - mv "${linktmp}" "${linkfull}" - fi -} - -setup_env() { - unset TARGET VER LIBPATH - source "${ENV_D}/${PROFILE}" - if [[ -z ${TARGET} ]] ; then - eerror "${PROFILE} is invalid (no \$TARGET defined) :(" - return 1 - fi - if [[ -z ${VER} ]] ; then - eerror "${PROFILE} is invalid (no \$VER defined) :(" - return 1 - fi - - # - # Generate binary symlinks - # - BINPATH="" - BINPATH_LINKS="" - if [[ ${TARGET} != ${HOST} ]] ; then - # - # Newer paths: /usr/${HOST}/${TARGET}/... - # Older paths: /usr/${TARGET}/... - # - if [[ -d ${ROOT}/usr/${HOST}/${TARGET}/binutils-bin/${VER} ]] ; then - BINPATH=/usr/${HOST}/${TARGET}/binutils-bin/${VER} - BINPATH_LINKS=/usr/libexec/gcc/${TARGET} - fi - fi - if [[ -z ${BINPATH} ]] ; then - BINPATH=/usr/${TARGET}/binutils-bin/${VER} - BINPATH_LINKS=/usr/${TARGET}/bin - fi -} - -switch_profile() { - ebegin "Switching to ${PROFILE}" - - setup_env || return 1 - - cd "${ROOT}/${BINPATH}" || exit 1 - mkdir -p "${ROOT}/${BINPATH_LINKS}" "${ROOT}/usr/bin" - for x in * ; do - atomic_ln "${BINPATH}/${x}" "${ROOT}/${BINPATH_LINKS}" "${x}" - atomic_ln "${BINPATH_LINKS}/${x}" "${ROOT}/usr/bin" "${TARGET}-${x}" - if [[ ${TARGET} == ${HOST} ]] ; then - atomic_ln "${TARGET}-${x}" "${ROOT}/usr/bin" "${x}" - fi - done - - # - # Generate library / ldscripts symlinks - # - : ${LIBPATH:=/usr/lib/binutils/${TARGET}/${VER}} - cd "${ROOT}/${LIBPATH}" || exit 1 - if [[ ${TARGET} == ${HOST} ]] ; then - dstlib=${ROOT}/usr/${HOST}/lib - else - dstlib=${ROOT}/usr/${HOST}/${TARGET}/lib - fi - # When upgrading, we need to clean up ldscripts and libs - mkdir -p "${dstlib}" - rm -rf "${ROOT}/${BINPATH_LINKS}"/ldscripts - atomic_ln "${LIBPATH}/ldscripts" "${dstlib}" "ldscripts" - find -L "${dstlib}" -type l -exec rm -v {} + - for x in lib* ; do - atomic_ln "${LIBPATH}/${x}" "${dstlib}" "${x}" - done - - # - # Generate include symlinks - # - INCPATH=${LIBPATH}/include - if [[ -d ${ROOT}/${INCPATH} ]] ; then - cd "${ROOT}/${INCPATH}" || exit 1 - if [[ ${HOST} == ${TARGET} ]] ; then - mkdir -p "${ROOT}/usr/include" - for x in * ; do - atomic_ln "${INCPATH}/${x}" "${ROOT}/usr/include" "${x}" - done - else - # Clean out old path -- cannot use '-exec {} +' syntax here - find . -type f -exec rm -f "${ROOT}/usr/${TARGET}/usr/include/{}" \; - rmdir "${ROOT}/usr/${TARGET}/usr/include" >& /dev/null - rmdir "${ROOT}/usr/${TARGET}/usr" >& /dev/null - rmdir "${ROOT}/usr/${TARGET}" >& /dev/null - fi - fi - - # - # Make sure proper paths get updated - # - if [[ ${TARGET} == ${HOST} ]] ; then - DATAPATH=/usr/share/binutils-data/${TARGET}/${VER} - local e="${ROOT}"/etc/env.d/05binutils - local ee="${e}.tmp" - rm -f "${ee}" - [[ -d ${ROOT}/${DATAPATH}/man ]] && echo "MANPATH=${DATAPATH}/man" >> "${ee}" - [[ -d ${ROOT}/${DATAPATH}/info ]] && echo "INFOPATH=${DATAPATH}/info" >> "${ee}" - # hmm, `ld` has this in SEARCH_DIR(), but ld.so does not ... - if [[ -d ${ROOT}/etc/ld.so.conf.d ]] ; then - local l="${ROOT}"/etc/ld.so.conf.d/05binutils.conf - local ll="${l}.tmp" - echo "/usr/${TARGET}/lib" > "${ll}" - mv_if_diff "${ll}" "${l}" - else - echo "LDPATH=/usr/${TARGET}/lib" >> "${ee}" - fi - mv_if_diff "${ee}" "${e}" - fi - - local c="${ENV_D}/config-${TARGET}" - local cc="${c}.tmp" - echo "CURRENT=${VER}" > "${cc}" - mv_if_diff "${cc}" "${c}" - - eend 0 - - # - # Regen env.d if need/can be - # - if [[ ${ROOT} == "/" ]] && [[ ${TARGET} == ${HOST} ]] ; then - env-update - echo - ewarn "Please remember to run:" - echo - ewarn " # . /etc/profile" - echo - fi - - return 0 -} - -uninstall_target() { - : ${TARGET:=${UARG}} - - if [[ ${TARGET} == ${HOST} ]] ; then - die "refusing to uninstall native binutils" - fi - - shopt -s nullglob - PROFILE="" - - for PROFILE in "${ENV_D}"/${TARGET}-* ; do - ewarn "Removing all signs of ${PROFILE##*/}" - rm -f "${ENV_D}"/${PROFILE} - done - if [[ -z ${PROFILE} ]] && [[ ! -e ${ENV_D}/config-${TARGET} ]] ; then - die "no profiles exist for '${TARGET}'" - fi - - rm -f "${ENV_D}"/config-${TARGET} - - local x - for x in \ - addr2line ar as c++filt elf2flt elfedit flthdr gprof \ - ld ld.{bfd,gold,real} \ - nm objcopy objdump ranlib readelf size strings strip - do - x=( - "${ROOT}"/usr/bin/${TARGET}-${x} - "${ROOT}"/usr/{${HOST}/,}${TARGET}/bin/${x} - "${ROOT}"/usr/libexec/gcc/${TARGET}/${x} - ) - rm -f "${x[@]}" - done - for x in ansidecl.h bfd.h bfdlink.h dis-asm.h symcat.h ; do - rm -f "${ROOT}"/usr/{${HOST}/,}${TARGET}/{usr/,}include/${x} - done - for x in bfd iberty opcodes ; do - rm -f "${ROOT}"/usr/${HOST}/${TARGET}/lib/lib${x}{{-*,}.so,.a,.la} - done - # Delete broken symlinks - local destdir="${ROOT}/usr/${HOST}/${TARGET}" - rm -f "${destdir}"/lib/ldscripts - find -L "${destdir}"/lib -type l -exec rm {} + - rmdir \ - "${destdir}"/{bin,include,lib,usr} \ - "${destdir}" \ - "${ROOT}"/var/db/pkg/cross-${TARGET} \ - "${ROOT}"/usr/{${HOST}/,}${TARGET}/bin \ - "${ROOT}"/usr/libexec/gcc/${TARGET} \ - 2>/dev/null - - rm -f "${ENV_D}"/${TARGET}-* -} - -set_current_profile() { - if [[ ! -f ${ENV_D}/config-${TARGET} ]] ; then - eerror "${argv0}: unable to locate a profile for target: ${TARGET}" - return 1 - fi - - source "${ENV_D}/config-${TARGET}" - - if [[ -z ${CURRENT} ]] ; then - eerror "${argv0}: no binutils profile is active!" - return 1 - fi - - echo "${TARGET}-${CURRENT}" - - return 0 -} -get_current_profile() { echo "${PROFILE}" ; } - -list_profiles() { - local x i target - - if [[ ${ROOT} != / ]] ; then - echo "Using binutils-config info in ${ROOT}" - fi - - set -- "${ENV_D}"/* - target= - i=1 - - for x ; do - # skip broken links and config files - [[ -f ${x} ]] || continue - [[ ${x} == */config-* ]] && continue - - source "${x}" - if [[ ${target} != ${TARGET} ]] ; then - [[ -n ${target} ]] && echo - target=${TARGET} - fi - - x=${x##*/} - if [[ -e ${ENV_D}/config-${TARGET} ]] ; then - source "${ENV_D}/config-${TARGET}" - if [[ ${VER} == ${CURRENT} ]] ; then - [[ ${TARGET} == ${HOST} ]] \ - && x="${x} ${GOOD}*${NORMAL}" \ - || x="${x} ${HILITE}*${NORMAL}" - fi - fi - - # We would align the [...] field like so: - #printf ' [%*ss] %s\n' ${##} "${i}" "${x}" - # but this breaks simple scripting: `binutils -l | awk '{print $2}'` - - # Or we could align the target col like so: - #printf ' [%s]%*s %s\n' "${i}" $(( ${##} - ${#i} )) "" "${x}" - # but i'm not sold that it looks better - - # So keep it simple ... only makes a diff anyways for crazy people - # like me which have 100+ binutils packages installed ... - echo " [$i] ${x}" - ((++i)) - done -} - -switch_linker() { - local bpath ld=$1 - - case ${ld} in - ld.*) ;; - *) die "not supported: linker must start with 'ld.'" ;; - esac - - setup_env || return 1 - bpath="${ROOT}/${BINPATH}" - - # does this binutils even support the requested linker ? - if [[ ! -e ${bpath}/${ld} ]] ; then - die "sorry, but ${PROFILE} doesn't support the ${ld} linker" - fi - - # switch it up - ebegin "Setting default linker to ${ld} for ${PROFILE}" - atomic_ln ${ld} "${bpath}" ld - eend $? -} - -set_HOST() { - # Set HOST to CHOST if it isn't already set - : ${HOST:=${CHOST:-$(portageq envvar CHOST)}} -} - -ENV_D="${ROOT}etc/env.d/binutils" - -DEBUG="no" -NEED_ACTION="yes" -DOIT="switch_profile" -PROFILE="current" -HOST="" -TARGET="" -unset UARG - -select_action() { - if [[ ${NEED_ACTION} != "no" ]] ; then - NEED_ACTION="no" - DOIT=$1 - else - die "one action at a time!" - fi -} - -while [[ $# -gt 0 ]] ; do - x=$1 - shift - case ${x} in - -c|--get-current-profile) select_action get_current_profile ;; - -l|--list|--list-profiles) select_action list_profiles ;; - -u|--uninstall) select_action uninstall_target ;; - --linker) select_action "switch_linker $1"; shift ;; - -d|--debug) DEBUG="yes" ;; - -h|--help) usage 0 ;; - -V|--version) - unset Header - cvsver="$Id$" - cvsver=${cvsver##*binutils-config-} - bver=${cvsver%%,v *} - cvsver=${cvsver#* } - echo "binutils-config-${bver} (r${cvsver%% *})" - exit 0 - ;; - -*) - die "invalid switch! Try '--help'." - ;; - *) - if [[ ${UARG+set} == "set" ]] ; then - die "only one profile/target at a time please" - fi - NEED_ACTION="maybe" - UARG=${x} - ;; - esac -done - -[[ ${NEED_ACTION} == "yes" ]] && usage 1 -[[ ${DEBUG} == "yes" ]] && set -x - -# All operations need to know the current HOST to figure out -# what is a native target and what is a cross target -set_HOST - -# All operations need to know the profile the user wants -case ${DOIT} in -switch_profile|switch_linker_*) - # decode user's profile choice - x=${UARG:-$(TARGET=${HOST} set_current_profile)} - PROFILE="" - if [[ -z $(echo ${x} | tr -d '[:digit:]') ]] ; then - # User gave us a # representing the profile - i=1 - for y in "${ENV_D}"/* ; do - [[ ${y/config-} != ${y} ]] && continue - - if [[ -f ${y} ]] && [[ ${x} -eq ${i} ]] ; then - PROFILE=${y##*/} - break - fi - ((++i)) - done - fi - - if [[ -z ${PROFILE} ]] ; then - # User gave us a full HOST-ver - x=${x##*/} - if [[ -f ${ENV_D}/${x} ]] ; then - # Valid HOST-ver yeah! - PROFILE=${x} - else - # Not a valid HOST-ver ... - if [[ ! -f ${ENV_D}/config-${x} ]] ; then - # Maybe they just gave us a ver ... - if [[ -f ${ENV_D}/${HOST}-${x} ]] ; then - x=${HOST}-${x} - else - die "could not locate '$x' in '${ENV_D}/'!" - fi - PROFILE=${x} - else - # Maybe they just gave us a target ... pick active profile - PROFILE=$(TARGET=${x} set_current_profile) - fi - fi - fi - ;; -*) - # lookup current profile as the user gave us a target - PROFILE=$(TARGET=${UARG:-${HOST}} set_current_profile) || exit 1 - ;; -esac - -eval ${DOIT} - -# vim:ts=4 diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/files/binutils-config-5 b/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/files/binutils-config-5 index 2bdd07e1fc..acb72b7e34 100755 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/files/binutils-config-5 +++ b/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/files/binutils-config-5 @@ -1,22 +1,28 @@ #!/bin/bash # Copyright 1999-2015 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ # Format of /etc/env.d/binutils/: # config-TARGET: CURRENT=version for TARGET # TARGET-VER: has a TARGET and VER variable +EPREFIX="@GENTOO_PORTAGE_EPREFIX@" +if [[ ${EPREFIX} == "@"GENTOO_PORTAGE_EPREFIX"@" ]] ; then + EPREFIX="" +fi + : ${ROOT:=/} [[ ${ROOT} != */ ]] && ROOT="${ROOT}/" [[ ${ROOT} != /* ]] && ROOT="${PWD%/}/${ROOT}" -cd / +EROOT="${ROOT%/}${EPREFIX}/" + +cd "${EPREFIX}/" trap ":" INT QUIT TSTP argv0=${0##*/} -FUNCTIONS_SH="/lib/gentoo/functions.sh" +FUNCTIONS_SH="${EPREFIX}/lib/gentoo/functions.sh" source ${FUNCTIONS_SH} || { echo "${argv0}: Could not source ${FUNCTIONS_SH}!" 1>&2 exit 1 @@ -97,14 +103,14 @@ setup_env() { # Newer paths: /usr/${HOST}/${TARGET}/... # Older paths: /usr/${TARGET}/... # - if [[ -d ${ROOT}/usr/${HOST}/${TARGET}/binutils-bin/${VER} ]] ; then - BINPATH=/usr/${HOST}/${TARGET}/binutils-bin/${VER} - BINPATH_LINKS=/usr/libexec/gcc/${TARGET} + if [[ -d "${EROOT}"/usr/${HOST}/${TARGET}/binutils-bin/${VER} ]] ; then + BINPATH="${EPREFIX}"/usr/${HOST}/${TARGET}/binutils-bin/${VER} + BINPATH_LINKS="${EPREFIX}"/usr/libexec/gcc/${TARGET} fi fi if [[ -z ${BINPATH} ]] ; then - BINPATH=/usr/${TARGET}/binutils-bin/${VER} - BINPATH_LINKS=/usr/${TARGET}/bin + BINPATH="${EPREFIX}"/usr/${TARGET}/binutils-bin/${VER} + BINPATH_LINKS="${EPREFIX}"/usr/${TARGET}/bin fi } @@ -123,24 +129,24 @@ switch_profile() { setup_env || return 1 cd "${ROOT}/${BINPATH}" || exit 1 - mkdir -p "${ROOT}/${BINPATH_LINKS}" "${ROOT}/usr/bin" + mkdir -p "${ROOT}/${BINPATH_LINKS}" "${EROOT}/usr/bin" for x in * ; do atomic_ln "${BINPATH}/${x}" "${ROOT}/${BINPATH_LINKS}" "${x}" - atomic_ln "${BINPATH_LINKS}/${x}" "${ROOT}/usr/bin" "${TARGET}-${x}" + atomic_ln "${BINPATH_LINKS}/${x}" "${EROOT}/usr/bin" "${TARGET}-${x}" if [[ ${TARGET} == ${HOST} ]] ; then - atomic_ln "${TARGET}-${x}" "${ROOT}/usr/bin" "${x}" + atomic_ln "${TARGET}-${x}" "${EROOT}/usr/bin" "${x}" fi done # # Generate library / ldscripts symlinks # - : ${LIBPATH:=/usr/lib/binutils/${TARGET}/${VER}} + : ${LIBPATH:=${EPREFIX}/usr/lib/binutils/${TARGET}/${VER}} cd "${ROOT}/${LIBPATH}" || exit 1 if [[ ${TARGET} == ${HOST} ]] ; then - dstlib=${ROOT}/usr/${HOST}/lib + dstlib=${EROOT}/usr/${HOST}/lib else - dstlib=${ROOT}/usr/${HOST}/${TARGET}/lib + dstlib=${EROOT}/usr/${HOST}/${TARGET}/lib fi # When upgrading, we need to clean up ldscripts and libs. # Don't symlink back in the libs -- the binutils-lib package handles @@ -149,16 +155,7 @@ switch_profile() { mkdir -p "${dstlib}" rm -rf "${ROOT}/${BINPATH_LINKS}"/ldscripts atomic_ln "${LIBPATH}/ldscripts" "${dstlib}" "ldscripts" - find -L "${dstlib}" -xtype l -name 'lib*' -delete - # Detect older binutils w/broken rpaths. #562460 - # We can hardcode the "/lib" part since that's what the binutils - # configure scripts have. They did not include any other path. - if [[ $(scanelf -qF '%r#F' "${ROOT}/${BINPATH}/as") == */lib ]] ; then - ewarn "Old cross-binutils detected; please re-emerge to fix (see bug #562460)." - for x in lib* ; do - atomic_ln "${LIBPATH}/${x}" "${dstlib}" "${x}" - done - fi + find -L "${dstlib}" -xtype l -name 'lib*' -exec rm -f {} + # # Clean out old generated include symlinks @@ -169,17 +166,17 @@ switch_profile() { if [[ ${HOST} == ${TARGET} ]] ; then # The binutils-lib package handles these files now. for x in libiberty "${HEADERS[@]}" ; do - x="${ROOT}/usr/include/${x}" + x="${EROOT}/usr/include/${x}" if [[ -L ${x} ]] ; then rm "${x}" fi done else # Clean out old path -- cannot use '-exec {} +' syntax here - find . -type f -exec rm -f "${ROOT}/usr/${TARGET}/usr/include/{}" \; - rmdir "${ROOT}/usr/${TARGET}/usr/include" >& /dev/null - rmdir "${ROOT}/usr/${TARGET}/usr" >& /dev/null - rmdir "${ROOT}/usr/${TARGET}" >& /dev/null + find . -type f -exec rm -f "${EROOT}/usr/${TARGET}/usr/include/{}" \; + rmdir "${EROOT}/usr/${TARGET}/usr/include" >& /dev/null + rmdir "${EROOT}/usr/${TARGET}/usr" >& /dev/null + rmdir "${EROOT}/usr/${TARGET}" >& /dev/null fi fi @@ -192,14 +189,14 @@ switch_profile() { # Note: This skips ldconfig update if env.d had LDPATH, but meh. # Most people have upgraded to ld.so.conf.d, and someone else will # eventually re-run ldconfig for us. - x="${ROOT}"/etc/ld.so.conf.d/05binutils.conf + x="${EROOT}"/etc/ld.so.conf.d/05binutils.conf if [[ -e ${x} ]]; then rm -f "${x}" env_update_flag="" fi - DATAPATH=/usr/share/binutils-data/${TARGET}/${VER} - local e="${ROOT}"/etc/env.d/05binutils + DATAPATH="${EPREFIX}"/usr/share/binutils-data/${TARGET}/${VER} + local e="${EROOT}"/etc/env.d/05binutils local ee="${e}.tmp" rm -f "${ee}" [[ -d ${ROOT}/${DATAPATH}/man ]] && echo "MANPATH=${DATAPATH}/man" >> "${ee}" @@ -222,7 +219,7 @@ switch_profile() { echo ewarn "Please remember to run:" echo - ewarn " # . /etc/profile" + ewarn " # . ${EPREFIX}/etc/profile" echo fi @@ -251,33 +248,33 @@ uninstall_target() { local x for x in \ - addr2line ar as c++filt dwp elf2flt elfedit flthdr gprof \ + addr2line ar as c++filt elf2flt elfedit flthdr gprof \ ld ld.{bfd,gold,real} \ nm objcopy objdump ranlib readelf size strings strip do x=( - "${ROOT}"/usr/bin/${TARGET}-${x} - "${ROOT}"/usr/{${HOST}/,}${TARGET}/bin/${x} - "${ROOT}"/usr/libexec/gcc/${TARGET}/${x} + "${EROOT}"/usr/bin/${TARGET}-${x} + "${EROOT}"/usr/{${HOST}/,}${TARGET}/bin/${x} + "${EROOT}"/usr/libexec/gcc/${TARGET}/${x} ) rm -f "${x[@]}" done for x in "${HEADERS[@]}" ; do - rm -f "${ROOT}"/usr/{${HOST}/,}${TARGET}/{usr/,}include/${x} + rm -f "${EROOT}"/usr/{${HOST}/,}${TARGET}/{usr/,}include/${x} done for x in bfd iberty opcodes ; do - rm -f "${ROOT}"/usr/${HOST}/${TARGET}/lib/lib${x}{{-*,}.so,.a,.la} + rm -f "${EROOT}"/usr/${HOST}/${TARGET}/lib/lib${x}{{-*,}.so,.a,.la} done # Delete broken symlinks - local destdir="${ROOT}/usr/${HOST}/${TARGET}" + local destdir="${EROOT}/usr/${HOST}/${TARGET}" rm -f "${destdir}"/lib/ldscripts find -L "${destdir}"/lib -type l -exec rm {} + rmdir \ "${destdir}"/{bin,include,lib,usr} \ "${destdir}" \ - "${ROOT}"/var/db/pkg/cross-${TARGET} \ - "${ROOT}"/usr/{${HOST}/,}${TARGET}/bin \ - "${ROOT}"/usr/libexec/gcc/${TARGET} \ + "${EROOT}"/var/db/pkg/cross-${TARGET} \ + "${EROOT}"/usr/{${HOST}/,}${TARGET}/bin \ + "${EROOT}"/usr/libexec/gcc/${TARGET} \ 2>/dev/null rm -f "${ENV_D}"/${TARGET}-* @@ -376,7 +373,7 @@ set_HOST() { : ${HOST:=${CHOST:-$(portageq envvar CHOST)}} } -ENV_D="${ROOT}etc/env.d/binutils" +ENV_D="${EROOT}etc/env.d/binutils" DEBUG="no" NEED_ACTION="yes" @@ -406,12 +403,8 @@ while [[ $# -gt 0 ]] ; do -d|--debug) DEBUG="yes" ;; -h|--help) usage 0 ;; -V|--version) - unset Header - cvsver="$Id$" - cvsver=${cvsver##*binutils-config-} - bver=${cvsver%%,v *} - cvsver=${cvsver#* } - echo "binutils-config-${bver} (r${cvsver%% *})" + ver="@PV@" + echo "binutils-config-${ver/@'PV'@/git}" exit 0 ;; -*) diff --git a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/files/binutils-config.8 b/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/files/binutils-config.8 index 0d8adb5a70..52cf7101e6 100644 --- a/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/files/binutils-config.8 +++ b/sdk_container/src/third_party/portage-stable/sys-devel/binutils-config/files/binutils-config.8 @@ -48,16 +48,12 @@ This is really for internal use only. Used to remove all traces of the \fITARGET\fR binutils from your system. .SH "CRUFTY OPTIONS" .TP -\fB\-\-gold\fR -Change the default linker for the specified \fIPROFILE\fR to the [newer] gold -linker. This only works if the binutils actually supports gold. Note that -not all options supported by the bfd linker are supportd by the gold linker. -.TP -\fB\-\-bfd\fR -Change the default linker for the specified \fIPROFILE\fR to the [older but -stable] bfd linker. If unsure, stick to this one. +\fB\-\-linker\fR \fB\fR +Change the default linker for the specified \fIPROFILE\fR to the \fB\fR. +Common names are \fBld.gold\fR for the newer gold linker and \fBld.bfd\fR for +the classic linker. Note that not all targets support the gold linker. .SH "REPORTING BUGS" -Please report bugs via http://bugs.gentoo.org/ +Please report bugs via https://bugs.gentoo.org/ .SH "SEE ALSO" .BR ar (1), .BR as (1), From 95f054aadb08b6dfd8c74b24c3b5f0361efb366e Mon Sep 17 00:00:00 2001 From: David Michael Date: Mon, 18 Sep 2017 13:39:43 -0700 Subject: [PATCH 05/14] bump(net-misc/curl): sync with upstream --- .../md5-cache/net-misc/curl-7.52.1-r1 | 15 -- .../metadata/md5-cache/net-misc/curl-7.53.0 | 15 -- .../metadata/md5-cache/net-misc/curl-7.53.1 | 15 -- .../metadata/md5-cache/net-misc/curl-7.54.0 | 15 -- .../metadata/md5-cache/net-misc/curl-7.55.1 | 15 ++ .../portage-stable/net-misc/curl/Manifest | 16 +- .../net-misc/curl/curl-7.52.1-r1.ebuild | 251 ------------------ .../net-misc/curl/curl-7.53.1.ebuild | 250 ----------------- .../net-misc/curl/curl-7.54.0.ebuild | 250 ----------------- ...{curl-7.53.0.ebuild => curl-7.55.1.ebuild} | 13 +- .../curl/files/curl-7.52.1-fix-openssl.patch | 36 --- .../curl/files/curl-7.55.1-fix-build.patch | 22 ++ 12 files changed, 41 insertions(+), 872 deletions(-) delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.52.1-r1 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.53.0 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.53.1 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.54.0 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.55.1 delete mode 100644 sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.52.1-r1.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.53.1.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.54.0.ebuild rename sdk_container/src/third_party/portage-stable/net-misc/curl/{curl-7.53.0.ebuild => curl-7.55.1.ebuild} (92%) delete mode 100644 sdk_container/src/third_party/portage-stable/net-misc/curl/files/curl-7.52.1-fix-openssl.patch create mode 100644 sdk_container/src/third_party/portage-stable/net-misc/curl/files/curl-7.55.1-fix-build.patch diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.52.1-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.52.1-r1 deleted file mode 100644 index 5b9f5d88dd..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.52.1-r1 +++ /dev/null @@ -1,15 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=ldap? ( net-nds/openldap[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssl? ( curl_ssl_axtls? ( net-libs/axtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_gnutls? ( net-libs/gnutls:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/nettle:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_libressl? ( dev-libs/libressl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_mbedtls? ( net-libs/mbedtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_openssl? ( dev-libs/openssl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_nss? ( dev-libs/nss:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_polarssl? ( net-libs/polarssl:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) ) http2? ( net-libs/nghttp2[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( net-dns/libidn2:0[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) adns? ( net-dns/c-ares:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) kerberos? ( >=virtual/krb5-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) metalink? ( >=media-libs/libmetalink-0.1.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) rtmp? ( media-video/rtmpdump[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssh? ( net-libs/libssh2[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] test? ( sys-apps/diffutils dev-lang/perl ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A Client that groks URLs -EAPI=6 -HOMEPAGE=https://curl.haxx.se/ -IUSE=adns http2 idn ipv6 kerberos ldap metalink rtmp samba ssh ssl static-libs test threads curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss +curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl elibc_Winnt abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~mips ppc ppc64 sparc x86 ~ppc-aix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris -LICENSE=MIT -RDEPEND=ldap? ( net-nds/openldap[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssl? ( curl_ssl_axtls? ( net-libs/axtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_gnutls? ( net-libs/gnutls:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/nettle:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_libressl? ( dev-libs/libressl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_mbedtls? ( net-libs/mbedtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_openssl? ( dev-libs/openssl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_nss? ( dev-libs/nss:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_polarssl? ( net-libs/polarssl:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) ) http2? ( net-libs/nghttp2[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( net-dns/libidn2:0[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) adns? ( net-dns/c-ares:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) kerberos? ( >=virtual/krb5-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) metalink? ( >=media-libs/libmetalink-0.1.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) rtmp? ( media-video/rtmpdump[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssh? ( net-libs/libssh2[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -REQUIRED_USE=curl_ssl_winssl? ( elibc_Winnt ) threads? ( !adns ) ssl? ( ^^ ( curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl ) ) -RESTRICT=test -SLOT=0 -SRC_URI=https://curl.haxx.se/download/curl-7.52.1.tar.bz2 -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 prefix df8265631f8bf5f5df387e9b987121f9 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=38a58c6ea893a25fbdc86e14213f3173 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.53.0 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.53.0 deleted file mode 100644 index 862d93e0ef..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.53.0 +++ /dev/null @@ -1,15 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=ldap? ( net-nds/openldap[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssl? ( curl_ssl_axtls? ( net-libs/axtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_gnutls? ( net-libs/gnutls:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/nettle:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_libressl? ( dev-libs/libressl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_mbedtls? ( net-libs/mbedtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_openssl? ( dev-libs/openssl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_nss? ( dev-libs/nss:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_polarssl? ( net-libs/polarssl:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) ) http2? ( net-libs/nghttp2[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( net-dns/libidn2:0[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) adns? ( net-dns/c-ares:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) kerberos? ( >=virtual/krb5-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) metalink? ( >=media-libs/libmetalink-0.1.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) rtmp? ( media-video/rtmpdump[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssh? ( net-libs/libssh2[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] test? ( sys-apps/diffutils dev-lang/perl ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A Client that groks URLs -EAPI=6 -HOMEPAGE=https://curl.haxx.se/ -IUSE=adns http2 idn ipv6 kerberos ldap metalink rtmp samba ssh ssl static-libs test threads curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss +curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl elibc_Winnt abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris -LICENSE=MIT -RDEPEND=ldap? ( net-nds/openldap[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssl? ( curl_ssl_axtls? ( net-libs/axtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_gnutls? ( net-libs/gnutls:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/nettle:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_libressl? ( dev-libs/libressl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_mbedtls? ( net-libs/mbedtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_openssl? ( dev-libs/openssl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_nss? ( dev-libs/nss:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_polarssl? ( net-libs/polarssl:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) ) http2? ( net-libs/nghttp2[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( net-dns/libidn2:0[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) adns? ( net-dns/c-ares:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) kerberos? ( >=virtual/krb5-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) metalink? ( >=media-libs/libmetalink-0.1.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) rtmp? ( media-video/rtmpdump[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssh? ( net-libs/libssh2[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -REQUIRED_USE=curl_ssl_winssl? ( elibc_Winnt ) threads? ( !adns ) ssl? ( ^^ ( curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl ) ) -RESTRICT=test -SLOT=0 -SRC_URI=https://curl.haxx.se/download/curl-7.53.0.tar.bz2 -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 prefix df8265631f8bf5f5df387e9b987121f9 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=c5c499648345022c3d70376351722250 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.53.1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.53.1 deleted file mode 100644 index cce99874a3..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.53.1 +++ /dev/null @@ -1,15 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=ldap? ( net-nds/openldap[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssl? ( curl_ssl_axtls? ( net-libs/axtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_gnutls? ( net-libs/gnutls:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/nettle:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_libressl? ( dev-libs/libressl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_mbedtls? ( net-libs/mbedtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_openssl? ( dev-libs/openssl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_nss? ( dev-libs/nss:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_polarssl? ( net-libs/polarssl:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) ) http2? ( net-libs/nghttp2[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( net-dns/libidn2:0[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) adns? ( net-dns/c-ares:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) kerberos? ( >=virtual/krb5-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) metalink? ( >=media-libs/libmetalink-0.1.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) rtmp? ( media-video/rtmpdump[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssh? ( net-libs/libssh2[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] test? ( sys-apps/diffutils dev-lang/perl ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A Client that groks URLs -EAPI=6 -HOMEPAGE=https://curl.haxx.se/ -IUSE=adns http2 idn ipv6 kerberos ldap metalink rtmp samba ssh ssl static-libs test threads curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss +curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl elibc_Winnt abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~x64-cygwin ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris -LICENSE=MIT -RDEPEND=ldap? ( net-nds/openldap[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssl? ( curl_ssl_axtls? ( net-libs/axtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_gnutls? ( net-libs/gnutls:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/nettle:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_libressl? ( dev-libs/libressl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_mbedtls? ( net-libs/mbedtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_openssl? ( dev-libs/openssl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_nss? ( dev-libs/nss:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_polarssl? ( net-libs/polarssl:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) ) http2? ( net-libs/nghttp2[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( net-dns/libidn2:0[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) adns? ( net-dns/c-ares:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) kerberos? ( >=virtual/krb5-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) metalink? ( >=media-libs/libmetalink-0.1.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) rtmp? ( media-video/rtmpdump[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssh? ( net-libs/libssh2[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -REQUIRED_USE=curl_ssl_winssl? ( elibc_Winnt ) threads? ( !adns ) ssl? ( ^^ ( curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl ) ) -RESTRICT=test -SLOT=0 -SRC_URI=https://curl.haxx.se/download/curl-7.53.1.tar.bz2 -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 prefix df8265631f8bf5f5df387e9b987121f9 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=51b2b5f3f4dca39c4370ccf2a0401572 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.54.0 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.54.0 deleted file mode 100644 index de82740dea..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.54.0 +++ /dev/null @@ -1,15 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=ldap? ( net-nds/openldap[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssl? ( curl_ssl_axtls? ( net-libs/axtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_gnutls? ( net-libs/gnutls:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/nettle:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_libressl? ( dev-libs/libressl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_mbedtls? ( net-libs/mbedtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_openssl? ( dev-libs/openssl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_nss? ( dev-libs/nss:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_polarssl? ( net-libs/polarssl:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) ) http2? ( net-libs/nghttp2[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( net-dns/libidn2:0[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) adns? ( net-dns/c-ares:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) kerberos? ( >=virtual/krb5-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) metalink? ( >=media-libs/libmetalink-0.1.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) rtmp? ( media-video/rtmpdump[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssh? ( net-libs/libssh2[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] test? ( sys-apps/diffutils dev-lang/perl ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A Client that groks URLs -EAPI=6 -HOMEPAGE=https://curl.haxx.se/ -IUSE=adns http2 idn ipv6 kerberos ldap metalink rtmp samba ssh ssl static-libs test threads curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss +curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl elibc_Winnt abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~x64-cygwin ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris -LICENSE=MIT -RDEPEND=ldap? ( net-nds/openldap[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssl? ( curl_ssl_axtls? ( net-libs/axtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_gnutls? ( net-libs/gnutls:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/nettle:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_libressl? ( dev-libs/libressl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_mbedtls? ( net-libs/mbedtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_openssl? ( dev-libs/openssl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_nss? ( dev-libs/nss:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_polarssl? ( net-libs/polarssl:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) ) http2? ( net-libs/nghttp2[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( net-dns/libidn2:0[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) adns? ( net-dns/c-ares:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) kerberos? ( >=virtual/krb5-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) metalink? ( >=media-libs/libmetalink-0.1.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) rtmp? ( media-video/rtmpdump[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssh? ( net-libs/libssh2[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -REQUIRED_USE=curl_ssl_winssl? ( elibc_Winnt ) threads? ( !adns ) ssl? ( ^^ ( curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl ) ) -RESTRICT=test -SLOT=0 -SRC_URI=https://curl.haxx.se/download/curl-7.54.0.tar.bz2 -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 prefix df8265631f8bf5f5df387e9b987121f9 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=51b2b5f3f4dca39c4370ccf2a0401572 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.55.1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.55.1 new file mode 100644 index 0000000000..d2ac45321d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-misc/curl-7.55.1 @@ -0,0 +1,15 @@ +DEFINED_PHASES=compile configure install prepare test +DEPEND=ldap? ( net-nds/openldap[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssl? ( curl_ssl_axtls? ( net-libs/axtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_gnutls? ( net-libs/gnutls:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/nettle:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_libressl? ( dev-libs/libressl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_mbedtls? ( net-libs/mbedtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_openssl? ( dev-libs/openssl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_nss? ( dev-libs/nss:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) ) http2? ( net-libs/nghttp2[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( net-dns/libidn2:0[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) adns? ( net-dns/c-ares:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) kerberos? ( >=virtual/krb5-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) metalink? ( >=media-libs/libmetalink-0.1.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) rtmp? ( media-video/rtmpdump[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssh? ( net-libs/libssh2[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] test? ( sys-apps/diffutils dev-lang/perl ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 +DESCRIPTION=A Client that groks URLs +EAPI=6 +HOMEPAGE=https://curl.haxx.se/ +IUSE=adns http2 idn ipv6 kerberos ldap metalink rtmp samba ssh ssl static-libs test threads curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss +curl_ssl_openssl curl_ssl_winssl elibc_Winnt abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~ppc-aix ~x64-cygwin ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +LICENSE=MIT +RDEPEND=ldap? ( net-nds/openldap[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssl? ( curl_ssl_axtls? ( net-libs/axtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_gnutls? ( net-libs/gnutls:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/nettle:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_libressl? ( dev-libs/libressl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_mbedtls? ( net-libs/mbedtls:0=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) curl_ssl_openssl? ( dev-libs/openssl:0=[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) curl_ssl_nss? ( dev-libs/nss:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] app-misc/ca-certificates ) ) http2? ( net-libs/nghttp2[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( net-dns/libidn2:0[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) adns? ( net-dns/c-ares:0[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) kerberos? ( >=virtual/krb5-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) metalink? ( >=media-libs/libmetalink-0.1.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) rtmp? ( media-video/rtmpdump[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) ssh? ( net-libs/libssh2[static-libs?,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) sys-libs/zlib[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) +REQUIRED_USE=curl_ssl_winssl? ( elibc_Winnt ) threads? ( !adns ) ssl? ( ^^ ( curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss curl_ssl_openssl curl_ssl_winssl ) ) +RESTRICT=test +SLOT=0 +SRC_URI=https://curl.haxx.se/download/curl-7.55.1.tar.bz2 +_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 prefix df8265631f8bf5f5df387e9b987121f9 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 +_md5_=456e5006c5740107ae797c6152d5edec diff --git a/sdk_container/src/third_party/portage-stable/net-misc/curl/Manifest b/sdk_container/src/third_party/portage-stable/net-misc/curl/Manifest index 32dd424e1e..016fa32dd9 100644 --- a/sdk_container/src/third_party/portage-stable/net-misc/curl/Manifest +++ b/sdk_container/src/third_party/portage-stable/net-misc/curl/Manifest @@ -1,15 +1 @@ -AUX curl-7.30.0-prefix.patch 880 SHA256 12204b7a522edbb133a3143b40b25805654d937e27ae66ba5d566a99afaa809a SHA512 c7cd13b9ccbd12ed01ea121ffece9c23b898a5b34698bae59ae1dd23b1cf2445180b84d80c4a640981f16dba5018df944f405dd5c660addab54ca21e0e673b7f WHIRLPOOL 6b60261dee31643b5db41c449ae6db14666f696470180c543ea39c3a11d7d6323057409be18a0a48a3335226ed5f78cee9fc2948dce9644e52481423147b49e5 -AUX curl-7.52.1-fix-openssl.patch 1379 SHA256 4a2c6f7925781d43a799927242bff018b09b6d0dd6d0d0ce1cf83f69027f44c5 SHA512 8b73f36d7a99b76c4a4d91916a2709432e26648db230931d78cda701c076e91130fa1bd338f98c61a76910ac53a4121ab7de600f2a7b6f138c1b6dedab7288f6 WHIRLPOOL afbdbb9cb28f2086b7f73d5ccd2ce3555e868c437c09b29a36d9f8f58df08ea74b64fecf9c8bf8437f794190f6646b6e5347e5e06f4ff4d454cce43d0e9df960 -AUX curl-fix-gnutls-nettle.patch 1186 SHA256 d7a0f1ae6dcd50adddc9d7cd6dfcdb6b5ba648c8b7f9f067a8bf56f4136f3679 SHA512 b88d4d71a1d55626aedea620e94a5b6064141c6ff0d8a64c784705d44d4a00dc789dd0a55a56320ca4c9f2b9914e72285447c9310bb4563b45d7f3430b18a0fa WHIRLPOOL 0206a8daf30f4c112c394555e455796cde7e71f632cc2b7f2612ef2cffb900d03001e5845d3683c34c6ae3aef1c1d8c4f5af30eac45d0ab621c9c0adb19397da -AUX curl-respect-cflags-3.patch 406 SHA256 b87bf2c491b057bc5af5258fffcf72d7c5e86b03218f497f097eeca845c0bc0d SHA512 3219e4e67d534e35012909243fc8d69d58989462db44dd507c502e7aaa299f1d9a01392e2c83797cc2bdb53d503470c5d6e7bf94572a6ccc6e5eafcc0466bc54 WHIRLPOOL 5d61ec7f36376bd9712e0fc7984006462ab27a7e2003dd92a8d9e78e97a2e620a5cbf6a62855ebff45b2fbf9f0bca821ffdf6ce8ff81cf2a047af9e168fb61bd -DIST curl-7.52.1.tar.bz2 2600476 SHA256 d16185a767cb2c1ba3d5b9096ec54e5ec198b213f45864a38b3bda4bbf87389b SHA512 cf36563c77d096f2c6084354ed6d45ccca7c557828ceab21204e4e8be0d4f0d287839c8cfac906174b86d51a1ee816c2769fc78ef88f039c9645bd2c27982a75 WHIRLPOOL cb0bb74de3fb650e627cf66e23b8126837ddd6d3006934aa1b1a8597182f992b29e80e0c76aef1234f62cfa9688c5b10b781f6b2bc7e5127f8bc5a67d57665c1 -DIST curl-7.53.0.tar.bz2 2612491 SHA256 b2345a8bef87b4c229dedf637cb203b5e21db05e20277c8e1094f0d4da180801 SHA512 1fc3264dd52f6f16463de158b4ab4637ba698b1fdbf01b7a3c05ae80b06a5480323b748b31f771c969a5f7062aa9e41a1aad8677be220a411d3cbad24581baf2 WHIRLPOOL 44a7b1d60b097856bc002d7aa1a89d93d5616b33a59a41703dc3dbe369733a63afcfd093b4374e263d05b60bd38e09f955b1921f12798cff3d400311fa4c7bdb -DIST curl-7.53.1.tar.bz2 2609559 SHA256 1c7207c06d75e9136a944a2e0528337ce76f15b9ec9ae4bb30d703b59bf530e8 SHA512 c668494d0e795f34b00505ca68ab41fbb475a1bccbcac1d0bbacbbbafa40a994472e100be18a0c10f8fa21b5b9bd3f4e66c1e68ff5423b13b82d829cbaefcd52 WHIRLPOOL bf5f0a795a2612284e84fa7917351b2d41370bda0efc84f2e21456f7110f1f1f6cbf52b0956b0ba586cdcafbbaad5e47bfea82bf37cde39434a18ee5d0dbfdaf -DIST curl-7.54.0.tar.bz2 2602286 SHA256 f50ebaf43c507fa7cc32be4b8108fa8bbd0f5022e90794388f3c7694a302ff06 SHA512 2ed8d32a6803ecddcb587495107d9ebce724d34dae5cad1f8be241e93340e913bb8ce9b69259cb84b3d53c2e672e142c3aad471c4a251bd1d42fc06eb9d8f650 WHIRLPOOL 37dc3e01e0466cdfb7ed061bd791b816112ca9af6ed88dfb89e47e814111e5968d980d2a8e6542d1a87882d540d04bac9d4f4ed6f4f7c5861e3f05ee623752e7 -EBUILD curl-7.52.1-r1.ebuild 7532 SHA256 332b9012cb5bddd49b78fce5cdc25e404eb3ec3f2c7cda1da81246d1dd427db5 SHA512 3e2271de0635e53b77e8b1dfbbbdd609e3dcf467b9bb516fce02ca2a6169644bb6c3674de38f0fc6e91565684d7385dec150ed662a6f96b0cf24d354ef636997 WHIRLPOOL 4f24b1d8376e6774b4ef3323d7ea008fb8d44636953dcbeb6e915240e1872311ea1e75720b2c6e0d53b6f2cbae1bd04f702ff0a0dbbc9c533c7634a17d6c610e -EBUILD curl-7.53.0.ebuild 7209 SHA256 df7c56401ce7762a51916582aa6b85b35ab2e5cadc1992f0bf8c1993a19a49b0 SHA512 ad61f15a721a2116ee3a51540dd1cbc3f81aa3c7d86a746f451c16d98a7b18c7ea6a7d0b60ac60d8f50c880c7f330292d0f5ed66adb7da2d1a1e80f66ed5984d WHIRLPOOL 966ecd7b97afd4fe49a2264f22339ade81023ab40d7da1e65c5fd76ea25057e2447f446bac7daa0bb3b514ac65212cb0407e88fc19effde932bba8c33b6a7c3b -EBUILD curl-7.53.1.ebuild 7234 SHA256 7db49de230067968e151bfaa048a02cb4071aea4c21fb07fbec63aa2bd3df3dc SHA512 8365cc126cfe0c42f18f74159eecad696806870578607ffacea26225a64c23549dad358800c8e49fce36a296c56c278b0fee68200a8c9916cc6e586f871dfbd8 WHIRLPOOL b83683535436c2e4c1d992066de104c982abb11a5f41c0053e3bca3c1cd536942ca622c555325b2b31dc1c32494fb885d53c81ce73836c91fab1367b3e060be3 -EBUILD curl-7.54.0.ebuild 7234 SHA256 7db49de230067968e151bfaa048a02cb4071aea4c21fb07fbec63aa2bd3df3dc SHA512 8365cc126cfe0c42f18f74159eecad696806870578607ffacea26225a64c23549dad358800c8e49fce36a296c56c278b0fee68200a8c9916cc6e586f871dfbd8 WHIRLPOOL b83683535436c2e4c1d992066de104c982abb11a5f41c0053e3bca3c1cd536942ca622c555325b2b31dc1c32494fb885d53c81ce73836c91fab1367b3e060be3 -MISC ChangeLog 16015 SHA256 d7818e6e555538c789a1e06565284ef0aa229a2eb019fa2f4b667f961c919853 SHA512 76b6eb67198e504b72b2367929edcbb90cf252c0b26cf0526a3145a99d3a6004aed57761770675558a9f1445ee796d80cab12d647aea2676b21eb5acae8a9f97 WHIRLPOOL ac33e39317b19015bc478210a9ceaac3d8fd6497bc6217cd3c11b60e442e7f58e693690b8d22498b0862d703174ce72487f879639a7298459945cb680ba1a566 -MISC ChangeLog-2015 61885 SHA256 8589ecee2da6b3ef8823e053b3522234733a2273e7a6b18f0b47aaa9e678a1cd SHA512 d44de33943e2a8ed1eabc0bece3203f1794ffcc4d0a19898b67f82c2dfb54906ea3c09053421e13610218619577fd2b67e726a9cc5895e162a1ebf0a58038124 WHIRLPOOL 73c5089f0bdb1ca427591584ee4253e40418ed8a967f5e9f60775ec4d652868925c599f36f1708d39f8663fb734b74a301e4ea82050805639ed5a45cf45e6fd7 -MISC metadata.xml 837 SHA256 950e71139d4fc99ff18c0ec34b2ced72e933c6e311f0bbdb599fbc944db509e2 SHA512 27e75529e492f897705e249135c7ed661de04eef216fe62669fce544b8c318e44c5435b884fb8f206433293be894bbe1b6214b6cf1a394c9cb907dad48db00a0 WHIRLPOOL 93920381ae926c74157e2a0486cee5630789ce66b1aec25ead41a45f911ac7b2f87ad604f249c4ef03f2b7f19dfe567628140d34e753ea0fca10d2a3af3151e7 +DIST curl-7.55.1.tar.bz2 2786830 SHA256 e5b1a92ed3b0c11f149886458fa063419500819f1610c020d62f25b8e4b16cfb SHA512 bfeb39e94b8378519b2efba0a476636b80dbee3434104b98464ee81ce3871eb134e065f52abe8bedb69681b43576cb30655c8be0be6115386859d0cb426d745b WHIRLPOOL 287f6f4f5464a780c338755e4e9870381937768c9f4c9545436856ea690ae6bf4d3f886dd816cf080d2ee84e2a3fbf1a0a5a78e5fbc9d9d18bde428458819a8e diff --git a/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.52.1-r1.ebuild b/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.52.1-r1.ebuild deleted file mode 100644 index a11b16d355..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.52.1-r1.ebuild +++ /dev/null @@ -1,251 +0,0 @@ -# Copyright 1999-2017 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 - -EAPI="6" - -inherit autotools eutils prefix multilib-minimal - -DESCRIPTION="A Client that groks URLs" -HOMEPAGE="https://curl.haxx.se/" -SRC_URI="https://curl.haxx.se/download/${P}.tar.bz2" - -LICENSE="MIT" -SLOT="0" -KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~mips ppc ppc64 sparc x86 ~ppc-aix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" -#KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" -IUSE="adns http2 idn ipv6 kerberos ldap metalink rtmp samba ssh ssl static-libs test threads" -IUSE+=" curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss +curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl" -IUSE+=" elibc_Winnt" - -#lead to lots of false negatives, bug #285669 -RESTRICT="test" - -RDEPEND="ldap? ( net-nds/openldap[${MULTILIB_USEDEP}] ) - ssl? ( - curl_ssl_axtls? ( - net-libs/axtls:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_gnutls? ( - net-libs/gnutls:0=[static-libs?,${MULTILIB_USEDEP}] - dev-libs/nettle:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_libressl? ( - dev-libs/libressl:0=[static-libs?,${MULTILIB_USEDEP}] - ) - curl_ssl_mbedtls? ( - net-libs/mbedtls:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_openssl? ( - dev-libs/openssl:0=[static-libs?,${MULTILIB_USEDEP}] - ) - curl_ssl_nss? ( - dev-libs/nss:0[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_polarssl? ( - net-libs/polarssl:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - ) - http2? ( net-libs/nghttp2[${MULTILIB_USEDEP}] ) - idn? ( net-dns/libidn2:0[static-libs?,${MULTILIB_USEDEP}] ) - adns? ( net-dns/c-ares:0[${MULTILIB_USEDEP}] ) - kerberos? ( >=virtual/krb5-0-r1[${MULTILIB_USEDEP}] ) - metalink? ( >=media-libs/libmetalink-0.1.1[${MULTILIB_USEDEP}] ) - rtmp? ( media-video/rtmpdump[${MULTILIB_USEDEP}] ) - ssh? ( net-libs/libssh2[static-libs?,${MULTILIB_USEDEP}] ) - sys-libs/zlib[${MULTILIB_USEDEP}] - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" - -# Do we need to enforce the same ssl backend for curl and rtmpdump? Bug #423303 -# rtmp? ( -# media-video/rtmpdump -# curl_ssl_gnutls? ( media-video/rtmpdump[gnutls] ) -# curl_ssl_openssl? ( media-video/rtmpdump[-gnutls,ssl] ) -# ) - -# ssl providers to be added: -# fbopenssl $(use_with spnego) - -DEPEND="${RDEPEND} - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - test? ( - sys-apps/diffutils - dev-lang/perl - )" - -# c-ares must be disabled for threads -# only one ssl provider can be enabled -REQUIRED_USE=" - curl_ssl_winssl? ( elibc_Winnt ) - threads? ( !adns ) - ssl? ( - ^^ ( - curl_ssl_axtls - curl_ssl_gnutls - curl_ssl_libressl - curl_ssl_mbedtls - curl_ssl_nss - curl_ssl_openssl - curl_ssl_polarssl - curl_ssl_winssl - ) - )" - -DOCS=( CHANGES README docs/FEATURES docs/INTERNALS.md \ - docs/MANUAL docs/FAQ docs/BUGS docs/CONTRIBUTE.md ) - -MULTILIB_WRAPPED_HEADERS=( - /usr/include/curl/curlbuild.h -) - -MULTILIB_CHOST_TOOLS=( - /usr/bin/curl-config -) - -src_prepare() { - eapply "${FILESDIR}"/${PN}-7.30.0-prefix.patch - eapply "${FILESDIR}"/${PN}-respect-cflags-3.patch - eapply "${FILESDIR}"/${PN}-fix-gnutls-nettle.patch - eapply "${FILESDIR}"/${P}-fix-openssl.patch - - sed -i '/LD_LIBRARY_PATH=/d' configure.ac || die #382241 - - eapply_user - eprefixify curl-config.in - eautoreconf -} - -multilib_src_configure() { - # We make use of the fact that later flags override earlier ones - # So start with all ssl providers off until proven otherwise - local myconf=() - myconf+=( --without-axtls --without-gnutls --without-mbedtls --without-nss --without-polarssl --without-ssl --without-winssl ) - myconf+=( --without-ca-fallback --with-ca-bundle="${EPREFIX}"/etc/ssl/certs/ca-certificates.crt ) - if use ssl ; then - if use curl_ssl_axtls; then - einfo "SSL provided by axtls" - myconf+=( --with-axtls ) - elif use curl_ssl_gnutls; then - einfo "SSL provided by gnutls" - myconf+=( --with-gnutls --with-nettle ) - elif use curl_ssl_libressl; then - einfo "SSL provided by LibreSSL" - myconf+=( --with-ssl --with-ca-path="${EPREFIX}"/etc/ssl/certs ) - elif use curl_ssl_mbedtls; then - einfo "SSL provided by mbedtls" - myconf+=( --with-mbedtls ) - elif use curl_ssl_nss; then - einfo "SSL provided by nss" - myconf+=( --with-nss ) - elif use curl_ssl_polarssl; then - einfo "SSL provided by polarssl" - myconf+=( --with-polarssl ) - elif use curl_ssl_openssl; then - einfo "SSL provided by openssl" - myconf+=( --with-ssl --with-ca-path="${EPREFIX}"/etc/ssl/certs ) - elif use curl_ssl_winssl; then - einfo "SSL provided by Windows" - myconf+=( --with-winssl ) - else - eerror "We can't be here because of REQUIRED_USE." - fi - else - einfo "SSL disabled" - fi - - # These configuration options are organized alphabetically - # within each category. This should make it easier if we - # ever decide to make any of them contingent on USE flags: - # 1) protocols first. To see them all do - # 'grep SUPPORT_PROTOCOLS configure.ac' - # 2) --enable/disable options second. - # 'grep -- --enable configure | grep Check | awk '{ print $4 }' | sort - # 3) --with/without options third. - # grep -- --with configure | grep Check | awk '{ print $4 }' | sort - ECONF_SOURCE="${S}" \ - econf \ - --enable-crypto-auth \ - --enable-dict \ - --enable-file \ - --enable-ftp \ - --enable-gopher \ - --enable-http \ - --enable-imap \ - $(use_enable ldap) \ - $(use_enable ldap ldaps) \ - --disable-ntlm-wb \ - --enable-pop3 \ - --enable-rt \ - --enable-rtsp \ - $(use_enable samba smb) \ - $(use_with ssh libssh2) \ - --enable-smtp \ - --enable-telnet \ - --enable-tftp \ - --enable-tls-srp \ - $(use_enable adns ares) \ - --enable-cookies \ - --enable-hidden-symbols \ - $(use_enable ipv6) \ - --enable-largefile \ - --without-libpsl \ - --enable-manual \ - --enable-proxy \ - --disable-soname-bump \ - --disable-sspi \ - $(use_enable static-libs static) \ - $(use_enable threads threaded-resolver) \ - --disable-versioned-symbols \ - --without-cyassl \ - --without-darwinssl \ - $(use_with idn libidn2) \ - $(use_with kerberos gssapi "${EPREFIX}"/usr) \ - $(use_with metalink libmetalink) \ - $(use_with http2 nghttp2) \ - $(use_with rtmp librtmp) \ - --without-spnego \ - --without-winidn \ - --with-zlib \ - "${myconf[@]}" - - if ! multilib_is_native_abi; then - # avoid building the client - sed -i -e '/SUBDIRS/s:src::' Makefile || die - sed -i -e '/SUBDIRS/s:scripts::' Makefile || die - fi - - # Fix up the pkg-config file to be more robust. - # https://github.com/curl/curl/issues/864 - local priv=() libs=() - # We always enable zlib. - libs+=( "-lz" ) - priv+=( "zlib" ) - if use http2; then - libs+=( "-lnghttp2" ) - priv+=( "libnghttp2" ) - fi - if use curl_ssl_openssl; then - libs+=( "-lssl" "-lcrypto" ) - priv+=( "openssl" ) - fi - grep -q Requires.private libcurl.pc && die "need to update ebuild" - libs=$(printf '|%s' "${libs[@]}") - sed -i -r \ - -e "/^Libs.private/s:(${libs#|})( |$)::g" \ - libcurl.pc || die - echo "Requires.private: ${priv[*]}" >> libcurl.pc -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - rm -rf "${ED}"/etc/ -} diff --git a/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.53.1.ebuild b/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.53.1.ebuild deleted file mode 100644 index 93be06a9c6..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.53.1.ebuild +++ /dev/null @@ -1,250 +0,0 @@ -# Copyright 1999-2017 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 - -EAPI="6" - -inherit autotools eutils prefix multilib-minimal - -DESCRIPTION="A Client that groks URLs" -HOMEPAGE="https://curl.haxx.se/" -SRC_URI="https://curl.haxx.se/download/${P}.tar.bz2" - -LICENSE="MIT" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~x64-cygwin ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" -IUSE="adns http2 idn ipv6 kerberos ldap metalink rtmp samba ssh ssl static-libs test threads" -IUSE+=" curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss +curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl" -IUSE+=" elibc_Winnt" - -#lead to lots of false negatives, bug #285669 -RESTRICT="test" - -RDEPEND="ldap? ( net-nds/openldap[${MULTILIB_USEDEP}] ) - ssl? ( - curl_ssl_axtls? ( - net-libs/axtls:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_gnutls? ( - net-libs/gnutls:0=[static-libs?,${MULTILIB_USEDEP}] - dev-libs/nettle:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_libressl? ( - dev-libs/libressl:0=[static-libs?,${MULTILIB_USEDEP}] - ) - curl_ssl_mbedtls? ( - net-libs/mbedtls:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_openssl? ( - dev-libs/openssl:0=[static-libs?,${MULTILIB_USEDEP}] - ) - curl_ssl_nss? ( - dev-libs/nss:0[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_polarssl? ( - net-libs/polarssl:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - ) - http2? ( net-libs/nghttp2[${MULTILIB_USEDEP}] ) - idn? ( net-dns/libidn2:0[static-libs?,${MULTILIB_USEDEP}] ) - adns? ( net-dns/c-ares:0[${MULTILIB_USEDEP}] ) - kerberos? ( >=virtual/krb5-0-r1[${MULTILIB_USEDEP}] ) - metalink? ( >=media-libs/libmetalink-0.1.1[${MULTILIB_USEDEP}] ) - rtmp? ( media-video/rtmpdump[${MULTILIB_USEDEP}] ) - ssh? ( net-libs/libssh2[static-libs?,${MULTILIB_USEDEP}] ) - sys-libs/zlib[${MULTILIB_USEDEP}] - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" - -# Do we need to enforce the same ssl backend for curl and rtmpdump? Bug #423303 -# rtmp? ( -# media-video/rtmpdump -# curl_ssl_gnutls? ( media-video/rtmpdump[gnutls] ) -# curl_ssl_openssl? ( media-video/rtmpdump[-gnutls,ssl] ) -# ) - -# ssl providers to be added: -# fbopenssl $(use_with spnego) - -DEPEND="${RDEPEND} - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - test? ( - sys-apps/diffutils - dev-lang/perl - )" - -# c-ares must be disabled for threads -# only one ssl provider can be enabled -REQUIRED_USE=" - curl_ssl_winssl? ( elibc_Winnt ) - threads? ( !adns ) - ssl? ( - ^^ ( - curl_ssl_axtls - curl_ssl_gnutls - curl_ssl_libressl - curl_ssl_mbedtls - curl_ssl_nss - curl_ssl_openssl - curl_ssl_polarssl - curl_ssl_winssl - ) - )" - -DOCS=( CHANGES README docs/FEATURES docs/INTERNALS.md \ - docs/MANUAL docs/FAQ docs/BUGS docs/CONTRIBUTE.md ) - -MULTILIB_WRAPPED_HEADERS=( - /usr/include/curl/curlbuild.h -) - -MULTILIB_CHOST_TOOLS=( - /usr/bin/curl-config -) - -src_prepare() { - eapply "${FILESDIR}"/${PN}-7.30.0-prefix.patch - eapply "${FILESDIR}"/${PN}-respect-cflags-3.patch - eapply "${FILESDIR}"/${PN}-fix-gnutls-nettle.patch - - sed -i '/LD_LIBRARY_PATH=/d' configure.ac || die #382241 - - eapply_user - eprefixify curl-config.in - eautoreconf -} - -multilib_src_configure() { - # We make use of the fact that later flags override earlier ones - # So start with all ssl providers off until proven otherwise - local myconf=() - myconf+=( --without-axtls --without-gnutls --without-mbedtls --without-nss --without-polarssl --without-ssl --without-winssl ) - myconf+=( --without-ca-fallback --with-ca-bundle="${EPREFIX}"/etc/ssl/certs/ca-certificates.crt ) - if use ssl ; then - if use curl_ssl_axtls; then - einfo "SSL provided by axtls" - myconf+=( --with-axtls ) - elif use curl_ssl_gnutls; then - einfo "SSL provided by gnutls" - myconf+=( --with-gnutls --with-nettle ) - elif use curl_ssl_libressl; then - einfo "SSL provided by LibreSSL" - myconf+=( --with-ssl --with-ca-path="${EPREFIX}"/etc/ssl/certs ) - elif use curl_ssl_mbedtls; then - einfo "SSL provided by mbedtls" - myconf+=( --with-mbedtls ) - elif use curl_ssl_nss; then - einfo "SSL provided by nss" - myconf+=( --with-nss ) - elif use curl_ssl_polarssl; then - einfo "SSL provided by polarssl" - myconf+=( --with-polarssl ) - elif use curl_ssl_openssl; then - einfo "SSL provided by openssl" - myconf+=( --with-ssl --with-ca-path="${EPREFIX}"/etc/ssl/certs ) - elif use curl_ssl_winssl; then - einfo "SSL provided by Windows" - myconf+=( --with-winssl ) - else - eerror "We can't be here because of REQUIRED_USE." - fi - else - einfo "SSL disabled" - fi - - # These configuration options are organized alphabetically - # within each category. This should make it easier if we - # ever decide to make any of them contingent on USE flags: - # 1) protocols first. To see them all do - # 'grep SUPPORT_PROTOCOLS configure.ac' - # 2) --enable/disable options second. - # 'grep -- --enable configure | grep Check | awk '{ print $4 }' | sort - # 3) --with/without options third. - # grep -- --with configure | grep Check | awk '{ print $4 }' | sort - ECONF_SOURCE="${S}" \ - econf \ - --enable-crypto-auth \ - --enable-dict \ - --enable-file \ - --enable-ftp \ - --enable-gopher \ - --enable-http \ - --enable-imap \ - $(use_enable ldap) \ - $(use_enable ldap ldaps) \ - --disable-ntlm-wb \ - --enable-pop3 \ - --enable-rt \ - --enable-rtsp \ - $(use_enable samba smb) \ - $(use_with ssh libssh2) \ - --enable-smtp \ - --enable-telnet \ - --enable-tftp \ - --enable-tls-srp \ - $(use_enable adns ares) \ - --enable-cookies \ - --enable-hidden-symbols \ - $(use_enable ipv6) \ - --enable-largefile \ - --without-libpsl \ - --enable-manual \ - --enable-proxy \ - --disable-soname-bump \ - --disable-sspi \ - $(use_enable static-libs static) \ - $(use_enable threads threaded-resolver) \ - $(use_enable threads pthreads) \ - --disable-versioned-symbols \ - --without-cyassl \ - --without-darwinssl \ - $(use_with idn libidn2) \ - $(use_with kerberos gssapi "${EPREFIX}"/usr) \ - $(use_with metalink libmetalink) \ - $(use_with http2 nghttp2) \ - $(use_with rtmp librtmp) \ - --without-spnego \ - --without-winidn \ - --with-zlib \ - "${myconf[@]}" - - if ! multilib_is_native_abi; then - # avoid building the client - sed -i -e '/SUBDIRS/s:src::' Makefile || die - sed -i -e '/SUBDIRS/s:scripts::' Makefile || die - fi - - # Fix up the pkg-config file to be more robust. - # https://github.com/curl/curl/issues/864 - local priv=() libs=() - # We always enable zlib. - libs+=( "-lz" ) - priv+=( "zlib" ) - if use http2; then - libs+=( "-lnghttp2" ) - priv+=( "libnghttp2" ) - fi - if use curl_ssl_openssl; then - libs+=( "-lssl" "-lcrypto" ) - priv+=( "openssl" ) - fi - grep -q Requires.private libcurl.pc && die "need to update ebuild" - libs=$(printf '|%s' "${libs[@]}") - sed -i -r \ - -e "/^Libs.private/s:(${libs#|})( |$)::g" \ - libcurl.pc || die - echo "Requires.private: ${priv[*]}" >> libcurl.pc -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - rm -rf "${ED}"/etc/ -} diff --git a/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.54.0.ebuild b/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.54.0.ebuild deleted file mode 100644 index 93be06a9c6..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.54.0.ebuild +++ /dev/null @@ -1,250 +0,0 @@ -# Copyright 1999-2017 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 - -EAPI="6" - -inherit autotools eutils prefix multilib-minimal - -DESCRIPTION="A Client that groks URLs" -HOMEPAGE="https://curl.haxx.se/" -SRC_URI="https://curl.haxx.se/download/${P}.tar.bz2" - -LICENSE="MIT" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~x64-cygwin ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" -IUSE="adns http2 idn ipv6 kerberos ldap metalink rtmp samba ssh ssl static-libs test threads" -IUSE+=" curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss +curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl" -IUSE+=" elibc_Winnt" - -#lead to lots of false negatives, bug #285669 -RESTRICT="test" - -RDEPEND="ldap? ( net-nds/openldap[${MULTILIB_USEDEP}] ) - ssl? ( - curl_ssl_axtls? ( - net-libs/axtls:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_gnutls? ( - net-libs/gnutls:0=[static-libs?,${MULTILIB_USEDEP}] - dev-libs/nettle:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_libressl? ( - dev-libs/libressl:0=[static-libs?,${MULTILIB_USEDEP}] - ) - curl_ssl_mbedtls? ( - net-libs/mbedtls:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_openssl? ( - dev-libs/openssl:0=[static-libs?,${MULTILIB_USEDEP}] - ) - curl_ssl_nss? ( - dev-libs/nss:0[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - curl_ssl_polarssl? ( - net-libs/polarssl:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) - ) - http2? ( net-libs/nghttp2[${MULTILIB_USEDEP}] ) - idn? ( net-dns/libidn2:0[static-libs?,${MULTILIB_USEDEP}] ) - adns? ( net-dns/c-ares:0[${MULTILIB_USEDEP}] ) - kerberos? ( >=virtual/krb5-0-r1[${MULTILIB_USEDEP}] ) - metalink? ( >=media-libs/libmetalink-0.1.1[${MULTILIB_USEDEP}] ) - rtmp? ( media-video/rtmpdump[${MULTILIB_USEDEP}] ) - ssh? ( net-libs/libssh2[static-libs?,${MULTILIB_USEDEP}] ) - sys-libs/zlib[${MULTILIB_USEDEP}] - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508-r13 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" - -# Do we need to enforce the same ssl backend for curl and rtmpdump? Bug #423303 -# rtmp? ( -# media-video/rtmpdump -# curl_ssl_gnutls? ( media-video/rtmpdump[gnutls] ) -# curl_ssl_openssl? ( media-video/rtmpdump[-gnutls,ssl] ) -# ) - -# ssl providers to be added: -# fbopenssl $(use_with spnego) - -DEPEND="${RDEPEND} - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - test? ( - sys-apps/diffutils - dev-lang/perl - )" - -# c-ares must be disabled for threads -# only one ssl provider can be enabled -REQUIRED_USE=" - curl_ssl_winssl? ( elibc_Winnt ) - threads? ( !adns ) - ssl? ( - ^^ ( - curl_ssl_axtls - curl_ssl_gnutls - curl_ssl_libressl - curl_ssl_mbedtls - curl_ssl_nss - curl_ssl_openssl - curl_ssl_polarssl - curl_ssl_winssl - ) - )" - -DOCS=( CHANGES README docs/FEATURES docs/INTERNALS.md \ - docs/MANUAL docs/FAQ docs/BUGS docs/CONTRIBUTE.md ) - -MULTILIB_WRAPPED_HEADERS=( - /usr/include/curl/curlbuild.h -) - -MULTILIB_CHOST_TOOLS=( - /usr/bin/curl-config -) - -src_prepare() { - eapply "${FILESDIR}"/${PN}-7.30.0-prefix.patch - eapply "${FILESDIR}"/${PN}-respect-cflags-3.patch - eapply "${FILESDIR}"/${PN}-fix-gnutls-nettle.patch - - sed -i '/LD_LIBRARY_PATH=/d' configure.ac || die #382241 - - eapply_user - eprefixify curl-config.in - eautoreconf -} - -multilib_src_configure() { - # We make use of the fact that later flags override earlier ones - # So start with all ssl providers off until proven otherwise - local myconf=() - myconf+=( --without-axtls --without-gnutls --without-mbedtls --without-nss --without-polarssl --without-ssl --without-winssl ) - myconf+=( --without-ca-fallback --with-ca-bundle="${EPREFIX}"/etc/ssl/certs/ca-certificates.crt ) - if use ssl ; then - if use curl_ssl_axtls; then - einfo "SSL provided by axtls" - myconf+=( --with-axtls ) - elif use curl_ssl_gnutls; then - einfo "SSL provided by gnutls" - myconf+=( --with-gnutls --with-nettle ) - elif use curl_ssl_libressl; then - einfo "SSL provided by LibreSSL" - myconf+=( --with-ssl --with-ca-path="${EPREFIX}"/etc/ssl/certs ) - elif use curl_ssl_mbedtls; then - einfo "SSL provided by mbedtls" - myconf+=( --with-mbedtls ) - elif use curl_ssl_nss; then - einfo "SSL provided by nss" - myconf+=( --with-nss ) - elif use curl_ssl_polarssl; then - einfo "SSL provided by polarssl" - myconf+=( --with-polarssl ) - elif use curl_ssl_openssl; then - einfo "SSL provided by openssl" - myconf+=( --with-ssl --with-ca-path="${EPREFIX}"/etc/ssl/certs ) - elif use curl_ssl_winssl; then - einfo "SSL provided by Windows" - myconf+=( --with-winssl ) - else - eerror "We can't be here because of REQUIRED_USE." - fi - else - einfo "SSL disabled" - fi - - # These configuration options are organized alphabetically - # within each category. This should make it easier if we - # ever decide to make any of them contingent on USE flags: - # 1) protocols first. To see them all do - # 'grep SUPPORT_PROTOCOLS configure.ac' - # 2) --enable/disable options second. - # 'grep -- --enable configure | grep Check | awk '{ print $4 }' | sort - # 3) --with/without options third. - # grep -- --with configure | grep Check | awk '{ print $4 }' | sort - ECONF_SOURCE="${S}" \ - econf \ - --enable-crypto-auth \ - --enable-dict \ - --enable-file \ - --enable-ftp \ - --enable-gopher \ - --enable-http \ - --enable-imap \ - $(use_enable ldap) \ - $(use_enable ldap ldaps) \ - --disable-ntlm-wb \ - --enable-pop3 \ - --enable-rt \ - --enable-rtsp \ - $(use_enable samba smb) \ - $(use_with ssh libssh2) \ - --enable-smtp \ - --enable-telnet \ - --enable-tftp \ - --enable-tls-srp \ - $(use_enable adns ares) \ - --enable-cookies \ - --enable-hidden-symbols \ - $(use_enable ipv6) \ - --enable-largefile \ - --without-libpsl \ - --enable-manual \ - --enable-proxy \ - --disable-soname-bump \ - --disable-sspi \ - $(use_enable static-libs static) \ - $(use_enable threads threaded-resolver) \ - $(use_enable threads pthreads) \ - --disable-versioned-symbols \ - --without-cyassl \ - --without-darwinssl \ - $(use_with idn libidn2) \ - $(use_with kerberos gssapi "${EPREFIX}"/usr) \ - $(use_with metalink libmetalink) \ - $(use_with http2 nghttp2) \ - $(use_with rtmp librtmp) \ - --without-spnego \ - --without-winidn \ - --with-zlib \ - "${myconf[@]}" - - if ! multilib_is_native_abi; then - # avoid building the client - sed -i -e '/SUBDIRS/s:src::' Makefile || die - sed -i -e '/SUBDIRS/s:scripts::' Makefile || die - fi - - # Fix up the pkg-config file to be more robust. - # https://github.com/curl/curl/issues/864 - local priv=() libs=() - # We always enable zlib. - libs+=( "-lz" ) - priv+=( "zlib" ) - if use http2; then - libs+=( "-lnghttp2" ) - priv+=( "libnghttp2" ) - fi - if use curl_ssl_openssl; then - libs+=( "-lssl" "-lcrypto" ) - priv+=( "openssl" ) - fi - grep -q Requires.private libcurl.pc && die "need to update ebuild" - libs=$(printf '|%s' "${libs[@]}") - sed -i -r \ - -e "/^Libs.private/s:(${libs#|})( |$)::g" \ - libcurl.pc || die - echo "Requires.private: ${priv[*]}" >> libcurl.pc -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - rm -rf "${ED}"/etc/ -} diff --git a/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.53.0.ebuild b/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.55.1.ebuild similarity index 92% rename from sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.53.0.ebuild rename to sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.55.1.ebuild index 490d6b4cca..83451ec25b 100644 --- a/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.53.0.ebuild +++ b/sdk_container/src/third_party/portage-stable/net-misc/curl/curl-7.55.1.ebuild @@ -11,9 +11,9 @@ SRC_URI="https://curl.haxx.se/download/${P}.tar.bz2" LICENSE="MIT" SLOT="0" -KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~ppc-aix ~x64-cygwin ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" IUSE="adns http2 idn ipv6 kerberos ldap metalink rtmp samba ssh ssl static-libs test threads" -IUSE+=" curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss +curl_ssl_openssl curl_ssl_polarssl curl_ssl_winssl" +IUSE+=" curl_ssl_axtls curl_ssl_gnutls curl_ssl_libressl curl_ssl_mbedtls curl_ssl_nss +curl_ssl_openssl curl_ssl_winssl" IUSE+=" elibc_Winnt" #lead to lots of false negatives, bug #285669 @@ -44,10 +44,6 @@ RDEPEND="ldap? ( net-nds/openldap[${MULTILIB_USEDEP}] ) dev-libs/nss:0[${MULTILIB_USEDEP}] app-misc/ca-certificates ) - curl_ssl_polarssl? ( - net-libs/polarssl:0=[${MULTILIB_USEDEP}] - app-misc/ca-certificates - ) ) http2? ( net-libs/nghttp2[${MULTILIB_USEDEP}] ) idn? ( net-dns/libidn2:0[static-libs?,${MULTILIB_USEDEP}] ) @@ -92,7 +88,6 @@ REQUIRED_USE=" curl_ssl_mbedtls curl_ssl_nss curl_ssl_openssl - curl_ssl_polarssl curl_ssl_winssl ) )" @@ -112,6 +107,7 @@ src_prepare() { eapply "${FILESDIR}"/${PN}-7.30.0-prefix.patch eapply "${FILESDIR}"/${PN}-respect-cflags-3.patch eapply "${FILESDIR}"/${PN}-fix-gnutls-nettle.patch + eapply "${FILESDIR}"/${P}-fix-build.patch sed -i '/LD_LIBRARY_PATH=/d' configure.ac || die #382241 @@ -142,9 +138,6 @@ multilib_src_configure() { elif use curl_ssl_nss; then einfo "SSL provided by nss" myconf+=( --with-nss ) - elif use curl_ssl_polarssl; then - einfo "SSL provided by polarssl" - myconf+=( --with-polarssl ) elif use curl_ssl_openssl; then einfo "SSL provided by openssl" myconf+=( --with-ssl --with-ca-path="${EPREFIX}"/etc/ssl/certs ) diff --git a/sdk_container/src/third_party/portage-stable/net-misc/curl/files/curl-7.52.1-fix-openssl.patch b/sdk_container/src/third_party/portage-stable/net-misc/curl/files/curl-7.52.1-fix-openssl.patch deleted file mode 100644 index 259f618d46..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-misc/curl/files/curl-7.52.1-fix-openssl.patch +++ /dev/null @@ -1,36 +0,0 @@ -From a7b38c9dc98481e4a5fc37e51a8690337c674dfb Mon Sep 17 00:00:00 2001 -From: Daniel Stenberg -Date: Mon, 26 Dec 2016 00:06:33 +0100 -Subject: [PATCH] vtls: s/SSLEAY/OPENSSL - -Fixed an old leftover use of the USE_SSLEAY define which would make a -socket get removed from the applications sockets to monitor when the -multi_socket API was used, leading to timeouts. - -Bug: #1174 ---- - lib/vtls/vtls.c | 4 ++-- - 1 file changed, 2 insertions(+), 2 deletions(-) - -diff --git a/lib/vtls/vtls.c b/lib/vtls/vtls.c -index b808e1c..707f24b 100644 ---- a/lib/vtls/vtls.c -+++ b/lib/vtls/vtls.c -@@ -484,7 +484,7 @@ void Curl_ssl_close_all(struct Curl_easy *data) - curlssl_close_all(data); - } - --#if defined(USE_SSLEAY) || defined(USE_GNUTLS) || defined(USE_SCHANNEL) || \ -+#if defined(USE_OPENSSL) || defined(USE_GNUTLS) || defined(USE_SCHANNEL) || \ - defined(USE_DARWINSSL) || defined(USE_NSS) - /* This function is for OpenSSL, GnuTLS, darwinssl, and schannel only. */ - int Curl_ssl_getsock(struct connectdata *conn, curl_socket_t *socks, -@@ -518,7 +518,7 @@ int Curl_ssl_getsock(struct connectdata *conn, - (void)numsocks; - return GETSOCK_BLANK; - } --/* USE_SSLEAY || USE_GNUTLS || USE_SCHANNEL || USE_DARWINSSL || USE_NSS */ -+/* USE_OPENSSL || USE_GNUTLS || USE_SCHANNEL || USE_DARWINSSL || USE_NSS */ - #endif - - void Curl_ssl_close(struct connectdata *conn, int sockindex) diff --git a/sdk_container/src/third_party/portage-stable/net-misc/curl/files/curl-7.55.1-fix-build.patch b/sdk_container/src/third_party/portage-stable/net-misc/curl/files/curl-7.55.1-fix-build.patch new file mode 100644 index 0000000000..b9749d59c7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/net-misc/curl/files/curl-7.55.1-fix-build.patch @@ -0,0 +1,22 @@ +index d77a884..6dcd0f1 100644 +--- a/m4/curl-confopts.m4 ++++ b/m4/curl-confopts.m4 +@@ -37,14 +37,14 @@ AC_HELP_STRING([--enable-threaded-resolver],[Enable threaded resolver]) + AC_HELP_STRING([--disable-threaded-resolver],[Disable threaded resolver]), + OPT_THRES=$enableval) + case "$OPT_THRES" in +- *) +- dnl configure option not specified +- want_thres="yes" +- ;; + no) + dnl --disable-threaded-resolver option used + want_thres="no" + ;; ++ *) ++ dnl configure option not specified ++ want_thres="yes" ++ ;; + esac + AC_MSG_RESULT([$want_thres]) + ]) From 89cb11839136a18c8564c3eecac6f795633784dd Mon Sep 17 00:00:00 2001 From: David Michael Date: Fri, 29 Sep 2017 11:29:43 -0700 Subject: [PATCH 06/14] bump(metadata/glsa): sync with upstream --- .../metadata/glsa/glsa-200310-03.xml | 5 +- .../metadata/glsa/glsa-200310-04.xml | 7 +- .../metadata/glsa/glsa-200311-01.xml | 7 +- .../metadata/glsa/glsa-200311-02.xml | 3 +- .../metadata/glsa/glsa-200311-03.xml | 3 +- .../metadata/glsa/glsa-200311-04.xml | 1 - .../metadata/glsa/glsa-200311-05.xml | 1 - .../metadata/glsa/glsa-200311-06.xml | 3 +- .../metadata/glsa/glsa-200311-07.xml | 5 +- .../metadata/glsa/glsa-200311-08.xml | 3 +- .../metadata/glsa/glsa-200312-01.xml | 1 - .../metadata/glsa/glsa-200312-03.xml | 9 +- .../metadata/glsa/glsa-200312-04.xml | 3 +- .../metadata/glsa/glsa-200312-05.xml | 3 +- .../metadata/glsa/glsa-200312-06.xml | 3 +- .../metadata/glsa/glsa-200312-07.xml | 9 +- .../metadata/glsa/glsa-200312-08.xml | 1 - .../metadata/glsa/glsa-200401-01.xml | 21 +- .../metadata/glsa/glsa-200401-02.xml | 11 +- .../metadata/glsa/glsa-200401-03.xml | 15 +- .../metadata/glsa/glsa-200401-04.xml | 11 +- .../metadata/glsa/glsa-200402-01.xml | 25 +- .../metadata/glsa/glsa-200402-02.xml | 12 +- .../metadata/glsa/glsa-200402-03.xml | 11 +- .../metadata/glsa/glsa-200402-04.xml | 9 +- .../metadata/glsa/glsa-200402-05.xml | 11 +- .../metadata/glsa/glsa-200402-06.xml | 5 +- .../metadata/glsa/glsa-200402-07.xml | 9 +- .../metadata/glsa/glsa-200403-01.xml | 11 +- .../metadata/glsa/glsa-200403-02.xml | 11 +- .../metadata/glsa/glsa-200403-03.xml | 17 +- .../metadata/glsa/glsa-200403-04.xml | 15 +- .../metadata/glsa/glsa-200403-05.xml | 9 +- .../metadata/glsa/glsa-200403-06.xml | 15 +- .../metadata/glsa/glsa-200403-07.xml | 19 +- .../metadata/glsa/glsa-200403-08.xml | 18 +- .../metadata/glsa/glsa-200403-09.xml | 11 +- .../metadata/glsa/glsa-200403-10.xml | 11 +- .../metadata/glsa/glsa-200403-11.xml | 17 +- .../metadata/glsa/glsa-200403-12.xml | 15 +- .../metadata/glsa/glsa-200403-13.xml | 21 +- .../metadata/glsa/glsa-200403-14.xml | 15 +- .../metadata/glsa/glsa-200404-01.xml | 11 +- .../metadata/glsa/glsa-200404-02.xml | 11 +- .../metadata/glsa/glsa-200404-03.xml | 15 +- .../metadata/glsa/glsa-200404-04.xml | 13 +- .../metadata/glsa/glsa-200404-05.xml | 13 +- .../metadata/glsa/glsa-200404-06.xml | 11 +- .../metadata/glsa/glsa-200404-07.xml | 11 +- .../metadata/glsa/glsa-200404-08.xml | 5 +- .../metadata/glsa/glsa-200404-09.xml | 11 +- .../metadata/glsa/glsa-200404-10.xml | 13 +- .../metadata/glsa/glsa-200404-11.xml | 11 +- .../metadata/glsa/glsa-200404-12.xml | 13 +- .../metadata/glsa/glsa-200404-13.xml | 13 +- .../metadata/glsa/glsa-200404-14.xml | 14 +- .../metadata/glsa/glsa-200404-15.xml | 17 +- .../metadata/glsa/glsa-200404-16.xml | 9 +- .../metadata/glsa/glsa-200404-17.xml | 15 +- .../metadata/glsa/glsa-200404-18.xml | 15 +- .../metadata/glsa/glsa-200404-19.xml | 9 +- .../metadata/glsa/glsa-200404-20.xml | 17 +- .../metadata/glsa/glsa-200404-21.xml | 9 +- .../metadata/glsa/glsa-200405-01.xml | 11 +- .../metadata/glsa/glsa-200405-02.xml | 13 +- .../metadata/glsa/glsa-200405-03.xml | 11 +- .../metadata/glsa/glsa-200405-04.xml | 29 +- .../metadata/glsa/glsa-200405-05.xml | 11 +- .../metadata/glsa/glsa-200405-06.xml | 11 +- .../metadata/glsa/glsa-200405-07.xml | 11 +- .../metadata/glsa/glsa-200405-08.xml | 11 +- .../metadata/glsa/glsa-200405-09.xml | 13 +- .../metadata/glsa/glsa-200405-10.xml | 13 +- .../metadata/glsa/glsa-200405-11.xml | 11 +- .../metadata/glsa/glsa-200405-12.xml | 11 +- .../metadata/glsa/glsa-200405-13.xml | 11 +- .../metadata/glsa/glsa-200405-14.xml | 11 +- .../metadata/glsa/glsa-200405-15.xml | 13 +- .../metadata/glsa/glsa-200405-16.xml | 17 +- .../metadata/glsa/glsa-200405-17.xml | 13 +- .../metadata/glsa/glsa-200405-18.xml | 13 +- .../metadata/glsa/glsa-200405-19.xml | 11 +- .../metadata/glsa/glsa-200405-20.xml | 13 +- .../metadata/glsa/glsa-200405-21.xml | 15 +- .../metadata/glsa/glsa-200405-22.xml | 17 +- .../metadata/glsa/glsa-200405-23.xml | 13 +- .../metadata/glsa/glsa-200405-24.xml | 15 +- .../metadata/glsa/glsa-200405-25.xml | 13 +- .../metadata/glsa/glsa-200406-01.xml | 19 +- .../metadata/glsa/glsa-200406-02.xml | 11 +- .../metadata/glsa/glsa-200406-03.xml | 13 +- .../metadata/glsa/glsa-200406-04.xml | 13 +- .../metadata/glsa/glsa-200406-05.xml | 17 +- .../metadata/glsa/glsa-200406-06.xml | 21 +- .../metadata/glsa/glsa-200406-07.xml | 15 +- .../metadata/glsa/glsa-200406-08.xml | 13 +- .../metadata/glsa/glsa-200406-09.xml | 9 +- .../metadata/glsa/glsa-200406-10.xml | 11 +- .../metadata/glsa/glsa-200406-11.xml | 11 +- .../metadata/glsa/glsa-200406-12.xml | 13 +- .../metadata/glsa/glsa-200406-13.xml | 11 +- .../metadata/glsa/glsa-200406-14.xml | 11 +- .../metadata/glsa/glsa-200406-15.xml | 13 +- .../metadata/glsa/glsa-200406-16.xml | 13 +- .../metadata/glsa/glsa-200406-17.xml | 15 +- .../metadata/glsa/glsa-200406-18.xml | 11 +- .../metadata/glsa/glsa-200406-19.xml | 11 +- .../metadata/glsa/glsa-200406-20.xml | 33 +- .../metadata/glsa/glsa-200406-21.xml | 11 +- .../metadata/glsa/glsa-200406-22.xml | 11 +- .../metadata/glsa/glsa-200407-01.xml | 11 +- .../metadata/glsa/glsa-200407-02.xml | 31 +- .../metadata/glsa/glsa-200407-03.xml | 11 +- .../metadata/glsa/glsa-200407-04.xml | 11 +- .../metadata/glsa/glsa-200407-05.xml | 15 +- .../metadata/glsa/glsa-200407-06.xml | 11 +- .../metadata/glsa/glsa-200407-07.xml | 11 +- .../metadata/glsa/glsa-200407-08.xml | 17 +- .../metadata/glsa/glsa-200407-09.xml | 13 +- .../metadata/glsa/glsa-200407-10.xml | 11 +- .../metadata/glsa/glsa-200407-11.xml | 11 +- .../metadata/glsa/glsa-200407-12.xml | 7 +- .../metadata/glsa/glsa-200407-13.xml | 21 +- .../metadata/glsa/glsa-200407-14.xml | 23 +- .../metadata/glsa/glsa-200407-15.xml | 15 +- .../metadata/glsa/glsa-200407-16.xml | 13 +- .../metadata/glsa/glsa-200407-17.xml | 11 +- .../metadata/glsa/glsa-200407-18.xml | 11 +- .../metadata/glsa/glsa-200407-19.xml | 11 +- .../metadata/glsa/glsa-200407-20.xml | 11 +- .../metadata/glsa/glsa-200407-21.xml | 15 +- .../metadata/glsa/glsa-200407-22.xml | 13 +- .../metadata/glsa/glsa-200407-23.xml | 11 +- .../metadata/glsa/glsa-200408-01.xml | 11 +- .../metadata/glsa/glsa-200408-02.xml | 15 +- .../metadata/glsa/glsa-200408-03.xml | 17 +- .../metadata/glsa/glsa-200408-04.xml | 19 +- .../metadata/glsa/glsa-200408-05.xml | 15 +- .../metadata/glsa/glsa-200408-06.xml | 15 +- .../metadata/glsa/glsa-200408-07.xml | 17 +- .../metadata/glsa/glsa-200408-08.xml | 17 +- .../metadata/glsa/glsa-200408-09.xml | 15 +- .../metadata/glsa/glsa-200408-10.xml | 15 +- .../metadata/glsa/glsa-200408-11.xml | 13 +- .../metadata/glsa/glsa-200408-12.xml | 13 +- .../metadata/glsa/glsa-200408-13.xml | 21 +- .../metadata/glsa/glsa-200408-14.xml | 15 +- .../metadata/glsa/glsa-200408-15.xml | 13 +- .../metadata/glsa/glsa-200408-16.xml | 9 +- .../metadata/glsa/glsa-200408-17.xml | 17 +- .../metadata/glsa/glsa-200408-18.xml | 13 +- .../metadata/glsa/glsa-200408-19.xml | 13 +- .../metadata/glsa/glsa-200408-20.xml | 19 +- .../metadata/glsa/glsa-200408-21.xml | 15 +- .../metadata/glsa/glsa-200408-22.xml | 19 +- .../metadata/glsa/glsa-200408-23.xml | 19 +- .../metadata/glsa/glsa-200408-24.xml | 13 +- .../metadata/glsa/glsa-200408-25.xml | 15 +- .../metadata/glsa/glsa-200408-26.xml | 15 +- .../metadata/glsa/glsa-200408-27.xml | 23 +- .../metadata/glsa/glsa-200409-01.xml | 13 +- .../metadata/glsa/glsa-200409-02.xml | 15 +- .../metadata/glsa/glsa-200409-03.xml | 13 +- .../metadata/glsa/glsa-200409-04.xml | 13 +- .../metadata/glsa/glsa-200409-05.xml | 15 +- .../metadata/glsa/glsa-200409-06.xml | 15 +- .../metadata/glsa/glsa-200409-07.xml | 15 +- .../metadata/glsa/glsa-200409-08.xml | 15 +- .../metadata/glsa/glsa-200409-09.xml | 21 +- .../metadata/glsa/glsa-200409-10.xml | 15 +- .../metadata/glsa/glsa-200409-11.xml | 17 +- .../metadata/glsa/glsa-200409-12.xml | 29 +- .../metadata/glsa/glsa-200409-13.xml | 21 +- .../metadata/glsa/glsa-200409-14.xml | 15 +- .../metadata/glsa/glsa-200409-15.xml | 25 +- .../metadata/glsa/glsa-200409-16.xml | 17 +- .../metadata/glsa/glsa-200409-17.xml | 17 +- .../metadata/glsa/glsa-200409-18.xml | 17 +- .../metadata/glsa/glsa-200409-19.xml | 17 +- .../metadata/glsa/glsa-200409-20.xml | 17 +- .../metadata/glsa/glsa-200409-21.xml | 29 +- .../metadata/glsa/glsa-200409-22.xml | 19 +- .../metadata/glsa/glsa-200409-23.xml | 15 +- .../metadata/glsa/glsa-200409-24.xml | 17 +- .../metadata/glsa/glsa-200409-25.xml | 19 +- .../metadata/glsa/glsa-200409-26.xml | 29 +- .../metadata/glsa/glsa-200409-27.xml | 13 +- .../metadata/glsa/glsa-200409-28.xml | 29 +- .../metadata/glsa/glsa-200409-29.xml | 23 +- .../metadata/glsa/glsa-200409-30.xml | 21 +- .../metadata/glsa/glsa-200409-31.xml | 21 +- .../metadata/glsa/glsa-200409-32.xml | 19 +- .../metadata/glsa/glsa-200409-33.xml | 17 +- .../metadata/glsa/glsa-200409-34.xml | 27 +- .../metadata/glsa/glsa-200409-35.xml | 17 +- .../metadata/glsa/glsa-200410-01.xml | 19 +- .../metadata/glsa/glsa-200410-02.xml | 19 +- .../metadata/glsa/glsa-200410-03.xml | 19 +- .../metadata/glsa/glsa-200410-04.xml | 25 +- .../metadata/glsa/glsa-200410-05.xml | 15 +- .../metadata/glsa/glsa-200410-06.xml | 15 +- .../metadata/glsa/glsa-200410-07.xml | 17 +- .../metadata/glsa/glsa-200410-08.xml | 19 +- .../metadata/glsa/glsa-200410-09.xml | 19 +- .../metadata/glsa/glsa-200410-10.xml | 15 +- .../metadata/glsa/glsa-200410-11.xml | 19 +- .../metadata/glsa/glsa-200410-12.xml | 17 +- .../metadata/glsa/glsa-200410-13.xml | 17 +- .../metadata/glsa/glsa-200410-14.xml | 21 +- .../metadata/glsa/glsa-200410-15.xml | 17 +- .../metadata/glsa/glsa-200410-16.xml | 17 +- .../metadata/glsa/glsa-200410-17.xml | 27 +- .../metadata/glsa/glsa-200410-18.xml | 19 +- .../metadata/glsa/glsa-200410-19.xml | 13 +- .../metadata/glsa/glsa-200410-20.xml | 17 +- .../metadata/glsa/glsa-200410-21.xml | 23 +- .../metadata/glsa/glsa-200410-22.xml | 25 +- .../metadata/glsa/glsa-200410-23.xml | 19 +- .../metadata/glsa/glsa-200410-24.xml | 15 +- .../metadata/glsa/glsa-200410-25.xml | 15 +- .../metadata/glsa/glsa-200410-26.xml | 15 +- .../metadata/glsa/glsa-200410-27.xml | 15 +- .../metadata/glsa/glsa-200410-28.xml | 15 +- .../metadata/glsa/glsa-200410-29.xml | 17 +- .../metadata/glsa/glsa-200410-30.xml | 23 +- .../metadata/glsa/glsa-200410-31.xml | 17 +- .../metadata/glsa/glsa-200411-01.xml | 11 +- .../metadata/glsa/glsa-200411-02.xml | 15 +- .../metadata/glsa/glsa-200411-03.xml | 15 +- .../metadata/glsa/glsa-200411-04.xml | 17 +- .../metadata/glsa/glsa-200411-05.xml | 15 +- .../metadata/glsa/glsa-200411-06.xml | 17 +- .../metadata/glsa/glsa-200411-07.xml | 17 +- .../metadata/glsa/glsa-200411-08.xml | 15 +- .../metadata/glsa/glsa-200411-09.xml | 15 +- .../metadata/glsa/glsa-200411-10.xml | 13 +- .../metadata/glsa/glsa-200411-11.xml | 19 +- .../metadata/glsa/glsa-200411-12.xml | 15 +- .../metadata/glsa/glsa-200411-13.xml | 19 +- .../metadata/glsa/glsa-200411-14.xml | 19 +- .../metadata/glsa/glsa-200411-15.xml | 15 +- .../metadata/glsa/glsa-200411-16.xml | 15 +- .../metadata/glsa/glsa-200411-17.xml | 15 +- .../metadata/glsa/glsa-200411-18.xml | 13 +- .../metadata/glsa/glsa-200411-19.xml | 19 +- .../metadata/glsa/glsa-200411-20.xml | 13 +- .../metadata/glsa/glsa-200411-21.xml | 19 +- .../metadata/glsa/glsa-200411-22.xml | 15 +- .../metadata/glsa/glsa-200411-23.xml | 17 +- .../metadata/glsa/glsa-200411-24.xml | 13 +- .../metadata/glsa/glsa-200411-25.xml | 17 +- .../metadata/glsa/glsa-200411-26.xml | 23 +- .../metadata/glsa/glsa-200411-27.xml | 21 +- .../metadata/glsa/glsa-200411-28.xml | 17 +- .../metadata/glsa/glsa-200411-29.xml | 17 +- .../metadata/glsa/glsa-200411-30.xml | 15 +- .../metadata/glsa/glsa-200411-31.xml | 13 +- .../metadata/glsa/glsa-200411-32.xml | 15 +- .../metadata/glsa/glsa-200411-33.xml | 15 +- .../metadata/glsa/glsa-200411-34.xml | 21 +- .../metadata/glsa/glsa-200411-35.xml | 15 +- .../metadata/glsa/glsa-200411-36.xml | 17 +- .../metadata/glsa/glsa-200411-37.xml | 13 +- .../metadata/glsa/glsa-200411-38.xml | 21 +- .../metadata/glsa/glsa-200412-01.xml | 19 +- .../metadata/glsa/glsa-200412-02.xml | 21 +- .../metadata/glsa/glsa-200412-03.xml | 15 +- .../metadata/glsa/glsa-200412-04.xml | 15 +- .../metadata/glsa/glsa-200412-05.xml | 13 +- .../metadata/glsa/glsa-200412-06.xml | 13 +- .../metadata/glsa/glsa-200412-07.xml | 15 +- .../metadata/glsa/glsa-200412-08.xml | 17 +- .../metadata/glsa/glsa-200412-09.xml | 15 +- .../metadata/glsa/glsa-200412-10.xml | 17 +- .../metadata/glsa/glsa-200412-11.xml | 15 +- .../metadata/glsa/glsa-200412-12.xml | 17 +- .../metadata/glsa/glsa-200412-13.xml | 15 +- .../metadata/glsa/glsa-200412-14.xml | 31 +- .../metadata/glsa/glsa-200412-15.xml | 21 +- .../metadata/glsa/glsa-200412-16.xml | 21 +- .../metadata/glsa/glsa-200412-17.xml | 21 +- .../metadata/glsa/glsa-200412-18.xml | 15 +- .../metadata/glsa/glsa-200412-19.xml | 17 +- .../metadata/glsa/glsa-200412-20.xml | 15 +- .../metadata/glsa/glsa-200412-21.xml | 13 +- .../metadata/glsa/glsa-200412-22.xml | 15 +- .../metadata/glsa/glsa-200412-23.xml | 15 +- .../metadata/glsa/glsa-200412-24.xml | 15 +- .../metadata/glsa/glsa-200412-25.xml | 23 +- .../metadata/glsa/glsa-200412-26.xml | 15 +- .../metadata/glsa/glsa-200412-27.xml | 11 +- .../metadata/glsa/glsa-200501-01.xml | 15 +- .../metadata/glsa/glsa-200501-02.xml | 19 +- .../metadata/glsa/glsa-200501-03.xml | 27 +- .../metadata/glsa/glsa-200501-04.xml | 15 +- .../metadata/glsa/glsa-200501-05.xml | 15 +- .../metadata/glsa/glsa-200501-06.xml | 15 +- .../metadata/glsa/glsa-200501-07.xml | 17 +- .../metadata/glsa/glsa-200501-08.xml | 19 +- .../metadata/glsa/glsa-200501-09.xml | 13 +- .../metadata/glsa/glsa-200501-10.xml | 15 +- .../metadata/glsa/glsa-200501-11.xml | 15 +- .../metadata/glsa/glsa-200501-12.xml | 15 +- .../metadata/glsa/glsa-200501-13.xml | 15 +- .../metadata/glsa/glsa-200501-14.xml | 15 +- .../metadata/glsa/glsa-200501-15.xml | 13 +- .../metadata/glsa/glsa-200501-16.xml | 13 +- .../metadata/glsa/glsa-200501-17.xml | 17 +- .../metadata/glsa/glsa-200501-18.xml | 13 +- .../metadata/glsa/glsa-200501-19.xml | 17 +- .../metadata/glsa/glsa-200501-20.xml | 15 +- .../metadata/glsa/glsa-200501-21.xml | 15 +- .../metadata/glsa/glsa-200501-22.xml | 15 +- .../metadata/glsa/glsa-200501-23.xml | 19 +- .../metadata/glsa/glsa-200501-24.xml | 15 +- .../metadata/glsa/glsa-200501-25.xml | 25 +- .../metadata/glsa/glsa-200501-26.xml | 13 +- .../metadata/glsa/glsa-200501-27.xml | 25 +- .../metadata/glsa/glsa-200501-28.xml | 15 +- .../metadata/glsa/glsa-200501-29.xml | 15 +- .../metadata/glsa/glsa-200501-30.xml | 15 +- .../metadata/glsa/glsa-200501-31.xml | 25 +- .../metadata/glsa/glsa-200501-32.xml | 17 +- .../metadata/glsa/glsa-200501-33.xml | 17 +- .../metadata/glsa/glsa-200501-34.xml | 21 +- .../metadata/glsa/glsa-200501-35.xml | 13 +- .../metadata/glsa/glsa-200501-36.xml | 21 +- .../metadata/glsa/glsa-200501-37.xml | 15 +- .../metadata/glsa/glsa-200501-38.xml | 15 +- .../metadata/glsa/glsa-200501-39.xml | 19 +- .../metadata/glsa/glsa-200501-40.xml | 15 +- .../metadata/glsa/glsa-200501-41.xml | 13 +- .../metadata/glsa/glsa-200501-42.xml | 15 +- .../metadata/glsa/glsa-200501-43.xml | 13 +- .../metadata/glsa/glsa-200501-44.xml | 17 +- .../metadata/glsa/glsa-200501-45.xml | 15 +- .../metadata/glsa/glsa-200501-46.xml | 21 +- .../metadata/glsa/glsa-200502-01.xml | 17 +- .../metadata/glsa/glsa-200502-02.xml | 17 +- .../metadata/glsa/glsa-200502-03.xml | 19 +- .../metadata/glsa/glsa-200502-04.xml | 19 +- .../metadata/glsa/glsa-200502-05.xml | 13 +- .../metadata/glsa/glsa-200502-06.xml | 13 +- .../metadata/glsa/glsa-200502-07.xml | 21 +- .../metadata/glsa/glsa-200502-08.xml | 21 +- .../metadata/glsa/glsa-200502-09.xml | 15 +- .../metadata/glsa/glsa-200502-10.xml | 15 +- .../metadata/glsa/glsa-200502-11.xml | 15 +- .../metadata/glsa/glsa-200502-12.xml | 13 +- .../metadata/glsa/glsa-200502-13.xml | 15 +- .../metadata/glsa/glsa-200502-14.xml | 13 +- .../metadata/glsa/glsa-200502-15.xml | 15 +- .../metadata/glsa/glsa-200502-16.xml | 15 +- .../metadata/glsa/glsa-200502-17.xml | 27 +- .../metadata/glsa/glsa-200502-18.xml | 15 +- .../metadata/glsa/glsa-200502-19.xml | 13 +- .../metadata/glsa/glsa-200502-20.xml | 17 +- .../metadata/glsa/glsa-200502-21.xml | 17 +- .../metadata/glsa/glsa-200502-22.xml | 15 +- .../metadata/glsa/glsa-200502-23.xml | 13 +- .../metadata/glsa/glsa-200502-24.xml | 21 +- .../metadata/glsa/glsa-200502-25.xml | 15 +- .../metadata/glsa/glsa-200502-26.xml | 15 +- .../metadata/glsa/glsa-200502-27.xml | 15 +- .../metadata/glsa/glsa-200502-28.xml | 19 +- .../metadata/glsa/glsa-200502-29.xml | 15 +- .../metadata/glsa/glsa-200502-30.xml | 15 +- .../metadata/glsa/glsa-200502-31.xml | 17 +- .../metadata/glsa/glsa-200502-32.xml | 14 +- .../metadata/glsa/glsa-200502-33.xml | 21 +- .../metadata/glsa/glsa-200503-01.xml | 13 +- .../metadata/glsa/glsa-200503-02.xml | 19 +- .../metadata/glsa/glsa-200503-03.xml | 19 +- .../metadata/glsa/glsa-200503-04.xml | 17 +- .../metadata/glsa/glsa-200503-05.xml | 21 +- .../metadata/glsa/glsa-200503-06.xml | 15 +- .../metadata/glsa/glsa-200503-07.xml | 25 +- .../metadata/glsa/glsa-200503-08.xml | 15 +- .../metadata/glsa/glsa-200503-09.xml | 15 +- .../metadata/glsa/glsa-200503-10.xml | 49 +- .../metadata/glsa/glsa-200503-11.xml | 15 +- .../metadata/glsa/glsa-200503-12.xml | 15 +- .../metadata/glsa/glsa-200503-13.xml | 15 +- .../metadata/glsa/glsa-200503-14.xml | 11 +- .../metadata/glsa/glsa-200503-15.xml | 13 +- .../metadata/glsa/glsa-200503-16.xml | 23 +- .../metadata/glsa/glsa-200503-17.xml | 15 +- .../metadata/glsa/glsa-200503-18.xml | 15 +- .../metadata/glsa/glsa-200503-19.xml | 19 +- .../metadata/glsa/glsa-200503-20.xml | 15 +- .../metadata/glsa/glsa-200503-21.xml | 17 +- .../metadata/glsa/glsa-200503-22.xml | 11 +- .../metadata/glsa/glsa-200503-23.xml | 15 +- .../metadata/glsa/glsa-200503-24.xml | 13 +- .../metadata/glsa/glsa-200503-25.xml | 15 +- .../metadata/glsa/glsa-200503-26.xml | 17 +- .../metadata/glsa/glsa-200503-27.xml | 11 +- .../metadata/glsa/glsa-200503-28.xml | 17 +- .../metadata/glsa/glsa-200503-29.xml | 17 +- .../metadata/glsa/glsa-200503-30.xml | 49 +- .../metadata/glsa/glsa-200503-31.xml | 21 +- .../metadata/glsa/glsa-200503-32.xml | 23 +- .../metadata/glsa/glsa-200503-33.xml | 17 +- .../metadata/glsa/glsa-200503-34.xml | 15 +- .../metadata/glsa/glsa-200503-35.xml | 17 +- .../metadata/glsa/glsa-200503-36.xml | 15 +- .../metadata/glsa/glsa-200503-37.xml | 19 +- .../metadata/glsa/glsa-200504-01.xml | 17 +- .../metadata/glsa/glsa-200504-02.xml | 13 +- .../metadata/glsa/glsa-200504-03.xml | 13 +- .../metadata/glsa/glsa-200504-04.xml | 15 +- .../metadata/glsa/glsa-200504-05.xml | 21 +- .../metadata/glsa/glsa-200504-06.xml | 15 +- .../metadata/glsa/glsa-200504-07.xml | 15 +- .../metadata/glsa/glsa-200504-08.xml | 17 +- .../metadata/glsa/glsa-200504-09.xml | 15 +- .../metadata/glsa/glsa-200504-10.xml | 15 +- .../metadata/glsa/glsa-200504-11.xml | 17 +- .../metadata/glsa/glsa-200504-12.xml | 13 +- .../metadata/glsa/glsa-200504-13.xml | 19 +- .../metadata/glsa/glsa-200504-14.xml | 17 +- .../metadata/glsa/glsa-200504-15.xml | 25 +- .../metadata/glsa/glsa-200504-16.xml | 13 +- .../metadata/glsa/glsa-200504-17.xml | 13 +- .../metadata/glsa/glsa-200504-18.xml | 33 +- .../metadata/glsa/glsa-200504-19.xml | 15 +- .../metadata/glsa/glsa-200504-20.xml | 13 +- .../metadata/glsa/glsa-200504-21.xml | 17 +- .../metadata/glsa/glsa-200504-22.xml | 13 +- .../metadata/glsa/glsa-200504-23.xml | 15 +- .../metadata/glsa/glsa-200504-24.xml | 17 +- .../metadata/glsa/glsa-200504-25.xml | 13 +- .../metadata/glsa/glsa-200504-26.xml | 15 +- .../metadata/glsa/glsa-200504-27.xml | 9 +- .../metadata/glsa/glsa-200504-28.xml | 17 +- .../metadata/glsa/glsa-200504-29.xml | 15 +- .../metadata/glsa/glsa-200504-30.xml | 13 +- .../metadata/glsa/glsa-200505-01.xml | 33 +- .../metadata/glsa/glsa-200505-02.xml | 15 +- .../metadata/glsa/glsa-200505-03.xml | 41 +- .../metadata/glsa/glsa-200505-04.xml | 13 +- .../metadata/glsa/glsa-200505-05.xml | 17 +- .../metadata/glsa/glsa-200505-06.xml | 21 +- .../metadata/glsa/glsa-200505-07.xml | 13 +- .../metadata/glsa/glsa-200505-08.xml | 17 +- .../metadata/glsa/glsa-200505-09.xml | 15 +- .../metadata/glsa/glsa-200505-10.xml | 13 +- .../metadata/glsa/glsa-200505-11.xml | 25 +- .../metadata/glsa/glsa-200505-12.xml | 18 +- .../metadata/glsa/glsa-200505-13.xml | 17 +- .../metadata/glsa/glsa-200505-14.xml | 15 +- .../metadata/glsa/glsa-200505-15.xml | 17 +- .../metadata/glsa/glsa-200505-16.xml | 17 +- .../metadata/glsa/glsa-200505-17.xml | 15 +- .../metadata/glsa/glsa-200505-18.xml | 15 +- .../metadata/glsa/glsa-200505-19.xml | 11 +- .../metadata/glsa/glsa-200505-20.xml | 19 +- .../metadata/glsa/glsa-200506-01.xml | 13 +- .../metadata/glsa/glsa-200506-02.xml | 15 +- .../metadata/glsa/glsa-200506-03.xml | 15 +- .../metadata/glsa/glsa-200506-04.xml | 19 +- .../metadata/glsa/glsa-200506-05.xml | 15 +- .../metadata/glsa/glsa-200506-06.xml | 19 +- .../metadata/glsa/glsa-200506-07.xml | 15 +- .../metadata/glsa/glsa-200506-08.xml | 19 +- .../metadata/glsa/glsa-200506-09.xml | 17 +- .../metadata/glsa/glsa-200506-10.xml | 15 +- .../metadata/glsa/glsa-200506-11.xml | 21 +- .../metadata/glsa/glsa-200506-12.xml | 13 +- .../metadata/glsa/glsa-200506-13.xml | 15 +- .../metadata/glsa/glsa-200506-14.xml | 19 +- .../metadata/glsa/glsa-200506-15.xml | 15 +- .../metadata/glsa/glsa-200506-16.xml | 15 +- .../metadata/glsa/glsa-200506-17.xml | 21 +- .../metadata/glsa/glsa-200506-18.xml | 15 +- .../metadata/glsa/glsa-200506-19.xml | 15 +- .../metadata/glsa/glsa-200506-20.xml | 27 +- .../metadata/glsa/glsa-200506-21.xml | 15 +- .../metadata/glsa/glsa-200506-22.xml | 15 +- .../metadata/glsa/glsa-200506-23.xml | 17 +- .../metadata/glsa/glsa-200506-24.xml | 17 +- .../metadata/glsa/glsa-200507-01.xml | 17 +- .../metadata/glsa/glsa-200507-02.xml | 15 +- .../metadata/glsa/glsa-200507-03.xml | 15 +- .../metadata/glsa/glsa-200507-04.xml | 15 +- .../metadata/glsa/glsa-200507-05.xml | 13 +- .../metadata/glsa/glsa-200507-06.xml | 17 +- .../metadata/glsa/glsa-200507-07.xml | 15 +- .../metadata/glsa/glsa-200507-08.xml | 17 +- .../metadata/glsa/glsa-200507-09.xml | 17 +- .../metadata/glsa/glsa-200507-10.xml | 17 +- .../metadata/glsa/glsa-200507-11.xml | 19 +- .../metadata/glsa/glsa-200507-12.xml | 19 +- .../metadata/glsa/glsa-200507-13.xml | 15 +- .../metadata/glsa/glsa-200507-14.xml | 15 +- .../metadata/glsa/glsa-200507-15.xml | 15 +- .../metadata/glsa/glsa-200507-16.xml | 15 +- .../metadata/glsa/glsa-200507-17.xml | 17 +- .../metadata/glsa/glsa-200507-18.xml | 17 +- .../metadata/glsa/glsa-200507-19.xml | 15 +- .../metadata/glsa/glsa-200507-20.xml | 13 +- .../metadata/glsa/glsa-200507-21.xml | 13 +- .../metadata/glsa/glsa-200507-22.xml | 15 +- .../metadata/glsa/glsa-200507-23.xml | 15 +- .../metadata/glsa/glsa-200507-24.xml | 17 +- .../metadata/glsa/glsa-200507-25.xml | 17 +- .../metadata/glsa/glsa-200507-26.xml | 23 +- .../metadata/glsa/glsa-200507-27.xml | 27 +- .../metadata/glsa/glsa-200507-28.xml | 19 +- .../metadata/glsa/glsa-200507-29.xml | 17 +- .../metadata/glsa/glsa-200508-01.xml | 21 +- .../metadata/glsa/glsa-200508-02.xml | 15 +- .../metadata/glsa/glsa-200508-03.xml | 17 +- .../metadata/glsa/glsa-200508-04.xml | 15 +- .../metadata/glsa/glsa-200508-05.xml | 15 +- .../metadata/glsa/glsa-200508-06.xml | 17 +- .../metadata/glsa/glsa-200508-07.xml | 13 +- .../metadata/glsa/glsa-200508-08.xml | 21 +- .../metadata/glsa/glsa-200508-09.xml | 17 +- .../metadata/glsa/glsa-200508-10.xml | 19 +- .../metadata/glsa/glsa-200508-11.xml | 17 +- .../metadata/glsa/glsa-200508-12.xml | 17 +- .../metadata/glsa/glsa-200508-13.xml | 19 +- .../metadata/glsa/glsa-200508-14.xml | 17 +- .../metadata/glsa/glsa-200508-15.xml | 17 +- .../metadata/glsa/glsa-200508-16.xml | 15 +- .../metadata/glsa/glsa-200508-17.xml | 15 +- .../metadata/glsa/glsa-200508-18.xml | 15 +- .../metadata/glsa/glsa-200508-19.xml | 15 +- .../metadata/glsa/glsa-200508-20.xml | 19 +- .../metadata/glsa/glsa-200508-21.xml | 15 +- .../metadata/glsa/glsa-200508-22.xml | 17 +- .../metadata/glsa/glsa-200509-01.xml | 13 +- .../metadata/glsa/glsa-200509-02.xml | 17 +- .../metadata/glsa/glsa-200509-03.xml | 17 +- .../metadata/glsa/glsa-200509-04.xml | 17 +- .../metadata/glsa/glsa-200509-05.xml | 15 +- .../metadata/glsa/glsa-200509-06.xml | 15 +- .../metadata/glsa/glsa-200509-07.xml | 13 +- .../metadata/glsa/glsa-200509-08.xml | 17 +- .../metadata/glsa/glsa-200509-09.xml | 15 +- .../metadata/glsa/glsa-200509-10.xml | 13 +- .../metadata/glsa/glsa-200509-11.xml | 37 +- .../metadata/glsa/glsa-200509-12.xml | 19 +- .../metadata/glsa/glsa-200509-13.xml | 17 +- .../metadata/glsa/glsa-200509-14.xml | 13 +- .../metadata/glsa/glsa-200509-15.xml | 15 +- .../metadata/glsa/glsa-200509-16.xml | 17 +- .../metadata/glsa/glsa-200509-17.xml | 15 +- .../metadata/glsa/glsa-200509-18.xml | 19 +- .../metadata/glsa/glsa-200509-19.xml | 17 +- .../metadata/glsa/glsa-200509-20.xml | 15 +- .../metadata/glsa/glsa-200509-21.xml | 15 +- .../metadata/glsa/glsa-200510-01.xml | 13 +- .../metadata/glsa/glsa-200510-02.xml | 15 +- .../metadata/glsa/glsa-200510-03.xml | 17 +- .../metadata/glsa/glsa-200510-04.xml | 15 +- .../metadata/glsa/glsa-200510-05.xml | 17 +- .../metadata/glsa/glsa-200510-06.xml | 15 +- .../metadata/glsa/glsa-200510-07.xml | 15 +- .../metadata/glsa/glsa-200510-08.xml | 11 +- .../metadata/glsa/glsa-200510-09.xml | 13 +- .../metadata/glsa/glsa-200510-10.xml | 15 +- .../metadata/glsa/glsa-200510-11.xml | 15 +- .../metadata/glsa/glsa-200510-12.xml | 17 +- .../metadata/glsa/glsa-200510-13.xml | 13 +- .../metadata/glsa/glsa-200510-14.xml | 19 +- .../metadata/glsa/glsa-200510-15.xml | 13 +- .../metadata/glsa/glsa-200510-16.xml | 17 +- .../metadata/glsa/glsa-200510-17.xml | 17 +- .../metadata/glsa/glsa-200510-18.xml | 11 +- .../metadata/glsa/glsa-200510-19.xml | 13 +- .../metadata/glsa/glsa-200510-20.xml | 13 +- .../metadata/glsa/glsa-200510-21.xml | 17 +- .../metadata/glsa/glsa-200510-22.xml | 15 +- .../metadata/glsa/glsa-200510-23.xml | 13 +- .../metadata/glsa/glsa-200510-24.xml | 23 +- .../metadata/glsa/glsa-200510-25.xml | 33 +- .../metadata/glsa/glsa-200510-26.xml | 17 +- .../metadata/glsa/glsa-200511-01.xml | 15 +- .../metadata/glsa/glsa-200511-02.xml | 19 +- .../metadata/glsa/glsa-200511-03.xml | 17 +- .../metadata/glsa/glsa-200511-04.xml | 27 +- .../metadata/glsa/glsa-200511-05.xml | 19 +- .../metadata/glsa/glsa-200511-06.xml | 13 +- .../metadata/glsa/glsa-200511-07.xml | 19 +- .../metadata/glsa/glsa-200511-08.xml | 23 +- .../metadata/glsa/glsa-200511-09.xml | 15 +- .../metadata/glsa/glsa-200511-10.xml | 15 +- .../metadata/glsa/glsa-200511-11.xml | 15 +- .../metadata/glsa/glsa-200511-12.xml | 17 +- .../metadata/glsa/glsa-200511-13.xml | 17 +- .../metadata/glsa/glsa-200511-14.xml | 17 +- .../metadata/glsa/glsa-200511-15.xml | 15 +- .../metadata/glsa/glsa-200511-16.xml | 19 +- .../metadata/glsa/glsa-200511-17.xml | 15 +- .../metadata/glsa/glsa-200511-18.xml | 19 +- .../metadata/glsa/glsa-200511-19.xml | 13 +- .../metadata/glsa/glsa-200511-20.xml | 17 +- .../metadata/glsa/glsa-200511-21.xml | 15 +- .../metadata/glsa/glsa-200511-22.xml | 15 +- .../metadata/glsa/glsa-200511-23.xml | 17 +- .../metadata/glsa/glsa-200512-01.xml | 15 +- .../metadata/glsa/glsa-200512-02.xml | 19 +- .../metadata/glsa/glsa-200512-03.xml | 23 +- .../metadata/glsa/glsa-200512-04.xml | 17 +- .../metadata/glsa/glsa-200512-05.xml | 15 +- .../metadata/glsa/glsa-200512-06.xml | 13 +- .../metadata/glsa/glsa-200512-07.xml | 15 +- .../metadata/glsa/glsa-200512-08.xml | 23 +- .../metadata/glsa/glsa-200512-09.xml | 17 +- .../metadata/glsa/glsa-200512-10.xml | 17 +- .../metadata/glsa/glsa-200512-11.xml | 17 +- .../metadata/glsa/glsa-200512-12.xml | 23 +- .../metadata/glsa/glsa-200512-13.xml | 15 +- .../metadata/glsa/glsa-200512-14.xml | 13 +- .../metadata/glsa/glsa-200512-15.xml | 15 +- .../metadata/glsa/glsa-200512-16.xml | 11 +- .../metadata/glsa/glsa-200512-17.xml | 15 +- .../metadata/glsa/glsa-200512-18.xml | 13 +- .../metadata/glsa/glsa-200601-01.xml | 15 +- .../metadata/glsa/glsa-200601-02.xml | 37 +- .../metadata/glsa/glsa-200601-03.xml | 17 +- .../metadata/glsa/glsa-200601-04.xml | 16 +- .../metadata/glsa/glsa-200601-05.xml | 15 +- .../metadata/glsa/glsa-200601-06.xml | 19 +- .../metadata/glsa/glsa-200601-07.xml | 15 +- .../metadata/glsa/glsa-200601-08.xml | 15 +- .../metadata/glsa/glsa-200601-09.xml | 15 +- .../metadata/glsa/glsa-200601-10.xml | 21 +- .../metadata/glsa/glsa-200601-11.xml | 13 +- .../metadata/glsa/glsa-200601-12.xml | 15 +- .../metadata/glsa/glsa-200601-13.xml | 15 +- .../metadata/glsa/glsa-200601-14.xml | 15 +- .../metadata/glsa/glsa-200601-15.xml | 13 +- .../metadata/glsa/glsa-200601-16.xml | 15 +- .../metadata/glsa/glsa-200601-17.xml | 27 +- .../metadata/glsa/glsa-200602-01.xml | 17 +- .../metadata/glsa/glsa-200602-02.xml | 13 +- .../metadata/glsa/glsa-200602-03.xml | 23 +- .../metadata/glsa/glsa-200602-04.xml | 15 +- .../metadata/glsa/glsa-200602-05.xml | 17 +- .../metadata/glsa/glsa-200602-06.xml | 17 +- .../metadata/glsa/glsa-200602-07.xml | 21 +- .../metadata/glsa/glsa-200602-08.xml | 17 +- .../metadata/glsa/glsa-200602-09.xml | 15 +- .../metadata/glsa/glsa-200602-10.xml | 13 +- .../metadata/glsa/glsa-200602-11.xml | 17 +- .../metadata/glsa/glsa-200602-12.xml | 15 +- .../metadata/glsa/glsa-200602-13.xml | 17 +- .../metadata/glsa/glsa-200602-14.xml | 15 +- .../metadata/glsa/glsa-200603-01.xml | 13 +- .../metadata/glsa/glsa-200603-02.xml | 21 +- .../metadata/glsa/glsa-200603-03.xml | 17 +- .../metadata/glsa/glsa-200603-04.xml | 15 +- .../metadata/glsa/glsa-200603-05.xml | 15 +- .../metadata/glsa/glsa-200603-06.xml | 15 +- .../metadata/glsa/glsa-200603-07.xml | 15 +- .../metadata/glsa/glsa-200603-08.xml | 13 +- .../metadata/glsa/glsa-200603-09.xml | 17 +- .../metadata/glsa/glsa-200603-10.xml | 15 +- .../metadata/glsa/glsa-200603-11.xml | 13 +- .../metadata/glsa/glsa-200603-12.xml | 15 +- .../metadata/glsa/glsa-200603-13.xml | 15 +- .../metadata/glsa/glsa-200603-14.xml | 17 +- .../metadata/glsa/glsa-200603-15.xml | 15 +- .../metadata/glsa/glsa-200603-16.xml | 15 +- .../metadata/glsa/glsa-200603-17.xml | 15 +- .../metadata/glsa/glsa-200603-18.xml | 17 +- .../metadata/glsa/glsa-200603-19.xml | 17 +- .../metadata/glsa/glsa-200603-20.xml | 13 +- .../metadata/glsa/glsa-200603-21.xml | 15 +- .../metadata/glsa/glsa-200603-22.xml | 23 +- .../metadata/glsa/glsa-200603-23.xml | 19 +- .../metadata/glsa/glsa-200603-24.xml | 15 +- .../metadata/glsa/glsa-200603-25.xml | 21 +- .../metadata/glsa/glsa-200603-26.xml | 15 +- .../metadata/glsa/glsa-200604-01.xml | 17 +- .../metadata/glsa/glsa-200604-02.xml | 19 +- .../metadata/glsa/glsa-200604-03.xml | 17 +- .../metadata/glsa/glsa-200604-04.xml | 17 +- .../metadata/glsa/glsa-200604-05.xml | 15 +- .../metadata/glsa/glsa-200604-06.xml | 17 +- .../metadata/glsa/glsa-200604-07.xml | 21 +- .../metadata/glsa/glsa-200604-08.xml | 17 +- .../metadata/glsa/glsa-200604-09.xml | 15 +- .../metadata/glsa/glsa-200604-10.xml | 19 +- .../metadata/glsa/glsa-200604-11.xml | 15 +- .../metadata/glsa/glsa-200604-12.xml | 59 +- .../metadata/glsa/glsa-200604-13.xml | 15 +- .../metadata/glsa/glsa-200604-14.xml | 15 +- .../metadata/glsa/glsa-200604-15.xml | 15 +- .../metadata/glsa/glsa-200604-16.xml | 15 +- .../metadata/glsa/glsa-200604-17.xml | 29 +- .../metadata/glsa/glsa-200604-18.xml | 67 +- .../metadata/glsa/glsa-200605-01.xml | 17 +- .../metadata/glsa/glsa-200605-02.xml | 13 +- .../metadata/glsa/glsa-200605-03.xml | 13 +- .../metadata/glsa/glsa-200605-04.xml | 15 +- .../metadata/glsa/glsa-200605-05.xml | 15 +- .../metadata/glsa/glsa-200605-06.xml | 17 +- .../metadata/glsa/glsa-200605-07.xml | 17 +- .../metadata/glsa/glsa-200605-08.xml | 19 +- .../metadata/glsa/glsa-200605-09.xml | 57 +- .../metadata/glsa/glsa-200605-10.xml | 15 +- .../metadata/glsa/glsa-200605-11.xml | 15 +- .../metadata/glsa/glsa-200605-12.xml | 19 +- .../metadata/glsa/glsa-200605-13.xml | 17 +- .../metadata/glsa/glsa-200605-14.xml | 15 +- .../metadata/glsa/glsa-200605-15.xml | 19 +- .../metadata/glsa/glsa-200605-16.xml | 15 +- .../metadata/glsa/glsa-200605-17.xml | 19 +- .../metadata/glsa/glsa-200606-01.xml | 13 +- .../metadata/glsa/glsa-200606-02.xml | 15 +- .../metadata/glsa/glsa-200606-03.xml | 17 +- .../metadata/glsa/glsa-200606-04.xml | 15 +- .../metadata/glsa/glsa-200606-05.xml | 13 +- .../metadata/glsa/glsa-200606-06.xml | 17 +- .../metadata/glsa/glsa-200606-07.xml | 15 +- .../metadata/glsa/glsa-200606-08.xml | 15 +- .../metadata/glsa/glsa-200606-09.xml | 13 +- .../metadata/glsa/glsa-200606-10.xml | 15 +- .../metadata/glsa/glsa-200606-11.xml | 15 +- .../metadata/glsa/glsa-200606-12.xml | 39 +- .../metadata/glsa/glsa-200606-13.xml | 15 +- .../metadata/glsa/glsa-200606-14.xml | 17 +- .../metadata/glsa/glsa-200606-15.xml | 17 +- .../metadata/glsa/glsa-200606-16.xml | 17 +- .../metadata/glsa/glsa-200606-17.xml | 15 +- .../metadata/glsa/glsa-200606-18.xml | 19 +- .../metadata/glsa/glsa-200606-19.xml | 15 +- .../metadata/glsa/glsa-200606-20.xml | 15 +- .../metadata/glsa/glsa-200606-21.xml | 33 +- .../metadata/glsa/glsa-200606-22.xml | 11 +- .../metadata/glsa/glsa-200606-23.xml | 13 +- .../metadata/glsa/glsa-200606-24.xml | 15 +- .../metadata/glsa/glsa-200606-25.xml | 15 +- .../metadata/glsa/glsa-200606-26.xml | 15 +- .../metadata/glsa/glsa-200606-27.xml | 15 +- .../metadata/glsa/glsa-200606-28.xml | 13 +- .../metadata/glsa/glsa-200606-29.xml | 15 +- .../metadata/glsa/glsa-200606-30.xml | 15 +- .../metadata/glsa/glsa-200607-01.xml | 15 +- .../metadata/glsa/glsa-200607-02.xml | 15 +- .../metadata/glsa/glsa-200607-03.xml | 15 +- .../metadata/glsa/glsa-200607-04.xml | 17 +- .../metadata/glsa/glsa-200607-05.xml | 21 +- .../metadata/glsa/glsa-200607-06.xml | 19 +- .../metadata/glsa/glsa-200607-07.xml | 15 +- .../metadata/glsa/glsa-200607-08.xml | 15 +- .../metadata/glsa/glsa-200607-09.xml | 29 +- .../metadata/glsa/glsa-200607-10.xml | 15 +- .../metadata/glsa/glsa-200607-11.xml | 13 +- .../metadata/glsa/glsa-200607-12.xml | 19 +- .../metadata/glsa/glsa-200607-13.xml | 17 +- .../metadata/glsa/glsa-200608-01.xml | 17 +- .../metadata/glsa/glsa-200608-02.xml | 41 +- .../metadata/glsa/glsa-200608-03.xml | 39 +- .../metadata/glsa/glsa-200608-04.xml | 37 +- .../metadata/glsa/glsa-200608-05.xml | 15 +- .../metadata/glsa/glsa-200608-06.xml | 15 +- .../metadata/glsa/glsa-200608-07.xml | 25 +- .../metadata/glsa/glsa-200608-08.xml | 15 +- .../metadata/glsa/glsa-200608-09.xml | 15 +- .../metadata/glsa/glsa-200608-10.xml | 17 +- .../metadata/glsa/glsa-200608-11.xml | 15 +- .../metadata/glsa/glsa-200608-12.xml | 17 +- .../metadata/glsa/glsa-200608-13.xml | 15 +- .../metadata/glsa/glsa-200608-14.xml | 15 +- .../metadata/glsa/glsa-200608-15.xml | 17 +- .../metadata/glsa/glsa-200608-16.xml | 15 +- .../metadata/glsa/glsa-200608-17.xml | 15 +- .../metadata/glsa/glsa-200608-18.xml | 15 +- .../metadata/glsa/glsa-200608-19.xml | 19 +- .../metadata/glsa/glsa-200608-20.xml | 17 +- .../metadata/glsa/glsa-200608-21.xml | 19 +- .../metadata/glsa/glsa-200608-22.xml | 15 +- .../metadata/glsa/glsa-200608-23.xml | 15 +- .../metadata/glsa/glsa-200608-24.xml | 15 +- .../metadata/glsa/glsa-200608-25.xml | 35 +- .../metadata/glsa/glsa-200608-26.xml | 25 +- .../metadata/glsa/glsa-200608-27.xml | 17 +- .../metadata/glsa/glsa-200608-28.xml | 17 +- .../metadata/glsa/glsa-200609-01.xml | 15 +- .../metadata/glsa/glsa-200609-02.xml | 15 +- .../metadata/glsa/glsa-200609-03.xml | 17 +- .../metadata/glsa/glsa-200609-04.xml | 15 +- .../metadata/glsa/glsa-200609-05.xml | 17 +- .../metadata/glsa/glsa-200609-06.xml | 17 +- .../metadata/glsa/glsa-200609-07.xml | 17 +- .../metadata/glsa/glsa-200609-08.xml | 15 +- .../metadata/glsa/glsa-200609-09.xml | 15 +- .../metadata/glsa/glsa-200609-10.xml | 17 +- .../metadata/glsa/glsa-200609-11.xml | 19 +- .../metadata/glsa/glsa-200609-12.xml | 17 +- .../metadata/glsa/glsa-200609-13.xml | 21 +- .../metadata/glsa/glsa-200609-14.xml | 19 +- .../metadata/glsa/glsa-200609-15.xml | 15 +- .../metadata/glsa/glsa-200609-16.xml | 17 +- .../metadata/glsa/glsa-200609-17.xml | 13 +- .../metadata/glsa/glsa-200609-18.xml | 17 +- .../metadata/glsa/glsa-200609-19.xml | 29 +- .../metadata/glsa/glsa-200609-20.xml | 19 +- .../metadata/glsa/glsa-200610-01.xml | 29 +- .../metadata/glsa/glsa-200610-02.xml | 21 +- .../metadata/glsa/glsa-200610-03.xml | 15 +- .../metadata/glsa/glsa-200610-04.xml | 23 +- .../metadata/glsa/glsa-200610-05.xml | 15 +- .../metadata/glsa/glsa-200610-06.xml | 17 +- .../metadata/glsa/glsa-200610-07.xml | 15 +- .../metadata/glsa/glsa-200610-08.xml | 13 +- .../metadata/glsa/glsa-200610-09.xml | 15 +- .../metadata/glsa/glsa-200610-10.xml | 15 +- .../metadata/glsa/glsa-200610-11.xml | 23 +- .../metadata/glsa/glsa-200610-12.xml | 15 +- .../metadata/glsa/glsa-200610-13.xml | 15 +- .../metadata/glsa/glsa-200610-14.xml | 17 +- .../metadata/glsa/glsa-200610-15.xml | 19 +- .../metadata/glsa/glsa-200611-01.xml | 13 +- .../metadata/glsa/glsa-200611-02.xml | 17 +- .../metadata/glsa/glsa-200611-03.xml | 17 +- .../metadata/glsa/glsa-200611-04.xml | 19 +- .../metadata/glsa/glsa-200611-05.xml | 13 +- .../metadata/glsa/glsa-200611-06.xml | 19 +- .../metadata/glsa/glsa-200611-07.xml | 15 +- .../metadata/glsa/glsa-200611-08.xml | 15 +- .../metadata/glsa/glsa-200611-09.xml | 13 +- .../metadata/glsa/glsa-200611-10.xml | 17 +- .../metadata/glsa/glsa-200611-11.xml | 17 +- .../metadata/glsa/glsa-200611-12.xml | 13 +- .../metadata/glsa/glsa-200611-13.xml | 17 +- .../metadata/glsa/glsa-200611-14.xml | 15 +- .../metadata/glsa/glsa-200611-15.xml | 15 +- .../metadata/glsa/glsa-200611-16.xml | 15 +- .../metadata/glsa/glsa-200611-17.xml | 15 +- .../metadata/glsa/glsa-200611-18.xml | 15 +- .../metadata/glsa/glsa-200611-19.xml | 15 +- .../metadata/glsa/glsa-200611-20.xml | 15 +- .../metadata/glsa/glsa-200611-21.xml | 13 +- .../metadata/glsa/glsa-200611-22.xml | 15 +- .../metadata/glsa/glsa-200611-23.xml | 15 +- .../metadata/glsa/glsa-200611-24.xml | 21 +- .../metadata/glsa/glsa-200611-25.xml | 15 +- .../metadata/glsa/glsa-200611-26.xml | 19 +- .../metadata/glsa/glsa-200612-01.xml | 13 +- .../metadata/glsa/glsa-200612-02.xml | 15 +- .../metadata/glsa/glsa-200612-03.xml | 17 +- .../metadata/glsa/glsa-200612-04.xml | 15 +- .../metadata/glsa/glsa-200612-05.xml | 15 +- .../metadata/glsa/glsa-200612-06.xml | 29 +- .../metadata/glsa/glsa-200612-07.xml | 25 +- .../metadata/glsa/glsa-200612-08.xml | 23 +- .../metadata/glsa/glsa-200612-09.xml | 15 +- .../metadata/glsa/glsa-200612-10.xml | 15 +- .../metadata/glsa/glsa-200612-11.xml | 19 +- .../metadata/glsa/glsa-200612-12.xml | 19 +- .../metadata/glsa/glsa-200612-13.xml | 15 +- .../metadata/glsa/glsa-200612-14.xml | 17 +- .../metadata/glsa/glsa-200612-15.xml | 13 +- .../metadata/glsa/glsa-200612-16.xml | 15 +- .../metadata/glsa/glsa-200612-17.xml | 15 +- .../metadata/glsa/glsa-200612-18.xml | 13 +- .../metadata/glsa/glsa-200612-19.xml | 13 +- .../metadata/glsa/glsa-200612-20.xml | 21 +- .../metadata/glsa/glsa-200612-21.xml | 13 +- .../metadata/glsa/glsa-200701-01.xml | 13 +- .../metadata/glsa/glsa-200701-02.xml | 33 +- .../metadata/glsa/glsa-200701-03.xml | 25 +- .../metadata/glsa/glsa-200701-04.xml | 29 +- .../metadata/glsa/glsa-200701-05.xml | 15 +- .../metadata/glsa/glsa-200701-06.xml | 13 +- .../metadata/glsa/glsa-200701-07.xml | 17 +- .../metadata/glsa/glsa-200701-08.xml | 21 +- .../metadata/glsa/glsa-200701-09.xml | 13 +- .../metadata/glsa/glsa-200701-10.xml | 19 +- .../metadata/glsa/glsa-200701-11.xml | 15 +- .../metadata/glsa/glsa-200701-12.xml | 15 +- .../metadata/glsa/glsa-200701-13.xml | 17 +- .../metadata/glsa/glsa-200701-14.xml | 15 +- .../metadata/glsa/glsa-200701-15.xml | 23 +- .../metadata/glsa/glsa-200701-16.xml | 23 +- .../metadata/glsa/glsa-200701-17.xml | 15 +- .../metadata/glsa/glsa-200701-18.xml | 15 +- .../metadata/glsa/glsa-200701-19.xml | 15 +- .../metadata/glsa/glsa-200701-20.xml | 15 +- .../metadata/glsa/glsa-200701-21.xml | 17 +- .../metadata/glsa/glsa-200701-22.xml | 17 +- .../metadata/glsa/glsa-200701-23.xml | 15 +- .../metadata/glsa/glsa-200701-24.xml | 15 +- .../metadata/glsa/glsa-200701-25.xml | 17 +- .../metadata/glsa/glsa-200701-26.xml | 15 +- .../metadata/glsa/glsa-200701-27.xml | 13 +- .../metadata/glsa/glsa-200701-28.xml | 15 +- .../metadata/glsa/glsa-200702-01.xml | 17 +- .../metadata/glsa/glsa-200702-02.xml | 15 +- .../metadata/glsa/glsa-200702-03.xml | 15 +- .../metadata/glsa/glsa-200702-04.xml | 17 +- .../metadata/glsa/glsa-200702-05.xml | 15 +- .../metadata/glsa/glsa-200702-06.xml | 19 +- .../metadata/glsa/glsa-200702-07.xml | 21 +- .../metadata/glsa/glsa-200702-08.xml | 23 +- .../metadata/glsa/glsa-200702-09.xml | 17 +- .../metadata/glsa/glsa-200702-10.xml | 23 +- .../metadata/glsa/glsa-200702-11.xml | 15 +- .../metadata/glsa/glsa-200702-12.xml | 15 +- .../metadata/glsa/glsa-200703-01.xml | 13 +- .../metadata/glsa/glsa-200703-02.xml | 15 +- .../metadata/glsa/glsa-200703-03.xml | 17 +- .../metadata/glsa/glsa-200703-04.xml | 41 +- .../metadata/glsa/glsa-200703-05.xml | 17 +- .../metadata/glsa/glsa-200703-06.xml | 17 +- .../metadata/glsa/glsa-200703-07.xml | 15 +- .../metadata/glsa/glsa-200703-08.xml | 35 +- .../metadata/glsa/glsa-200703-09.xml | 21 +- .../metadata/glsa/glsa-200703-10.xml | 15 +- .../metadata/glsa/glsa-200703-11.xml | 15 +- .../metadata/glsa/glsa-200703-12.xml | 13 +- .../metadata/glsa/glsa-200703-13.xml | 13 +- .../metadata/glsa/glsa-200703-14.xml | 11 +- .../metadata/glsa/glsa-200703-15.xml | 17 +- .../metadata/glsa/glsa-200703-16.xml | 15 +- .../metadata/glsa/glsa-200703-17.xml | 15 +- .../metadata/glsa/glsa-200703-18.xml | 25 +- .../metadata/glsa/glsa-200703-19.xml | 17 +- .../metadata/glsa/glsa-200703-20.xml | 15 +- .../metadata/glsa/glsa-200703-21.xml | 43 +- .../metadata/glsa/glsa-200703-22.xml | 15 +- .../metadata/glsa/glsa-200703-23.xml | 23 +- .../metadata/glsa/glsa-200703-24.xml | 17 +- .../metadata/glsa/glsa-200703-25.xml | 15 +- .../metadata/glsa/glsa-200703-26.xml | 15 +- .../metadata/glsa/glsa-200703-27.xml | 15 +- .../metadata/glsa/glsa-200703-28.xml | 15 +- .../metadata/glsa/glsa-200704-01.xml | 13 +- .../metadata/glsa/glsa-200704-02.xml | 17 +- .../metadata/glsa/glsa-200704-03.xml | 15 +- .../metadata/glsa/glsa-200704-04.xml | 13 +- .../metadata/glsa/glsa-200704-05.xml | 15 +- .../metadata/glsa/glsa-200704-06.xml | 17 +- .../metadata/glsa/glsa-200704-07.xml | 17 +- .../metadata/glsa/glsa-200704-08.xml | 15 +- .../metadata/glsa/glsa-200704-09.xml | 15 +- .../metadata/glsa/glsa-200704-10.xml | 15 +- .../metadata/glsa/glsa-200704-11.xml | 15 +- .../metadata/glsa/glsa-200704-12.xml | 23 +- .../metadata/glsa/glsa-200704-13.xml | 15 +- .../metadata/glsa/glsa-200704-14.xml | 15 +- .../metadata/glsa/glsa-200704-15.xml | 17 +- .../metadata/glsa/glsa-200704-16.xml | 15 +- .../metadata/glsa/glsa-200704-17.xml | 15 +- .../metadata/glsa/glsa-200704-18.xml | 13 +- .../metadata/glsa/glsa-200704-19.xml | 15 +- .../metadata/glsa/glsa-200704-20.xml | 23 +- .../metadata/glsa/glsa-200704-21.xml | 17 +- .../metadata/glsa/glsa-200704-22.xml | 17 +- .../metadata/glsa/glsa-200704-23.xml | 15 +- .../metadata/glsa/glsa-200705-01.xml | 19 +- .../metadata/glsa/glsa-200705-02.xml | 15 +- .../metadata/glsa/glsa-200705-03.xml | 15 +- .../metadata/glsa/glsa-200705-04.xml | 17 +- .../metadata/glsa/glsa-200705-05.xml | 15 +- .../metadata/glsa/glsa-200705-06.xml | 15 +- .../metadata/glsa/glsa-200705-07.xml | 17 +- .../metadata/glsa/glsa-200705-08.xml | 13 +- .../metadata/glsa/glsa-200705-09.xml | 15 +- .../metadata/glsa/glsa-200705-10.xml | 21 +- .../metadata/glsa/glsa-200705-11.xml | 17 +- .../metadata/glsa/glsa-200705-12.xml | 18 +- .../metadata/glsa/glsa-200705-13.xml | 15 +- .../metadata/glsa/glsa-200705-14.xml | 15 +- .../metadata/glsa/glsa-200705-15.xml | 17 +- .../metadata/glsa/glsa-200705-16.xml | 17 +- .../metadata/glsa/glsa-200705-17.xml | 15 +- .../metadata/glsa/glsa-200705-18.xml | 15 +- .../metadata/glsa/glsa-200705-19.xml | 47 +- .../metadata/glsa/glsa-200705-20.xml | 23 +- .../metadata/glsa/glsa-200705-21.xml | 19 +- .../metadata/glsa/glsa-200705-22.xml | 15 +- .../metadata/glsa/glsa-200705-23.xml | 21 +- .../metadata/glsa/glsa-200705-24.xml | 15 +- .../metadata/glsa/glsa-200705-25.xml | 13 +- .../metadata/glsa/glsa-200706-01.xml | 13 +- .../metadata/glsa/glsa-200706-02.xml | 15 +- .../metadata/glsa/glsa-200706-03.xml | 15 +- .../metadata/glsa/glsa-200706-04.xml | 19 +- .../metadata/glsa/glsa-200706-05.xml | 23 +- .../metadata/glsa/glsa-200706-06.xml | 39 +- .../metadata/glsa/glsa-200706-07.xml | 21 +- .../metadata/glsa/glsa-200706-08.xml | 19 +- .../metadata/glsa/glsa-200706-09.xml | 15 +- .../metadata/glsa/glsa-200707-01.xml | 13 +- .../metadata/glsa/glsa-200707-02.xml | 19 +- .../metadata/glsa/glsa-200707-03.xml | 15 +- .../metadata/glsa/glsa-200707-04.xml | 13 +- .../metadata/glsa/glsa-200707-05.xml | 15 +- .../metadata/glsa/glsa-200707-06.xml | 13 +- .../metadata/glsa/glsa-200707-07.xml | 15 +- .../metadata/glsa/glsa-200707-08.xml | 15 +- .../metadata/glsa/glsa-200707-09.xml | 17 +- .../metadata/glsa/glsa-200707-10.xml | 11 +- .../metadata/glsa/glsa-200707-11.xml | 19 +- .../metadata/glsa/glsa-200707-12.xml | 15 +- .../metadata/glsa/glsa-200707-13.xml | 15 +- .../metadata/glsa/glsa-200707-14.xml | 15 +- .../metadata/glsa/glsa-200708-01.xml | 19 +- .../metadata/glsa/glsa-200708-02.xml | 15 +- .../metadata/glsa/glsa-200708-03.xml | 19 +- .../metadata/glsa/glsa-200708-04.xml | 15 +- .../metadata/glsa/glsa-200708-05.xml | 29 +- .../metadata/glsa/glsa-200708-06.xml | 17 +- .../metadata/glsa/glsa-200708-07.xml | 15 +- .../metadata/glsa/glsa-200708-08.xml | 17 +- .../metadata/glsa/glsa-200708-09.xml | 41 +- .../metadata/glsa/glsa-200708-10.xml | 17 +- .../metadata/glsa/glsa-200708-11.xml | 23 +- .../metadata/glsa/glsa-200708-12.xml | 23 +- .../metadata/glsa/glsa-200708-13.xml | 17 +- .../metadata/glsa/glsa-200708-14.xml | 15 +- .../metadata/glsa/glsa-200708-15.xml | 15 +- .../metadata/glsa/glsa-200708-16.xml | 15 +- .../metadata/glsa/glsa-200708-17.xml | 23 +- .../metadata/glsa/glsa-200709-01.xml | 17 +- .../metadata/glsa/glsa-200709-02.xml | 15 +- .../metadata/glsa/glsa-200709-03.xml | 15 +- .../metadata/glsa/glsa-200709-04.xml | 15 +- .../metadata/glsa/glsa-200709-05.xml | 15 +- .../metadata/glsa/glsa-200709-06.xml | 15 +- .../metadata/glsa/glsa-200709-07.xml | 15 +- .../metadata/glsa/glsa-200709-08.xml | 13 +- .../metadata/glsa/glsa-200709-09.xml | 13 +- .../metadata/glsa/glsa-200709-10.xml | 15 +- .../metadata/glsa/glsa-200709-11.xml | 15 +- .../metadata/glsa/glsa-200709-12.xml | 15 +- .../metadata/glsa/glsa-200709-13.xml | 15 +- .../metadata/glsa/glsa-200709-14.xml | 15 +- .../metadata/glsa/glsa-200709-15.xml | 29 +- .../metadata/glsa/glsa-200709-16.xml | 15 +- .../metadata/glsa/glsa-200709-17.xml | 19 +- .../metadata/glsa/glsa-200709-18.xml | 17 +- .../metadata/glsa/glsa-200710-01.xml | 17 +- .../metadata/glsa/glsa-200710-02.xml | 69 +- .../metadata/glsa/glsa-200710-03.xml | 21 +- .../metadata/glsa/glsa-200710-04.xml | 15 +- .../metadata/glsa/glsa-200710-05.xml | 15 +- .../metadata/glsa/glsa-200710-06.xml | 19 +- .../metadata/glsa/glsa-200710-07.xml | 15 +- .../metadata/glsa/glsa-200710-08.xml | 21 +- .../metadata/glsa/glsa-200710-09.xml | 19 +- .../metadata/glsa/glsa-200710-10.xml | 15 +- .../metadata/glsa/glsa-200710-11.xml | 19 +- .../metadata/glsa/glsa-200710-12.xml | 15 +- .../metadata/glsa/glsa-200710-13.xml | 17 +- .../metadata/glsa/glsa-200710-14.xml | 15 +- .../metadata/glsa/glsa-200710-15.xml | 17 +- .../metadata/glsa/glsa-200710-16.xml | 15 +- .../metadata/glsa/glsa-200710-17.xml | 15 +- .../metadata/glsa/glsa-200710-18.xml | 15 +- .../metadata/glsa/glsa-200710-19.xml | 21 +- .../metadata/glsa/glsa-200710-20.xml | 15 +- .../metadata/glsa/glsa-200710-21.xml | 15 +- .../metadata/glsa/glsa-200710-22.xml | 15 +- .../metadata/glsa/glsa-200710-23.xml | 15 +- .../metadata/glsa/glsa-200710-24.xml | 17 +- .../metadata/glsa/glsa-200710-25.xml | 13 +- .../metadata/glsa/glsa-200710-26.xml | 15 +- .../metadata/glsa/glsa-200710-27.xml | 21 +- .../metadata/glsa/glsa-200710-28.xml | 15 +- .../metadata/glsa/glsa-200710-29.xml | 17 +- .../metadata/glsa/glsa-200710-30.xml | 15 +- .../metadata/glsa/glsa-200710-31.xml | 15 +- .../metadata/glsa/glsa-200711-01.xml | 17 +- .../metadata/glsa/glsa-200711-02.xml | 15 +- .../metadata/glsa/glsa-200711-03.xml | 15 +- .../metadata/glsa/glsa-200711-04.xml | 17 +- .../metadata/glsa/glsa-200711-05.xml | 23 +- .../metadata/glsa/glsa-200711-06.xml | 25 +- .../metadata/glsa/glsa-200711-07.xml | 17 +- .../metadata/glsa/glsa-200711-08.xml | 19 +- .../metadata/glsa/glsa-200711-09.xml | 15 +- .../metadata/glsa/glsa-200711-10.xml | 13 +- .../metadata/glsa/glsa-200711-11.xml | 17 +- .../metadata/glsa/glsa-200711-12.xml | 15 +- .../metadata/glsa/glsa-200711-13.xml | 19 +- .../metadata/glsa/glsa-200711-14.xml | 37 +- .../metadata/glsa/glsa-200711-15.xml | 15 +- .../metadata/glsa/glsa-200711-16.xml | 13 +- .../metadata/glsa/glsa-200711-17.xml | 19 +- .../metadata/glsa/glsa-200711-18.xml | 15 +- .../metadata/glsa/glsa-200711-19.xml | 19 +- .../metadata/glsa/glsa-200711-20.xml | 17 +- .../metadata/glsa/glsa-200711-21.xml | 17 +- .../metadata/glsa/glsa-200711-22.xml | 25 +- .../metadata/glsa/glsa-200711-23.xml | 49 +- .../metadata/glsa/glsa-200711-24.xml | 21 +- .../metadata/glsa/glsa-200711-25.xml | 15 +- .../metadata/glsa/glsa-200711-26.xml | 21 +- .../metadata/glsa/glsa-200711-27.xml | 15 +- .../metadata/glsa/glsa-200711-28.xml | 15 +- .../metadata/glsa/glsa-200711-29.xml | 15 +- .../metadata/glsa/glsa-200711-30.xml | 33 +- .../metadata/glsa/glsa-200711-31.xml | 15 +- .../metadata/glsa/glsa-200711-32.xml | 15 +- .../metadata/glsa/glsa-200711-33.xml | 15 +- .../metadata/glsa/glsa-200711-34.xml | 21 +- .../metadata/glsa/glsa-200712-01.xml | 13 +- .../metadata/glsa/glsa-200712-02.xml | 15 +- .../metadata/glsa/glsa-200712-03.xml | 17 +- .../metadata/glsa/glsa-200712-04.xml | 15 +- .../metadata/glsa/glsa-200712-05.xml | 15 +- .../metadata/glsa/glsa-200712-06.xml | 17 +- .../metadata/glsa/glsa-200712-07.xml | 15 +- .../metadata/glsa/glsa-200712-08.xml | 17 +- .../metadata/glsa/glsa-200712-09.xml | 15 +- .../metadata/glsa/glsa-200712-10.xml | 13 +- .../metadata/glsa/glsa-200712-11.xml | 15 +- .../metadata/glsa/glsa-200712-12.xml | 15 +- .../metadata/glsa/glsa-200712-13.xml | 15 +- .../metadata/glsa/glsa-200712-14.xml | 21 +- .../metadata/glsa/glsa-200712-15.xml | 17 +- .../metadata/glsa/glsa-200712-16.xml | 15 +- .../metadata/glsa/glsa-200712-17.xml | 19 +- .../metadata/glsa/glsa-200712-18.xml | 17 +- .../metadata/glsa/glsa-200712-19.xml | 15 +- .../metadata/glsa/glsa-200712-20.xml | 17 +- .../metadata/glsa/glsa-200712-21.xml | 25 +- .../metadata/glsa/glsa-200712-22.xml | 21 +- .../metadata/glsa/glsa-200712-23.xml | 45 +- .../metadata/glsa/glsa-200712-24.xml | 15 +- .../metadata/glsa/glsa-200712-25.xml | 19 +- .../metadata/glsa/glsa-200801-01.xml | 15 +- .../metadata/glsa/glsa-200801-02.xml | 15 +- .../metadata/glsa/glsa-200801-03.xml | 15 +- .../metadata/glsa/glsa-200801-04.xml | 15 +- .../metadata/glsa/glsa-200801-05.xml | 15 +- .../metadata/glsa/glsa-200801-06.xml | 19 +- .../metadata/glsa/glsa-200801-07.xml | 31 +- .../metadata/glsa/glsa-200801-08.xml | 15 +- .../metadata/glsa/glsa-200801-09.xml | 27 +- .../metadata/glsa/glsa-200801-10.xml | 19 +- .../metadata/glsa/glsa-200801-11.xml | 17 +- .../metadata/glsa/glsa-200801-12.xml | 17 +- .../metadata/glsa/glsa-200801-13.xml | 15 +- .../metadata/glsa/glsa-200801-14.xml | 13 +- .../metadata/glsa/glsa-200801-15.xml | 25 +- .../metadata/glsa/glsa-200801-16.xml | 15 +- .../metadata/glsa/glsa-200801-17.xml | 15 +- .../metadata/glsa/glsa-200801-18.xml | 15 +- .../metadata/glsa/glsa-200801-19.xml | 17 +- .../metadata/glsa/glsa-200801-20.xml | 15 +- .../metadata/glsa/glsa-200801-21.xml | 15 +- .../metadata/glsa/glsa-200801-22.xml | 15 +- .../metadata/glsa/glsa-200802-01.xml | 17 +- .../metadata/glsa/glsa-200802-02.xml | 17 +- .../metadata/glsa/glsa-200802-03.xml | 13 +- .../metadata/glsa/glsa-200802-04.xml | 31 +- .../metadata/glsa/glsa-200802-05.xml | 15 +- .../metadata/glsa/glsa-200802-06.xml | 17 +- .../metadata/glsa/glsa-200802-07.xml | 15 +- .../metadata/glsa/glsa-200802-08.xml | 17 +- .../metadata/glsa/glsa-200802-09.xml | 17 +- .../metadata/glsa/glsa-200802-10.xml | 17 +- .../metadata/glsa/glsa-200802-11.xml | 21 +- .../metadata/glsa/glsa-200802-12.xml | 19 +- .../metadata/glsa/glsa-200803-01.xml | 27 +- .../metadata/glsa/glsa-200803-02.xml | 17 +- .../metadata/glsa/glsa-200803-03.xml | 15 +- .../metadata/glsa/glsa-200803-04.xml | 15 +- .../metadata/glsa/glsa-200803-05.xml | 15 +- .../metadata/glsa/glsa-200803-06.xml | 15 +- .../metadata/glsa/glsa-200803-07.xml | 15 +- .../metadata/glsa/glsa-200803-08.xml | 29 +- .../metadata/glsa/glsa-200803-09.xml | 19 +- .../metadata/glsa/glsa-200803-10.xml | 17 +- .../metadata/glsa/glsa-200803-11.xml | 15 +- .../metadata/glsa/glsa-200803-12.xml | 15 +- .../metadata/glsa/glsa-200803-13.xml | 25 +- .../metadata/glsa/glsa-200803-14.xml | 19 +- .../metadata/glsa/glsa-200803-15.xml | 15 +- .../metadata/glsa/glsa-200803-16.xml | 21 +- .../metadata/glsa/glsa-200803-17.xml | 15 +- .../metadata/glsa/glsa-200803-18.xml | 21 +- .../metadata/glsa/glsa-200803-19.xml | 23 +- .../metadata/glsa/glsa-200803-20.xml | 17 +- .../metadata/glsa/glsa-200803-21.xml | 17 +- .../metadata/glsa/glsa-200803-22.xml | 15 +- .../metadata/glsa/glsa-200803-23.xml | 17 +- .../metadata/glsa/glsa-200803-24.xml | 17 +- .../metadata/glsa/glsa-200803-25.xml | 17 +- .../metadata/glsa/glsa-200803-26.xml | 15 +- .../metadata/glsa/glsa-200803-27.xml | 23 +- .../metadata/glsa/glsa-200803-28.xml | 17 +- .../metadata/glsa/glsa-200803-29.xml | 19 +- .../metadata/glsa/glsa-200803-30.xml | 33 +- .../metadata/glsa/glsa-200803-31.xml | 23 +- .../metadata/glsa/glsa-200803-32.xml | 19 +- .../metadata/glsa/glsa-200804-01.xml | 21 +- .../metadata/glsa/glsa-200804-02.xml | 15 +- .../metadata/glsa/glsa-200804-03.xml | 17 +- .../metadata/glsa/glsa-200804-04.xml | 19 +- .../metadata/glsa/glsa-200804-05.xml | 17 +- .../metadata/glsa/glsa-200804-06.xml | 15 +- .../metadata/glsa/glsa-200804-07.xml | 15 +- .../metadata/glsa/glsa-200804-08.xml | 17 +- .../metadata/glsa/glsa-200804-09.xml | 15 +- .../metadata/glsa/glsa-200804-10.xml | 25 +- .../metadata/glsa/glsa-200804-11.xml | 15 +- .../metadata/glsa/glsa-200804-12.xml | 15 +- .../metadata/glsa/glsa-200804-13.xml | 19 +- .../metadata/glsa/glsa-200804-14.xml | 17 +- .../metadata/glsa/glsa-200804-15.xml | 15 +- .../metadata/glsa/glsa-200804-16.xml | 15 +- .../metadata/glsa/glsa-200804-17.xml | 15 +- .../metadata/glsa/glsa-200804-18.xml | 13 +- .../metadata/glsa/glsa-200804-19.xml | 15 +- .../metadata/glsa/glsa-200804-20.xml | 85 +- .../metadata/glsa/glsa-200804-21.xml | 27 +- .../metadata/glsa/glsa-200804-22.xml | 17 +- .../metadata/glsa/glsa-200804-23.xml | 15 +- .../metadata/glsa/glsa-200804-24.xml | 15 +- .../metadata/glsa/glsa-200804-25.xml | 27 +- .../metadata/glsa/glsa-200804-26.xml | 15 +- .../metadata/glsa/glsa-200804-27.xml | 23 +- .../metadata/glsa/glsa-200804-28.xml | 17 +- .../metadata/glsa/glsa-200804-29.xml | 17 +- .../metadata/glsa/glsa-200804-30.xml | 13 +- .../metadata/glsa/glsa-200805-01.xml | 25 +- .../metadata/glsa/glsa-200805-02.xml | 15 +- .../metadata/glsa/glsa-200805-03.xml | 29 +- .../metadata/glsa/glsa-200805-04.xml | 17 +- .../metadata/glsa/glsa-200805-05.xml | 19 +- .../metadata/glsa/glsa-200805-06.xml | 13 +- .../metadata/glsa/glsa-200805-07.xml | 29 +- .../metadata/glsa/glsa-200805-08.xml | 15 +- .../metadata/glsa/glsa-200805-09.xml | 15 +- .../metadata/glsa/glsa-200805-10.xml | 17 +- .../metadata/glsa/glsa-200805-11.xml | 15 +- .../metadata/glsa/glsa-200805-12.xml | 17 +- .../metadata/glsa/glsa-200805-13.xml | 25 +- .../metadata/glsa/glsa-200805-14.xml | 15 +- .../metadata/glsa/glsa-200805-15.xml | 15 +- .../metadata/glsa/glsa-200805-16.xml | 29 +- .../metadata/glsa/glsa-200805-17.xml | 17 +- .../metadata/glsa/glsa-200805-18.xml | 71 +- .../metadata/glsa/glsa-200805-19.xml | 25 +- .../metadata/glsa/glsa-200805-20.xml | 17 +- .../metadata/glsa/glsa-200805-21.xml | 17 +- .../metadata/glsa/glsa-200805-22.xml | 15 +- .../metadata/glsa/glsa-200805-23.xml | 15 +- .../metadata/glsa/glsa-200806-01.xml | 15 +- .../metadata/glsa/glsa-200806-02.xml | 15 +- .../metadata/glsa/glsa-200806-03.xml | 15 +- .../metadata/glsa/glsa-200806-04.xml | 19 +- .../metadata/glsa/glsa-200806-05.xml | 15 +- .../metadata/glsa/glsa-200806-06.xml | 17 +- .../metadata/glsa/glsa-200806-07.xml | 33 +- .../metadata/glsa/glsa-200806-08.xml | 17 +- .../metadata/glsa/glsa-200806-09.xml | 19 +- .../metadata/glsa/glsa-200806-10.xml | 19 +- .../metadata/glsa/glsa-200806-11.xml | 21 +- .../metadata/glsa/glsa-200807-01.xml | 19 +- .../metadata/glsa/glsa-200807-02.xml | 15 +- .../metadata/glsa/glsa-200807-03.xml | 15 +- .../metadata/glsa/glsa-200807-04.xml | 13 +- .../metadata/glsa/glsa-200807-05.xml | 17 +- .../metadata/glsa/glsa-200807-06.xml | 19 +- .../metadata/glsa/glsa-200807-07.xml | 15 +- .../metadata/glsa/glsa-200807-08.xml | 15 +- .../metadata/glsa/glsa-200807-09.xml | 15 +- .../metadata/glsa/glsa-200807-10.xml | 13 +- .../metadata/glsa/glsa-200807-11.xml | 15 +- .../metadata/glsa/glsa-200807-12.xml | 17 +- .../metadata/glsa/glsa-200807-13.xml | 17 +- .../metadata/glsa/glsa-200807-14.xml | 13 +- .../metadata/glsa/glsa-200807-15.xml | 15 +- .../metadata/glsa/glsa-200807-16.xml | 23 +- .../metadata/glsa/glsa-200808-01.xml | 19 +- .../metadata/glsa/glsa-200808-02.xml | 17 +- .../metadata/glsa/glsa-200808-03.xml | 59 +- .../metadata/glsa/glsa-200808-04.xml | 25 +- .../metadata/glsa/glsa-200808-05.xml | 15 +- .../metadata/glsa/glsa-200808-06.xml | 15 +- .../metadata/glsa/glsa-200808-07.xml | 19 +- .../metadata/glsa/glsa-200808-08.xml | 15 +- .../metadata/glsa/glsa-200808-09.xml | 13 +- .../metadata/glsa/glsa-200808-10.xml | 13 +- .../metadata/glsa/glsa-200808-11.xml | 17 +- .../metadata/glsa/glsa-200808-12.xml | 17 +- .../metadata/glsa/glsa-200809-01.xml | 17 +- .../metadata/glsa/glsa-200809-02.xml | 17 +- .../metadata/glsa/glsa-200809-03.xml | 13 +- .../metadata/glsa/glsa-200809-04.xml | 13 +- .../metadata/glsa/glsa-200809-05.xml | 15 +- .../metadata/glsa/glsa-200809-06.xml | 17 +- .../metadata/glsa/glsa-200809-07.xml | 15 +- .../metadata/glsa/glsa-200809-08.xml | 15 +- .../metadata/glsa/glsa-200809-09.xml | 17 +- .../metadata/glsa/glsa-200809-10.xml | 21 +- .../metadata/glsa/glsa-200809-11.xml | 15 +- .../metadata/glsa/glsa-200809-12.xml | 15 +- .../metadata/glsa/glsa-200809-13.xml | 15 +- .../metadata/glsa/glsa-200809-14.xml | 17 +- .../metadata/glsa/glsa-200809-15.xml | 15 +- .../metadata/glsa/glsa-200809-16.xml | 15 +- .../metadata/glsa/glsa-200809-17.xml | 21 +- .../metadata/glsa/glsa-200809-18.xml | 21 +- .../metadata/glsa/glsa-200810-01.xml | 17 +- .../metadata/glsa/glsa-200810-02.xml | 13 +- .../metadata/glsa/glsa-200810-03.xml | 15 +- .../metadata/glsa/glsa-200811-01.xml | 39 +- .../metadata/glsa/glsa-200811-02.xml | 23 +- .../metadata/glsa/glsa-200811-03.xml | 15 +- .../metadata/glsa/glsa-200811-04.xml | 15 +- .../metadata/glsa/glsa-200811-05.xml | 41 +- .../metadata/glsa/glsa-200812-01.xml | 15 +- .../metadata/glsa/glsa-200812-02.xml | 17 +- .../metadata/glsa/glsa-200812-03.xml | 17 +- .../metadata/glsa/glsa-200812-04.xml | 19 +- .../metadata/glsa/glsa-200812-05.xml | 15 +- .../metadata/glsa/glsa-200812-06.xml | 23 +- .../metadata/glsa/glsa-200812-07.xml | 21 +- .../metadata/glsa/glsa-200812-08.xml | 15 +- .../metadata/glsa/glsa-200812-09.xml | 15 +- .../metadata/glsa/glsa-200812-10.xml | 15 +- .../metadata/glsa/glsa-200812-11.xml | 19 +- .../metadata/glsa/glsa-200812-12.xml | 15 +- .../metadata/glsa/glsa-200812-13.xml | 21 +- .../metadata/glsa/glsa-200812-14.xml | 15 +- .../metadata/glsa/glsa-200812-15.xml | 25 +- .../metadata/glsa/glsa-200812-16.xml | 19 +- .../metadata/glsa/glsa-200812-17.xml | 37 +- .../metadata/glsa/glsa-200812-18.xml | 17 +- .../metadata/glsa/glsa-200812-19.xml | 17 +- .../metadata/glsa/glsa-200812-20.xml | 21 +- .../metadata/glsa/glsa-200812-21.xml | 17 +- .../metadata/glsa/glsa-200812-22.xml | 15 +- .../metadata/glsa/glsa-200812-23.xml | 15 +- .../metadata/glsa/glsa-200812-24.xml | 19 +- .../metadata/glsa/glsa-200901-01.xml | 15 +- .../metadata/glsa/glsa-200901-02.xml | 21 +- .../metadata/glsa/glsa-200901-03.xml | 17 +- .../metadata/glsa/glsa-200901-04.xml | 15 +- .../metadata/glsa/glsa-200901-05.xml | 15 +- .../metadata/glsa/glsa-200901-06.xml | 17 +- .../metadata/glsa/glsa-200901-07.xml | 19 +- .../metadata/glsa/glsa-200901-08.xml | 19 +- .../metadata/glsa/glsa-200901-09.xml | 27 +- .../metadata/glsa/glsa-200901-10.xml | 15 +- .../metadata/glsa/glsa-200901-11.xml | 15 +- .../metadata/glsa/glsa-200901-12.xml | 15 +- .../metadata/glsa/glsa-200901-13.xml | 21 +- .../metadata/glsa/glsa-200901-14.xml | 15 +- .../metadata/glsa/glsa-200901-15.xml | 15 +- .../metadata/glsa/glsa-200902-01.xml | 15 +- .../metadata/glsa/glsa-200902-02.xml | 15 +- .../metadata/glsa/glsa-200902-03.xml | 15 +- .../metadata/glsa/glsa-200902-04.xml | 15 +- .../metadata/glsa/glsa-200902-05.xml | 17 +- .../metadata/glsa/glsa-200902-06.xml | 19 +- .../metadata/glsa/glsa-200903-01.xml | 15 +- .../metadata/glsa/glsa-200903-02.xml | 15 +- .../metadata/glsa/glsa-200903-03.xml | 15 +- .../metadata/glsa/glsa-200903-04.xml | 15 +- .../metadata/glsa/glsa-200903-05.xml | 17 +- .../metadata/glsa/glsa-200903-06.xml | 15 +- .../metadata/glsa/glsa-200903-07.xml | 15 +- .../metadata/glsa/glsa-200903-08.xml | 15 +- .../metadata/glsa/glsa-200903-09.xml | 19 +- .../metadata/glsa/glsa-200903-10.xml | 15 +- .../metadata/glsa/glsa-200903-11.xml | 15 +- .../metadata/glsa/glsa-200903-12.xml | 15 +- .../metadata/glsa/glsa-200903-13.xml | 15 +- .../metadata/glsa/glsa-200903-14.xml | 17 +- .../metadata/glsa/glsa-200903-15.xml | 19 +- .../metadata/glsa/glsa-200903-16.xml | 15 +- .../metadata/glsa/glsa-200903-17.xml | 15 +- .../metadata/glsa/glsa-200903-18.xml | 15 +- .../metadata/glsa/glsa-200903-19.xml | 15 +- .../metadata/glsa/glsa-200903-20.xml | 19 +- .../metadata/glsa/glsa-200903-21.xml | 15 +- .../metadata/glsa/glsa-200903-22.xml | 15 +- .../metadata/glsa/glsa-200903-23.xml | 45 +- .../metadata/glsa/glsa-200903-24.xml | 15 +- .../metadata/glsa/glsa-200903-25.xml | 15 +- .../metadata/glsa/glsa-200903-26.xml | 15 +- .../metadata/glsa/glsa-200903-27.xml | 17 +- .../metadata/glsa/glsa-200903-28.xml | 19 +- .../metadata/glsa/glsa-200903-29.xml | 17 +- .../metadata/glsa/glsa-200903-30.xml | 27 +- .../metadata/glsa/glsa-200903-31.xml | 13 +- .../metadata/glsa/glsa-200903-32.xml | 25 +- .../metadata/glsa/glsa-200903-33.xml | 29 +- .../metadata/glsa/glsa-200903-34.xml | 17 +- .../metadata/glsa/glsa-200903-35.xml | 15 +- .../metadata/glsa/glsa-200903-36.xml | 15 +- .../metadata/glsa/glsa-200903-37.xml | 21 +- .../metadata/glsa/glsa-200903-38.xml | 21 +- .../metadata/glsa/glsa-200903-39.xml | 17 +- .../metadata/glsa/glsa-200903-40.xml | 17 +- .../metadata/glsa/glsa-200903-41.xml | 19 +- .../metadata/glsa/glsa-200904-01.xml | 23 +- .../metadata/glsa/glsa-200904-02.xml | 17 +- .../metadata/glsa/glsa-200904-03.xml | 13 +- .../metadata/glsa/glsa-200904-04.xml | 15 +- .../metadata/glsa/glsa-200904-05.xml | 17 +- .../metadata/glsa/glsa-200904-06.xml | 15 +- .../metadata/glsa/glsa-200904-07.xml | 15 +- .../metadata/glsa/glsa-200904-08.xml | 15 +- .../metadata/glsa/glsa-200904-09.xml | 19 +- .../metadata/glsa/glsa-200904-10.xml | 15 +- .../metadata/glsa/glsa-200904-11.xml | 27 +- .../metadata/glsa/glsa-200904-12.xml | 15 +- .../metadata/glsa/glsa-200904-13.xml | 13 +- .../metadata/glsa/glsa-200904-14.xml | 19 +- .../metadata/glsa/glsa-200904-15.xml | 15 +- .../metadata/glsa/glsa-200904-16.xml | 15 +- .../metadata/glsa/glsa-200904-17.xml | 25 +- .../metadata/glsa/glsa-200904-18.xml | 17 +- .../metadata/glsa/glsa-200904-19.xml | 21 +- .../metadata/glsa/glsa-200904-20.xml | 23 +- .../metadata/glsa/glsa-200905-01.xml | 27 +- .../metadata/glsa/glsa-200905-02.xml | 17 +- .../metadata/glsa/glsa-200905-03.xml | 17 +- .../metadata/glsa/glsa-200905-04.xml | 19 +- .../metadata/glsa/glsa-200905-05.xml | 15 +- .../metadata/glsa/glsa-200905-06.xml | 15 +- .../metadata/glsa/glsa-200905-07.xml | 21 +- .../metadata/glsa/glsa-200905-08.xml | 15 +- .../metadata/glsa/glsa-200905-09.xml | 17 +- .../metadata/glsa/glsa-200906-01.xml | 15 +- .../metadata/glsa/glsa-200906-02.xml | 13 +- .../metadata/glsa/glsa-200906-03.xml | 15 +- .../metadata/glsa/glsa-200906-04.xml | 15 +- .../metadata/glsa/glsa-200906-05.xml | 43 +- .../metadata/glsa/glsa-200907-01.xml | 15 +- .../metadata/glsa/glsa-200907-02.xml | 17 +- .../metadata/glsa/glsa-200907-03.xml | 19 +- .../metadata/glsa/glsa-200907-04.xml | 21 +- .../metadata/glsa/glsa-200907-05.xml | 15 +- .../metadata/glsa/glsa-200907-06.xml | 45 +- .../metadata/glsa/glsa-200907-07.xml | 21 +- .../metadata/glsa/glsa-200907-08.xml | 23 +- .../metadata/glsa/glsa-200907-09.xml | 15 +- .../metadata/glsa/glsa-200907-10.xml | 17 +- .../metadata/glsa/glsa-200907-11.xml | 27 +- .../metadata/glsa/glsa-200907-12.xml | 15 +- .../metadata/glsa/glsa-200907-13.xml | 15 +- .../metadata/glsa/glsa-200907-14.xml | 17 +- .../metadata/glsa/glsa-200907-15.xml | 21 +- .../metadata/glsa/glsa-200907-16.xml | 17 +- .../metadata/glsa/glsa-200908-01.xml | 17 +- .../metadata/glsa/glsa-200908-02.xml | 13 +- .../metadata/glsa/glsa-200908-03.xml | 17 +- .../metadata/glsa/glsa-200908-04.xml | 33 +- .../metadata/glsa/glsa-200908-05.xml | 15 +- .../metadata/glsa/glsa-200908-06.xml | 15 +- .../metadata/glsa/glsa-200908-07.xml | 19 +- .../metadata/glsa/glsa-200908-08.xml | 15 +- .../metadata/glsa/glsa-200908-09.xml | 15 +- .../metadata/glsa/glsa-200908-10.xml | 15 +- .../metadata/glsa/glsa-200909-01.xml | 15 +- .../metadata/glsa/glsa-200909-02.xml | 15 +- .../metadata/glsa/glsa-200909-03.xml | 17 +- .../metadata/glsa/glsa-200909-04.xml | 21 +- .../metadata/glsa/glsa-200909-05.xml | 17 +- .../metadata/glsa/glsa-200909-06.xml | 15 +- .../metadata/glsa/glsa-200909-07.xml | 15 +- .../metadata/glsa/glsa-200909-08.xml | 15 +- .../metadata/glsa/glsa-200909-09.xml | 15 +- .../metadata/glsa/glsa-200909-10.xml | 13 +- .../metadata/glsa/glsa-200909-11.xml | 15 +- .../metadata/glsa/glsa-200909-12.xml | 15 +- .../metadata/glsa/glsa-200909-13.xml | 15 +- .../metadata/glsa/glsa-200909-14.xml | 25 +- .../metadata/glsa/glsa-200909-15.xml | 19 +- .../metadata/glsa/glsa-200909-16.xml | 23 +- .../metadata/glsa/glsa-200909-17.xml | 15 +- .../metadata/glsa/glsa-200909-18.xml | 19 +- .../metadata/glsa/glsa-200909-19.xml | 15 +- .../metadata/glsa/glsa-200909-20.xml | 15 +- .../metadata/glsa/glsa-200910-01.xml | 15 +- .../metadata/glsa/glsa-200910-02.xml | 23 +- .../metadata/glsa/glsa-200910-03.xml | 57 +- .../metadata/glsa/glsa-200911-01.xml | 21 +- .../metadata/glsa/glsa-200911-02.xml | 205 ++-- .../metadata/glsa/glsa-200911-03.xml | 21 +- .../metadata/glsa/glsa-200911-04.xml | 15 +- .../metadata/glsa/glsa-200911-05.xml | 29 +- .../metadata/glsa/glsa-200911-06.xml | 15 +- .../metadata/glsa/glsa-200912-01.xml | 25 +- .../metadata/glsa/glsa-200912-02.xml | 33 +- .../metadata/glsa/glsa-201001-01.xml | 15 +- .../metadata/glsa/glsa-201001-02.xml | 25 +- .../metadata/glsa/glsa-201001-03.xml | 61 +- .../metadata/glsa/glsa-201001-04.xml | 23 +- .../metadata/glsa/glsa-201001-05.xml | 15 +- .../metadata/glsa/glsa-201001-06.xml | 17 +- .../metadata/glsa/glsa-201001-07.xml | 15 +- .../metadata/glsa/glsa-201001-08.xml | 21 +- .../metadata/glsa/glsa-201001-09.xml | 17 +- .../metadata/glsa/glsa-201003-01.xml | 17 +- .../metadata/glsa/glsa-201006-01.xml | 21 +- .../metadata/glsa/glsa-201006-02.xml | 17 +- .../metadata/glsa/glsa-201006-03.xml | 15 +- .../metadata/glsa/glsa-201006-04.xml | 51 +- .../metadata/glsa/glsa-201006-05.xml | 21 +- .../metadata/glsa/glsa-201006-06.xml | 15 +- .../metadata/glsa/glsa-201006-07.xml | 23 +- .../metadata/glsa/glsa-201006-08.xml | 17 +- .../metadata/glsa/glsa-201006-09.xml | 15 +- .../metadata/glsa/glsa-201006-10.xml | 15 +- .../metadata/glsa/glsa-201006-11.xml | 21 +- .../metadata/glsa/glsa-201006-12.xml | 17 +- .../metadata/glsa/glsa-201006-13.xml | 21 +- .../metadata/glsa/glsa-201006-14.xml | 15 +- .../metadata/glsa/glsa-201006-15.xml | 15 +- .../metadata/glsa/glsa-201006-16.xml | 15 +- .../metadata/glsa/glsa-201006-17.xml | 15 +- .../metadata/glsa/glsa-201006-18.xml | 77 +- .../metadata/glsa/glsa-201006-19.xml | 39 +- .../metadata/glsa/glsa-201006-20.xml | 23 +- .../metadata/glsa/glsa-201006-21.xml | 17 +- .../metadata/glsa/glsa-201009-01.xml | 17 +- .../metadata/glsa/glsa-201009-02.xml | 15 +- .../metadata/glsa/glsa-201009-03.xml | 17 +- .../metadata/glsa/glsa-201009-04.xml | 15 +- .../metadata/glsa/glsa-201009-05.xml | 95 +- .../metadata/glsa/glsa-201009-06.xml | 21 +- .../metadata/glsa/glsa-201009-07.xml | 17 +- .../metadata/glsa/glsa-201009-08.xml | 13 +- .../metadata/glsa/glsa-201009-09.xml | 15 +- .../metadata/glsa/glsa-201010-01.xml | 16 +- .../metadata/glsa/glsa-201011-01.xml | 25 +- .../metadata/glsa/glsa-201012-01.xml | 33 +- .../metadata/glsa/glsa-201101-01.xml | 15 +- .../metadata/glsa/glsa-201101-02.xml | 15 +- .../metadata/glsa/glsa-201101-03.xml | 15 +- .../metadata/glsa/glsa-201101-04.xml | 15 +- .../metadata/glsa/glsa-201101-05.xml | 15 +- .../metadata/glsa/glsa-201101-06.xml | 15 +- .../metadata/glsa/glsa-201101-07.xml | 15 +- .../metadata/glsa/glsa-201101-08.xml | 59 +- .../metadata/glsa/glsa-201101-09.xml | 135 ++- .../metadata/glsa/glsa-201110-01.xml | 34 +- .../metadata/glsa/glsa-201110-02.xml | 88 +- .../metadata/glsa/glsa-201110-03.xml | 44 +- .../metadata/glsa/glsa-201110-04.xml | 30 +- .../metadata/glsa/glsa-201110-05.xml | 12 +- .../metadata/glsa/glsa-201110-06.xml | 140 +-- .../metadata/glsa/glsa-201110-07.xml | 10 +- .../metadata/glsa/glsa-201110-08.xml | 14 +- .../metadata/glsa/glsa-201110-09.xml | 10 +- .../metadata/glsa/glsa-201110-10.xml | 10 +- .../metadata/glsa/glsa-201110-11.xml | 118 +- .../metadata/glsa/glsa-201110-12.xml | 12 +- .../metadata/glsa/glsa-201110-13.xml | 24 +- .../metadata/glsa/glsa-201110-14.xml | 14 +- .../metadata/glsa/glsa-201110-15.xml | 10 +- .../metadata/glsa/glsa-201110-16.xml | 14 +- .../metadata/glsa/glsa-201110-17.xml | 12 +- .../metadata/glsa/glsa-201110-18.xml | 10 +- .../metadata/glsa/glsa-201110-19.xml | 12 +- .../metadata/glsa/glsa-201110-20.xml | 24 +- .../metadata/glsa/glsa-201110-21.xml | 30 +- .../metadata/glsa/glsa-201110-22.xml | 38 +- .../metadata/glsa/glsa-201110-23.xml | 10 +- .../metadata/glsa/glsa-201110-24.xml | 24 +- .../metadata/glsa/glsa-201110-25.xml | 12 +- .../metadata/glsa/glsa-201110-26.xml | 18 +- .../metadata/glsa/glsa-201111-01.xml | 156 +-- .../metadata/glsa/glsa-201111-02.xml | 170 +-- .../metadata/glsa/glsa-201111-03.xml | 16 +- .../metadata/glsa/glsa-201111-04.xml | 10 +- .../metadata/glsa/glsa-201111-05.xml | 28 +- .../metadata/glsa/glsa-201111-06.xml | 10 +- .../metadata/glsa/glsa-201111-07.xml | 14 +- .../metadata/glsa/glsa-201111-08.xml | 18 +- .../metadata/glsa/glsa-201111-09.xml | 10 +- .../metadata/glsa/glsa-201111-10.xml | 16 +- .../metadata/glsa/glsa-201111-11.xml | 10 +- .../metadata/glsa/glsa-201111-12.xml | 14 +- .../metadata/glsa/glsa-201201-01.xml | 96 +- .../metadata/glsa/glsa-201201-02.xml | 70 +- .../metadata/glsa/glsa-201201-03.xml | 38 +- .../metadata/glsa/glsa-201201-04.xml | 10 +- .../metadata/glsa/glsa-201201-05.xml | 20 +- .../metadata/glsa/glsa-201201-06.xml | 10 +- .../metadata/glsa/glsa-201201-07.xml | 10 +- .../metadata/glsa/glsa-201201-08.xml | 10 +- .../metadata/glsa/glsa-201201-09.xml | 50 +- .../metadata/glsa/glsa-201201-10.xml | 12 +- .../metadata/glsa/glsa-201201-11.xml | 12 +- .../metadata/glsa/glsa-201201-12.xml | 14 +- .../metadata/glsa/glsa-201201-13.xml | 52 +- .../metadata/glsa/glsa-201201-14.xml | 12 +- .../metadata/glsa/glsa-201201-15.xml | 12 +- .../metadata/glsa/glsa-201201-16.xml | 10 +- .../metadata/glsa/glsa-201201-17.xml | 20 +- .../metadata/glsa/glsa-201201-18.xml | 12 +- .../metadata/glsa/glsa-201201-19.xml | 118 +- .../metadata/glsa/glsa-201202-01.xml | 74 +- .../metadata/glsa/glsa-201202-02.xml | 26 +- .../metadata/glsa/glsa-201202-03.xml | 10 +- .../metadata/glsa/glsa-201202-04.xml | 12 +- .../metadata/glsa/glsa-201202-05.xml | 10 +- .../metadata/glsa/glsa-201202-06.xml | 10 +- .../metadata/glsa/glsa-201202-07.xml | 16 +- .../metadata/glsa/glsa-201202-08.xml | 10 +- .../metadata/glsa/glsa-201202-09.xml | 10 +- .../metadata/glsa/glsa-201203-01.xml | 10 +- .../metadata/glsa/glsa-201203-02.xml | 16 +- .../metadata/glsa/glsa-201203-03.xml | 26 +- .../metadata/glsa/glsa-201203-04.xml | 10 +- .../metadata/glsa/glsa-201203-05.xml | 10 +- .../metadata/glsa/glsa-201203-06.xml | 12 +- .../metadata/glsa/glsa-201203-07.xml | 12 +- .../metadata/glsa/glsa-201203-08.xml | 10 +- .../metadata/glsa/glsa-201203-09.xml | 12 +- .../metadata/glsa/glsa-201203-10.xml | 12 +- .../metadata/glsa/glsa-201203-11.xml | 10 +- .../metadata/glsa/glsa-201203-12.xml | 22 +- .../metadata/glsa/glsa-201203-13.xml | 12 +- .../metadata/glsa/glsa-201203-14.xml | 18 +- .../metadata/glsa/glsa-201203-15.xml | 12 +- .../metadata/glsa/glsa-201203-16.xml | 20 +- .../metadata/glsa/glsa-201203-17.xml | 12 +- .../metadata/glsa/glsa-201203-18.xml | 8 +- .../metadata/glsa/glsa-201203-19.xml | 66 +- .../metadata/glsa/glsa-201203-20.xml | 10 +- .../metadata/glsa/glsa-201203-21.xml | 16 +- .../metadata/glsa/glsa-201203-22.xml | 18 +- .../metadata/glsa/glsa-201203-23.xml | 12 +- .../metadata/glsa/glsa-201203-24.xml | 28 +- .../metadata/glsa/glsa-201204-01.xml | 18 +- .../metadata/glsa/glsa-201204-02.xml | 10 +- .../metadata/glsa/glsa-201204-03.xml | 34 +- .../metadata/glsa/glsa-201204-04.xml | 46 +- .../metadata/glsa/glsa-201204-05.xml | 10 +- .../metadata/glsa/glsa-201204-06.xml | 14 +- .../metadata/glsa/glsa-201204-07.xml | 50 +- .../metadata/glsa/glsa-201204-08.xml | 10 +- .../metadata/glsa/glsa-201205-01.xml | 16 +- .../metadata/glsa/glsa-201205-02.xml | 14 +- .../metadata/glsa/glsa-201205-03.xml | 42 +- .../metadata/glsa/glsa-201205-04.xml | 28 +- .../metadata/glsa/glsa-201206-01.xml | 26 +- .../metadata/glsa/glsa-201206-02.xml | 10 +- .../metadata/glsa/glsa-201206-03.xml | 212 ++-- .../metadata/glsa/glsa-201206-04.xml | 10 +- .../metadata/glsa/glsa-201206-05.xml | 18 +- .../metadata/glsa/glsa-201206-06.xml | 10 +- .../metadata/glsa/glsa-201206-07.xml | 10 +- .../metadata/glsa/glsa-201206-08.xml | 12 +- .../metadata/glsa/glsa-201206-09.xml | 38 +- .../metadata/glsa/glsa-201206-10.xml | 14 +- .../metadata/glsa/glsa-201206-11.xml | 14 +- .../metadata/glsa/glsa-201206-12.xml | 2 +- .../metadata/glsa/glsa-201206-13.xml | 28 +- .../metadata/glsa/glsa-201206-14.xml | 24 +- .../metadata/glsa/glsa-201206-15.xml | 26 +- .../metadata/glsa/glsa-201206-16.xml | 14 +- .../metadata/glsa/glsa-201206-17.xml | 10 +- .../metadata/glsa/glsa-201206-18.xml | 16 +- .../metadata/glsa/glsa-201206-19.xml | 10 +- .../metadata/glsa/glsa-201206-20.xml | 12 +- .../metadata/glsa/glsa-201206-21.xml | 24 +- .../metadata/glsa/glsa-201206-22.xml | 34 +- .../metadata/glsa/glsa-201206-23.xml | 10 +- .../metadata/glsa/glsa-201206-24.xml | 72 +- .../metadata/glsa/glsa-201206-25.xml | 34 +- .../metadata/glsa/glsa-201206-26.xml | 24 +- .../metadata/glsa/glsa-201206-27.xml | 10 +- .../metadata/glsa/glsa-201206-28.xml | 16 +- .../metadata/glsa/glsa-201206-29.xml | 12 +- .../metadata/glsa/glsa-201206-30.xml | 10 +- .../metadata/glsa/glsa-201206-31.xml | 28 +- .../metadata/glsa/glsa-201206-32.xml | 10 +- .../metadata/glsa/glsa-201206-33.xml | 12 +- .../metadata/glsa/glsa-201206-34.xml | 10 +- .../metadata/glsa/glsa-201206-35.xml | 12 +- .../metadata/glsa/glsa-201206-36.xml | 16 +- .../metadata/glsa/glsa-201207-01.xml | 10 +- .../metadata/glsa/glsa-201207-02.xml | 10 +- .../metadata/glsa/glsa-201207-03.xml | 10 +- .../metadata/glsa/glsa-201207-04.xml | 10 +- .../metadata/glsa/glsa-201207-05.xml | 10 +- .../metadata/glsa/glsa-201207-06.xml | 10 +- .../metadata/glsa/glsa-201207-07.xml | 10 +- .../metadata/glsa/glsa-201207-08.xml | 12 +- .../metadata/glsa/glsa-201207-09.xml | 12 +- .../metadata/glsa/glsa-201207-10.xml | 28 +- .../metadata/glsa/glsa-201208-01.xml | 10 +- .../metadata/glsa/glsa-201208-02.xml | 18 +- .../metadata/glsa/glsa-201208-03.xml | 66 +- .../metadata/glsa/glsa-201208-04.xml | 14 +- .../metadata/glsa/glsa-201208-05.xml | 10 +- .../metadata/glsa/glsa-201208-06.xml | 10 +- .../metadata/glsa/glsa-201209-01.xml | 22 +- .../metadata/glsa/glsa-201209-02.xml | 58 +- .../metadata/glsa/glsa-201209-03.xml | 46 +- .../metadata/glsa/glsa-201209-04.xml | 18 +- .../metadata/glsa/glsa-201209-05.xml | 16 +- .../metadata/glsa/glsa-201209-06.xml | 18 +- .../metadata/glsa/glsa-201209-07.xml | 10 +- .../metadata/glsa/glsa-201209-08.xml | 12 +- .../metadata/glsa/glsa-201209-09.xml | 10 +- .../metadata/glsa/glsa-201209-10.xml | 10 +- .../metadata/glsa/glsa-201209-11.xml | 22 +- .../metadata/glsa/glsa-201209-12.xml | 10 +- .../metadata/glsa/glsa-201209-13.xml | 10 +- .../metadata/glsa/glsa-201209-14.xml | 10 +- .../metadata/glsa/glsa-201209-15.xml | 16 +- .../metadata/glsa/glsa-201209-16.xml | 10 +- .../metadata/glsa/glsa-201209-17.xml | 10 +- .../metadata/glsa/glsa-201209-18.xml | 12 +- .../metadata/glsa/glsa-201209-19.xml | 10 +- .../metadata/glsa/glsa-201209-20.xml | 10 +- .../metadata/glsa/glsa-201209-21.xml | 12 +- .../metadata/glsa/glsa-201209-22.xml | 10 +- .../metadata/glsa/glsa-201209-23.xml | 28 +- .../metadata/glsa/glsa-201209-24.xml | 22 +- .../metadata/glsa/glsa-201209-25.xml | 82 +- .../metadata/glsa/glsa-201210-01.xml | 10 +- .../metadata/glsa/glsa-201210-02.xml | 26 +- .../metadata/glsa/glsa-201210-03.xml | 10 +- .../metadata/glsa/glsa-201210-04.xml | 20 +- .../metadata/glsa/glsa-201210-05.xml | 12 +- .../metadata/glsa/glsa-201210-06.xml | 38 +- .../metadata/glsa/glsa-201210-07.xml | 82 +- .../metadata/glsa/glsa-201211-01.xml | 46 +- .../metadata/glsa/glsa-201301-01.xml | 1028 ++++++++--------- .../metadata/glsa/glsa-201301-02.xml | 10 +- .../metadata/glsa/glsa-201301-03.xml | 20 +- .../metadata/glsa/glsa-201301-04.xml | 10 +- .../metadata/glsa/glsa-201301-05.xml | 10 +- .../metadata/glsa/glsa-201301-06.xml | 26 +- .../metadata/glsa/glsa-201301-07.xml | 20 +- .../metadata/glsa/glsa-201304-01.xml | 12 +- .../metadata/glsa/glsa-201307-01.xml | 12 +- .../metadata/glsa/glsa-201308-01.xml | 12 +- .../metadata/glsa/glsa-201308-02.xml | 10 +- .../metadata/glsa/glsa-201308-03.xml | 158 +-- .../metadata/glsa/glsa-201308-04.xml | 30 +- .../metadata/glsa/glsa-201308-05.xml | 124 +- .../metadata/glsa/glsa-201308-06.xml | 210 ++-- .../metadata/glsa/glsa-201309-01.xml | 10 +- .../metadata/glsa/glsa-201309-02.xml | 14 +- .../metadata/glsa/glsa-201309-03.xml | 12 +- .../metadata/glsa/glsa-201309-04.xml | 10 +- .../metadata/glsa/glsa-201309-05.xml | 12 +- .../metadata/glsa/glsa-201309-06.xml | 158 +-- .../metadata/glsa/glsa-201309-07.xml | 10 +- .../metadata/glsa/glsa-201309-08.xml | 16 +- .../metadata/glsa/glsa-201309-09.xml | 16 +- .../metadata/glsa/glsa-201309-10.xml | 10 +- .../metadata/glsa/glsa-201309-11.xml | 40 +- .../metadata/glsa/glsa-201309-12.xml | 18 +- .../metadata/glsa/glsa-201309-13.xml | 14 +- .../metadata/glsa/glsa-201309-14.xml | 16 +- .../metadata/glsa/glsa-201309-15.xml | 24 +- .../metadata/glsa/glsa-201309-16.xml | 300 ++--- .../metadata/glsa/glsa-201309-17.xml | 14 +- .../metadata/glsa/glsa-201309-18.xml | 12 +- .../metadata/glsa/glsa-201309-19.xml | 10 +- .../metadata/glsa/glsa-201309-20.xml | 10 +- .../metadata/glsa/glsa-201309-21.xml | 10 +- .../metadata/glsa/glsa-201309-22.xml | 22 +- .../metadata/glsa/glsa-201309-23.xml | 208 ++-- .../metadata/glsa/glsa-201309-24.xml | 122 +- .../metadata/glsa/glsa-201310-01.xml | 10 +- .../metadata/glsa/glsa-201310-02.xml | 10 +- .../metadata/glsa/glsa-201310-03.xml | 70 +- .../metadata/glsa/glsa-201310-04.xml | 14 +- .../metadata/glsa/glsa-201310-05.xml | 10 +- .../metadata/glsa/glsa-201310-06.xml | 10 +- .../metadata/glsa/glsa-201310-07.xml | 14 +- .../metadata/glsa/glsa-201310-08.xml | 18 +- .../metadata/glsa/glsa-201310-09.xml | 10 +- .../metadata/glsa/glsa-201310-10.xml | 20 +- .../metadata/glsa/glsa-201310-11.xml | 10 +- .../metadata/glsa/glsa-201310-12.xml | 178 +-- .../metadata/glsa/glsa-201310-13.xml | 20 +- .../metadata/glsa/glsa-201310-14.xml | 20 +- .../metadata/glsa/glsa-201310-15.xml | 12 +- .../metadata/glsa/glsa-201310-16.xml | 12 +- .../metadata/glsa/glsa-201310-17.xml | 10 +- .../metadata/glsa/glsa-201310-18.xml | 12 +- .../metadata/glsa/glsa-201310-19.xml | 10 +- .../metadata/glsa/glsa-201310-20.xml | 10 +- .../metadata/glsa/glsa-201310-21.xml | 38 +- .../metadata/glsa/glsa-201311-01.xml | 10 +- .../metadata/glsa/glsa-201311-02.xml | 34 +- .../metadata/glsa/glsa-201311-03.xml | 12 +- .../metadata/glsa/glsa-201311-04.xml | 10 +- .../metadata/glsa/glsa-201311-05.xml | 14 +- .../metadata/glsa/glsa-201311-06.xml | 20 +- .../metadata/glsa/glsa-201311-07.xml | 14 +- .../metadata/glsa/glsa-201311-08.xml | 10 +- .../metadata/glsa/glsa-201311-09.xml | 16 +- .../metadata/glsa/glsa-201311-10.xml | 16 +- .../metadata/glsa/glsa-201311-11.xml | 10 +- .../metadata/glsa/glsa-201311-12.xml | 10 +- .../metadata/glsa/glsa-201311-13.xml | 12 +- .../metadata/glsa/glsa-201311-14.xml | 12 +- .../metadata/glsa/glsa-201311-15.xml | 22 +- .../metadata/glsa/glsa-201311-16.xml | 10 +- .../metadata/glsa/glsa-201311-17.xml | 18 +- .../metadata/glsa/glsa-201311-18.xml | 12 +- .../metadata/glsa/glsa-201311-19.xml | 12 +- .../metadata/glsa/glsa-201311-20.xml | 10 +- .../metadata/glsa/glsa-201311-21.xml | 10 +- .../metadata/glsa/glsa-201311-22.xml | 14 +- .../metadata/glsa/glsa-201312-01.xml | 26 +- .../metadata/glsa/glsa-201312-02.xml | 14 +- .../metadata/glsa/glsa-201312-03.xml | 26 +- .../metadata/glsa/glsa-201312-04.xml | 10 +- .../metadata/glsa/glsa-201312-05.xml | 12 +- .../metadata/glsa/glsa-201312-06.xml | 10 +- .../metadata/glsa/glsa-201312-07.xml | 12 +- .../metadata/glsa/glsa-201312-08.xml | 10 +- .../metadata/glsa/glsa-201312-09.xml | 12 +- .../metadata/glsa/glsa-201312-10.xml | 10 +- .../metadata/glsa/glsa-201312-11.xml | 10 +- .../metadata/glsa/glsa-201312-12.xml | 22 +- .../metadata/glsa/glsa-201312-13.xml | 30 +- .../metadata/glsa/glsa-201312-14.xml | 10 +- .../metadata/glsa/glsa-201312-15.xml | 10 +- .../metadata/glsa/glsa-201312-16.xml | 10 +- .../metadata/glsa/glsa-201401-01.xml | 10 +- .../metadata/glsa/glsa-201401-02.xml | 10 +- .../metadata/glsa/glsa-201401-03.xml | 10 +- .../metadata/glsa/glsa-201401-04.xml | 24 +- .../metadata/glsa/glsa-201401-05.xml | 10 +- .../metadata/glsa/glsa-201401-06.xml | 10 +- .../metadata/glsa/glsa-201401-07.xml | 16 +- .../metadata/glsa/glsa-201401-08.xml | 14 +- .../metadata/glsa/glsa-201401-09.xml | 10 +- .../metadata/glsa/glsa-201401-10.xml | 24 +- .../metadata/glsa/glsa-201401-11.xml | 16 +- .../metadata/glsa/glsa-201401-12.xml | 12 +- .../metadata/glsa/glsa-201401-13.xml | 20 +- .../metadata/glsa/glsa-201401-14.xml | 16 +- .../metadata/glsa/glsa-201401-15.xml | 24 +- .../metadata/glsa/glsa-201401-16.xml | 10 +- .../metadata/glsa/glsa-201401-17.xml | 10 +- .../metadata/glsa/glsa-201401-18.xml | 10 +- .../metadata/glsa/glsa-201401-19.xml | 10 +- .../metadata/glsa/glsa-201401-20.xml | 24 +- .../metadata/glsa/glsa-201401-21.xml | 14 +- .../metadata/glsa/glsa-201401-22.xml | 10 +- .../metadata/glsa/glsa-201401-23.xml | 16 +- .../metadata/glsa/glsa-201401-24.xml | 10 +- .../metadata/glsa/glsa-201401-25.xml | 10 +- .../metadata/glsa/glsa-201401-26.xml | 10 +- .../metadata/glsa/glsa-201401-27.xml | 10 +- .../metadata/glsa/glsa-201401-28.xml | 12 +- .../metadata/glsa/glsa-201401-29.xml | 10 +- .../metadata/glsa/glsa-201401-30.xml | 506 ++++---- .../metadata/glsa/glsa-201401-31.xml | 10 +- .../metadata/glsa/glsa-201401-32.xml | 24 +- .../metadata/glsa/glsa-201401-33.xml | 10 +- .../metadata/glsa/glsa-201401-34.xml | 22 +- .../metadata/glsa/glsa-201402-01.xml | 12 +- .../metadata/glsa/glsa-201402-02.xml | 12 +- .../metadata/glsa/glsa-201402-03.xml | 10 +- .../metadata/glsa/glsa-201402-04.xml | 12 +- .../metadata/glsa/glsa-201402-05.xml | 10 +- .../metadata/glsa/glsa-201402-06.xml | 22 +- .../metadata/glsa/glsa-201402-07.xml | 10 +- .../metadata/glsa/glsa-201402-08.xml | 10 +- .../metadata/glsa/glsa-201402-09.xml | 10 +- .../metadata/glsa/glsa-201402-10.xml | 10 +- .../metadata/glsa/glsa-201402-11.xml | 10 +- .../metadata/glsa/glsa-201402-12.xml | 10 +- .../metadata/glsa/glsa-201402-13.xml | 10 +- .../metadata/glsa/glsa-201402-14.xml | 12 +- .../metadata/glsa/glsa-201402-15.xml | 10 +- .../metadata/glsa/glsa-201402-16.xml | 14 +- .../metadata/glsa/glsa-201402-17.xml | 14 +- .../metadata/glsa/glsa-201402-18.xml | 10 +- .../metadata/glsa/glsa-201402-19.xml | 10 +- .../metadata/glsa/glsa-201402-20.xml | 14 +- .../metadata/glsa/glsa-201402-21.xml | 22 +- .../metadata/glsa/glsa-201402-22.xml | 10 +- .../metadata/glsa/glsa-201402-23.xml | 12 +- .../metadata/glsa/glsa-201402-24.xml | 18 +- .../metadata/glsa/glsa-201402-25.xml | 10 +- .../metadata/glsa/glsa-201402-26.xml | 18 +- .../metadata/glsa/glsa-201402-27.xml | 10 +- .../metadata/glsa/glsa-201402-28.xml | 12 +- .../metadata/glsa/glsa-201402-29.xml | 10 +- .../metadata/glsa/glsa-201403-01.xml | 134 +-- .../metadata/glsa/glsa-201403-02.xml | 10 +- .../metadata/glsa/glsa-201403-03.xml | 10 +- .../metadata/glsa/glsa-201403-04.xml | 10 +- .../metadata/glsa/glsa-201403-05.xml | 12 +- .../metadata/glsa/glsa-201403-06.xml | 14 +- .../metadata/glsa/glsa-201403-07.xml | 10 +- .../metadata/glsa/glsa-201403-08.xml | 10 +- .../metadata/glsa/glsa-201404-01.xml | 10 +- .../metadata/glsa/glsa-201404-02.xml | 10 +- .../metadata/glsa/glsa-201404-03.xml | 10 +- .../metadata/glsa/glsa-201404-04.xml | 10 +- .../metadata/glsa/glsa-201404-05.xml | 24 +- .../metadata/glsa/glsa-201404-06.xml | 14 +- .../metadata/glsa/glsa-201404-07.xml | 12 +- .../metadata/glsa/glsa-201405-01.xml | 10 +- .../metadata/glsa/glsa-201405-02.xml | 10 +- .../metadata/glsa/glsa-201405-03.xml | 12 +- .../metadata/glsa/glsa-201405-04.xml | 28 +- .../metadata/glsa/glsa-201405-05.xml | 24 +- .../metadata/glsa/glsa-201405-06.xml | 22 +- .../metadata/glsa/glsa-201405-07.xml | 72 +- .../metadata/glsa/glsa-201405-08.xml | 18 +- .../metadata/glsa/glsa-201405-09.xml | 18 +- .../metadata/glsa/glsa-201405-10.xml | 18 +- .../metadata/glsa/glsa-201405-11.xml | 10 +- .../metadata/glsa/glsa-201405-12.xml | 14 +- .../metadata/glsa/glsa-201405-13.xml | 16 +- .../metadata/glsa/glsa-201405-14.xml | 10 +- .../metadata/glsa/glsa-201405-15.xml | 16 +- .../metadata/glsa/glsa-201405-16.xml | 10 +- .../metadata/glsa/glsa-201405-17.xml | 14 +- .../metadata/glsa/glsa-201405-18.xml | 10 +- .../metadata/glsa/glsa-201405-19.xml | 14 +- .../metadata/glsa/glsa-201405-20.xml | 10 +- .../metadata/glsa/glsa-201405-21.xml | 10 +- .../metadata/glsa/glsa-201405-22.xml | 42 +- .../metadata/glsa/glsa-201405-23.xml | 10 +- .../metadata/glsa/glsa-201405-24.xml | 16 +- .../metadata/glsa/glsa-201405-25.xml | 10 +- .../metadata/glsa/glsa-201405-26.xml | 10 +- .../metadata/glsa/glsa-201405-27.xml | 10 +- .../metadata/glsa/glsa-201405-28.xml | 10 +- .../metadata/glsa/glsa-201406-01.xml | 10 +- .../metadata/glsa/glsa-201406-02.xml | 18 +- .../metadata/glsa/glsa-201406-03.xml | 14 +- .../metadata/glsa/glsa-201406-04.xml | 10 +- .../metadata/glsa/glsa-201406-05.xml | 10 +- .../metadata/glsa/glsa-201406-06.xml | 16 +- .../metadata/glsa/glsa-201406-07.xml | 10 +- .../metadata/glsa/glsa-201406-08.xml | 20 +- .../metadata/glsa/glsa-201406-09.xml | 16 +- .../metadata/glsa/glsa-201406-10.xml | 20 +- .../metadata/glsa/glsa-201406-11.xml | 14 +- .../metadata/glsa/glsa-201406-12.xml | 10 +- .../metadata/glsa/glsa-201406-13.xml | 20 +- .../metadata/glsa/glsa-201406-14.xml | 40 +- .../metadata/glsa/glsa-201406-15.xml | 10 +- .../metadata/glsa/glsa-201406-16.xml | 18 +- .../metadata/glsa/glsa-201406-17.xml | 20 +- .../metadata/glsa/glsa-201406-18.xml | 10 +- .../metadata/glsa/glsa-201406-19.xml | 22 +- .../metadata/glsa/glsa-201406-20.xml | 10 +- .../metadata/glsa/glsa-201406-21.xml | 12 +- .../metadata/glsa/glsa-201406-22.xml | 12 +- .../metadata/glsa/glsa-201406-23.xml | 10 +- .../metadata/glsa/glsa-201406-24.xml | 12 +- .../metadata/glsa/glsa-201406-25.xml | 12 +- .../metadata/glsa/glsa-201406-26.xml | 16 +- .../metadata/glsa/glsa-201406-27.xml | 18 +- .../metadata/glsa/glsa-201406-28.xml | 57 +- .../metadata/glsa/glsa-201406-29.xml | 11 +- .../metadata/glsa/glsa-201406-30.xml | 10 +- .../metadata/glsa/glsa-201406-31.xml | 16 +- .../metadata/glsa/glsa-201406-32.xml | 464 ++++---- .../metadata/glsa/glsa-201406-33.xml | 22 +- .../metadata/glsa/glsa-201406-34.xml | 16 +- .../metadata/glsa/glsa-201406-35.xml | 14 +- .../metadata/glsa/glsa-201406-36.xml | 26 +- .../metadata/glsa/glsa-201407-01.xml | 10 +- .../metadata/glsa/glsa-201407-02.xml | 14 +- .../metadata/glsa/glsa-201407-03.xml | 68 +- .../metadata/glsa/glsa-201407-04.xml | 10 +- .../metadata/glsa/glsa-201407-05.xml | 22 +- .../metadata/glsa/glsa-201408-01.xml | 10 +- .../metadata/glsa/glsa-201408-02.xml | 10 +- .../metadata/glsa/glsa-201408-03.xml | 10 +- .../metadata/glsa/glsa-201408-04.xml | 16 +- .../metadata/glsa/glsa-201408-05.xml | 22 +- .../metadata/glsa/glsa-201408-06.xml | 14 +- .../metadata/glsa/glsa-201408-07.xml | 12 +- .../metadata/glsa/glsa-201408-08.xml | 10 +- .../metadata/glsa/glsa-201408-09.xml | 14 +- .../metadata/glsa/glsa-201408-10.xml | 10 +- .../metadata/glsa/glsa-201408-11.xml | 60 +- .../metadata/glsa/glsa-201408-12.xml | 14 +- .../metadata/glsa/glsa-201408-13.xml | 12 +- .../metadata/glsa/glsa-201408-14.xml | 10 +- .../metadata/glsa/glsa-201408-15.xml | 32 +- .../metadata/glsa/glsa-201408-16.xml | 126 +- .../metadata/glsa/glsa-201408-17.xml | 36 +- .../metadata/glsa/glsa-201408-18.xml | 12 +- .../metadata/glsa/glsa-201408-19.xml | 60 +- .../metadata/glsa/glsa-201409-01.xml | 18 +- .../metadata/glsa/glsa-201409-02.xml | 16 +- .../metadata/glsa/glsa-201409-03.xml | 10 +- .../metadata/glsa/glsa-201409-04.xml | 80 +- .../metadata/glsa/glsa-201409-05.xml | 32 +- .../metadata/glsa/glsa-201409-06.xml | 12 +- .../metadata/glsa/glsa-201409-07.xml | 12 +- .../metadata/glsa/glsa-201409-08.xml | 10 +- .../metadata/glsa/glsa-201409-09.xml | 10 +- .../metadata/glsa/glsa-201409-10.xml | 10 +- .../metadata/glsa/glsa-201410-01.xml | 16 +- .../metadata/glsa/glsa-201410-02.xml | 10 +- .../metadata/glsa/glsa-201411-01.xml | 74 +- .../metadata/glsa/glsa-201411-02.xml | 26 +- .../metadata/glsa/glsa-201411-03.xml | 10 +- .../metadata/glsa/glsa-201411-04.xml | 14 +- .../metadata/glsa/glsa-201411-05.xml | 10 +- .../metadata/glsa/glsa-201411-06.xml | 50 +- .../metadata/glsa/glsa-201411-07.xml | 10 +- .../metadata/glsa/glsa-201411-08.xml | 16 +- .../metadata/glsa/glsa-201411-09.xml | 16 +- .../metadata/glsa/glsa-201411-10.xml | 12 +- .../metadata/glsa/glsa-201411-11.xml | 14 +- .../metadata/glsa/glsa-201412-01.xml | 20 +- .../metadata/glsa/glsa-201412-02.xml | 10 +- .../metadata/glsa/glsa-201412-03.xml | 10 +- .../metadata/glsa/glsa-201412-04.xml | 44 +- .../metadata/glsa/glsa-201412-05.xml | 10 +- .../metadata/glsa/glsa-201412-06.xml | 10 +- .../metadata/glsa/glsa-201412-07.xml | 22 +- .../metadata/glsa/glsa-201412-08.xml | 72 +- .../metadata/glsa/glsa-201412-09.xml | 132 +-- .../metadata/glsa/glsa-201412-10.xml | 32 +- .../metadata/glsa/glsa-201412-11.xml | 48 +- .../metadata/glsa/glsa-201412-12.xml | 26 +- .../metadata/glsa/glsa-201412-13.xml | 54 +- .../metadata/glsa/glsa-201412-14.xml | 12 +- .../metadata/glsa/glsa-201412-15.xml | 12 +- .../metadata/glsa/glsa-201412-16.xml | 10 +- .../metadata/glsa/glsa-201412-17.xml | 26 +- .../metadata/glsa/glsa-201412-18.xml | 10 +- .../metadata/glsa/glsa-201412-19.xml | 10 +- .../metadata/glsa/glsa-201412-20.xml | 10 +- .../metadata/glsa/glsa-201412-21.xml | 12 +- .../metadata/glsa/glsa-201412-22.xml | 16 +- .../metadata/glsa/glsa-201412-23.xml | 14 +- .../metadata/glsa/glsa-201412-24.xml | 24 +- .../metadata/glsa/glsa-201412-25.xml | 10 +- .../metadata/glsa/glsa-201412-26.xml | 12 +- .../metadata/glsa/glsa-201412-27.xml | 30 +- .../metadata/glsa/glsa-201412-28.xml | 46 +- .../metadata/glsa/glsa-201412-29.xml | 46 +- .../metadata/glsa/glsa-201412-30.xml | 12 +- .../metadata/glsa/glsa-201412-31.xml | 12 +- .../metadata/glsa/glsa-201412-32.xml | 10 +- .../metadata/glsa/glsa-201412-33.xml | 18 +- .../metadata/glsa/glsa-201412-34.xml | 16 +- .../metadata/glsa/glsa-201412-35.xml | 14 +- .../metadata/glsa/glsa-201412-36.xml | 14 +- .../metadata/glsa/glsa-201412-37.xml | 14 +- .../metadata/glsa/glsa-201412-38.xml | 12 +- .../metadata/glsa/glsa-201412-39.xml | 34 +- .../metadata/glsa/glsa-201412-40.xml | 10 +- .../metadata/glsa/glsa-201412-41.xml | 10 +- .../metadata/glsa/glsa-201412-42.xml | 16 +- .../metadata/glsa/glsa-201412-43.xml | 12 +- .../metadata/glsa/glsa-201412-44.xml | 10 +- .../metadata/glsa/glsa-201412-45.xml | 10 +- .../metadata/glsa/glsa-201412-46.xml | 12 +- .../metadata/glsa/glsa-201412-47.xml | 20 +- .../metadata/glsa/glsa-201412-48.xml | 10 +- .../metadata/glsa/glsa-201412-49.xml | 16 +- .../metadata/glsa/glsa-201412-50.xml | 14 +- .../metadata/glsa/glsa-201412-51.xml | 18 +- .../metadata/glsa/glsa-201412-52.xml | 32 +- .../metadata/glsa/glsa-201412-53.xml | 16 +- .../metadata/glsa/glsa-201502-01.xml | 10 +- .../metadata/glsa/glsa-201502-02.xml | 64 +- .../metadata/glsa/glsa-201502-03.xml | 14 +- .../metadata/glsa/glsa-201502-04.xml | 62 +- .../metadata/glsa/glsa-201502-05.xml | 16 +- .../metadata/glsa/glsa-201502-06.xml | 10 +- .../metadata/glsa/glsa-201502-07.xml | 10 +- .../metadata/glsa/glsa-201502-08.xml | 30 +- .../metadata/glsa/glsa-201502-09.xml | 10 +- .../metadata/glsa/glsa-201502-10.xml | 10 +- .../metadata/glsa/glsa-201502-11.xml | 12 +- .../metadata/glsa/glsa-201502-12.xml | 166 +-- .../metadata/glsa/glsa-201502-13.xml | 84 +- .../metadata/glsa/glsa-201502-14.xml | 10 +- .../metadata/glsa/glsa-201502-15.xml | 30 +- .../metadata/glsa/glsa-201503-01.xml | 18 +- .../metadata/glsa/glsa-201503-02.xml | 10 +- .../metadata/glsa/glsa-201503-03.xml | 22 +- .../metadata/glsa/glsa-201503-04.xml | 40 +- .../metadata/glsa/glsa-201503-05.xml | 48 +- .../metadata/glsa/glsa-201503-06.xml | 16 +- .../metadata/glsa/glsa-201503-07.xml | 10 +- .../metadata/glsa/glsa-201503-08.xml | 14 +- .../metadata/glsa/glsa-201503-09.xml | 30 +- .../metadata/glsa/glsa-201503-10.xml | 22 +- .../metadata/glsa/glsa-201503-11.xml | 36 +- .../metadata/glsa/glsa-201503-12.xml | 48 +- .../metadata/glsa/glsa-201503-13.xml | 12 +- .../metadata/glsa/glsa-201504-01.xml | 331 +++--- .../metadata/glsa/glsa-201504-02.xml | 10 +- .../metadata/glsa/glsa-201504-03.xml | 16 +- .../metadata/glsa/glsa-201504-04.xml | 48 +- .../metadata/glsa/glsa-201504-05.xml | 26 +- .../metadata/glsa/glsa-201504-06.xml | 36 +- .../metadata/glsa/glsa-201504-07.xml | 52 +- .../metadata/glsa/glsa-201505-01.xml | 24 +- .../metadata/glsa/glsa-201505-02.xml | 44 +- .../metadata/glsa/glsa-201505-03.xml | 22 +- .../metadata/glsa/glsa-201506-01.xml | 38 +- .../metadata/glsa/glsa-201506-02.xml | 22 +- .../metadata/glsa/glsa-201506-03.xml | 12 +- .../metadata/glsa/glsa-201506-04.xml | 70 +- .../metadata/glsa/glsa-201507-01.xml | 14 +- .../metadata/glsa/glsa-201507-02.xml | 12 +- .../metadata/glsa/glsa-201507-03.xml | 10 +- .../metadata/glsa/glsa-201507-04.xml | 12 +- .../metadata/glsa/glsa-201507-05.xml | 14 +- .../metadata/glsa/glsa-201507-06.xml | 12 +- .../metadata/glsa/glsa-201507-07.xml | 18 +- .../metadata/glsa/glsa-201507-08.xml | 10 +- .../metadata/glsa/glsa-201507-09.xml | 10 +- .../metadata/glsa/glsa-201507-10.xml | 10 +- .../metadata/glsa/glsa-201507-11.xml | 10 +- .../metadata/glsa/glsa-201507-12.xml | 10 +- .../metadata/glsa/glsa-201507-13.xml | 80 +- .../metadata/glsa/glsa-201507-14.xml | 44 +- .../metadata/glsa/glsa-201507-15.xml | 10 +- .../metadata/glsa/glsa-201507-16.xml | 10 +- .../metadata/glsa/glsa-201507-17.xml | 10 +- .../metadata/glsa/glsa-201507-18.xml | 16 +- .../metadata/glsa/glsa-201507-19.xml | 50 +- .../metadata/glsa/glsa-201507-20.xml | 24 +- .../metadata/glsa/glsa-201507-21.xml | 14 +- .../metadata/glsa/glsa-201507-22.xml | 10 +- .../metadata/glsa/glsa-201508-01.xml | 82 +- .../metadata/glsa/glsa-201508-02.xml | 14 +- .../metadata/glsa/glsa-201508-03.xml | 10 +- .../metadata/glsa/glsa-201509-01.xml | 14 +- .../metadata/glsa/glsa-201509-02.xml | 20 +- .../metadata/glsa/glsa-201509-03.xml | 26 +- .../metadata/glsa/glsa-201509-04.xml | 12 +- .../metadata/glsa/glsa-201509-05.xml | 10 +- .../metadata/glsa/glsa-201509-06.xml | 10 +- .../metadata/glsa/glsa-201509-07.xml | 58 +- .../metadata/glsa/glsa-201510-01.xml | 18 +- .../metadata/glsa/glsa-201510-02.xml | 16 +- .../metadata/glsa/glsa-201510-03.xml | 44 +- .../metadata/glsa/glsa-201510-04.xml | 16 +- .../metadata/glsa/glsa-201510-05.xml | 52 +- .../metadata/glsa/glsa-201510-06.xml | 14 +- .../metadata/glsa/glsa-201510-07.xml | 12 +- .../metadata/glsa/glsa-201510-08.xml | 12 +- .../metadata/glsa/glsa-201511-01.xml | 10 +- .../metadata/glsa/glsa-201511-02.xml | 76 +- .../metadata/glsa/glsa-201512-01.xml | 10 +- .../metadata/glsa/glsa-201512-02.xml | 10 +- .../metadata/glsa/glsa-201512-03.xml | 126 +- .../metadata/glsa/glsa-201512-04.xml | 18 +- .../metadata/glsa/glsa-201512-05.xml | 14 +- .../metadata/glsa/glsa-201512-06.xml | 10 +- .../metadata/glsa/glsa-201512-07.xml | 10 +- .../metadata/glsa/glsa-201512-08.xml | 24 +- .../metadata/glsa/glsa-201512-09.xml | 10 +- .../metadata/glsa/glsa-201512-10.xml | 176 +-- .../metadata/glsa/glsa-201512-11.xml | 10 +- .../metadata/glsa/glsa-201512-12.xml | 10 +- .../metadata/glsa/glsa-201512-13.xml | 14 +- .../metadata/glsa/glsa-201601-01.xml | 12 +- .../metadata/glsa/glsa-201601-02.xml | 24 +- .../metadata/glsa/glsa-201601-03.xml | 198 ++-- .../metadata/glsa/glsa-201601-04.xml | 8 +- .../metadata/glsa/glsa-201601-05.xml | 24 +- .../metadata/glsa/glsa-201602-01.xml | 56 +- .../metadata/glsa/glsa-201602-02.xml | 36 +- .../metadata/glsa/glsa-201602-03.xml | 18 +- .../metadata/glsa/glsa-201603-01.xml | 14 +- .../metadata/glsa/glsa-201603-02.xml | 12 +- .../metadata/glsa/glsa-201603-03.xml | 12 +- .../metadata/glsa/glsa-201603-04.xml | 10 +- .../metadata/glsa/glsa-201603-05.xml | 28 +- .../metadata/glsa/glsa-201603-06.xml | 126 +- .../metadata/glsa/glsa-201603-07.xml | 100 +- .../metadata/glsa/glsa-201603-08.xml | 38 +- .../metadata/glsa/glsa-201603-09.xml | 214 ++-- .../metadata/glsa/glsa-201603-10.xml | 16 +- .../metadata/glsa/glsa-201603-11.xml | 186 +-- .../metadata/glsa/glsa-201603-12.xml | 12 +- .../metadata/glsa/glsa-201603-13.xml | 14 +- .../metadata/glsa/glsa-201603-14.xml | 104 +- .../metadata/glsa/glsa-201603-15.xml | 24 +- .../metadata/glsa/glsa-201604-01.xml | 28 +- .../metadata/glsa/glsa-201604-02.xml | 10 +- .../metadata/glsa/glsa-201604-03.xml | 112 +- .../metadata/glsa/glsa-201604-04.xml | 8 +- .../metadata/glsa/glsa-201604-05.xml | 98 +- .../metadata/glsa/glsa-201605-01.xml | 16 +- .../metadata/glsa/glsa-201605-02.xml | 62 +- .../metadata/glsa/glsa-201605-03.xml | 10 +- .../metadata/glsa/glsa-201605-04.xml | 14 +- .../metadata/glsa/glsa-201605-05.xml | 16 +- .../metadata/glsa/glsa-201605-06.xml | 376 +++--- .../metadata/glsa/glsa-201606-01.xml | 14 +- .../metadata/glsa/glsa-201606-02.xml | 14 +- .../metadata/glsa/glsa-201606-03.xml | 12 +- .../metadata/glsa/glsa-201606-04.xml | 12 +- .../metadata/glsa/glsa-201606-05.xml | 22 +- .../metadata/glsa/glsa-201606-06.xml | 22 +- .../metadata/glsa/glsa-201606-07.xml | 14 +- .../metadata/glsa/glsa-201606-08.xml | 42 +- .../metadata/glsa/glsa-201606-09.xml | 28 +- .../metadata/glsa/glsa-201606-10.xml | 72 +- .../metadata/glsa/glsa-201606-11.xml | 20 +- .../metadata/glsa/glsa-201606-12.xml | 16 +- .../metadata/glsa/glsa-201606-13.xml | 4 +- .../metadata/glsa/glsa-201606-14.xml | 8 +- .../metadata/glsa/glsa-201606-15.xml | 16 +- .../metadata/glsa/glsa-201606-16.xml | 12 +- .../metadata/glsa/glsa-201606-17.xml | 26 +- .../metadata/glsa/glsa-201606-18.xml | 30 +- .../metadata/glsa/glsa-201606-19.xml | 10 +- .../metadata/glsa/glsa-201607-01.xml | 50 +- .../metadata/glsa/glsa-201607-02.xml | 54 +- .../metadata/glsa/glsa-201607-03.xml | 76 +- .../metadata/glsa/glsa-201607-04.xml | 16 +- .../metadata/glsa/glsa-201607-05.xml | 26 +- .../metadata/glsa/glsa-201607-06.xml | 12 +- .../metadata/glsa/glsa-201607-07.xml | 58 +- .../metadata/glsa/glsa-201607-08.xml | 12 +- .../metadata/glsa/glsa-201607-09.xml | 10 +- .../metadata/glsa/glsa-201607-10.xml | 12 +- .../metadata/glsa/glsa-201607-11.xml | 16 +- .../metadata/glsa/glsa-201607-12.xml | 10 +- .../metadata/glsa/glsa-201607-13.xml | 12 +- .../metadata/glsa/glsa-201607-14.xml | 10 +- .../metadata/glsa/glsa-201607-15.xml | 90 +- .../metadata/glsa/glsa-201607-16.xml | 12 +- .../metadata/glsa/glsa-201607-17.xml | 10 +- .../metadata/glsa/glsa-201608-01.xml | 16 +- .../metadata/glsa/glsa-201609-01.xml | 58 +- .../metadata/glsa/glsa-201609-02.xml | 10 +- .../metadata/glsa/glsa-201610-01.xml | 10 +- .../metadata/glsa/glsa-201610-02.xml | 18 +- .../metadata/glsa/glsa-201610-03.xml | 10 +- .../metadata/glsa/glsa-201610-04.xml | 16 +- .../metadata/glsa/glsa-201610-05.xml | 32 +- .../metadata/glsa/glsa-201610-06.xml | 44 +- .../metadata/glsa/glsa-201610-07.xml | 26 +- .../metadata/glsa/glsa-201610-08.xml | 52 +- .../metadata/glsa/glsa-201610-09.xml | 136 +-- .../metadata/glsa/glsa-201610-10.xml | 90 +- .../metadata/glsa/glsa-201610-11.xml | 12 +- .../metadata/glsa/glsa-201611-01.xml | 18 +- .../metadata/glsa/glsa-201611-02.xml | 12 +- .../metadata/glsa/glsa-201611-03.xml | 12 +- .../metadata/glsa/glsa-201611-04.xml | 24 +- .../metadata/glsa/glsa-201611-05.xml | 10 +- .../metadata/glsa/glsa-201611-06.xml | 10 +- .../metadata/glsa/glsa-201611-07.xml | 10 +- .../metadata/glsa/glsa-201611-08.xml | 14 +- .../metadata/glsa/glsa-201611-09.xml | 18 +- .../metadata/glsa/glsa-201611-10.xml | 12 +- .../metadata/glsa/glsa-201611-11.xml | 48 +- .../metadata/glsa/glsa-201611-12.xml | 16 +- .../metadata/glsa/glsa-201611-13.xml | 10 +- .../metadata/glsa/glsa-201611-14.xml | 14 +- .../metadata/glsa/glsa-201611-15.xml | 10 +- .../metadata/glsa/glsa-201611-16.xml | 16 +- .../metadata/glsa/glsa-201611-17.xml | 10 +- .../metadata/glsa/glsa-201611-18.xml | 26 +- .../metadata/glsa/glsa-201611-19.xml | 10 +- .../metadata/glsa/glsa-201611-20.xml | 8 +- .../metadata/glsa/glsa-201611-21.xml | 28 +- .../metadata/glsa/glsa-201611-22.xml | 88 +- .../metadata/glsa/glsa-201612-01.xml | 12 +- .../metadata/glsa/glsa-201612-02.xml | 10 +- .../metadata/glsa/glsa-201612-03.xml | 12 +- .../metadata/glsa/glsa-201612-04.xml | 12 +- .../metadata/glsa/glsa-201612-05.xml | 10 +- .../metadata/glsa/glsa-201612-06.xml | 10 +- .../metadata/glsa/glsa-201612-07.xml | 10 +- .../metadata/glsa/glsa-201612-08.xml | 10 +- .../metadata/glsa/glsa-201612-09.xml | 18 +- .../metadata/glsa/glsa-201612-10.xml | 10 +- .../metadata/glsa/glsa-201612-11.xml | 60 +- .../metadata/glsa/glsa-201612-12.xml | 8 +- .../metadata/glsa/glsa-201612-13.xml | 10 +- .../metadata/glsa/glsa-201612-14.xml | 10 +- .../metadata/glsa/glsa-201612-15.xml | 14 +- .../metadata/glsa/glsa-201612-16.xml | 38 +- .../metadata/glsa/glsa-201612-17.xml | 10 +- .../metadata/glsa/glsa-201612-18.xml | 20 +- .../metadata/glsa/glsa-201612-19.xml | 20 +- .../metadata/glsa/glsa-201612-20.xml | 10 +- .../metadata/glsa/glsa-201612-21.xml | 12 +- .../metadata/glsa/glsa-201612-22.xml | 10 +- .../metadata/glsa/glsa-201612-23.xml | 8 +- .../metadata/glsa/glsa-201612-24.xml | 24 +- .../metadata/glsa/glsa-201612-25.xml | 10 +- .../metadata/glsa/glsa-201612-26.xml | 22 +- .../metadata/glsa/glsa-201612-27.xml | 36 +- .../metadata/glsa/glsa-201612-28.xml | 12 +- .../metadata/glsa/glsa-201612-29.xml | 10 +- .../metadata/glsa/glsa-201612-30.xml | 10 +- .../metadata/glsa/glsa-201612-31.xml | 14 +- .../metadata/glsa/glsa-201612-32.xml | 10 +- .../metadata/glsa/glsa-201612-33.xml | 10 +- .../metadata/glsa/glsa-201612-34.xml | 14 +- .../metadata/glsa/glsa-201612-35.xml | 10 +- .../metadata/glsa/glsa-201612-36.xml | 12 +- .../metadata/glsa/glsa-201612-37.xml | 10 +- .../metadata/glsa/glsa-201612-38.xml | 12 +- .../metadata/glsa/glsa-201612-39.xml | 10 +- .../metadata/glsa/glsa-201612-40.xml | 12 +- .../metadata/glsa/glsa-201612-41.xml | 14 +- .../metadata/glsa/glsa-201612-42.xml | 12 +- .../metadata/glsa/glsa-201612-43.xml | 16 +- .../metadata/glsa/glsa-201612-44.xml | 10 +- .../metadata/glsa/glsa-201612-45.xml | 10 +- .../metadata/glsa/glsa-201612-46.xml | 12 +- .../metadata/glsa/glsa-201612-47.xml | 36 +- .../metadata/glsa/glsa-201612-48.xml | 8 +- .../metadata/glsa/glsa-201612-49.xml | 10 +- .../metadata/glsa/glsa-201612-50.xml | 14 +- .../metadata/glsa/glsa-201612-51.xml | 10 +- .../metadata/glsa/glsa-201612-52.xml | 24 +- .../metadata/glsa/glsa-201612-53.xml | 18 +- .../metadata/glsa/glsa-201612-54.xml | 18 +- .../metadata/glsa/glsa-201612-55.xml | 8 +- .../metadata/glsa/glsa-201612-56.xml | 42 +- .../metadata/glsa/glsa-201701-01.xml | 60 +- .../metadata/glsa/glsa-201701-02.xml | 12 +- .../metadata/glsa/glsa-201701-03.xml | 74 +- .../metadata/glsa/glsa-201701-04.xml | 10 +- .../metadata/glsa/glsa-201701-05.xml | 10 +- .../metadata/glsa/glsa-201701-06.xml | 10 +- .../metadata/glsa/glsa-201701-07.xml | 10 +- .../metadata/glsa/glsa-201701-08.xml | 50 +- .../metadata/glsa/glsa-201701-09.xml | 10 +- .../metadata/glsa/glsa-201701-10.xml | 12 +- .../metadata/glsa/glsa-201701-11.xml | 10 +- .../metadata/glsa/glsa-201701-12.xml | 20 +- .../metadata/glsa/glsa-201701-13.xml | 16 +- .../metadata/glsa/glsa-201701-14.xml | 10 +- .../metadata/glsa/glsa-201701-15.xml | 158 +-- .../metadata/glsa/glsa-201701-16.xml | 114 +- .../metadata/glsa/glsa-201701-17.xml | 42 +- .../metadata/glsa/glsa-201701-18.xml | 4 +- .../metadata/glsa/glsa-201701-19.xml | 10 +- .../metadata/glsa/glsa-201701-20.xml | 8 +- .../metadata/glsa/glsa-201701-21.xml | 20 +- .../metadata/glsa/glsa-201701-22.xml | 10 +- .../metadata/glsa/glsa-201701-23.xml | 12 +- .../metadata/glsa/glsa-201701-24.xml | 12 +- .../metadata/glsa/glsa-201701-25.xml | 12 +- .../metadata/glsa/glsa-201701-26.xml | 10 +- .../metadata/glsa/glsa-201701-27.xml | 12 +- .../metadata/glsa/glsa-201701-28.xml | 10 +- .../metadata/glsa/glsa-201701-29.xml | 10 +- .../metadata/glsa/glsa-201701-30.xml | 10 +- .../metadata/glsa/glsa-201701-31.xml | 10 +- .../metadata/glsa/glsa-201701-32.xml | 134 +-- .../metadata/glsa/glsa-201701-33.xml | 20 +- .../metadata/glsa/glsa-201701-34.xml | 10 +- .../metadata/glsa/glsa-201701-35.xml | 18 +- .../metadata/glsa/glsa-201701-36.xml | 12 +- .../metadata/glsa/glsa-201701-37.xml | 42 +- .../metadata/glsa/glsa-201701-38.xml | 36 +- .../metadata/glsa/glsa-201701-39.xml | 2 +- .../metadata/glsa/glsa-201701-40.xml | 2 +- .../metadata/glsa/glsa-201701-41.xml | 2 +- .../metadata/glsa/glsa-201701-42.xml | 8 +- .../metadata/glsa/glsa-201701-43.xml | 30 +- .../metadata/glsa/glsa-201701-44.xml | 2 +- .../metadata/glsa/glsa-201701-45.xml | 8 +- .../metadata/glsa/glsa-201701-46.xml | 16 +- .../metadata/glsa/glsa-201701-47.xml | 44 +- .../metadata/glsa/glsa-201701-48.xml | 4 +- .../metadata/glsa/glsa-201701-49.xml | 30 +- .../metadata/glsa/glsa-201701-50.xml | 2 +- .../metadata/glsa/glsa-201701-51.xml | 8 +- .../metadata/glsa/glsa-201701-52.xml | 4 +- .../metadata/glsa/glsa-201701-53.xml | 2 +- .../metadata/glsa/glsa-201701-54.xml | 2 +- .../metadata/glsa/glsa-201701-55.xml | 4 +- .../metadata/glsa/glsa-201701-56.xml | 8 +- .../metadata/glsa/glsa-201701-57.xml | 14 +- .../metadata/glsa/glsa-201701-58.xml | 6 +- .../metadata/glsa/glsa-201701-59.xml | 4 +- .../metadata/glsa/glsa-201701-60.xml | 6 +- .../metadata/glsa/glsa-201701-61.xml | 2 +- .../metadata/glsa/glsa-201701-62.xml | 6 +- .../metadata/glsa/glsa-201701-63.xml | 36 +- .../metadata/glsa/glsa-201701-64.xml | 6 +- .../metadata/glsa/glsa-201701-65.xml | 36 +- .../metadata/glsa/glsa-201701-66.xml | 42 +- .../metadata/glsa/glsa-201701-67.xml | 2 +- .../metadata/glsa/glsa-201701-68.xml | 4 +- .../metadata/glsa/glsa-201701-69.xml | 2 +- .../metadata/glsa/glsa-201701-70.xml | 2 +- .../metadata/glsa/glsa-201701-71.xml | 14 +- .../metadata/glsa/glsa-201701-72.xml | 2 +- .../metadata/glsa/glsa-201701-73.xml | 4 +- .../metadata/glsa/glsa-201701-74.xml | 2 +- .../metadata/glsa/glsa-201701-75.xml | 10 +- .../metadata/glsa/glsa-201701-76.xml | 4 +- .../metadata/glsa/glsa-201701-77.xml | 2 +- .../metadata/glsa/glsa-201702-01.xml | 2 +- .../metadata/glsa/glsa-201702-03.xml | 2 +- .../metadata/glsa/glsa-201702-04.xml | 8 +- .../metadata/glsa/glsa-201702-05.xml | 2 +- .../metadata/glsa/glsa-201702-06.xml | 6 +- .../metadata/glsa/glsa-201702-07.xml | 8 +- .../metadata/glsa/glsa-201702-08.xml | 8 +- .../metadata/glsa/glsa-201702-09.xml | 20 +- .../metadata/glsa/glsa-201702-10.xml | 2 +- .../metadata/glsa/glsa-201702-11.xml | 16 +- .../metadata/glsa/glsa-201702-12.xml | 6 +- .../metadata/glsa/glsa-201702-13.xml | 16 +- .../metadata/glsa/glsa-201702-14.xml | 2 +- .../metadata/glsa/glsa-201702-15.xml | 2 +- .../metadata/glsa/glsa-201702-16.xml | 6 +- .../metadata/glsa/glsa-201702-17.xml | 36 +- .../metadata/glsa/glsa-201702-18.xml | 22 +- .../metadata/glsa/glsa-201702-19.xml | 2 +- .../metadata/glsa/glsa-201702-20.xml | 52 +- .../metadata/glsa/glsa-201702-21.xml | 2 +- .../metadata/glsa/glsa-201702-22.xml | 18 +- .../metadata/glsa/glsa-201702-23.xml | 8 +- .../metadata/glsa/glsa-201702-24.xml | 4 +- .../metadata/glsa/glsa-201702-25.xml | 8 +- .../metadata/glsa/glsa-201702-26.xml | 10 +- .../metadata/glsa/glsa-201702-27.xml | 2 +- .../metadata/glsa/glsa-201702-28.xml | 22 +- .../metadata/glsa/glsa-201702-29.xml | 10 +- .../metadata/glsa/glsa-201702-30.xml | 82 +- .../metadata/glsa/glsa-201702-31.xml | 10 +- .../metadata/glsa/glsa-201702-32.xml | 2 +- .../metadata/glsa/glsa-201703-01.xml | 4 +- .../metadata/glsa/glsa-201703-02.xml | 14 +- .../metadata/glsa/glsa-201703-03.xml | 2 +- .../metadata/glsa/glsa-201703-04.xml | 2 +- .../metadata/glsa/glsa-201703-05.xml | 2 +- .../metadata/glsa/glsa-201703-06.xml | 2 +- .../metadata/glsa/glsa-201703-07.xml | 2 +- .../metadata/glsa/glsa-201704-01.xml | 14 +- .../metadata/glsa/glsa-201704-02.xml | 44 +- .../metadata/glsa/glsa-201704-03.xml | 28 +- .../metadata/glsa/glsa-201704-04.xml | 14 +- .../metadata/glsa/glsa-201705-01.xml | 6 +- .../metadata/glsa/glsa-201705-02.xml | 24 +- .../metadata/glsa/glsa-201705-03.xml | 16 +- .../metadata/glsa/glsa-201705-04.xml | 4 +- .../metadata/glsa/glsa-201705-05.xml | 4 +- .../metadata/glsa/glsa-201705-06.xml | 18 +- .../metadata/glsa/glsa-201705-07.xml | 18 +- .../metadata/glsa/glsa-201705-08.xml | 12 +- .../metadata/glsa/glsa-201705-09.xml | 28 +- .../metadata/glsa/glsa-201705-10.xml | 54 +- .../metadata/glsa/glsa-201705-11.xml | 6 +- .../metadata/glsa/glsa-201705-12.xml | 14 +- .../metadata/glsa/glsa-201705-13.xml | 2 +- .../metadata/glsa/glsa-201705-14.xml | 2 +- .../metadata/glsa/glsa-201705-15.xml | 2 +- .../metadata/glsa/glsa-201706-02.xml | 4 +- .../metadata/glsa/glsa-201706-03.xml | 28 +- .../metadata/glsa/glsa-201706-04.xml | 2 +- .../metadata/glsa/glsa-201706-06.xml | 18 +- .../metadata/glsa/glsa-201706-07.xml | 2 +- .../metadata/glsa/glsa-201706-08.xml | 6 +- .../metadata/glsa/glsa-201706-09.xml | 2 +- .../metadata/glsa/glsa-201706-10.xml | 2 +- .../metadata/glsa/glsa-201706-11.xml | 2 +- .../metadata/glsa/glsa-201706-12.xml | 14 +- .../metadata/glsa/glsa-201706-13.xml | 2 +- .../metadata/glsa/glsa-201706-14.xml | 14 +- .../metadata/glsa/glsa-201706-15.xml | 198 ++-- .../metadata/glsa/glsa-201706-16.xml | 2 +- .../metadata/glsa/glsa-201706-17.xml | 4 +- .../metadata/glsa/glsa-201706-18.xml | 6 +- .../metadata/glsa/glsa-201706-19.xml | 6 +- .../metadata/glsa/glsa-201706-20.xml | 42 +- .../metadata/glsa/glsa-201706-21.xml | 2 +- .../metadata/glsa/glsa-201706-22.xml | 2 +- .../metadata/glsa/glsa-201706-23.xml | 8 +- .../metadata/glsa/glsa-201706-24.xml | 2 +- .../metadata/glsa/glsa-201706-25.xml | 2 +- .../metadata/glsa/glsa-201706-26.xml | 6 +- .../metadata/glsa/glsa-201706-27.xml | 2 +- .../metadata/glsa/glsa-201706-28.xml | 4 +- .../metadata/glsa/glsa-201706-29.xml | 2 +- .../metadata/glsa/glsa-201707-01.xml | 44 +- .../metadata/glsa/glsa-201707-02.xml | 10 +- .../metadata/glsa/glsa-201707-04.xml | 8 +- .../metadata/glsa/glsa-201707-05.xml | 8 +- .../metadata/glsa/glsa-201707-06.xml | 24 +- .../metadata/glsa/glsa-201707-07.xml | 8 +- .../metadata/glsa/glsa-201707-08.xml | 2 +- .../metadata/glsa/glsa-201707-09.xml | 2 +- .../metadata/glsa/glsa-201707-10.xml | 8 +- .../metadata/glsa/glsa-201707-11.xml | 2 +- .../metadata/glsa/glsa-201707-12.xml | 2 +- .../metadata/glsa/glsa-201707-13.xml | 4 +- .../metadata/glsa/glsa-201707-14.xml | 2 +- .../metadata/glsa/glsa-201707-15.xml | 24 +- .../metadata/glsa/glsa-201708-01.xml | 20 +- .../metadata/glsa/glsa-201708-02.xml | 10 +- .../metadata/glsa/glsa-201708-04.xml | 2 +- .../metadata/glsa/glsa-201708-05.xml | 2 +- .../metadata/glsa/glsa-201708-06.xml | 12 +- .../metadata/glsa/glsa-201708-08.xml | 2 +- .../metadata/glsa/glsa-201708-09.xml | 4 +- .../metadata/glsa/glsa-201708-10.xml | 6 +- .../metadata/glsa/glsa-201709-01.xml | 2 +- .../metadata/glsa/glsa-201709-13.xml | 2 +- .../metadata/glsa/glsa-201709-14.xml | 10 +- .../metadata/glsa/glsa-201709-15.xml | 146 +++ .../metadata/glsa/glsa-201709-16.xml | 64 + .../metadata/glsa/glsa-201709-17.xml | 54 + .../metadata/glsa/glsa-201709-18.xml | 59 + .../metadata/glsa/glsa-201709-19.xml | 53 + .../metadata/glsa/glsa-201709-20.xml | 53 + .../metadata/glsa/glsa-201709-21.xml | 69 ++ .../metadata/glsa/glsa-201709-22.xml | 187 +++ .../metadata/glsa/glsa-201709-23.xml | 323 ++++++ .../metadata/glsa/glsa-201709-24.xml | 73 ++ .../metadata/glsa/glsa-201709-25.xml | 56 + .../metadata/glsa/glsa-201709-26.xml | 51 + .../metadata/glsa/glsa-201709-27.xml | 109 ++ .../metadata/glsa/timestamp.chk | 2 +- .../metadata/glsa/timestamp.commit | 2 +- 2529 files changed, 26180 insertions(+), 26432 deletions(-) create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-15.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-16.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-17.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-18.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-19.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-20.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-21.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-22.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-23.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-24.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-25.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-26.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-27.xml diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200310-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200310-03.xml index 06a8247e49..5d9e7093df 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200310-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200310-03.xml @@ -1,6 +1,5 @@ - Apache: multiple buffer overflows @@ -9,7 +8,7 @@ Apache 2003-10-28 - December 30, 2007: 02 + 2007-12-30: 02 32194 local @@ -57,6 +56,6 @@ # /etc/init.d/apache restart - CAN-2003-0542 (under review at time of GLSA) + CAN-2003-0542 (under review at time of GLSA) diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200310-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200310-04.xml index f7884115d2..d5858fd1e3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200310-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200310-04.xml @@ -1,6 +1,5 @@ - Apache: buffer overflows and a possible information disclosure @@ -11,7 +10,7 @@ Apache 2003-10-31 - December 30, 2007: 02 + 2007-12-30: 02 32271 local @@ -65,7 +64,7 @@

- CAN-2003-0789 - CAN-2003-0542 + CAN-2003-0789 + CAN-2003-0542
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-01.xml index 7c14f47bb2..1932b80a1b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-01.xml @@ -1,6 +1,5 @@ - kdebase: KDM vulnerabilities @@ -58,8 +57,8 @@ # emerge clean - CAN-2003-0690 - CAN-2003-0692 - KDE Security Advisory + CAN-2003-0690 + CAN-2003-0692 + KDE Security Advisory diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-02.xml index 013cdd2b6c..f28dd60f6d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-02.xml @@ -1,6 +1,5 @@ - Opera: buffer overflows in 7.11 and 7.20 @@ -58,7 +57,7 @@ # emerge clean - CAN-2003-0870 + CAN-2003-0870 @stake Security Advisory diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-03.xml index 5e0bfe6b34..aa7c8e5216 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-03.xml @@ -1,6 +1,5 @@ - HylaFAX: Remote code exploit in hylafax @@ -54,7 +53,7 @@ # emerge clean - CAN-2003-0886 + CAN-2003-0886 SuSE Security Announcment diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-04.xml index 7c377d71c6..d959f75a94 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-04.xml @@ -1,6 +1,5 @@ - FreeRADIUS: heap exploit and NULL pointer dereference vulnerability diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-05.xml index aad9e9816c..12d029f23a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-05.xml @@ -1,6 +1,5 @@ - Ethereal: security problems in ethereal 0.9.15 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-06.xml index 75c712298e..2e9f9fb551 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-06.xml @@ -1,6 +1,5 @@ - glibc: getgrouplist buffer overflow vulnerability @@ -53,6 +52,6 @@ # emerge clean - CAN-2003-0689 + CAN-2003-0689 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-07.xml index fda973d491..3c9074d051 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-07.xml @@ -1,6 +1,5 @@ - phpSysInfo: arbitrary code execution and directory traversal @@ -9,7 +8,7 @@ phpSysInfo 2003-11-22 - December 30, 2007: 02 + 2007-12-30: 02 26782 local @@ -53,6 +52,6 @@ # emerge clean - CAN-2003-0536 + CAN-2003-0536 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-08.xml index 9ae2821611..dc74215239 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200311-08.xml @@ -1,6 +1,5 @@ - Libnids: remote code execution vulnerability @@ -50,6 +49,6 @@ # emerge clean - CAN-2003-0850 + CAN-2003-0850 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-01.xml index 325c4282fd..01720a9211 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-01.xml @@ -1,6 +1,5 @@ - rsync.gentoo.org: rotation server compromised diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-03.xml index 6c89cb79f7..5abb70314a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-03.xml @@ -1,6 +1,5 @@ - rsync: exploitable heap overflow @@ -67,9 +66,9 @@ # /etc/init.d/rsyncd restart - Rsync Security Advisory - CAN-2003-0962 - GLSA-200312-02 - GLSA-200312-01 + Rsync Security Advisory + CAN-2003-0962 + GLSA-200312-02 + GLSA-200312-01 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-04.xml index 2227b28cea..322e472170 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-04.xml @@ -1,6 +1,5 @@ - CVS: malformed module request vulnerability @@ -61,6 +60,6 @@ # emerge clean - CAN-2003-0977 + CAN-2003-0977 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-05.xml index 2f5973332b..3a00e47603 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-05.xml @@ -1,6 +1,5 @@ - GnuPG: ElGamal signing keys compromised and format string vulnerability @@ -65,7 +64,7 @@ # emerge clean - CAN-2003-0971 + CAN-2003-0971 GnuPG Announcement S-Quadra Advisory diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-06.xml index 8b2d4bff82..71c7b1e707 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-06.xml @@ -1,6 +1,5 @@ - XChat: malformed dcc send request denial of service @@ -59,6 +58,6 @@

- XChat Announcement + XChat Announcement
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-07.xml index 9aca78d00e..90346eccf6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-07.xml @@ -1,6 +1,5 @@ - Two buffer overflows in lftp @@ -8,8 +7,8 @@ a malicious ftp server, could lead to malicious code being executed. lftp - December 13, 2003 - 200312-07: 2 + 2003-12-13 + 2003-12-07: 2 35866 remote @@ -64,8 +63,8 @@

# emerge sync - # emerge -pv '>=net-ftp/lftp-2.6.10' - # emerge '>=net-ftp/lftp-2.6.10' + # emerge -pv '>=net-ftp/lftp-2.6.10' + # emerge '>=net-ftp/lftp-2.6.10' # emerge clean diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-08.xml index dbe2dc2bce..6ef1ec1381 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200312-08.xml @@ -1,6 +1,5 @@ - CVS: possible root compromise when using CVS pserver diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-01.xml index 2ff200192b..2922a8bffd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-01.xml @@ -1,6 +1,5 @@ - Linux kernel do_mremap() local privilege escalation vulnerability @@ -8,8 +7,8 @@ which allows for local privelege escalation. Kernel - January 08, 2004 - January 08, 2004: 01 + 2004-01-08 + 2004-01-08: 01 37292 local @@ -212,15 +211,15 @@ their system:

- $> emerge sync - $> emerge -pv your-favourite-sources - $> emerge your-favourite-sources - $> # Follow usual procedure for compiling and installing a kernel. - $> # If you use genkernel, run genkernel as you would do normally. + $> emerge sync + $> emerge -pv your-favourite-sources + $> emerge your-favourite-sources + $> # Follow usual procedure for compiling and installing a kernel. + $> # If you use genkernel, run genkernel as you would do normally. - $> # IF YOUR KERNEL IS MARKED as "remerge required!" THEN - $> # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE - $> # REPORTS THAT THE SAME VERSION IS INSTALLED. + $> # IF YOUR KERNEL IS MARKED as "remerge required!" THEN + $> # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE + $> # REPORTS THAT THE SAME VERSION IS INSTALLED. Vulnerability diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-02.xml index 111144b321..86bd801f9d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-02.xml @@ -1,6 +1,5 @@ - Honeyd remote detection vulnerability via a probe packet @@ -9,8 +8,8 @@ known. honeyd - January 21, 2004 - January 21, 2004: 01 + 2004-01-21 + 2004-01-21: 01 38934 remote @@ -51,9 +50,9 @@ All users are recommended to update to honeyd version 0.8:

- $> emerge sync - $> emerge -pv ">=net-analyzer/honeyd-0.8" - $> emerge ">=net-analyzer/honeyd-0.8" + $> emerge sync + $> emerge -pv ">=net-analyzer/honeyd-0.8" + $> emerge ">=net-analyzer/honeyd-0.8" Honeyd Security Advisory 2004-001 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-03.xml index e369a8134f..811de0adde 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-03.xml @@ -1,6 +1,5 @@ - Apache mod_python Denial of Service vulnerability @@ -8,8 +7,8 @@ malformed query string was sent. mod_python - January 27, 2004 - December 30, 2007: 02 + 2004-01-27 + 2007-12-30: 02 39154 remote @@ -56,12 +55,12 @@ update their mod_python installation:

- $> emerge sync - $> emerge -pv ">=www-apache/mod_python-2.7.10" - $> emerge ">=www-apache/mod_python-2.7.10" - $> /etc/init.d/apache restart + $> emerge sync + $> emerge -pv ">=www-apache/mod_python-2.7.10" + $> emerge ">=www-apache/mod_python-2.7.10" + $> /etc/init.d/apache restart - Mod_python 2.7.10 release announcement + Mod_python 2.7.10 release announcement
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-04.xml index 794d61938e..bb7979d955 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200401-04.xml @@ -1,6 +1,5 @@ - GAIM 0.75 Remote overflows @@ -8,8 +7,8 @@ GAIM that could lead to a remote compromise of the IM client. GAIM - January 26, 2004 - January 26, 2004: 01 + 2004-01-26 + 2004-01-26: 01 39470 man-in-the-middle @@ -68,9 +67,9 @@ All users are recommended to upgrade GAIM to 0.75-r7.

- $> emerge sync - $> emerge -pv ">=net-im/gaim-0.75-r7" - $> emerge ">=net-im/gaim-0.75-r7" + $> emerge sync + $> emerge -pv ">=net-im/gaim-0.75-r7" + $> emerge ">=net-im/gaim-0.75-r7" Security advisory from Stefan Esser diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-01.xml index 827e12208b..92d65863df 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-01.xml @@ -1,19 +1,18 @@ - PHP setting leaks from .htaccess files on virtual hosts - If the server configuration "php.ini" file has - "register_globals = on" and a request is made to one virtual host - (which has "php_admin_flag register_globals off") and the next + If the server configuration "php.ini" file has + "register_globals = on" and a request is made to one virtual host + (which has "php_admin_flag register_globals off") and the next request is sent to the another virtual host (which does not have the setting) global variables may leak and may be used to exploit the site. PHP - February 07, 2004 - February 07, 2004: 01 + 2004-02-07 + 2004-02-07: 01 39952 remote @@ -30,9 +29,9 @@

- If the server configuration "php.ini" file has - "register_globals = on" and a request is made to one virtual host - (which has "php_admin_flag register_globals off") and the next + If the server configuration "php.ini" file has + "register_globals = on" and a request is made to one virtual host + (which has "php_admin_flag register_globals off") and the next request is sent to the another virtual host (which does not have the setting) through the same apache child, the setting will persist.

@@ -45,7 +44,7 @@ result, users are urged to upgrade their PHP installations.

- Gentoo ships PHP with "register_globals" set to "off" + Gentoo ships PHP with "register_globals" set to "off" by default.

@@ -64,10 +63,10 @@

# emerge sync - # emerge -pv ">=dev-php/mod_php-4.3.4-r4" - # emerge ">=dev-php/mod_php-4.3.4-r4" + # emerge -pv ">=dev-php/mod_php-4.3.4-r4" + # emerge ">=dev-php/mod_php-4.3.4-r4" - Corresponding PHP bug + Corresponding PHP bug diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-02.xml index 8f60b9344a..f4906cfbe3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-02.xml @@ -1,6 +1,5 @@ - XFree86 Font Information File Buffer Overflow @@ -8,8 +7,8 @@ Window System allows local attackers to gain root privileges. 200402-02 - February 11, 2004 - February 11, 2004: 01 + 2004-02-11 + 2004-02-11: 01 local @@ -44,11 +43,11 @@ To reproduce the overflow on the command line one can run:

- # cat > fonts.dir <<EOF + # cat > fonts.dir <<EOF 1 word.bdf -misc-fixed-medium-r-semicondensed--13-120-75-75-c-60-iso8859-1 EOF - # perl -e 'print "0" x 1024 . "A" x 96 . "\n"' > fonts.alias + # perl -e 'print "0" x 1024 . "A" x 96 . "\n"' > fonts.alias # X :0 -fp $PWD

{Some output removed}... Server aborting... Segmentation fault (core dumped) @@ -84,8 +83,7 @@ # emerge x11-base/xfree - CVE: CAN-2004-0083 + CVE: CAN-2004-0083 Vulnerability: XFree86 Font Information File Buffer Overflow diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-03.xml index de5809f2d3..8c719c15b5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-03.xml @@ -1,6 +1,5 @@ - Monkeyd Denial of Service vulnerability @@ -8,8 +7,8 @@ launched against the webserver. monkeyd - February 11, 2004 - February 11, 2004: 01 + 2004-02-11 + 2004-02-11: 01 41156 remote @@ -50,10 +49,10 @@

# emerge sync - # emerge -pv ">=www-servers/monkeyd-0.8.2" - # emerge ">=www-servers/monkeyd-0.8.2" + # emerge -pv ">=www-servers/monkeyd-0.8.2" + # emerge ">=www-servers/monkeyd-0.8.2" - CVS Patch + CVS Patch
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-04.xml index 379f664dc4..9700e9412b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-04.xml @@ -1,6 +1,5 @@ - Gallery 1.4.1 and below remote exploit vulnerability @@ -9,8 +8,8 @@ remote exploit of your webserver. Gallery - February 11, 2004 - February 11, 2004: 01 + 2004-02-11 + 2004-02-11: 01 39638 remote @@ -57,8 +56,8 @@

# emerge sync - # emerge -p ">=www-apps/gallery-1.4.1_p1" - # emerge ">=www-apps/gallery-1.4.1_p1" + # emerge -p ">=www-apps/gallery-1.4.1_p1" + # emerge ">=www-apps/gallery-1.4.1_p1" diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-05.xml index cf5005ed0f..32b445a54d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-05.xml @@ -1,6 +1,5 @@ - phpMyAdmin < 2.5.6-rc1: possible attack against export.php @@ -8,8 +7,8 @@ generated input could lead to a directory traversal attack. phpmyadmin - February 17, 2004 - February 17, 2004: 01 + 2004-02-17 + 2004-02-17: 01 40268 remote @@ -55,11 +54,11 @@

# emerge sync - # emerge -pv ">=dev-db/phpmyadmin-2.5.6_rc1" - # emerge ">=dev-db/phpmyadmin-2.5.6_rc1" + # emerge -pv ">=dev-db/phpmyadmin-2.5.6_rc1" + # emerge ">=dev-db/phpmyadmin-2.5.6_rc1" # emerge clean - CVS Patch + CVS Patch
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-06.xml index c29bb140d0..b4ec7afd7d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-06.xml @@ -1,6 +1,5 @@ - Updated kernel packages fix the AMD64 ptrace vulnerability @@ -9,8 +8,8 @@ elevated priveleges. Kernel - February 17, 2004 - February 17, 2004: 01 + 2004-02-17 + 2004-02-17: 01 local diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-07.xml index c2e0e0823a..633dbd725d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200402-07.xml @@ -1,6 +1,5 @@ - Clam Antivirus DoS vulnerability @@ -9,8 +8,8 @@ programs that rely on the clamav daemon, such as SMTP daemons. clamav - February 17, 2004 - February 17, 2004: 01 + 2004-02-17 + 2004-02-17: 01 41248 remote @@ -58,8 +57,8 @@

# emerge sync - # emerge -pv ">=app-antivirus/clamav-0.6.7" - # emerge ">=app-antivirus/clamav-0.6.7" + # emerge -pv ">=app-antivirus/clamav-0.6.7" + # emerge ">=app-antivirus/clamav-0.6.7" diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-01.xml index 18c812ae51..1c6ecdabe0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-01.xml @@ -1,6 +1,5 @@ - Libxml2 URI Parsing Buffer Overflow Vulnerabilities @@ -9,8 +8,8 @@ arbitrary code. libxml - March 05, 2004 - March 05, 2004: 01 + 2004-03-05 + 2004-03-05: 01 42735 local and remote combination @@ -44,10 +43,10 @@

# emerge sync - # emerge -pv ">=dev-libs/libxml2-2.6.6" - # emerge ">=dev-libs/libxml2-2.6.6" + # emerge -pv ">=dev-libs/libxml2-2.6.6" + # emerge ">=dev-libs/libxml2-2.6.6" - CVE 2004-0110 + CVE 2004-0110
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-02.xml index f0332c98c5..8a3951743e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-02.xml @@ -1,6 +1,5 @@ - Linux kernel do_mremap local privilege escalation vulnerability @@ -9,8 +8,8 @@ escalations. Kernel - March 05, 2004 - May 22, 2006: 03 + 2004-03-05 + 2006-05-22: 03 42024 local @@ -228,15 +227,15 @@ # # Follow usual procedure for compiling and installing a kernel. # # If you use genkernel, run genkernel as you would do normally. - # # IF YOUR KERNEL IS MARKED as "remerge required!" THEN + # # IF YOUR KERNEL IS MARKED as "remerge required!" THEN # # YOU SHOULD UPDATE YOUR KERNEL EVEN IF PORTAGE # # REPORTS THAT THE SAME VERSION IS INSTALLED. Advisory released by iSEC - CVE-2004-0077 + CVE-2004-0077 - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-03.xml index f31e4278fe..d515bafcf4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-03.xml @@ -1,6 +1,5 @@ - Multiple OpenSSL Vulnerabilities @@ -8,8 +7,8 @@ suite for the TLS protocol developed by Codenomicon Ltd. OpenSSL - March 17, 2004 - May 22, 2006: 02 + 2004-03-17 + 2006-05-22: 02 44941 remote @@ -77,15 +76,15 @@

# emerge sync - # emerge -pv ">=dev-libs/openssl-0.9.7d" - # emerge ">=dev-libs/openssl-0.9.7d" + # emerge -pv ">=dev-libs/openssl-0.9.7d" + # emerge ">=dev-libs/openssl-0.9.7d" - CVE-2004-0079 - CVE-2004-0081 - CVE-2004-0112 + CVE-2004-0079 + CVE-2004-0081 + CVE-2004-0112 - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-04.xml index 273e0fce60..8e1ed7ca9e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-04.xml @@ -1,6 +1,5 @@ - Multiple security vulnerabilities in Apache 2 @@ -11,8 +10,8 @@ mod_disk_cache module. Apache - March 22, 2004 - December 30, 2007: 03 + 2004-03-22 + 2007-12-30: 03 45206 remote @@ -79,8 +78,8 @@

# emerge sync - # emerge -pv ">=www-servers/apache-2.0.49" - # emerge ">=www-servers/apache-2.0.49" + # emerge -pv ">=www-servers/apache-2.0.49" + # emerge ">=www-servers/apache-2.0.49" # ** IMPORTANT ** @@ -102,10 +101,10 @@ Apache mod_disk_cache authentication storage weakness vulnerability - Apache HTTP Server 2.0.49 Announcement - CVE-2004-0113 + Apache HTTP Server 2.0.49 Announcement + CVE-2004-0113 - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-05.xml index a768342b0a..da9467bbfc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-05.xml @@ -1,6 +1,5 @@ - UUDeview MIME Buffer Overflow @@ -8,8 +7,8 @@ extensions) may cause UUDeview to crash or execute arbitrary code. UUDeview - March 26, 2004 - March 26, 2004: 01 + 2004-03-26 + 2004-03-26: 01 44859 remote @@ -57,8 +56,8 @@

# emerge sync - # emerge -pv ">=app-text/uudeview-0.5.20" - # emerge ">=app-text/uudeview-0.5.20" + # emerge -pv ">=app-text/uudeview-0.5.20" + # emerge ">=app-text/uudeview-0.5.20" diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-06.xml index ad456273d8..3b878e8ddd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-06.xml @@ -1,6 +1,5 @@ - Multiple remote buffer overflow vulnerabilities in Courier @@ -9,8 +8,8 @@ allowing unauthorized access to a vulnerable system. Courier - March 26, 2004 - March 26, 2004: 01 + 2004-03-26 + 2004-03-26: 01 45584 remote @@ -56,17 +55,17 @@ # emerge sync - # emerge -pv ">=net-mail/courier-imap-3.0.0" - # emerge ">=net-mail/courier-imap-3.0.0" + # emerge -pv ">=net-mail/courier-imap-3.0.0" + # emerge ">=net-mail/courier-imap-3.0.0" # ** Or; depending on your installation... ** - # emerge -pv ">=mail-mta/courier-0.45" - # emerge ">=mail-mta/courier-0.45" + # emerge -pv ">=mail-mta/courier-0.45" + # emerge ">=mail-mta/courier-0.45" Courier Multiple Remote Buffer Overflow Vulnerabilities - CAN-2004-0224 + CAN-2004-0224 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-07.xml index d6dc15f931..bdfa196aae 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-07.xml @@ -1,6 +1,5 @@ - Multiple remote overflows and vulnerabilities in Ethereal @@ -8,8 +7,8 @@ attacker to crash the program or run arbitrary code. ethereal - March 28, 2004 - March 28, 2004: 01 + 2004-03-28 + 2004-03-28: 01 45543 remote @@ -23,13 +22,13 @@ Quote from http://www.ethereal.com

- "Ethereal is used by network professionals around the world for + "Ethereal is used by network professionals around the world for troubleshooting, analysis, software and protocol development, and education. It has all of the standard features you would expect in a protocol analyzer, and several features not seen in any other product. Its open source license allows talented experts in the networking community to add enhancements. It runs on all popular computing platforms, including - Unix, Linux, and Windows." + Unix, Linux, and Windows."

@@ -60,13 +59,13 @@ # emerge sync - # emerge -pv ">=net-analyzer/ethereal-0.10.3" - # emerge ">=net-analyzer/ethereal-0.10.3" + # emerge -pv ">=net-analyzer/ethereal-0.10.3" + # emerge ">=net-analyzer/ethereal-0.10.3" Multiple security problems in Ethereal 0.10.2 - CAN-2004-0176 - CAN-2004-0365 - CAN-2004-0367 + CAN-2004-0176 + CAN-2004-0365 + CAN-2004-0367 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-08.xml index ca445d0b2e..387902531d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-08.xml @@ -1,6 +1,5 @@ - oftpd DoS vulnerability @@ -8,8 +7,8 @@ crash the oftpd daemon. oftpd - March 29, 2004 - May 22, 2006: 02 + 2004-03-29 + 2006-05-22: 02 45738 remote @@ -20,8 +19,7 @@

- Quote from http://www.time-travellers + Quote from http://www.time-travellers .org/oftpd/

@@ -62,14 +60,14 @@ # emerge sync - # emerge -pv ">=net-ftp/oftpd-0.3.7" - # emerge ">=net-ftp/oftpd-0.3.7" + # emerge -pv ">=net-ftp/oftpd-0.3.7" + # emerge ">=net-ftp/oftpd-0.3.7" - osftpd DoS Vulnerability - CVE-2004-0376 + osftpd DoS Vulnerability + CVE-2004-0376 - + DerCorny diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-09.xml index cdf7392994..12c43631a2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-09.xml @@ -1,6 +1,5 @@ - Buffer overflow in Midnight Commander @@ -8,8 +7,8 @@ arbitrary code to be run on a user's computer mc - March 29, 2004 - March 29, 2004: 01 + 2004-03-29 + 2004-03-29: 01 45957 remote @@ -48,10 +47,10 @@ # emerge sync - # emerge -pv ">=app-misc/mc-4.6.0-r5" - # emerge ">=app-misc/mc-4.6.0-r5" + # emerge -pv ">=app-misc/mc-4.6.0-r5" + # emerge ">=app-misc/mc-4.6.0-r5" - CAN-2003-1023 + CAN-2003-1023 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-10.xml index 939654c6b7..f592667ba4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-10.xml @@ -1,6 +1,5 @@ - Fetchmail 6.2.5 fixes a remote DoS @@ -8,8 +7,8 @@ specially-crafted email to a fetchmail user. fetchmail - March 30, 2004 - March 30, 2004: 01 + 2004-03-30 + 2004-03-30: 01 37717 remote @@ -49,11 +48,11 @@

# emerge sync - # emerge -pv ">=net-mail/fetchmail-6.2.5" - # emerge ">=net-mail/fetchmail-6.2.5" + # emerge -pv ">=net-mail/fetchmail-6.2.5" + # emerge ">=net-mail/fetchmail-6.2.5" ISS X-Force Listing - CVE Candidate (CAN-2003-0792) + CVE Candidate (CAN-2003-0792)
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-11.xml index f7354ed4dc..7abb28f92e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-11.xml @@ -1,6 +1,5 @@ - Squid ACL [url_regex] bypass vulnerability @@ -11,8 +10,8 @@ ACL. Squid - March 30, 2004 - September 02, 2004: 02 + 2004-03-30 + 2004-09-02: 02 45273 remote @@ -32,13 +31,13 @@

A bug in Squid allows users to bypass certain access controls by passing a - URL containing "%00" which exploits the Squid decoding function. + URL containing "%00" which exploits the Squid decoding function. This may insert a NUL character into decoded URLs, which may allow users to bypass url_regex access control lists that are enforced upon them.

In such a scenario, Squid will insert a NUL character after - the"%00" and it will make a comparison between the URL to the end + the"%00" and it will make a comparison between the URL to the end of the NUL character rather than the contents after it: the comparison does not result in a match, and the user's request is not denied.

@@ -65,14 +64,14 @@ # emerge sync - # emerge -pv ">=net-proxy/squid-2.5.5" - # emerge ">=net-proxy/squid-2.5.5" + # emerge -pv ">=net-proxy/squid-2.5.5" + # emerge ">=net-proxy/squid-2.5.5" - CAN-2004-0189 + CAN-2004-0189 Squid 2.5.STABLE5 Release Announcement - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-12.xml index 1171ed6d60..b04d50e954 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-12.xml @@ -1,6 +1,5 @@ - OpenLDAP DoS Vulnerability @@ -8,8 +7,8 @@ using the back-ldbm backend, to free memory that was never allocated. openldap - March 31, 2004 - May 22, 2006: 02 + 2004-03-31 + 2006-05-22: 02 26728 remote @@ -56,14 +55,14 @@ # emerge sync - # emerge -pv ">=net-nds/openldap-2.1.13" - # emerge ">=net-nds/openldap-2.1.13" + # emerge -pv ">=net-nds/openldap-2.1.13" + # emerge ">=net-nds/openldap-2.1.13" - OpenLDAP ITS Bug and Patch - CVE-2003-1201 + OpenLDAP ITS Bug and Patch + CVE-2003-1201 - + DerCorny diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-13.xml index 5e3d203795..a63078e7eb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-13.xml @@ -1,6 +1,5 @@ - Remote buffer overflow in MPlayer @@ -8,8 +7,8 @@ that may allow attackers to run arbitrary code on a user's computer. mplayer - March 31, 2004 - October 11, 2006: 03 + 2004-03-31 + 2006-10-11: 03 46246 remote @@ -69,30 +68,30 @@ # emerge sync - # emerge -pv ">=media-video/mplayer-0.92-r1" - # emerge ">=media-video/mplayer-0.92-r1" + # emerge -pv ">=media-video/mplayer-0.92-r1" + # emerge ">=media-video/mplayer-0.92-r1"

AMD64 users should:

# emerge sync - # emerge -pv ">=media-video/mplayer-1.0_pre2-r1" - # emerge ">=media-video/mplayer-1.0_pre2-r1" + # emerge -pv ">=media-video/mplayer-1.0_pre2-r1" + # emerge ">=media-video/mplayer-1.0_pre2-r1"

PPC users should:

# emerge sync - # emerge -pv ">=media-video/mplayer-1.0_pre3-r2" - # emerge ">=media-video/mplayer-1.0_pre3-r2" + # emerge -pv ">=media-video/mplayer-1.0_pre3-r2" + # emerge ">=media-video/mplayer-1.0_pre3-r2" MPlayerHQ News - CVE-2004-0386 + CVE-2004-0386 - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-14.xml index 0d910a46fa..f2939a5d37 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200403-14.xml @@ -1,6 +1,5 @@ - Multiple Security Vulnerabilities in Monit @@ -8,8 +7,8 @@ Monit. app-admin/monit - March 31, 2004 - May 22, 2006: 02 + 2004-03-31 + 2006-05-22: 02 43967 remote @@ -58,16 +57,16 @@ # emerge sync - # emerge -pv ">=app-admin/monit-4.2" - # emerge ">=app-admin/monit-4.2" + # emerge -pv ">=app-admin/monit-4.2" + # emerge ">=app-admin/monit-4.2" Monit HTTP Content-Length Parameter Denial of Service Vulnerability Monit Overly Long HTTP Request Buffer Overrun Vulnerability - CVE-2003-1083 - CVE-2003-1084 + CVE-2003-1083 + CVE-2003-1084 - + DerCorny diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-01.xml index e852dcf39c..36fda1de6d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-01.xml @@ -1,6 +1,5 @@ - Insecure sandbox temporary lockfile vulnerabilities in Portage @@ -11,8 +10,8 @@ the system. Portage - April 04, 2004 - April 04, 2004: 01 + 2004-04-04 + 2004-04-04: 01 21923 local @@ -26,7 +25,7 @@ Portage is Gentoo's package management system which is responsible for installing, compiling and updating any ebuilds on the system through the Gentoo rsync tree. Under default configurations, most ebuilds run under a - sandbox which prevent the build process writing to the "real" + sandbox which prevent the build process writing to the "real" system outside the build directory - packages are installed into a temporary location and then copied over safely by Portage instead. During the process the sandbox wrapper creates lockfiles in the /tmp directory @@ -84,8 +83,8 @@ # emerge sync - # emerge -pv ">=sys-apps/portage-2.0.50-r3" - # emerge ">=sys-apps/portage-2.0.50-r3" + # emerge -pv ">=sys-apps/portage-2.0.50-r3" + # emerge ">=sys-apps/portage-2.0.50-r3" diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-02.xml index 73d1614d72..2d9e3f5fce 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-02.xml @@ -1,6 +1,5 @@ - KDE Personal Information Management Suite Remote Buffer Overflow Vulnerability @@ -8,8 +7,8 @@ unauthorized access to an affected system. kde-base/kde - April 06, 2004 - April 06, 2004: 01 + 2004-04-06 + 2004-04-06: 01 38256 remote @@ -49,11 +48,11 @@ # emerge sync - # emerge -pv ">=kde-base/kde-3.1.5" - # emerge ">=kde-base/kde-3.1.5" + # emerge -pv ">=kde-base/kde-3.1.5" + # emerge ">=kde-base/kde-3.1.5" - CAN-2003-0988 + CAN-2003-0988 aescriva diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-03.xml index 37c74e98d1..841bd80fa4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-03.xml @@ -1,6 +1,5 @@ - Tcpdump Vulnerabilities in ISAKMP Parsing @@ -8,8 +7,8 @@ parsing of ISAKMP packets. tcpdump - March 31, 2004 - March 31, 2004: 01 + 2004-03-31 + 2004-03-31: 01 38206 46258 remote @@ -59,12 +58,12 @@ # emerge sync - # emerge -pv ">=net-libs/libpcap-0.8.3-r1" ">=net-analyzer/tcpdump-3.8.3-r1" - # emerge ">=net-libs/libpcap-0.8.3-r1" ">=net-analyzer/tcpdump-3.8.3-r1" + # emerge -pv ">=net-libs/libpcap-0.8.3-r1" ">=net-analyzer/tcpdump-3.8.3-r1" + # emerge ">=net-libs/libpcap-0.8.3-r1" ">=net-analyzer/tcpdump-3.8.3-r1" - Rapid7 Advisory - Red Hat Security Advisory - CVE Advisory + Rapid7 Advisory + Red Hat Security Advisory + CVE Advisory diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-04.xml index 292afdb967..3a0c35bf9e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-04.xml @@ -1,6 +1,5 @@ - Multiple vulnerabilities in sysstat @@ -8,8 +7,8 @@ attacker to execute arbitrary code or overwrite arbitrary files sysstat - April 06, 2004 - April 06, 2004: 01 + 2004-04-06 + 2004-04-06: 01 45159 local @@ -55,12 +54,12 @@ # emerge sync - # emerge -pv ">=app-admin/sysstat-5.0.2" - # emerge ">=app-admin/sysstat-5.0.2" + # emerge -pv ">=app-admin/sysstat-5.0.2" + # emerge ">=app-admin/sysstat-5.0.2" - CVE (1) - CVE (2) + CVE (1) + CVE (2) klieber diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-05.xml index 80727adab5..a10ae20dcf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-05.xml @@ -1,6 +1,5 @@ - ipsec-tools contains an X.509 certificates vulnerability. @@ -8,8 +7,8 @@ with X.509 certificates. ipsec-tools - April 07, 2004 - April 07, 2004: 01 + 2004-04-07 + 2004-04-07: 01 47013 remote @@ -23,8 +22,8 @@ From http://ipsec-tools.sourceforge.net/ :

- "IPsec-Tools is a port of KAME's IPsec utilities to the Linux-2.6 - IPsec implementation." + "IPsec-Tools is a port of KAME's IPsec utilities to the Linux-2.6 + IPsec implementation."

@@ -54,8 +53,8 @@ # emerge sync - # emerge -pv ">=net-firewall/ipsec-tools-0.2.5" - # emerge ">=net-firewall/ipsec-tools-0.2.5" + # emerge -pv ">=net-firewall/ipsec-tools-0.2.5" + # emerge ">=net-firewall/ipsec-tools-0.2.5" diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-06.xml index 7804015e7e..a00f338a60 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-06.xml @@ -1,6 +1,5 @@ - Util-linux login may leak sensitive data @@ -8,8 +7,8 @@ under certain conditions. - April 07, 2004 - April 07, 2004: 01 + 2004-04-07 + 2004-04-07: 01 46422 remote @@ -54,12 +53,12 @@ # emerge sync - # emerge -pv ">=sys-apps/util-linux-2.12" - # emerge ">=sys-apps/util-linux-2.12" + # emerge -pv ">=sys-apps/util-linux-2.12" + # emerge ">=sys-apps/util-linux-2.12" - CAN-2004-0080 + CAN-2004-0080 lcars diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-07.xml index fdc7215de9..3084f67f99 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-07.xml @@ -1,6 +1,5 @@ - ClamAV RAR Archive Remote Denial Of Service Vulnerability @@ -8,8 +7,8 @@ RAR archives. clamav - April 07, 2004 - May 22, 2006: 02 + 2004-04-07 + 2006-05-22: 02 45357 remote @@ -59,11 +58,11 @@ # emerge sync - # emerge -pv ">=app-antivirus/clamav-0.68.1" - # emerge ">=app-antivirus/clamav-0.68.1" + # emerge -pv ">=app-antivirus/clamav-0.68.1" + # emerge ">=app-antivirus/clamav-0.68.1" - CVE-2004-1909 + CVE-2004-1909 klieber diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-08.xml index 5e6efb7880..f96f8c1742 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-08.xml @@ -1,6 +1,5 @@ - GNU Automake symbolic link vulnerability @@ -8,8 +7,8 @@ attacker to modify data or elevate their privileges. automake - April 08, 2004 - January 31, 2005: 05 + 2004-04-08 + 2005-01-31: 05 45646 local diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-09.xml index 7c3ba4ee02..ae644470e3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-09.xml @@ -1,6 +1,5 @@ - Cross-realm trust vulnerability in Heimdal @@ -8,8 +7,8 @@ over a realm to impersonate anyone in the cross-realm trust path. heimdal - April 09, 2004 - April 09, 2004: 01 + 2004-04-09 + 2004-04-09: 01 46590 local @@ -49,11 +48,11 @@ # emerge sync - # emerge -pv ">=app-crypt/heimdal-0.6.1" - # emerge ">=app-crypt/heimdal-0.6.1" + # emerge -pv ">=app-crypt/heimdal-0.6.1" + # emerge ">=app-crypt/heimdal-0.6.1" - CVE + CVE klieber diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-10.xml index cb59725fa9..4052c65817 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-10.xml @@ -1,14 +1,13 @@ - iproute local Denial of Service vulnerability The iproute package allows local users to cause a denial of service. - - April 09, 2004 - April 09, 2004: 01 + + 2004-04-09 + 2004-04-09: 01 34294 local @@ -48,12 +47,12 @@ # emerge sync - # emerge -pv ">=sys-apps/iproute-20010824-r5"; - # emerge ">=sys-apps/iproute-20010824-r5"; + # emerge -pv ">=sys-apps/iproute-20010824-r5"; + # emerge ">=sys-apps/iproute-20010824-r5"; - CAN-2003-0856 + CAN-2003-0856 lcars diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-11.xml index fc1bdcc38c..40d1cfd8a8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-11.xml @@ -1,6 +1,5 @@ - Multiple Vulnerabilities in pwlib @@ -8,8 +7,8 @@ denial of service or buffer overflow attack. dev-libs/pwlib - April 09, 2004 - April 09, 2004: 01 + 2004-04-09 + 2004-04-09: 01 45846 remote @@ -51,11 +50,11 @@ # emerge sync - # emerge -pv ">=dev-libs/pwlib-1.5.2-r3" - # emerge ">=dev-libs/pwlib-1.5.2-r3" + # emerge -pv ">=dev-libs/pwlib-1.5.2-r3" + # emerge ">=dev-libs/pwlib-1.5.2-r3" - CAN-2004-0097 + CAN-2004-0097 NISCC Vulnerability Advisory 006489/H323 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-12.xml index 341307d7a4..d2d85a63c9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-12.xml @@ -1,6 +1,5 @@ - Scorched 3D server chat box format string vulnerability @@ -9,8 +8,8 @@ of arbitrary code. scorched3d - April 09, 2004 - April 09, 2004: 08 + 2004-04-09 + 2004-04-09: 08 39302 remote @@ -21,8 +20,8 @@

- Scorched 3D is a game based loosely on the classic DOS game "Scorched - Earth". Scorched 3D adds amongst other new features a 3D island + Scorched 3D is a game based loosely on the classic DOS game "Scorched + Earth". Scorched 3D adds amongst other new features a 3D island environment and LAN and internet play. Scorched 3D is totally free and is available for multiple operating systems.

@@ -56,8 +55,8 @@ # emerge sync - # emerge -pv ">=games-strategy/scorched3d-37" - # emerge ">=games-strategy/scorched3d-37" + # emerge -pv ">=games-strategy/scorched3d-37" + # emerge ">=games-strategy/scorched3d-37" diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-13.xml index 6ecbd1cb85..88e5be17cb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-13.xml @@ -1,6 +1,5 @@ - CVS Server and Client Vulnerabilities @@ -9,8 +8,8 @@ files on both client and server. cvs - April 14, 2004 - May 22, 2006: 02 + 2004-04-14 + 2006-05-22: 02 47800 remote @@ -57,13 +56,13 @@ # emerge sync - # emerge -pv ">=dev-util/cvs-1.11.15" - # emerge ">=dev-util/cvs-1.11.15" + # emerge -pv ">=dev-util/cvs-1.11.15" + # emerge ">=dev-util/cvs-1.11.15" CVS commit log - CVE-2004-0180 - CVE-2004-0405 + CVE-2004-0180 + CVE-2004-0405 condordes diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-14.xml index 423b20f38e..7ddc6bcc16 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-14.xml @@ -1,6 +1,5 @@ - Multiple format string vulnerabilities in cadaver @@ -9,8 +8,8 @@ to a malicious server. cadaver - April 19, 2004 - April 19, 2004: 01 + 2004-04-19 + 2004-04-19: 01 47799 remote @@ -21,8 +20,7 @@

- According to http://www.webdav.org/cadaver, + According to http://www.webdav.org/cadaver, cadaver is a command-line WebDAV client for Unix. It supports file upload, download, on-screen display, namespace operations (move/copy), collection creation and deletion, and locking operations. @@ -56,11 +54,11 @@ # emerge sync - # emerge -pv ">=net-misc/cadaver-0.22.1" - # emerge ">=net-misc/cadaver-0.22.1" + # emerge -pv ">=net-misc/cadaver-0.22.1" + # emerge ">=net-misc/cadaver-0.22.1" - CAN-2004-0179 + CAN-2004-0179 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-15.xml index 9d92dbab1b..862e77b5d4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-15.xml @@ -1,6 +1,5 @@ - XChat 2.0.x SOCKS5 Vulnerability @@ -8,8 +7,8 @@ run arbitrary code. xchat - April 19, 2004 - May 22, 2006: 02 + 2004-04-19 + 2006-05-22: 02 46856 remote @@ -50,8 +49,8 @@ # emerge sync - # emerge -pv ">=net-irc/xchat-2.0.8-r1" - # emerge ">=net-irc/xchat-2.0.8-r1" + # emerge -pv ">=net-irc/xchat-2.0.8-r1" + # emerge ">=net-irc/xchat-2.0.8-r1"

Note that users of the gtk1 version of xchat (1.8.*) should upgrade to xchat-1.8.11-r1: @@ -59,12 +58,12 @@ # emerge sync - # emerge -pv "=net-irc/xchat-1.8.11-r1" - # emerge "=net-irc/xchat-1.8.11-r1" + # emerge -pv "=net-irc/xchat-1.8.11-r1" + # emerge "=net-irc/xchat-1.8.11-r1" - XChat 2.0.x SOCKS5 Vulnerability - CVE-2004-0409 + XChat 2.0.x SOCKS5 Vulnerability + CVE-2004-0409 klieber diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-16.xml index 39357bad56..18ab6fdabc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-16.xml @@ -1,6 +1,5 @@ - Multiple new security vulnerabilities in monit @@ -8,8 +7,8 @@ possibly leading to denial of service or execution of arbitrary code. monit - April 19, 2004 - April 19, 2004: 01 + 2004-04-19 + 2004-04-19: 01 47631 remote @@ -51,8 +50,8 @@ # emerge sync - # emerge -pv ">=app-admin/monit-4.2.1" - # emerge ">=app-admin/monit-4.2.1" + # emerge -pv ">=app-admin/monit-4.2.1" + # emerge ">=app-admin/monit-4.2.1" Monit security advisory 20040305 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-17.xml index e1c3be44ee..e6d014aed0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-17.xml @@ -1,6 +1,5 @@ - ipsec-tools and iputils contain a remote DoS vulnerability @@ -10,8 +9,8 @@ system resoources, causing a Denial of Service. ipsec-utils - April 24, 2004 - April 24, 2004: 01 + 2004-04-24 + 2004-04-24: 01 48847 remote @@ -65,19 +64,19 @@ # emerge sync - # emerge -pv ">=net-firewall/ipsec-tools-0.3.1" - # emerge ">=net-firewall/ipsec-tools-0.3.1" + # emerge -pv ">=net-firewall/ipsec-tools-0.3.1" + # emerge ">=net-firewall/ipsec-tools-0.3.1"

iputils users should upgrade to version 021109-r3 or later:

# emerge sync - # emerge -pv ">=net-misc/iputils-021109-r3" - # emerge ">=net-misc/iputils-021109-r3" + # emerge -pv ">=net-misc/iputils-021109-r3" + # emerge ">=net-misc/iputils-021109-r3" - CVE + CVE klieber diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-18.xml index 7a5a4cb722..5989c4ceb8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-18.xml @@ -1,6 +1,5 @@ - Multiple Vulnerabilities in ssmtp @@ -9,8 +8,8 @@ (potentially root). ssmtp - April 26, 2004 - April 26, 2004: 01 + 2004-04-26 + 2004-04-26: 01 47918 48435 remote root @@ -55,13 +54,13 @@ # emerge sync - # emerge -pv ">=mail-mta/ssmtp-2.60.7" - # emerge ">=mail-mta/ssmtp-2.60.7" + # emerge -pv ">=mail-mta/ssmtp-2.60.7" + # emerge ">=mail-mta/ssmtp-2.60.7" - Secunia Advisory - CVE Reference - Debian Advisory + Secunia Advisory + CVE Reference + Debian Advisory condordes diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-19.xml index daa59159ab..e81bb30af7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-19.xml @@ -1,6 +1,5 @@ - Buffer overflows and format string vulnerabilities in LCDproc @@ -8,8 +7,8 @@ allowing execution of arbitrary code with the rights of the LCDd user. lcdproc - April 27, 2004 - April 27, 2004: 01 + 2004-04-27 + 2004-04-27: 01 47340 remote @@ -53,8 +52,8 @@ # emerge sync - # emerge -pv ">=app-misc/lcdproc-0.4.5" - # emerge ">=app-misc/lcdproc-0.4.5" + # emerge -pv ">=app-misc/lcdproc-0.4.5" + # emerge ">=app-misc/lcdproc-0.4.5" LCDproc advisory diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-20.xml index 4a17cf16ef..9218b44d23 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-20.xml @@ -1,6 +1,5 @@ - Multiple vulnerabilities in xine @@ -9,8 +8,8 @@ user. xine - April 27, 2004 - May 22, 2006: 02 + 2004-04-27 + 2006-05-22: 02 45448 48107 48108 @@ -69,17 +68,17 @@ # emerge sync - # emerge -pv ">=media-video/xine-ui-0.9.23-r2" - # emerge ">=media-video/xine-ui-0.9.23-r2" + # emerge -pv ">=media-video/xine-ui-0.9.23-r2" + # emerge ">=media-video/xine-ui-0.9.23-r2" - # emerge -pv ">=media-libs/xine-lib-1_rc3-r3" - # emerge ">=media-libs/xine-lib-1_rc3-r3" + # emerge -pv ">=media-libs/xine-lib-1_rc3-r3" + # emerge ">=media-libs/xine-lib-1_rc3-r3" Xine Security Advisories xine-bugreport and xine-check vulnerability - CVE-2004-0372 - CVE-2004-1951 + CVE-2004-0372 + CVE-2004-1951 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-21.xml index 17dd885a3c..3557ecb61b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200404-21.xml @@ -1,6 +1,5 @@ - Multiple Vulnerabilities in Samba @@ -9,8 +8,8 @@ vulnerability in the smbprint script distributed with Samba. samba - April 29, 2004 - April 29, 2004: 01 + 2004-04-29 + 2004-04-29: 01 41800 45965 local @@ -74,8 +73,8 @@ # emerge sync - # emerge -pv ">=net-fs/samba-3.0.2a-r2" - # emerge ">=net-fs/samba-3.0.2a-r2" + # emerge -pv ">=net-fs/samba-3.0.2a-r2" + # emerge ">=net-fs/samba-3.0.2a-r2"

Those who are using Samba's password database also need to run the following command: diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-01.xml index 62aaec31a3..dbb59f7a18 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-01.xml @@ -1,6 +1,5 @@ - Multiple format string vulnerabilities in neon 0.24.4 and earlier @@ -8,8 +7,8 @@ a malicious WebDAV server to execute arbitrary code. neon - May 09, 2004 - May 09, 2004: 01 + 2004-05-09 + 2004-05-09: 01 48448 remote @@ -49,11 +48,11 @@ # emerge sync - # emerge -pv ">=net-misc/neon-0.24.5" - # emerge ">=net-misc/neon-0.24.5" + # emerge -pv ">=net-misc/neon-0.24.5" + # emerge ">=net-misc/neon-0.24.5" - CVE + CVE klieber diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-02.xml index b53e858bfc..46b64b6a2f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-02.xml @@ -1,6 +1,5 @@ - Multiple vulnerabilities in LHa @@ -9,8 +8,8 @@ code or as a denial of service attack. lha - May 09, 2004 - October 20, 2006: 02 + 2004-05-09 + 2006-10-20: 02 49961 remote @@ -57,12 +56,12 @@ # emerge sync - # emerge -pv ">=app-arch/lha-114i-r2" - # emerge ">=app-arch/lha-114i-r2" + # emerge -pv ">=app-arch/lha-114i-r2" + # emerge ">=app-arch/lha-114i-r2" - CAN-2004-0234 - CAN-2004-0235 + CAN-2004-0234 + CAN-2004-0235 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-03.xml index e73eed4332..e7bdbdeeed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-03.xml @@ -1,6 +1,5 @@ - ClamAV VirusEvent parameter vulnerability @@ -9,8 +8,8 @@ commands. ClamAV - May 11, 2004 - May 22, 2006: 02 + 2004-05-11 + 2006-05-22: 02 46264 remote @@ -64,11 +63,11 @@ # emerge sync - # emerge -pv ">=app-antivirus/clamav-0.70" - # emerge ">=app-antivirus/clamav-0.70" + # emerge -pv ">=app-antivirus/clamav-0.70" + # emerge ">=app-antivirus/clamav-0.70" - CVE-2004-1876 + CVE-2004-1876 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-04.xml index 1b69db3902..1e88fd2fa0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-04.xml @@ -1,6 +1,5 @@ - OpenOffice.org vulnerability when using DAV servers @@ -9,8 +8,8 @@ when connected to an untrusted WebDAV server. openoffice - May 11, 2004 - October 27, 2004: 02 + 2004-05-11 + 2004-10-27: 02 47926 remote @@ -76,44 +75,44 @@ # emerge sync - # emerge -pv ">=app-office/openoffice-1.1.1-r1" - # emerge ">=app-office/openoffice-1.1.1-r1" + # emerge -pv ">=app-office/openoffice-1.1.1-r1" + # emerge ">=app-office/openoffice-1.1.1-r1"

openoffice users on the sparc architecture should:

# emerge sync - # emerge -pv ">=app-office/openoffice-1.1.0-r3" - # emerge ">=app-office/openoffice-1.1.0-r3" + # emerge -pv ">=app-office/openoffice-1.1.0-r3" + # emerge ">=app-office/openoffice-1.1.0-r3"

openoffice users on the ppc architecture should:

# emerge sync - # emerge -pv ">=app-office/openoffice-1.0.3-r1" - # emerge ">=app-office/openoffice-1.0.3-r1" + # emerge -pv ">=app-office/openoffice-1.0.3-r1" + # emerge ">=app-office/openoffice-1.0.3-r1"

openoffice-ximian users should:

# emerge sync - # emerge -pv ">=app-office/openoffice-ximian-1.1.51-r1" - # emerge ">=app-office/openoffice-ximian-1.1.51-r1" + # emerge -pv ">=app-office/openoffice-ximian-1.1.51-r1" + # emerge ">=app-office/openoffice-ximian-1.1.51-r1"

openoffice-bin users should:

# emerge sync - # emerge -pv ">=app-office/openoffice-bin-1.1.2" - # emerge ">=app-office/openoffice-bin-1.1.2" + # emerge -pv ">=app-office/openoffice-bin-1.1.2" + # emerge ">=app-office/openoffice-bin-1.1.2" - CAN-2004-0179 - Neon vulnerabilities (GLSA 200405-01) + CAN-2004-0179 + Neon vulnerabilities (GLSA 200405-01) koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-05.xml index 7387064595..8f194d579d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-05.xml @@ -1,6 +1,5 @@ - Utempter symlink vulnerability @@ -8,8 +7,8 @@ arbitrary files via a symlink attack. utempter - May 13, 2004 - May 13, 2004: 01 + 2004-05-13 + 2004-05-13: 01 49536 local @@ -49,11 +48,11 @@ # emerge sync - # emerge -pv ">=sys-apps/utempter-0.5.5.4" - # emerge ">=sys-apps/utempter-0.5.5.4" + # emerge -pv ">=sys-apps/utempter-0.5.5.4" + # emerge ">=sys-apps/utempter-0.5.5.4" - CAN-2004-0233 + CAN-2004-0233 klieber diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-06.xml index f799484eef..a322d81523 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-06.xml @@ -1,6 +1,5 @@ - libpng denial of service vulnerability @@ -8,8 +7,8 @@ that library to decode PNG images. libpng - May 14, 2004 - May 14, 2004: 01 + 2004-05-14 + 2004-05-14: 01 49887 remote @@ -53,8 +52,8 @@ # emerge sync - # emerge -pv ">=media-libs/libpng-1.2.5-r5" - # emerge ">=media-libs/libpng-1.2.5-r5" + # emerge -pv ">=media-libs/libpng-1.2.5-r5" + # emerge ">=media-libs/libpng-1.2.5-r5"

You should also run revdep-rebuild to rebuild any packages that depend on older versions of libpng : @@ -63,7 +62,7 @@ # revdep-rebuild - CAN-2004-0421 + CAN-2004-0421 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-07.xml index 4a68cfcb03..423862bbc9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-07.xml @@ -1,6 +1,5 @@ - Exim verify=header_syntax buffer overflow @@ -8,8 +7,8 @@ Exim that allows remote execution of arbitrary code. Exim - May 14, 2004 - May 14, 2004: 01 + 2004-05-14 + 2004-05-14: 01 50217 remote @@ -52,11 +51,11 @@ # emerge sync - # emerge -pv ">=mail-mta/exim-4.33-r1" - # emerge ">=mail-mta/exim-4.33-r1" + # emerge -pv ">=mail-mta/exim-4.33-r1" + # emerge ">=mail-mta/exim-4.33-r1" - CAN-2004-0400 + CAN-2004-0400 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-08.xml index ac2446576f..34c3adf87a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-08.xml @@ -1,6 +1,5 @@ - Pound format string vulnerability @@ -8,8 +7,8 @@ arbitrary code with the rights of the Pound process. pound - May 18, 2004 - May 22, 2006: 02 + 2004-05-18 + 2006-05-22: 02 50421 remote @@ -51,12 +50,12 @@ # emerge sync - # emerge -pv ">=www-servers/pound-1.6" - # emerge ">=www-servers/pound-1.6" + # emerge -pv ">=www-servers/pound-1.6" + # emerge ">=www-servers/pound-1.6" Pound announcement - CVE-2004-2026 + CVE-2004-2026 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-09.xml index b8c78b25c8..c07ea510a9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-09.xml @@ -1,16 +1,15 @@ - ProFTPD Access Control List bypass vulnerability Version 1.2.9 of ProFTPD introduced a vulnerability that causes CIDR-based - Access Control Lists (ACLs) to be treated as "AllowAll", thereby + Access Control Lists (ACLs) to be treated as "AllowAll", thereby allowing remote users full access to files available to the FTP daemon. proftpd - May 19, 2004 - May 19, 2004: 01 + 2004-05-19 + 2004-05-19: 01 49496 remote @@ -52,11 +51,11 @@ # emerge sync - # emerge -pv ">=net-ftp/proftpd-1.2.9-r2" - # emerge ">=net-ftp/proftpd-1.2.9-r2" + # emerge -pv ">=net-ftp/proftpd-1.2.9-r2" + # emerge ">=net-ftp/proftpd-1.2.9-r2" - CAN-2004-0432 + CAN-2004-0432 klieber diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-10.xml index d0a4bc6c90..b6d0d15f52 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-10.xml @@ -1,6 +1,5 @@ - Icecast denial of service vulnerability @@ -8,8 +7,8 @@ to crash the application. icecast - May 19, 2004 - May 22, 2006: 02 + 2004-05-19 + 2006-05-22: 02 50935 remote @@ -51,12 +50,12 @@ # emerge sync - # emerge -pv ">=net-misc/icecast-2.0.1" - # emerge ">=net-misc/icecast-2.0.1" + # emerge -pv ">=net-misc/icecast-2.0.1" + # emerge ">=net-misc/icecast-2.0.1" - Icecast 2.0.1 announcement - CVE-2004-2027 + Icecast 2.0.1 announcement + CVE-2004-2027 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-11.xml index 271476dfd3..140c6569b4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-11.xml @@ -1,6 +1,5 @@ - KDE URI Handler Vulnerabilities @@ -8,8 +7,8 @@ attacks. kdelibs - May 19, 2004 - May 19, 2004: 01 + 2004-05-19 + 2004-05-19: 01 51276 remote @@ -64,11 +63,11 @@ # emerge sync - # emerge -pv ">=kde-base/kdelibs-3.2.2-r1" - # emerge ">=kde-base/kdelibs-3.2.2-r1" + # emerge -pv ">=kde-base/kdelibs-3.2.2-r1" + # emerge ">=kde-base/kdelibs-3.2.2-r1" - CAN-2004-0411 + CAN-2004-0411 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-12.xml index 1ed75d9724..990556c7f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-12.xml @@ -1,6 +1,5 @@ - CVS heap overflow vulnerability @@ -8,8 +7,8 @@ compromise. cvs - May 20, 2004 - May 20, 2004: 01 + 2004-05-20 + 2004-05-20: 01 51460 remote @@ -53,12 +52,12 @@ # emerge sync - # emerge -pv ">=dev-util/cvs-1.11.16" - # emerge ">=dev-util/cvs-1.11.16" + # emerge -pv ">=dev-util/cvs-1.11.16" + # emerge ">=dev-util/cvs-1.11.16" E-matters advisory 07/2004 - CAN-2004-0396 + CAN-2004-0396 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-13.xml index 6638fa0098..7158d5f21a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-13.xml @@ -1,6 +1,5 @@ - neon heap-based buffer overflow @@ -8,8 +7,8 @@ been discovered in the neon library. neon - May 20, 2004 - May 20, 2004: 01 + 2004-05-20 + 2004-05-20: 01 51490 remote @@ -50,12 +49,12 @@ # emerge sync - # emerge -pv ">=net-misc/neon-0.24.6" - # emerge ">=net-misc/neon-0.24.6" + # emerge -pv ">=net-misc/neon-0.24.6" + # emerge ">=net-misc/neon-0.24.6" E-matters advisory 06/2004 - CAN-2004-0398 + CAN-2004-0398 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-14.xml index f380b67b13..6b89f0291b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-14.xml @@ -1,6 +1,5 @@ - Buffer overflow in Subversion @@ -9,8 +8,8 @@ client and server are vulnerable. subversion - May 20, 2004 - May 22, 2006: 02 + 2004-05-20 + 2006-05-22: 02 51462 remote @@ -60,13 +59,13 @@ # emerge sync - # emerge -pv ">=dev-util/subversion-1.0.3" - # emerge ">=dev-util/subversion-1.0.3" + # emerge -pv ">=dev-util/subversion-1.0.3" + # emerge ">=dev-util/subversion-1.0.3" Subversion Announcement E-Matters Advisory - CVE-2004-0397 + CVE-2004-0397 condordes diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-15.xml index daa6601c88..587258d329 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-15.xml @@ -1,6 +1,5 @@ - cadaver heap-based buffer overflow @@ -9,8 +8,8 @@ connected to a malicious server. cadaver - May 20, 2004 - May 20, 2004: 01 + 2004-05-20 + 2004-05-20: 01 51461 remote @@ -50,12 +49,12 @@ # emerge sync - # emerge -pv ">=net-misc/cadaver-0.22.2" - # emerge ">=net-misc/cadaver-0.22.2" + # emerge -pv ">=net-misc/cadaver-0.22.2" + # emerge ">=net-misc/cadaver-0.22.2" - CAN-2004-0398 - GLSA 200405-13 + CAN-2004-0398 + GLSA 200405-13 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-16.xml index 47b21e7e5b..6ddb603a13 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-16.xml @@ -1,14 +1,13 @@ - Multiple XSS Vulnerabilities in SquirrelMail SquirrelMail is subject to several XSS and one SQL injection vulnerability. SquirrelMail - May 25, 2004 - May 27, 2006: 04 + 2004-05-25 + 2006-05-27: 04 49675 remote @@ -54,15 +53,15 @@ # emerge sync - # emerge -pv ">=mail-client/squirrelmail-1.4.3_rc1" - # emerge ">=mail-client/squirrelmail-1.4.3_rc1" + # emerge -pv ">=mail-client/squirrelmail-1.4.3_rc1" + # emerge ">=mail-client/squirrelmail-1.4.3_rc1" - SquirrelMail 1.4.3_rc1 release annoucement + SquirrelMail 1.4.3_rc1 release annoucement Bugtraq security annoucement - CERT description of XSS - CVE-2004-0519 - CVE-2004-0521 + CERT description of XSS + CVE-2004-0519 + CVE-2004-0521 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-17.xml index a1aa9b6017..679862769d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-17.xml @@ -1,6 +1,5 @@ - Multiple vulnerabilities in metamail @@ -8,8 +7,8 @@ metamail, potentially allowing execution of arbitrary code remotely. metamail - May 21, 2004 - May 21, 2004: 01 + 2004-05-21 + 2004-05-21: 01 42133 remote @@ -48,12 +47,12 @@ # emerge sync - # emerge -pv ">=net-mail/metamail-2.7.45.3" - # emerge ">=net-mail/metamail-2.7.45.3" + # emerge -pv ">=net-mail/metamail-2.7.45.3" + # emerge ">=net-mail/metamail-2.7.45.3" - CAN-2004-0104 - CAN-2004-0105 + CAN-2004-0104 + CAN-2004-0105 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-18.xml index ba653d46d0..f0edf32130 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-18.xml @@ -1,6 +1,5 @@ - Buffer Overflow in Firebird @@ -9,8 +8,8 @@ binaries. firebird - May 23, 2004 - May 22, 2006: 02 + 2004-05-23 + 2006-05-22: 02 20837 local @@ -52,13 +51,13 @@ # emerge sync - # emerge -pv ">=dev-db/firebird-1.5" - # emerge ">=dev-db/firebird-1.5" + # emerge -pv ">=dev-db/firebird-1.5" + # emerge ">=dev-db/firebird-1.5" Bugtraq Security Announcement - Sourceforge BugTracker Announcement - CVE-2003-0281 + Sourceforge BugTracker Announcement + CVE-2003-0281 dmargoli diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-19.xml index 80a11fe120..6c63715844 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-19.xml @@ -1,6 +1,5 @@ - Opera telnet URI handler file creation/truncation vulnerability @@ -8,8 +7,8 @@ remote attacker to overwrite arbitrary files. opera - May 25, 2004 - December 30, 2007: 03 + 2004-05-25 + 2007-12-30: 03 50857 remote @@ -62,12 +61,12 @@ # emerge sync - # emerge -pv ">=www-client/opera-7.50_beta1" - # emerge ">=www-client/opera-7.50_beta1" + # emerge -pv ">=www-client/opera-7.50_beta1" + # emerge ">=www-client/opera-7.50_beta1" iDEFENSE Security Advisory 05.12.04 - CVE-2004-0473 + CVE-2004-0473 klieber diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-20.xml index 87fa404fe5..72b31efb92 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-20.xml @@ -1,6 +1,5 @@ - Insecure Temporary File Creation In MySQL @@ -9,8 +8,8 @@ data. MySQL - May 25, 2004 - May 25, 2004: 01 + 2004-05-25 + 2004-05-25: 01 46242 local @@ -55,12 +54,12 @@ # emerge sync - # emerge -pv ">=dev-db/mysql-4.0.18-r2" - # emerge ">=dev-db/mysql-4.0.18-r2" + # emerge -pv ">=dev-db/mysql-4.0.18-r2" + # emerge ">=dev-db/mysql-4.0.18-r2" - CAN-2004-0381 - CAN-2004-0388 + CAN-2004-0381 + CAN-2004-0388 dmargoli diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-21.xml index 9dce8e0e96..bd72cd2ab9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-21.xml @@ -1,6 +1,5 @@ - Midnight Commander: Multiple vulnerabilities @@ -8,8 +7,8 @@ including several buffer overflows and string format vulnerabilities. MC - May 26, 2004 - May 26, 2004: 01 + 2004-05-26 + 2004-05-26: 01 49990 local @@ -53,13 +52,13 @@ # emerge sync - # emerge -pv ">=app-misc/mc-4.6.0-r7 - # emerge ">=app-misc/mc-4.6.0-r7" + # emerge -pv ">=app-misc/mc-4.6.0-r7 + # emerge ">=app-misc/mc-4.6.0-r7" - CAN-2004-0226 - CAN-2004-0231 - CAN-2004-0232 + CAN-2004-0226 + CAN-2004-0231 + CAN-2004-0232 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-22.xml index 9d7c41c63d..ffe51487bb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-22.xml @@ -1,6 +1,5 @@ - Apache 1.3: Multiple vulnerabilities @@ -8,8 +7,8 @@ Apache 1.3. Apache - May 26, 2004 - December 30, 2007: 02 + 2004-05-26 + 2007-12-30: 02 51815 remote @@ -68,14 +67,14 @@ # emerge sync - # emerge -pv ">=www-servers/apache-1.3.31" - # emerge ">=www-servers/apache-1.3.31" + # emerge -pv ">=www-servers/apache-1.3.31" + # emerge ">=www-servers/apache-1.3.31" - CAN-2003-0993 - CAN-2003-0020 - CAN-2003-0987 - CAN-2004-0174 + CAN-2003-0993 + CAN-2003-0020 + CAN-2003-0987 + CAN-2004-0174 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-23.xml index 63847d121a..334ae3d193 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-23.xml @@ -1,6 +1,5 @@ - Heimdal: Kerberos 4 buffer overflow in kadmin @@ -8,8 +7,8 @@ discovered. Heimdal - May 27, 2004 - May 27, 2004: 01 + 2004-05-27 + 2004-05-27: 01 50208 remote @@ -50,12 +49,12 @@ # emerge sync - # emerge -pv ">=app-crypt/heimdal-0.6.2" - # emerge ">=app-crypt/heimdal-0.6.2" + # emerge -pv ">=app-crypt/heimdal-0.6.2" + # emerge ">=app-crypt/heimdal-0.6.2" - Heimdal 0.6.2 Release Notice - CAN-2004-0434 + Heimdal 0.6.2 Release Notice + CAN-2004-0434 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-24.xml index 665bdc1ec0..9f21a01796 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-24.xml @@ -1,6 +1,5 @@ - MPlayer, xine-lib: vulnerabilities in RTSP stream handling @@ -8,8 +7,8 @@ have been found in code common to MPlayer and the xine library. mplayer - May 28, 2004 - May 28, 2004: 01 + 2004-05-28 + 2004-05-28: 01 49387 remote @@ -61,15 +60,15 @@ # emerge sync - # emerge -pv ">=media-video/mplayer-1.0_pre4" - # emerge ">=media-video/mplayer-1.0_pre4" + # emerge -pv ">=media-video/mplayer-1.0_pre4" + # emerge ">=media-video/mplayer-1.0_pre4" - # emerge -pv ">=media-libs/xine-lib-1_rc4" - # emerge ">=media-libs/xine-lib-1_rc4" + # emerge -pv ">=media-libs/xine-lib-1_rc4" + # emerge ">=media-libs/xine-lib-1_rc4" Xine security advisory - CAN-2004-0433 + CAN-2004-0433 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-25.xml index 8ab55fbcc5..e272bac322 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200405-25.xml @@ -1,14 +1,13 @@ - tla: Multiple vulnerabilities in included libneon tla includes a vulnerable version of the neon library. tla - May 30, 2004 - June 02, 2004: 02 + 2004-05-30 + 2004-06-02: 02 51586 remote @@ -50,12 +49,12 @@ # emerge sync - # emerge -pv ">=dev-util/tla-1.2-r2" - # emerge ">=dev-util/tla-1.2-r2" + # emerge -pv ">=dev-util/tla-1.2-r2" + # emerge ">=dev-util/tla-1.2-r2" - GLSA 200405-01 - GLSA 200405-13 + GLSA 200405-01 + GLSA 200405-13 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-01.xml index 2d3664224a..58cf57889f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-01.xml @@ -1,6 +1,5 @@ - Ethereal: Multiple security problems @@ -8,8 +7,8 @@ which may allow an attacker to run arbitrary code or crash the program. Ethereal - June 04, 2004 - May 22, 2006: 02 + 2004-06-04 + 2006-05-22: 02 51022 remote @@ -48,7 +47,7 @@

For a temporary workaround you can disable all affected protocol - dissectors by selecting Analyze->Enabled Protocols... and deselecting + dissectors by selecting Analyze->Enabled Protocols... and deselecting them from the list. However, it is strongly recommended to upgrade to the latest stable release.

@@ -60,15 +59,15 @@ # emerge sync - # emerge -pv ">=net-analyzer/ethereal-0.10.4" - # emerge ">=net-analyzer/ethereal-0.10.4" + # emerge -pv ">=net-analyzer/ethereal-0.10.4" + # emerge ">=net-analyzer/ethereal-0.10.4" Ethereal enpa-sa-00014 - CVE-2004-0504 - CVE-2004-0505 - CVE-2004-0506 - CVE-2004-0507 + CVE-2004-0504 + CVE-2004-0505 + CVE-2004-0506 + CVE-2004-0507 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-02.xml index 163e95b9e5..dcc9c2fe72 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-02.xml @@ -1,6 +1,5 @@ - tripwire: Format string vulnerability @@ -8,8 +7,8 @@ circumstances has been found. tripwire - June 04, 2004 - May 22, 2006: 02 + 2004-06-04 + 2006-05-22: 02 52945 local @@ -48,12 +47,12 @@ # emerge sync - # emerge -pv ">=app-admin/tripwire-2.3.1.2-r1" - # emerge ">=app-admin/tripwire-2.3.1.2-r1" + # emerge -pv ">=app-admin/tripwire-2.3.1.2-r1" + # emerge ">=app-admin/tripwire-2.3.1.2-r1" Bugtraq Announcement - CVE-2004-0536 + CVE-2004-0536 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-03.xml index 126a845f00..1b5c88db80 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-03.xml @@ -1,14 +1,13 @@ - sitecopy: Multiple vulnerabilities in included libneon sitecopy includes a vulnerable version of the neon library. sitecopy - June 05, 2004 - August 15, 2004: 04 + 2004-06-05 + 2004-08-15: 04 51585 remote @@ -51,12 +50,12 @@ # emerge sync - # emerge -pv ">=net-misc/sitecopy-0.13.4-r2" - # emerge ">=net-misc/sitecopy-0.13.4-r2" + # emerge -pv ">=net-misc/sitecopy-0.13.4-r2" + # emerge ">=net-misc/sitecopy-0.13.4-r2" - GLSA 200405-01 - GLSA 200405-13 + GLSA 200405-01 + GLSA 200405-13 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-04.xml index 2e181887b5..30bd71360e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-04.xml @@ -1,14 +1,13 @@ - Mailman: Member password disclosure vulnerability Mailman contains a bug allowing 3rd parties to retrieve member passwords. mailman - June 09, 2004 - June 09, 2004: 01 + 2004-06-09 + 2004-06-09: 01 51671 remote @@ -47,12 +46,12 @@ # emerge sync - # emerge -pv ">=net-mail/mailman-2.1.5" - # emerge ">=net-mail/mailman-2.1.5" + # emerge -pv ">=net-mail/mailman-2.1.5" + # emerge ">=net-mail/mailman-2.1.5" - Mailman 2.1.5 Release Announcement - CAN-2004-0412 + Mailman 2.1.5 Release Announcement + CAN-2004-0412 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-05.xml index d040d8af8f..56b1153397 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-05.xml @@ -1,6 +1,5 @@ - Apache: Buffer overflow in mod_ssl @@ -8,8 +7,8 @@ Apache is configured a certain way. Apache - June 09, 2004 - December 30, 2007: 03 + 2004-06-09 + 2007-12-30: 03 51368 remote @@ -42,7 +41,7 @@

Given the right server configuration, an attacker could cause a Denial of Service or execute code as the user running Apache, usually - "apache". It is thought to be impossible to exploit this to + "apache". It is thought to be impossible to exploit this to execute code on the x86 platform, but the possibility for other platforms is unknown. This does not preclude a DoS on x86 systems.

@@ -60,19 +59,19 @@ # emerge sync - # emerge -pv ">=net-www/mod_ssl-2.8.18" - # emerge ">=net-www/mod_ssl-2.8.18" + # emerge -pv ">=net-www/mod_ssl-2.8.18" + # emerge ">=net-www/mod_ssl-2.8.18"

Apache 2.x users should upgrade to the latest version of Apache:

# emerge sync - # emerge -pv ">=www-servers/apache-2.0.49-r3" - # emerge ">=www-servers/apache-2.0.49-r3" + # emerge -pv ">=www-servers/apache-2.0.49-r3" + # emerge ">=www-servers/apache-2.0.49-r3" - CAN-2004-0488 + CAN-2004-0488 dmargoli diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-06.xml index bb2d802e15..ac1c3ca68e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-06.xml @@ -1,6 +1,5 @@ - CVS: additional DoS and arbitrary code execution vulnerabilities @@ -8,8 +7,8 @@ an attacker to remotely compromise a CVS server. CVS - June 10, 2004 - June 10, 2004: 01 + 2004-06-10 + 2004-06-10: 01 53408 remote @@ -31,8 +30,8 @@ vulnerabilities including:

    -
  • no-null-termination of "Entry" lines
  • -
  • error_prog_name "double-free()"
  • +
  • no-null-termination of "Entry" lines
  • +
  • error_prog_name "double-free()"
  • Argument integer overflow
  • serve_notify() out of bounds writes
@@ -56,15 +55,15 @@ # emerge sync - # emerge -pv ">=dev-util/cvs-1.11.17" - # emerge ">=dev-util/cvs-1.11.17" + # emerge -pv ">=dev-util/cvs-1.11.17" + # emerge ">=dev-util/cvs-1.11.17" E-matters Advisory 09/2004 - CAN-2004-0414 - CAN-2004-0416 - CAN-2004-0417 - CAN-2004-0418 + CAN-2004-0414 + CAN-2004-0416 + CAN-2004-0417 + CAN-2004-0418 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-07.xml index 3d1006b1d1..bbd13804ff 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-07.xml @@ -1,6 +1,5 @@ - Subversion: Remote heap overflow @@ -8,8 +7,8 @@ exploitable to execute arbitrary code on the server running svnserve. dev-util/subversion - June 10, 2004 - June 10, 2004: 01 + 2004-06-10 + 2004-06-10: 01 remote @@ -19,8 +18,8 @@

- Subversion is a revision control system that aims to be a "compelling - replacement for CVS". It enjoys wide use in the open source community. + Subversion is a revision control system that aims to be a "compelling + replacement for CVS". It enjoys wide use in the open source community. svnserve allows access to Subversion repositories using URIs with the svn://, svn+ssh://, and other tunelled svn+*:// protocols.

@@ -58,11 +57,11 @@ # emerge sync - # emerge -pv ">=dev-util/subversion-1.0.4-r1" - # emerge ">=dev-util/subversion-1.0.4-r1" + # emerge -pv ">=dev-util/subversion-1.0.4-r1" + # emerge ">=dev-util/subversion-1.0.4-r1" - CAN-2004-0413 + CAN-2004-0413 dmargoli diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-08.xml index e723d036bc..78c12c63c5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-08.xml @@ -1,6 +1,5 @@ - Squirrelmail: Another XSS vulnerability @@ -8,8 +7,8 @@ compromise of webmail accounts. Squirrelmail - June 15, 2004 - May 22, 2006: 02 + 2004-06-15 + 2006-05-22: 02 52434 remote @@ -51,13 +50,13 @@ # emerge sync - # emerge -pv ">=mail-client/squirrelmail-1.4.3" - # emerge ">=mail-client/squirrelmail-1.4.3" + # emerge -pv ">=mail-client/squirrelmail-1.4.3" + # emerge ">=mail-client/squirrelmail-1.4.3" RS-Labs Advisory - CERT description of XSS - CVE-2004-0520 + CERT description of XSS + CVE-2004-0520 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-09.xml index 267a461a2f..b0e6b0e5d2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-09.xml @@ -1,14 +1,13 @@ - Horde-Chora: Remote code execution A vulnerability in Chora allows remote code execution and file upload. www-apps/horde-chora - June 15, 2004 - December 30, 2007: 02 + 2004-06-15 + 2007-12-30: 02 53800 remote @@ -49,8 +48,8 @@ # emerge sync - # emerge -pv ">=www-apps/horde-chora-1.2.2" - # emerge ">=www-apps/horde-chora-1.2.2" + # emerge -pv ">=www-apps/horde-chora-1.2.2" + # emerge ">=www-apps/horde-chora-1.2.2" e-matters Advisory diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-10.xml index 3d659ed4ab..78647b228c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-10.xml @@ -1,6 +1,5 @@ - Gallery: Privilege escalation vulnerability @@ -8,8 +7,8 @@ allow an attacker to gain administrator privileges within Gallery. gallery - June 15, 2004 - May 22, 2006: 02 + 2004-06-15 + 2006-05-22: 02 52798 remote @@ -53,12 +52,12 @@ # emerge sync - # emerge -pv ">=www-apps/gallery-1.4.3_p2" - # emerge ">=www-apps/gallery-1.4.3_p2" + # emerge -pv ">=www-apps/gallery-1.4.3_p2" + # emerge ">=www-apps/gallery-1.4.3_p2" Gallery Announcement - CVE-2004-0522 + CVE-2004-0522 condordes diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-11.xml index f24263dab9..bde9abcc22 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-11.xml @@ -1,14 +1,13 @@ - Horde-IMP: Input validation vulnerability An input validation vulnerability has been discovered in Horde-IMP. horde-imp - June 16, 2004 - May 22, 2006: 02 + 2004-06-16 + 2006-05-22: 02 53862 remote @@ -49,12 +48,12 @@ # emerge sync - # emerge -pv ">=www-apps/horde-imp-3.2.4" - # emerge ">=www-apps/horde-imp-3.2.4" + # emerge -pv ">=www-apps/horde-imp-3.2.4" + # emerge ">=www-apps/horde-imp-3.2.4" Bugtraq Announcement - CVE-2004-0584 + CVE-2004-0584 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-12.xml index b1c8807a16..3838de0067 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-12.xml @@ -1,6 +1,5 @@ - Webmin: Multiple vulnerabilities @@ -8,8 +7,8 @@ of Service attack and information disclosure. webmin - June 16, 2004 - May 22, 2006: 02 + 2004-06-16 + 2006-05-22: 02 53375 remote @@ -52,14 +51,14 @@ # emerge sync - # emerge -pv ">=app-admin/app-admin/webmin-1.150" - # emerge ">=app-admin/app-admin/webmin-1.150" + # emerge -pv ">=app-admin/app-admin/webmin-1.150" + # emerge ">=app-admin/app-admin/webmin-1.150" Bugtraq Announcement Webmin Changelog - CVE-2004-0582 - CVE-2004-0583 + CVE-2004-0582 + CVE-2004-0583 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-13.xml index 059710486b..b1225bd50e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-13.xml @@ -1,6 +1,5 @@ - Squid: NTLM authentication helper buffer overflow @@ -8,8 +7,8 @@ variable. squid - June 17, 2004 - September 02, 2004: 02 + 2004-06-17 + 2004-09-02: 02 53367 remote @@ -52,11 +51,11 @@ # emerge sync - # emerge -pv ">=net-proxy/squid-2.5.5-r2" - # emerge ">=net-proxy/squid-2.5.5-r2" + # emerge -pv ">=net-proxy/squid-2.5.5-r2" + # emerge ">=net-proxy/squid-2.5.5-r2" - CAN-2004-0541 + CAN-2004-0541 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-14.xml index d467a5f54f..8072c3d22e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-14.xml @@ -1,6 +1,5 @@ - aspell: Buffer overflow in word-list-compress @@ -8,8 +7,8 @@ execute arbitrary code. aspell - June 17, 2004 - May 22, 2006: 03 + 2004-06-17 + 2006-05-22: 03 53389 local @@ -51,12 +50,12 @@ # emerge sync - # emerge -pv ">=app-text/aspell-0.50.5-r4" - # emerge ">=app-text/aspell-0.50.5-r4" + # emerge -pv ">=app-text/aspell-0.50.5-r4" + # emerge ">=app-text/aspell-0.50.5-r4" Nettwerked Advisory - CVE-2004-0548 + CVE-2004-0548 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-15.xml index 3375b00c96..f2ccee206c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-15.xml @@ -1,6 +1,5 @@ - Usermin: Multiple vulnerabilities @@ -8,8 +7,8 @@ of Service attack and information disclosure. Usermin - June 18, 2004 - May 22, 2006: 02 + 2004-06-18 + 2006-05-22: 02 54030 remote @@ -55,14 +54,14 @@ # emerge sync - # emerge -pv ">=app-admin/usermin-1.080" - # emerge ">=app-admin/usermin-1.080" + # emerge -pv ">=app-admin/usermin-1.080" + # emerge ">=app-admin/usermin-1.080" Bugtraq Announcement SNS Advisory - CVE-2004-0583 - CVE-2004-0588 + CVE-2004-0583 + CVE-2004-0588 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-16.xml index e312b16419..dc196c7831 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-16.xml @@ -1,6 +1,5 @@ - Apache 1.3: Buffer overflow in mod_proxy @@ -8,8 +7,8 @@ when Apache is configured a certain way. Apache - June 21, 2004 - December 30, 2007: 02 + 2004-06-21 + 2007-12-30: 02 53544 remote @@ -38,7 +37,7 @@

An attacker could cause a Denial of Service as the Apache child handling the request, which will die and under some circumstances execute arbitrary - code as the user running Apache, usually "apache". + code as the user running Apache, usually "apache".

@@ -54,12 +53,12 @@ # emerge sync - # emerge -pv ">=www-servers/apache-1.3.31-r2" - # emerge ">=www-servers/apache-1.3.31-r2" + # emerge -pv ">=www-servers/apache-1.3.31-r2" + # emerge ">=www-servers/apache-1.3.31-r2" Georgi Guninski security advisory #69, 2004 - CAN-2004-0492 + CAN-2004-0492 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-17.xml index cf4baf5293..7bc7e67864 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-17.xml @@ -1,14 +1,13 @@ - IPsec-Tools: authentication bug in racoon racoon provided as part of IPsec-Tools fails do proper authentication. IPsec-Tools - June 22, 2004 - May 22, 2006: 02 + 2004-06-22 + 2006-05-22: 02 53915 remote @@ -52,13 +51,13 @@ # emerge sync - # emerge -pv ">=net-firewall/ipsec-tools-0.3.3" - # emerge ">=net-firewall/ipsec-tools-0.3.3" + # emerge -pv ">=net-firewall/ipsec-tools-0.3.3" + # emerge ">=net-firewall/ipsec-tools-0.3.3" - IPsec-Tools Advisory - CVE-2004-0155 - CVE-2004-0607 + IPsec-Tools Advisory + CVE-2004-0155 + CVE-2004-0607 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-18.xml index 24526edbdb..b293ec71ad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-18.xml @@ -1,6 +1,5 @@ - gzip: Insecure creation of temporary files @@ -8,8 +7,8 @@ commands. gzip - June 24, 2004 - May 22, 2006: 02 + 2004-06-24 + 2006-05-22: 02 54890 local @@ -52,8 +51,8 @@ # emerge sync - # emerge -pv ">=app-arch/gzip-1.3.3-r4" - # emerge ">=app-arch/gzip-1.3.3-r4" + # emerge -pv ">=app-arch/gzip-1.3.3-r4" + # emerge ">=app-arch/gzip-1.3.3-r4"

Additionally, once the upgrade is complete, all self extracting files created with earlier versions gzexe should be recreated, since the @@ -61,7 +60,7 @@

- CVE-2004-0603 + CVE-2004-0603 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-19.xml index 56c05acbc0..90df51d24c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-19.xml @@ -1,6 +1,5 @@ - giFT-FastTrack: remote denial of service attack @@ -8,8 +7,8 @@ giFT-FastTrack plugin will cause the giFT daemon to crash. giFT-FastTrack - June 24, 2004 - May 22, 2006: 02 + 2004-06-24 + 2006-05-22: 02 54452 remote @@ -51,12 +50,12 @@ # emerge sync - # emerge -pv ">=net-p2p/gift-fasttrack-0.8.7" - # emerge ">=net-p2p/gift-fasttrack-0.8.7" + # emerge -pv ">=net-p2p/gift-fasttrack-0.8.7" + # emerge ">=net-p2p/gift-fasttrack-0.8.7" giFT-FastTrack announcement - CVE-2004-0604 + CVE-2004-0604 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-20.xml index fcdcababc2..03a64e3eea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-20.xml @@ -1,6 +1,5 @@ - FreeS/WAN, Openswan, strongSwan: Vulnerabilities in certificate handling @@ -9,8 +8,8 @@ authenticate with a fake certificate. Openswan - June 25, 2004 - May 22, 2006: 02 + 2004-06-25 + 2006-05-22: 02 remote @@ -65,40 +64,40 @@ # emerge sync - # emerge -pv "=net-misc/freeswan-1.99-r1" - # emerge "=net-misc/freeswan-1.99-r1" + # emerge -pv "=net-misc/freeswan-1.99-r1" + # emerge "=net-misc/freeswan-1.99-r1"

All FreeS/WAN 2.x users should upgrade to the latest stable version:

# emerge sync - # emerge -pv ">=net-misc/freeswan-2.04-r1" - # emerge ">=net-misc/freeswan-2.04-r1" + # emerge -pv ">=net-misc/freeswan-2.04-r1" + # emerge ">=net-misc/freeswan-2.04-r1"

All Openswan 1.x users should upgrade to the latest stable version:

# emerge sync - # emerge -pv "=net-misc/openswan-1.0.6_rc1" - # emerge "=net-misc/openswan-1.0.6_rc1" + # emerge -pv "=net-misc/openswan-1.0.6_rc1" + # emerge "=net-misc/openswan-1.0.6_rc1"

All Openswan 2.x users should upgrade to the latest stable version:

# emerge sync - # emerge -pv ">=net-misc/openswan-2.1.4" - # emerge ">=net-misc/openswan-2.1.4" + # emerge -pv ">=net-misc/openswan-2.1.4" + # emerge ">=net-misc/openswan-2.1.4"

All strongSwan users should upgrade to the latest stable version:

# emerge sync - # emerge -pv ">=net-misc/strongswan-2.1.3" - # emerge ">=net-misc/strongswan-2.1.3" + # emerge -pv ">=net-misc/strongswan-2.1.3" + # emerge ">=net-misc/strongswan-2.1.3"

All Super-FreeS/WAN users should migrate to the latest stable version of Openswan. Note that Portage will force a move for Super-FreeS/WAN @@ -107,12 +106,12 @@ # emerge sync - # emerge -pv "=net-misc/openswan-1.0.6_rc1" - # emerge "=net-misc/openswan-1.0.6_rc1" + # emerge -pv "=net-misc/openswan-1.0.6_rc1" + # emerge "=net-misc/openswan-1.0.6_rc1" - Openswan/strongSwan Authentication Bug - CVE-2004-0590 + Openswan/strongSwan Authentication Bug + CVE-2004-0590 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-21.xml index c7698df487..d02b35055f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-21.xml @@ -1,6 +1,5 @@ - mit-krb5: Multiple buffer overflows in krb5_aname_to_localname @@ -9,8 +8,8 @@ system compromise. mit-krb5 - June 29, 2004 - June 29, 2004: 01 + 2004-06-29 + 2004-06-29: 01 52744 remote @@ -61,11 +60,11 @@ # emerge sync - # emerge -pv ">=app-crypt/mit-krb5-1.3.3-r1" - # emerge ">=app-crypt/mit-krb5-1.3.3-r1" + # emerge -pv ">=app-crypt/mit-krb5-1.3.3-r1" + # emerge ">=app-crypt/mit-krb5-1.3.3-r1" - CAN-2004-0523 + CAN-2004-0523 MIT krb5 Security Advisory diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-22.xml index adedc54c72..5ff727bdaa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200406-22.xml @@ -1,6 +1,5 @@ - Pavuk: Remote buffer overflow @@ -8,8 +7,8 @@ code. Pavuk - June 30, 2004 - May 22, 2006: 02 + 2004-06-30 + 2006-05-22: 02 remote @@ -48,11 +47,11 @@ # emerge sync - # emerge -pv ">=net-misc/pavuk-0.9.28-r2" - # emerge ">="net-misc/pavuk-0.9.28-r2 + # emerge -pv ">=net-misc/pavuk-0.9.28-r2" + # emerge ">="net-misc/pavuk-0.9.28-r2 - CVE-2004-0456 + CVE-2004-0456 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-01.xml index 508b29e96f..ff68388d95 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-01.xml @@ -1,6 +1,5 @@ - Esearch: Insecure temp file handling @@ -9,8 +8,8 @@ arbitrary files. esearch - July 01, 2004 - May 22, 2006: 02 + 2004-07-01 + 2006-05-22: 02 55424 local @@ -56,11 +55,11 @@ # emerge sync - # emerge -pv ">=app-portage/esearch-0.6.2" - # emerge ">=app-portage/esearch-0.6.2" + # emerge -pv ">=app-portage/esearch-0.6.2" + # emerge ">=app-portage/esearch-0.6.2" - CVE-2004-0655 + CVE-2004-0655 condordes diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-02.xml index 09a0f02ee3..fe44d7c0eb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-02.xml @@ -1,6 +1,5 @@ - Linux Kernel: Multiple vulnerabilities @@ -9,8 +8,8 @@ released and details are included in this advisory. Kernel - July 03, 2004 - March 27, 2011: 04 + 2004-07-03 + 2011-03-27: 04 47881 49637 53804 @@ -300,19 +299,19 @@ # # If you use genkernel, run genkernel as you would do normally. - CVE-2004-0109 - CVE-2004-0133 - CVE-2004-0177 - CVE-2004-0178 - CVE-2004-0181 - CVE-2004-0228 - CVE-2004-0229 - CVE-2004-0394 - CVE-2004-0427 - CVE-2004-0495 - CVE-2004-0535 - CVE-2004-0554 - CVE-2004-1983 + CVE-2004-0109 + CVE-2004-0133 + CVE-2004-0177 + CVE-2004-0178 + CVE-2004-0181 + CVE-2004-0228 + CVE-2004-0229 + CVE-2004-0394 + CVE-2004-0427 + CVE-2004-0495 + CVE-2004-0535 + CVE-2004-0554 + CVE-2004-1983 plasmaroo diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-03.xml index ddf00eb878..2554ce37b9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-03.xml @@ -1,6 +1,5 @@ - Apache 2: Remote denial of service attack @@ -9,8 +8,8 @@ overflow. Apache - July 04, 2004 - December 30, 2007: 02 + 2004-07-04 + 2007-12-30: 02 55441 remote @@ -57,12 +56,12 @@ # emerge sync - # emerge -pv ">=www-servers/apache-2.0.49-r4" - # emerge ">=www-servers/apache-2.0.49-r4" + # emerge -pv ">=www-servers/apache-2.0.49-r4" + # emerge ">=www-servers/apache-2.0.49-r4" Georgi Guninski security advisory #70, 2004 - CAN-2004-0493 + CAN-2004-0493 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-04.xml index 9db02bb1cd..47efc8c80c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-04.xml @@ -1,6 +1,5 @@ - Pure-FTPd: Potential DoS when maximum connections is reached @@ -8,8 +7,8 @@ when the maximum number of connections is reached. Pure-FTPd - July 04, 2004 - May 22, 2006: 02 + 2004-07-04 + 2006-05-22: 02 54590 remote @@ -49,12 +48,12 @@ # emerge sync - # emerge -pv ">=net-ftp/pure-ftpd-1.0.18-r1" - # emerge ">=net-ftp/pure-ftpd-1.0.18-r1" + # emerge -pv ">=net-ftp/pure-ftpd-1.0.18-r1" + # emerge ">=net-ftp/pure-ftpd-1.0.18-r1" Pure-FTPd website - CVE-2004-0656 + CVE-2004-0656 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-05.xml index 461f99b388..e4cf0bb662 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-05.xml @@ -1,6 +1,5 @@ - XFree86, X.org: XDM ignores requestPort setting @@ -10,8 +9,8 @@ configured XDM to refuse such connections. xdm - July 05, 2004 - July 05, 2004: 01 + 2004-07-05 + 2004-07-05: 01 53226 remote @@ -60,19 +59,19 @@ # emerge sync - # emerge -pv ">=x11-base/xfree-4.3.0-r6" - # emerge ">=x11-base/xfree-4.3.0-r6" + # emerge -pv ">=x11-base/xfree-4.3.0-r6" + # emerge ">=x11-base/xfree-4.3.0-r6"

If you are using X.org's X11 server, you should run the following:

# emerge sync - # emerge -pv ">=x11-base/xorg-x11-6.7.0-r1" - # emerge ">=x11-base/xorg-x11-6.7.0-r1" + # emerge -pv ">=x11-base/xorg-x11-6.7.0-r1" + # emerge ">=x11-base/xorg-x11-6.7.0-r1" - CAN 2004-0419 + CAN 2004-0419 XFree86 Bug diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-06.xml index d304d0d7c4..5142b92f16 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-06.xml @@ -1,6 +1,5 @@ - libpng: Buffer overflow on row buffers @@ -9,8 +8,8 @@ code. libpng - July 08, 2004 - July 08, 2004: 01 + 2004-07-08 + 2004-07-08: 01 56307 remote @@ -54,8 +53,8 @@ # emerge sync - # emerge -pv ">=media-libs/libpng-1.2.5-r7" - # emerge ">=media-libs/libpng-1.2.5-r7" + # emerge -pv ">=media-libs/libpng-1.2.5-r7" + # emerge ">=media-libs/libpng-1.2.5-r7"

You should also run revdep-rebuild to rebuild any packages that depend on older versions of libpng : @@ -64,7 +63,7 @@ # revdep-rebuild - CAN-2002-1363 + CAN-2002-1363 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-07.xml index 9ce491bba1..b3a06999f8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-07.xml @@ -1,6 +1,5 @@ - Shorewall : Insecure temp file handling @@ -9,8 +8,8 @@ arbitrary system files. Shorewall - July 08, 2004 - May 22, 2006: 02 + 2004-07-08 + 2006-05-22: 02 55675 local @@ -54,12 +53,12 @@ # emerge sync - # emerge -pv ">=net-firewall/shorewall-1.4.10f" - # emerge ">=net-firewall/shorewall-1.4.10f" + # emerge -pv ">=net-firewall/shorewall-1.4.10f" + # emerge ">=net-firewall/shorewall-1.4.10f" Shorewall Announcement - CVE-2004-0647 + CVE-2004-0647 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-08.xml index 8235ab9fcf..0232aaa6e9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-08.xml @@ -1,6 +1,5 @@ - Ethereal: Multiple security problems @@ -8,8 +7,8 @@ which may allow an attacker to run arbitrary code or crash the program. Ethereal - July 09, 2004 - May 22, 2006: 02 + 2004-07-09 + 2006-05-22: 02 56423 remote @@ -47,7 +46,7 @@

For a temporary workaround you can disable all affected protocol - dissectors by selecting Analyze->Enabled Protocols... and deselecting + dissectors by selecting Analyze->Enabled Protocols... and deselecting them from the list. For SMB you can disable SID snooping in the SMB protocol preference. However, it is strongly recommended to upgrade to the latest stable version. @@ -60,14 +59,14 @@ # emerge sync - # emerge -pv ">=net-analyzer/ethereal-0.10.5" - # emerge ">=net-analyzer/ethereal-0.10.5" + # emerge -pv ">=net-analyzer/ethereal-0.10.5" + # emerge ">=net-analyzer/ethereal-0.10.5" Ethereal enpa-sa-00015 - CVE-2004-0633 - CVE-2004-0634 - CVE-2004-0635 + CVE-2004-0633 + CVE-2004-0634 + CVE-2004-0635 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-09.xml index 922025f974..2ef4d2f0c5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-09.xml @@ -1,6 +1,5 @@ - MoinMoin: Group ACL bypass @@ -8,8 +7,8 @@ Control Lists). MoinMoin - July 11, 2004 - May 22, 2006: 02 + 2004-07-11 + 2006-05-22: 02 53126 remote @@ -52,13 +51,13 @@ # emerge sync - # emerge -pv ">=www-apps/moinmoin-1.2.2" - # emerge ">=www-apps/moinmoin-1.2.2" + # emerge -pv ">=www-apps/moinmoin-1.2.2" + # emerge ">=www-apps/moinmoin-1.2.2" - MoinMoin Announcement + MoinMoin Announcement OSVDB Entry - CVE-2004-0708 + CVE-2004-0708 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-10.xml index 368fa89ec2..a7a76bac1c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-10.xml @@ -1,6 +1,5 @@ - rsync: Directory traversal in rsync daemon @@ -8,8 +7,8 @@ traversal allowing to write files outside a sync module. rsync - July 12, 2004 - July 12, 2004: 01 + 2004-07-12 + 2004-07-12: 01 49534 remote @@ -57,11 +56,11 @@ # emerge sync - # emerge -pv ">=net-misc/rsync-2.6.0-r2" - # emerge ">=net-misc/rsync-2.6.0-r2" + # emerge -pv ">=net-misc/rsync-2.6.0-r2" + # emerge ">=net-misc/rsync-2.6.0-r2" - CAN-2004-0426 + CAN-2004-0426 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-11.xml index a9f9b5858c..4bc5da9521 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-11.xml @@ -1,6 +1,5 @@ - wv: Buffer overflow vulnerability @@ -9,8 +8,8 @@ the vulnerable application. app-text/wv - July 14, 2004 - May 22, 2006: 02 + 2004-07-14 + 2006-05-22: 02 56595 remote @@ -57,12 +56,12 @@ # emerge sync - # emerge -pv ">=app-text/wv-1.0.0-r1" - # emerge ">=app-text/wv-1.0.0-r1" + # emerge -pv ">=app-text/wv-1.0.0-r1" + # emerge ">=app-text/wv-1.0.0-r1" iDEFENSE Security Advisory - CVE-2004-0645 + CVE-2004-0645 dmargoli diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-12.xml index e5b1764670..05c22c78cc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-12.xml @@ -1,6 +1,5 @@ - Linux Kernel: Remote DoS vulnerability with IPTables TCP Handling @@ -9,8 +8,8 @@ possibly enter an infinite loop and hang the vulnerable machine. Kernel - July 14, 2004 - October 10, 2004: 02 + 2004-07-14 + 2004-10-10: 02 55694 remote @@ -125,7 +124,7 @@ # # If you use genkernel, run genkernel as you would do normally. - CAN-2004-0626 + CAN-2004-0626 plasmaroo diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-13.xml index b0d43fcddd..7fc892cb59 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-13.xml @@ -1,6 +1,5 @@ - PHP: Multiple security vulnerabilities @@ -8,8 +7,8 @@ execution, were found and fixed in PHP. PHP - July 15, 2004 - July 15, 2004: 01 + 2004-07-15 + 2004-07-15: 01 56985 remote @@ -70,18 +69,18 @@ # emerge sync - # emerge -pv ">=dev-php/php-4.3.8" - # emerge ">=dev-php/php-4.3.8" + # emerge -pv ">=dev-php/php-4.3.8" + # emerge ">=dev-php/php-4.3.8" - # emerge -pv ">=dev-php/mod_php-4.3.8" - # emerge ">=dev-php/mod_php-4.3.8" + # emerge -pv ">=dev-php/mod_php-4.3.8" + # emerge ">=dev-php/mod_php-4.3.8" - # emerge -pv ">=dev-php/php-cgi-4.3.8" - # emerge ">=dev-php/php-cgi-4.3.8" + # emerge -pv ">=dev-php/php-cgi-4.3.8" + # emerge ">=dev-php/php-cgi-4.3.8" - CAN-2004-0594 - CAN-2004-0595 + CAN-2004-0594 + CAN-2004-0595 E-Matters Advisory 11/2004 E-Matters Advisory 12/2004 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-14.xml index 87dcd762ae..26ada0781c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-14.xml @@ -1,6 +1,5 @@ - Unreal Tournament 2003/2004: Buffer overflow in 'secure' queries @@ -8,8 +7,8 @@ execution through malformed 'secure' queries. Unreal Tournament - July 19, 2004 - July 19, 2004: 01 + 2004-07-19 + 2004-07-19: 01 54726 remote @@ -67,21 +66,21 @@ # emerge sync - # emerge -pv ">=games-fps/ut2003-2225-r3" - # emerge ">=games-fps/ut2003-2225-r3" + # emerge -pv ">=games-fps/ut2003-2225-r3" + # emerge ">=games-fps/ut2003-2225-r3" - # emerge -pv ">=games-server/ut2003-ded-2225-r2" - # emerge ">=games-server/ut2003-ded-2225-r2" + # emerge -pv ">=games-server/ut2003-ded-2225-r2" + # emerge ">=games-server/ut2003-ded-2225-r2" - # emerge -pv ">=games-fps/ut2004-3236" - # emerge ">=games-fps/ut2004-3236" + # emerge -pv ">=games-fps/ut2004-3236" + # emerge ">=games-fps/ut2004-3236" - # emerge -pv ">=games-fps/ut2004-demo-3120-r4" - # emerge ">=games-fps/ut2004-demo-3120-r4" + # emerge -pv ">=games-fps/ut2004-demo-3120-r4" + # emerge ">=games-fps/ut2004-demo-3120-r4" Luigi Auriemma advisory - CAN-2004-0608 + CAN-2004-0608 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-15.xml index 506b63836f..8d9b2c42a6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-15.xml @@ -1,6 +1,5 @@ - Opera: Multiple spoofing vulnerabilities @@ -9,8 +8,8 @@ injection. opera - July 20, 2004 - July 20, 2004: 01 + 2004-07-20 + 2004-07-20: 01 56311 56109 remote @@ -54,14 +53,14 @@ # emerge sync - # emerge -pv ">=www-client/opera-7.53" - # emerge ">=www-client/opera-7.53" + # emerge -pv ">=www-client/opera-7.53" + # emerge ">=www-client/opera-7.53" Bugtraq Announcement - Secunia Advisory SA11978 - Secunia Advisory SA12028 - Opera Changelog + Secunia Advisory SA11978 + Secunia Advisory SA12028 + Opera Changelog jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-16.xml index 6546586815..36f8a29861 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-16.xml @@ -1,6 +1,5 @@ - Linux Kernel: Multiple DoS and permission vulnerabilities @@ -14,8 +13,8 @@ advisory. Kernel - July 22, 2004 - March 27, 2011: 03 + 2004-07-22 + 2011-03-27: 03 56171 56479 local @@ -287,10 +286,10 @@ # # If you use genkernel, run genkernel as you would do normally. - CAN-2004-0447 - CAN-2004-0496 - CAN-2004-0497 - CAN-2004-0565 + CAN-2004-0447 + CAN-2004-0496 + CAN-2004-0497 + CAN-2004-0565 VServer /proc Context Vulnerability diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-17.xml index 4f68a9775b..1241478ac6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-17.xml @@ -1,6 +1,5 @@ - l2tpd: Buffer overflow @@ -8,8 +7,8 @@ known whether this bug is exploitable. net-dialup/l2tpd - July 22, 2004 - July 22, 2004: 01 + 2004-07-22 + 2004-07-22: 01 53009 remote @@ -48,11 +47,11 @@ # emerge sync - # emerge -pv ">=net-l2tpd-0.69-r2" - # emerge ">=net-l2tpd-0.69-r2" + # emerge -pv ">=net-l2tpd-0.69-r2" + # emerge ">=net-l2tpd-0.69-r2" - CAN-2004-0649 + CAN-2004-0649 Full Disclosure Report diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-18.xml index b7e4e740e7..d35b3cc2e7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-18.xml @@ -1,6 +1,5 @@ - mod_ssl: Format string vulnerability @@ -8,8 +7,8 @@ Apache is configured to use mod_ssl and mod_proxy. mod_ssl - July 22, 2004 - July 22, 2004: 01 + 2004-07-22 + 2004-07-22: 01 57379 remote @@ -33,7 +32,7 @@

Given the right server configuration, an attacker could execute code as the - user running Apache, usually "apache". + user running Apache, usually "apache".

@@ -49,8 +48,8 @@ # emerge sync - # emerge -pv ">=net-www/mod_ssl-2.8.19" - # emerge ">=net-www/mod_ssl-2.8.19" + # emerge -pv ">=net-www/mod_ssl-2.8.19" + # emerge ">=net-www/mod_ssl-2.8.19" mod_ssl Announcement diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-19.xml index 6d2307e2cf..d2e7dbd0d1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-19.xml @@ -1,14 +1,13 @@ - Pavuk: Digest authentication helper buffer overflow Pavuk contains a bug that can allow an attacker to run arbitrary code. Pavuk - July 26, 2004 - May 22, 2006: 02 + 2004-07-26 + 2006-05-22: 02 remote @@ -46,11 +45,11 @@ # emerge sync - # emerge -pv ">=net-misc/pavuk-0.9.28-r3" - # emerge ">=net-misc/pavuk-0.9.28-r3" + # emerge -pv ">=net-misc/pavuk-0.9.28-r3" + # emerge ">=net-misc/pavuk-0.9.28-r3" - CVE-2004-1437 + CVE-2004-1437 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-20.xml index 7927c96f30..393b01ca7c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-20.xml @@ -1,6 +1,5 @@ - Subversion: Vulnerability in mod_authz_svn @@ -9,8 +8,8 @@ wish. subversion - July 26, 2004 - May 22, 2006: 02 + 2004-07-26 + 2006-05-22: 02 57747 remote @@ -64,12 +63,12 @@ # emerge sync - # emerge -pv ">=dev-util/subversion-1.0.6" - # emerve ">=dev-util/subversion-1.0.6" + # emerge -pv ">=dev-util/subversion-1.0.6" + # emerve ">=dev-util/subversion-1.0.6" ChangeLog for Subversion 1.0.6 - CVE-2004-1438 + CVE-2004-1438 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-21.xml index 0bb44c7791..b3b2a97eb5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-21.xml @@ -1,6 +1,5 @@ - Samba: Multiple buffer overflows @@ -8,8 +7,8 @@ allowing the remote execution of arbitrary code. Samba - July 29, 2004 - July 29, 2004: 02 + 2004-07-29 + 2004-07-29: 02 57962 remote @@ -59,13 +58,13 @@ # emerge sync - # emerge -pv ">=net-fs/samba-3.0.5" - # emerge ">=net-fs/samba-3.0.5" + # emerge -pv ">=net-fs/samba-3.0.5" + # emerge ">=net-fs/samba-3.0.5" - Samba 3.0.5 Release Notes - CAN-2004-0600 - CAN-2004-0686 + Samba 3.0.5 Release Notes + CAN-2004-0600 + CAN-2004-0686 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-22.xml index 84a89f01d7..5f5a8a03b2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-22.xml @@ -1,6 +1,5 @@ - phpMyAdmin: Multiple vulnerabilities @@ -9,8 +8,8 @@ PHP code. dev-db/phpmyadmin - July 29, 2004 - May 22, 2006: 02 + 2004-07-29 + 2006-05-22: 02 57890 remote @@ -60,13 +59,13 @@ # emerge sync - # emerge -pv ">=dev-db/phpmyadmin-2.5.7_p1" - # emerge ">=dev-db/phpmyadmin-2.5.7_p1" + # emerge -pv ">=dev-db/phpmyadmin-2.5.7_p1" + # emerge ">=dev-db/phpmyadmin-2.5.7_p1" BugTraq Announcement - CVE-2004-2631 - CVE-2004-2632 + CVE-2004-2631 + CVE-2004-2632 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-23.xml index dd782192a5..6f197d1ab8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200407-23.xml @@ -1,6 +1,5 @@ - SoX: Multiple buffer overflows @@ -8,8 +7,8 @@ code. SoX - July 30, 2004 - May 22, 2006: 02 + 2004-07-30 + 2006-05-22: 02 58733 remote @@ -50,12 +49,12 @@ # emerge sync - # emerge -pv ">=media-sound/sox-12.17.4-r2" - # emerge ">=media-sound/sox-12.17.4-r2" + # emerge -pv ">=media-sound/sox-12.17.4-r2" + # emerge ">=media-sound/sox-12.17.4-r2" Full Disclosure Announcement - CVE-2004-0557 + CVE-2004-0557 jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-01.xml index e9595f4e35..fabb5c22fc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-01.xml @@ -1,6 +1,5 @@ - MPlayer: GUI filename handling overflow @@ -8,8 +7,8 @@ exploitable buffer overflow attack. MPlayer - August 01, 2004 - May 22, 2006: 02 + 2004-08-01 + 2006-05-22: 02 55456 remote @@ -51,13 +50,13 @@ # emerge sync - # emerge -pv ">=media-video/mplayer-1.0_pre4-r7" - # emerge ">=media-video/mplayer-1.0_pre4-r7" + # emerge -pv ">=media-video/mplayer-1.0_pre4-r7" + # emerge ">=media-video/mplayer-1.0_pre4-r7" Bugtraq Announcement Open-Security Announcement - CVE-2004-0659 + CVE-2004-0659 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-02.xml index 52b3a9e207..f9168c3f18 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-02.xml @@ -1,6 +1,5 @@ - Courier: Cross-site scripting vulnerability in SqWebMail @@ -8,8 +7,8 @@ to cross-site scripting attacks. Courier - August 04, 2004 - August 04, 2004: 01 + 2004-08-04 + 2004-08-04: 01 58020 remote @@ -55,17 +54,17 @@ # emerge sync - # emerge -pv ">=mail-mta/courier-0.45.6.20040618" - # emerge ">=mail-mta/courier-0.45.6.20040618" + # emerge -pv ">=mail-mta/courier-0.45.6.20040618" + # emerge ">=mail-mta/courier-0.45.6.20040618" - CAN-2004-0591 - XSS definition + CAN-2004-0591 + XSS definition koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-03.xml index 1432e2ee7d..421d78b496 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-03.xml @@ -1,6 +1,5 @@ - libpng: Numerous vulnerabilities @@ -8,8 +7,8 @@ to perform a Denial of Service attack or even execute arbitrary code. libpng - August 05, 2004 - August 05, 2004: 01 + 2004-08-05 + 2004-08-05: 01 59424 remote @@ -51,8 +50,8 @@ # emerge sync - # emerge -pv ">=media-libs/libpng-1.2.5-r8" - # emerge ">=media-libs/libpng-1.2.5-r8" + # emerge -pv ">=media-libs/libpng-1.2.5-r8" + # emerge ">=media-libs/libpng-1.2.5-r8"

You should also run revdep-rebuild to rebuild any packages that depend on older versions of libpng : @@ -61,11 +60,11 @@ # revdep-rebuild - CAN-2004-0597 - CAN-2004-0598 - CAN-2004-0599 + CAN-2004-0597 + CAN-2004-0598 + CAN-2004-0599 - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-04.xml index 2fe7e7a5fb..023e62a942 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-04.xml @@ -1,6 +1,5 @@ - PuTTY: Pre-authentication arbitrary code execution @@ -8,8 +7,8 @@ code on the connecting client. PuTTY - August 05, 2004 - May 22, 2006: 03 + 2004-08-05 + 2006-05-22: 03 59383 remote @@ -51,18 +50,18 @@ # emerge sync - # emerge -pv ">=net-misc/putty-0.55" - # emerge ">=net-misc/putty-0.55" + # emerge -pv ">=net-misc/putty-0.55" + # emerge ">=net-misc/putty-0.55" - Corelabs Advisory - PuTTY ChangeLog - CVE-2004-1440 + Corelabs Advisory + PuTTY ChangeLog + CVE-2004-1440 - + koon - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-05.xml index aab6c652f1..20455548ae 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-05.xml @@ -1,6 +1,5 @@ - Opera: Multiple new vulnerabilities @@ -8,8 +7,8 @@ allowing an attacker to read the local filesystem remotely. Opera - August 05, 2004 - December 30, 2007: 03 + 2004-08-05 + 2007-12-30: 03 59503 remote @@ -55,16 +54,16 @@ # emerge sync - # emerge -pv ">=www-client/opera-7.54" - # emerge ">=www-client/opera-7.54" + # emerge -pv ">=www-client/opera-7.54" + # emerge ">=www-client/opera-7.54" - Opera Changelog + Opera Changelog Address bar spoofing issue disclosure GreyMagic Security Advisory GM#008-OP - CVE-2004-2570 + CVE-2004-2570 - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-06.xml index deb745c498..ad33013da8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-06.xml @@ -1,6 +1,5 @@ - SpamAssassin: Denial of Service vulnerability @@ -8,8 +7,8 @@ certain malformed messages. SpamAssassin - August 09, 2004 - May 22, 2006: 02 + 2004-08-09 + 2006-05-22: 02 59483 remote @@ -48,17 +47,17 @@ # emerge sync - # emerge -pv ">=mail-filter/spamassassin-2.64" - # emerge ">=mail-filter/spamassassin-2.64" + # emerge -pv ">=mail-filter/spamassassin-2.64" + # emerge ">=mail-filter/spamassassin-2.64" SpamAssassin Release Announcement - CVE-2004-0796 + CVE-2004-0796 - + koon - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-07.xml index e53ced251d..3d17987dd5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-07.xml @@ -1,6 +1,5 @@ - Horde-IMP: Input validation vulnerability for Internet Explorer users @@ -8,8 +7,8 @@ only affects users of Internet Explorer. horde-imp - August 10, 2004 - May 22, 2006: 02 + 2004-08-10 + 2006-05-22: 02 59336 remote @@ -51,15 +50,15 @@ # emerge sync - # emerge -pv ">=www-apps/horde-imp-3.2.5" - # emerge ">=www-apps/horde-imp-3.2.5" + # emerge -pv ">=www-apps/horde-imp-3.2.5" + # emerge ">=www-apps/horde-imp-3.2.5" - Horde-IMP Changelog - Secunia Advisory SA12202 - CVE-2004-1443 + Horde-IMP Changelog + Secunia Advisory SA12202 + CVE-2004-1443 - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-08.xml index 013868c676..bbb53f2a3a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-08.xml @@ -1,6 +1,5 @@ - Cfengine: RSA Authentication Heap Corruption @@ -8,8 +7,8 @@ AllowConnectionsFrom. Cfengine - August 10, 2004 - May 22, 2006: 05 + 2004-08-10 + 2006-05-22: 05 59895 remote @@ -59,15 +58,15 @@ # emerge sync - # emerge -pv ">=net-misc/cfengine-2.1.8" - # emerge ">=net-misc/cfengine-2.1.8" + # emerge -pv ">=net-misc/cfengine-2.1.8" + # emerge ">=net-misc/cfengine-2.1.8" - Corelabs Advisory - CVE-2004-1701 - CVE-2004-1702 + Corelabs Advisory + CVE-2004-1701 + CVE-2004-1702 - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-09.xml index 8fc9bdb961..a4db0e937a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-09.xml @@ -1,6 +1,5 @@ - Roundup: Filesystem access vulnerability @@ -8,8 +7,8 @@ to a remote attacker. Roundup - August 11, 2004 - May 22, 2006: 03 + 2004-08-11 + 2006-05-22: 03 53494 remote @@ -49,14 +48,14 @@ # emerge sync - # emerge -pv ">=www-apps/roundup-0.7.6" - # emerge ">=www-apps/roundup-0.7.6" + # emerge -pv ">=www-apps/roundup-0.7.6" + # emerge ">=www-apps/roundup-0.7.6" - Secunia Advisory SA11801 - CVE-2004-1444 + Secunia Advisory SA11801 + CVE-2004-1444 - + chriswhite diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-10.xml index ec85a58018..970b474e10 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-10.xml @@ -1,6 +1,5 @@ - gv: Exploitable Buffer Overflow @@ -8,8 +7,8 @@ execute arbitrary code. gv - August 12, 2004 - August 12, 2004: 01 + 2004-08-12 + 2004-08-12: 01 59385 remote @@ -49,16 +48,16 @@ # emerge sync - # emerge -pv ">=app-text/gv-3.5.8-r4" - # emerge ">=app-text/gv-3.5.8-r4" + # emerge -pv ">=app-text/gv-3.5.8-r4" + # emerge ">=app-text/gv-3.5.8-r4" - CAN-2002-0838 + CAN-2002-0838 - + koon - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-11.xml index f7abf96fa2..c55debc8db 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-11.xml @@ -1,6 +1,5 @@ - Nessus: "adduser" race condition vulnerability @@ -8,8 +7,8 @@ escalation attack. Nessus - August 12, 2004 - May 22, 2006: 02 + 2004-08-12 + 2006-05-22: 02 58014 local @@ -48,12 +47,12 @@ # emerge sync - # emerge -pv ">=net-analyzer/nessus-2.0.12" - # emerge ">=net-analyzer/nessus-2.0.12" + # emerge -pv ">=net-analyzer/nessus-2.0.12" + # emerge ">=net-analyzer/nessus-2.0.12" - Secunia Advisory - CVE-2004-1445 + Secunia Advisory + CVE-2004-1445 koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-12.xml index 7c4a93953a..0477527b96 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-12.xml @@ -1,6 +1,5 @@ - Gaim: MSN protocol parsing function buffer overflow @@ -9,8 +8,8 @@ code. gaim - August 12, 2004 - May 22, 2006: 03 + 2004-08-12 + 2006-05-22: 03 60034 remote @@ -51,14 +50,14 @@ # emerge sync - # emerge -pv ">=net-im/gaim-0.81-r1" - # emerge ">=net-im/gaim-0.81-r1" + # emerge -pv ">=net-im/gaim-0.81-r1" + # emerge ">=net-im/gaim-0.81-r1" OSVDB ID: 8382 - CVE-2004-0500 + CVE-2004-0500 - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-13.xml index 3b6788df0c..769037112f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-13.xml @@ -1,6 +1,5 @@ - kdebase, kdelibs: Multiple security issues @@ -9,8 +8,8 @@ injection. kde, kdebase, kdelibs - August 12, 2004 - August 12, 2004: 01 + 2004-08-12 + 2004-08-12: 01 60068 remote and local @@ -62,18 +61,18 @@ # emerge sync - # emerge -pv ">=kde-base/kdebase-3.2.3-r1" - # emerge ">=kde-base/kdebase-3.2.3-r1" + # emerge -pv ">=kde-base/kdebase-3.2.3-r1" + # emerge ">=kde-base/kdebase-3.2.3-r1" - # emerge -pv ">=kde-base/kdelibs-3.2.3-r1" - # emerge ">=kde-base/kdelibs-3.2.3-r1" + # emerge -pv ">=kde-base/kdelibs-3.2.3-r1" + # emerge ">=kde-base/kdelibs-3.2.3-r1" - KDE Advisory: Temporary Directory Vulnerability - KDE Advisory: DCOPServer Temporary Filename Vulnerability - KDE Advisory: Konqueror Frame Injection Vulnerability + KDE Advisory: Temporary Directory Vulnerability + KDE Advisory: DCOPServer Temporary Filename Vulnerability + KDE Advisory: Konqueror Frame Injection Vulnerability - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-14.xml index 2512942ac0..3aeeb60806 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-14.xml @@ -1,6 +1,5 @@ - acroread: UUDecode filename buffer overflow @@ -8,8 +7,8 @@ may lead to execution of arbitrary code or programs. acroread - August 15, 2004 - May 22, 2006: 03 + 2004-08-15 + 2006-05-22: 03 60205 remote @@ -52,16 +51,16 @@ # emerge sync - # emerge -pv ">=app-text/acroread-5.09" - # emerge ">=app-text/acroread-5.09" + # emerge -pv ">=app-text/acroread-5.09" + # emerge ">=app-text/acroread-5.09" iDEFENSE Advisory 124 iDEFENSE Advisory 125 - CVE-2004-0630 - CVE-2004-0631 + CVE-2004-0630 + CVE-2004-0631 - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-15.xml index ff125490d3..1e7c845a2b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-15.xml @@ -1,6 +1,5 @@ - Tomcat: Insecure installation @@ -8,8 +7,8 @@ scripts as root. tomcat - August 15, 2004 - May 22, 2006: 04 + 2004-08-15 + 2006-05-22: 04 59232 local @@ -57,13 +56,13 @@

# emerge sync - # emerge -pv ">=www-servers/tomcat-5.0.27-r3" - # emerge ">=www-servers/tomcat-5.0.27-r3" + # emerge -pv ">=www-servers/tomcat-5.0.27-r3" + # emerge ">=www-servers/tomcat-5.0.27-r3" - CVE-2004-1452 + CVE-2004-1452 - + dmargoli
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-16.xml index 04680d3abf..01bccfdc44 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-16.xml @@ -1,6 +1,5 @@ - glibc: Information leak with LD_DEBUG @@ -8,8 +7,8 @@ SUID binaries. glibc - August 16, 2004 - May 28, 2006: 04 + 2004-08-16 + 2006-05-28: 04 59526 local @@ -73,9 +72,9 @@ # emerge your_version - CVE-2004-1453 + CVE-2004-1453 - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-17.xml index 15c7c76c29..69e025bf9f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-17.xml @@ -1,6 +1,5 @@ - rsync: Potential information leakage @@ -9,8 +8,8 @@ on rsync server configurations that allow uploading. rsync - August 17, 2004 - May 22, 2006: 02 + 2004-08-17 + 2006-05-22: 02 60309 remote @@ -57,15 +56,15 @@ # emerge sync - # emerge -pv ">=net-misc/rsync-2.6.0-r3" - # emerge ">=net-misc/rsync-2.6.0-r3" + # emerge -pv ">=net-misc/rsync-2.6.0-r3" + # emerge ">=net-misc/rsync-2.6.0-r3" - rsync Advisory - rsync 2.6.2 announcement - CVE-2004-0792 + rsync Advisory + rsync 2.6.2 announcement + CVE-2004-0792 - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-18.xml index 38363b4d4a..10d0dba60f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-18.xml @@ -1,14 +1,13 @@ - xine-lib: VCD MRL buffer overflow xine-lib contains an exploitable buffer overflow in the VCD handling code xine-lib - August 17, 2004 - May 22, 2006: 02 + 2004-08-17 + 2006-05-22: 02 59948 remote @@ -55,14 +54,14 @@ # emerge sync - # emerge -pv ">=media-libs/xine-lib-1_rc5-r3" - # emerge ">=media-libs/xine-lib-1_rc5-r3" + # emerge -pv ">=media-libs/xine-lib-1_rc5-r3" + # emerge ">=media-libs/xine-lib-1_rc5-r3" Open Security Advisory - CVE-2004-1475 + CVE-2004-1475 - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-19.xml index 2df5a7d221..6f29d10ab1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-19.xml @@ -1,6 +1,5 @@ - courier-imap: Remote Format String Vulnerability @@ -9,8 +8,8 @@ execute arbitrary code as the user running courier-imapd (oftentimes root). courier-imap - August 19, 2004 - May 22, 2006: 02 + 2004-08-19 + 2006-05-22: 02 60865 remote @@ -58,14 +57,14 @@ # emerge sync - # emerge -pv ">=net-mail/courier-imap-3.0.5" - # emerge ">=net-mail/courier-imap-3.0.5" + # emerge -pv ">=net-mail/courier-imap-3.0.5" + # emerge ">=net-mail/courier-imap-3.0.5" iDEFENSE Advisory - CVE-2004-0777 + CVE-2004-0777 - + condordes diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-20.xml index bbe3c4a762..4177dc709e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-20.xml @@ -1,6 +1,5 @@ - Qt: Image loader overflows @@ -8,8 +7,8 @@ crashes or arbitrary code execution. Qt - August 22, 2004 - May 22, 2006: 02 + 2004-08-22 + 2006-05-22: 02 60855 local @@ -53,20 +52,20 @@ # emerge sync - # emerge -pv ">=x11-libs/qt-3.3.3" - # emerge ">=x11-libs/qt-3.3.3" + # emerge -pv ">=x11-libs/qt-3.3.3" + # emerge ">=x11-libs/qt-3.3.3" Mandrake Advisory Qt 3.3.3 ChangeLog - CVE-2004-0691 - CVE-2004-0692 - CVE-2004-0693 + CVE-2004-0691 + CVE-2004-0692 + CVE-2004-0693 - + jaervosz - + condordes diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-21.xml index 6dc2f99716..5219a7310f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-21.xml @@ -1,6 +1,5 @@ - Cacti: SQL injection vulnerability @@ -8,8 +7,8 @@ a SQL injection attack. cacti - August 23, 2004 - May 22, 2006: 04 + 2004-08-23 + 2006-05-22: 04 60630 remote @@ -51,17 +50,17 @@ # emerge sync - # emerge -pv ">=net-analyzer/cacti-0.8.5a-r1" - # emerge ">=net-analyzer/cacti-0.8.5a-r1" + # emerge -pv ">=net-analyzer/cacti-0.8.5a-r1" + # emerge ">=net-analyzer/cacti-0.8.5a-r1" Full Disclosure Announcement - CVE-2004-1737 + CVE-2004-1737 - + dmargoli - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-22.xml index 9f8781154c..70c81e3ee2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-22.xml @@ -1,6 +1,5 @@ - Mozilla, Firefox, Thunderbird, Galeon, Epiphany: New releases fix vulnerabilities @@ -9,8 +8,8 @@ overflows. www-client/mozilla, www-client/mozilla-firefox, mail-client/mozilla-thunderbird, www-client/galeon, www-client/epiphany - August 23, 2004 - December 30, 2007: 06 + 2004-08-23 + 2007-12-30: 06 57380 59419 remote @@ -102,16 +101,16 @@ # emerge your-version - CAN-2004-0763 - CAN-2004-0758 - CAN-2004-0597 - CAN-2004-0598 - CAN-2004-0599 + CAN-2004-0763 + CAN-2004-0758 + CAN-2004-0597 + CAN-2004-0598 + CAN-2004-0599 - + koon - + dmargoli diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-23.xml index a1c27bdd35..bdd7a0ad31 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-23.xml @@ -1,6 +1,5 @@ - kdelibs: Cross-domain cookie injection vulnerability @@ -9,8 +8,8 @@ web server. kdelibs - August 24, 2004 - August 24, 2004: 01 + 2004-08-24 + 2004-08-24: 01 61389 remote @@ -46,8 +45,8 @@ be used instead of the cookie issued by the legitimate site. Depending on the design of the legitimate site, this may allow an attacker to gain access to the user's session. For further explanation on this type of - attack, see the paper titled "Session Fixation Vulnerability in - Web-based Applications" (reference 2). + attack, see the paper titled "Session Fixation Vulnerability in + Web-based Applications" (reference 2).

@@ -63,17 +62,17 @@ # emerge sync - # emerge -pv ">=kde-base/kdelibs-3.2.3-r2" - # emerge ">=kde-base/kdelibs-3.2.3-r2" + # emerge -pv ">=kde-base/kdelibs-3.2.3-r2" + # emerge ">=kde-base/kdelibs-3.2.3-r2" - KDE Advisory + KDE Advisory Session Fixation Vulnerability in Web-based Applications - + jaervosz - + condordes
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-24.xml index d2fe4e66dd..96195d8123 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-24.xml @@ -1,6 +1,5 @@ - Linux Kernel: Multiple information leaks @@ -9,8 +8,8 @@ exploitation of the system. Kernel - August 25, 2004 - March 27, 2011: 03 + 2004-08-25 + 2011-03-27: 03 59378 59769 59905 @@ -223,11 +222,11 @@ # # If you use genkernel, run genkernel as you would normally. - CAN-2004-0415 - CAN-2004-0685 - CVE-2004-1058 + CAN-2004-0415 + CAN-2004-0685 + CVE-2004-1058 - + plasmaroo diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-25.xml index 06fdbc9cf4..7ae2be9854 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-25.xml @@ -1,6 +1,5 @@ - MoinMoin: Group ACL bypass @@ -9,8 +8,8 @@ authorized users. MoinMoin - August 26, 2004 - May 22, 2006: 02 + 2004-08-26 + 2006-05-22: 02 57913 remote @@ -52,17 +51,17 @@ # emerge sync - # emerge -pv ">=www-apps/moinmoin-1.2.3" - # emerge ">=www-apps/moinmoin-1.2.3" + # emerge -pv ">=www-apps/moinmoin-1.2.3" + # emerge ">=www-apps/moinmoin-1.2.3" MoinMoin Announcement OSVDB Advisory 8194 OSVDB Advisory 8195 - CVE-2004-1462 - CVE-2004-1463 + CVE-2004-1462 + CVE-2004-1463 - + dmargoli diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-26.xml index c95a139d41..f4111fb990 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-26.xml @@ -1,14 +1,13 @@ - zlib: Denial of service vulnerability The zlib library contains a Denial of Service vulnerability. zlib - August 27, 2004 - May 22, 2006: 02 + 2004-08-27 + 2006-05-22: 02 61749 remote @@ -47,8 +46,8 @@ # emerge sync - # emerge -pv ">=sys-libs/zlib-1.2.1-r3" - # emerge ">=sys-libs/zlib-1.2.1-r3" + # emerge -pv ">=sys-libs/zlib-1.2.1-r3" + # emerge ">=sys-libs/zlib-1.2.1-r3"

You should also run revdep-rebuild to rebuild any packages that depend on older versions of zlib : @@ -58,12 +57,12 @@ OpenPKG-SA-2004.038-zlib - CVE-2004-0797 + CVE-2004-0797 - + jaervosz - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-27.xml index 6d8bdc8fb2..a79c46db6c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200408-27.xml @@ -1,6 +1,5 @@ - Gaim: New vulnerabilities @@ -8,8 +7,8 @@ execute arbitrary code or commands. Gaim - August 27, 2004 - May 22, 2006: 02 + 2004-08-27 + 2006-05-22: 02 61457 remote @@ -62,20 +61,20 @@ # emerge sync - # emerge -pv ">=net-im/gaim-0.81-r5" - # emerge ">=net-im/gaim-0.81-r5" + # emerge -pv ">=net-im/gaim-0.81-r5" + # emerge ">=net-im/gaim-0.81-r5" - Gaim security issues - CVE-2004-0500 - CVE-2004-0754 - CVE-2004-0784 - CVE-2004-0785 + Gaim security issues + CVE-2004-0500 + CVE-2004-0754 + CVE-2004-0784 + CVE-2004-0785 - + jaervosz - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-01.xml index 159ac1f866..fc933d9810 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-01.xml @@ -1,6 +1,5 @@ - vpopmail: Multiple vulnerabilities @@ -10,8 +9,8 @@ code. vpopmail - September 01, 2004 - September 01, 2004: 01 + 2004-09-01 + 2004-09-01: 01 60844 remote @@ -51,14 +50,14 @@ # emerge sync - # emerge -pv ">=net-mail/vpopmail-5.4.6" - # emerge ">=net-mail/vpopmail-5.4.6" + # emerge -pv ">=net-mail/vpopmail-5.4.6" + # emerge ">=net-mail/vpopmail-5.4.6" - vpopmail Announcement + vpopmail Announcement Bugtraq Announcement - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-02.xml index a042b03bc2..fd3612b639 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-02.xml @@ -1,6 +1,5 @@ - MySQL: Insecure temporary file creation in mysqlhotcopy @@ -9,8 +8,8 @@ important data. MySQL - September 01, 2004 - September 01, 2004: 01 + 2004-09-01 + 2004-09-01: 01 60744 local @@ -55,16 +54,16 @@ # emerge sync - # emerge -pv ">=dev-db/mysql-4.0.20-r1" - # emerge ">=dev-db/mysql-4.0.20-r1" + # emerge -pv ">=dev-db/mysql-4.0.20-r1" + # emerge ">=dev-db/mysql-4.0.20-r1" - CAN-2004-0457 + CAN-2004-0457 - + jaervosz - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-03.xml index f9ca7d2f4e..d8b934d95e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-03.xml @@ -1,6 +1,5 @@ - Python 2.2: Buffer overflow in getaddrinfo() @@ -8,8 +7,8 @@ malformed IPV6 address is encountered by getaddrinfo(). Python - September 02, 2004 - September 02, 2004: 01 + 2004-09-02 + 2004-09-02: 01 62440 remote @@ -48,14 +47,14 @@ # emerge sync - # emerge -pv ">=dev-lang/python-2.2.2" - # emerge ">=dev-lang/python-2.2.2" + # emerge -pv ">=dev-lang/python-2.2.2" + # emerge ">=dev-lang/python-2.2.2" - CVE-2004-0150 + CVE-2004-0150 OSVDB:4172 - + chriswhite diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-04.xml index 941ee1102b..c0127d9a40 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-04.xml @@ -1,6 +1,5 @@ - Squid: Denial of service when using NTLM authentication @@ -8,8 +7,8 @@ NTLM helpers. squid - September 02, 2004 - December 30, 2007: 03 + 2004-09-02 + 2007-12-30: 03 61280 remote @@ -53,14 +52,14 @@ # emerge sync - # emerge -pv ">=net-www/squid-2.5.6-r2" - # emerge ">=net-www/squid-2.5.6-r2" + # emerge -pv ">=net-www/squid-2.5.6-r2" + # emerge ">=net-www/squid-2.5.6-r2" Squid-2.5 Patches - CVE-2004-0832 + CVE-2004-0832 - + vorlon078 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-05.xml index 08546dc6fa..8cbdaacbef 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-05.xml @@ -1,6 +1,5 @@ - Gallery: Arbitrary command execution @@ -8,8 +7,8 @@ vulnerability which could lead to execution of arbitrary commands. Gallery - September 02, 2004 - May 22, 2006: 02 + 2004-09-02 + 2006-05-22: 02 60742 remote @@ -60,18 +59,18 @@ # emerge sync - # emerge -pv ">=www-apps/gallery-1.4.4_p2" - # emerge ">=www-apps/gallery-1.4.4_p2" + # emerge -pv ">=www-apps/gallery-1.4.4_p2" + # emerge ">=www-apps/gallery-1.4.4_p2" Full Disclosure Announcement Gallery Announcement - CVE-2004-1466 + CVE-2004-1466 - + jaervosz - + chriswhite diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-06.xml index da894af3f7..1d84f3c72a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-06.xml @@ -1,6 +1,5 @@ - eGroupWare: Multiple XSS vulnerabilities @@ -8,8 +7,8 @@ vulnerabilities. eGroupWare - September 02, 2004 - May 22, 2006: 02 + 2004-09-02 + 2006-05-22: 02 61510 remote @@ -51,18 +50,18 @@ # emerge sync - # emerge -pv ">=www-apps/egroupware-1.0.00.004" - # emerge ">=www-apps/egroupware-1.0.00.004" + # emerge -pv ">=www-apps/egroupware-1.0.00.004" + # emerge ">=www-apps/egroupware-1.0.00.004" eGroupWare Announcement Bugtraq Announcement - CVE-2004-1467 + CVE-2004-1467 - + koon - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-07.xml index e2c9d3bbab..7a6825f926 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-07.xml @@ -1,6 +1,5 @@ - xv: Buffer overflows in image handling @@ -8,8 +7,8 @@ code. xv - September 03, 2004 - September 03, 2004: 01 + 2004-09-03 + 2004-09-03: 01 61619 remote @@ -49,17 +48,17 @@ # emerge sync - # emerge -pv ">=media-gfx/xv-3.10a-r7" - # emerge ">=media-gfx/xv-3.10a-r7" + # emerge -pv ">=media-gfx/xv-3.10a-r7" + # emerge ">=media-gfx/xv-3.10a-r7" BugTraq Advisory - CAN-2004-0802 + CAN-2004-0802 - + koon - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-08.xml index c9e55a88e5..2d25653d60 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-08.xml @@ -1,6 +1,5 @@ - Ruby: CGI::Session creates files insecurely @@ -9,8 +8,8 @@ be able to read sensitive data stored in session files. dev-lang/ruby - September 03, 2004 - September 03, 2004: 01 + 2004-09-03 + 2004-09-03: 01 60525 local @@ -57,16 +56,16 @@ # emerge sync - # emerge -pv ">=dev-lang/ruby-your_version" - # emerge ">=dev-lang/ruby-your_version" + # emerge -pv ">=dev-lang/ruby-your_version" + # emerge ">=dev-lang/ruby-your_version" - CAN-2004-0755 + CAN-2004-0755 - + jaervosz - + dmargoli diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-09.xml index f4064d3652..f6a42c1d9f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-09.xml @@ -1,6 +1,5 @@ - MIT krb5: Multiple vulnerabilities @@ -9,8 +8,8 @@ vulnerability. mit-krb5 - September 06, 2004 - September 06, 2004: 01 + 2004-09-06 + 2004-09-06: 01 62417 remote @@ -63,21 +62,21 @@ # emerge sync - # emerge -pv ">=app-crypt/mit-krb5-1.3.4" - # emerge ">=app-crypt/mit-krb5-1.3.4" + # emerge -pv ">=app-crypt/mit-krb5-1.3.4" + # emerge ">=app-crypt/mit-krb5-1.3.4" MIT krb5 Security Advisory 2004-002 MIT krb5 Security Advisory 2004-003 - CAN-2004-0642 - CAN-2004-0643 - CAN-2004-0644 - CAN-2004-0772 + CAN-2004-0642 + CAN-2004-0643 + CAN-2004-0644 + CAN-2004-0772 - + jaervosz - + vorlon078 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-10.xml index 7a7534b0f4..8aa164ede5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-10.xml @@ -1,6 +1,5 @@ - multi-gnome-terminal: Information leak @@ -9,8 +8,8 @@ the system to read sensitive data, including passwords. multi-gnome-terminal - September 06, 2004 - September 06, 2004: 01 + 2004-09-06 + 2004-09-06: 01 62322 local @@ -52,17 +51,17 @@ # emerge sync - # emerge -pv ">=x11-terms/multi-gnome-terminal-1.6.2-r1" - # emerge ">=x11-terms/multi-gnome-terminal-1.6.2-r1" + # emerge -pv ">=x11-terms/multi-gnome-terminal-1.6.2-r1" + # emerge ">=x11-terms/multi-gnome-terminal-1.6.2-r1" - + koon - + lewk - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-11.xml index 3df74b318a..49ed2dfd7a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-11.xml @@ -1,6 +1,5 @@ - star: Suid root vulnerability @@ -8,8 +7,8 @@ unauthorized root access to an attacker. star - September 07, 2004 - May 30, 2006: 03 + 2004-09-07 + 2006-05-30: 03 61797 local @@ -48,20 +47,20 @@ # emerge sync - # emerge -pv ">=app-arch/star-1.5_alpha46" - # emerge ">=app-arch/star-1.5_alpha46" + # emerge -pv ">=app-arch/star-1.5_alpha46" + # emerge ">=app-arch/star-1.5_alpha46" Star Mailing List Announcement - CVE-2004-0850 + CVE-2004-0850 - + jaervosz - + lewk - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-12.xml index db4c188982..79a8fdf8c9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-12.xml @@ -1,6 +1,5 @@ - ImageMagick, imlib, imlib2: BMP decoding buffer overflows @@ -8,8 +7,8 @@ vulnerabilities in the BMP image processing code. imagemagick imlib - September 08, 2004 - September 08, 2004: 01 + 2004-09-08 + 2004-09-08: 01 62309 62487 remote @@ -60,39 +59,39 @@ # emerge sync - # emerge -pv ">=media-gfx/imagemagick-6.0.7.1" - # emerge ">=media-gfx/imagemagick-6.0.7.1" + # emerge -pv ">=media-gfx/imagemagick-6.0.7.1" + # emerge ">=media-gfx/imagemagick-6.0.7.1"

All imlib users should upgrade to the latest version:

# emerge sync - # emerge -pv ">=media-libs/imlib-1.9.14-r2" - # emerge ">=media-libs/imlib-1.9.14-r2" + # emerge -pv ">=media-libs/imlib-1.9.14-r2" + # emerge ">=media-libs/imlib-1.9.14-r2"

All imlib2 users should upgrade to the latest version:

# emerge sync - # emerge -pv ">=media-libs/imlib2-1.1.2" - # emerge ">=media-libs/imlib2-1.1.2" + # emerge -pv ">=media-libs/imlib2-1.1.2" + # emerge ">=media-libs/imlib2-1.1.2" - CAN-2004-0817 - CAN-2004-0802 - ImageMagick Mailing List + CAN-2004-0817 + CAN-2004-0802 + ImageMagick Mailing List SecurityTracker #1011104 SecurityTracker #1011105 - + koon - + lewk - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-13.xml index a10f7a7b2c..fe9e59d8b4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-13.xml @@ -1,6 +1,5 @@ - LHa: Multiple vulnerabilities @@ -9,8 +8,8 @@ execute arbitrary code. lha - September 08, 2004 - October 20, 2006: 02 + 2004-09-08 + 2006-10-20: 02 62618 remote @@ -53,19 +52,19 @@ # emerge sync - # emerge -pv ">=app-arch/lha-114i-r4" - # emerge ">=app-arch/lha-114i-r4" + # emerge -pv ">=app-arch/lha-114i-r4" + # emerge ">=app-arch/lha-114i-r4" - CAN-2004-0694 - CAN-2004-0745 - CAN-2004-0769 - CAN-2004-0771 + CAN-2004-0694 + CAN-2004-0745 + CAN-2004-0769 + CAN-2004-0771 - + vorlon078 - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-14.xml index 32d6723259..06f270e66b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-14.xml @@ -1,6 +1,5 @@ - Samba: Remote printing non-vulnerability @@ -8,8 +7,8 @@ but it cannot be used to perform a remote denial of service attack. samba - September 09, 2004 - May 22, 2006: 03 + 2004-09-09 + 2006-05-22: 03 62476 remote @@ -50,17 +49,17 @@

- Samba Release Notes + Samba Release Notes Samba Bug #1520 - CVE-2004-0829 + CVE-2004-0829 - + jaervosz - + lewk - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-15.xml index 295908ba73..886333fa48 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-15.xml @@ -1,6 +1,5 @@ - Webmin, Usermin: Multiple vulnerabilities in Usermin @@ -10,8 +9,8 @@ execute a symlink attack at installation time. Usermin - September 12, 2004 - May 22, 2006: 02 + 2004-09-12 + 2006-05-22: 02 63167 remote @@ -68,30 +67,30 @@ # emerge sync - # emerge -pv ">=app-admin/usermin-1.090" - # emerge ">=app-admin/usermin-1.090" + # emerge -pv ">=app-admin/usermin-1.090" + # emerge ">=app-admin/usermin-1.090"

All Webmin users should upgrade to the latest version:

# emerge sync - # emerge -pv ">=app-admin/webmin-1.160" - # emerge ">=app-admin/webmin-1.160" + # emerge -pv ">=app-admin/webmin-1.160" + # emerge ">=app-admin/webmin-1.160" - Secunia Advisory SA12488 + Secunia Advisory SA12488 Usermin Changelog - CVE-2004-0559 - CVE-2004-1468 + CVE-2004-0559 + CVE-2004-1468 - + koon - + koon - + dmargoli
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-16.xml index 977e4266f3..420837d7c7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-16.xml @@ -1,14 +1,13 @@ - Samba: Denial of Service vulnerabilities Two Denial of Service vulnerabilities have been found and fixed in Samba. Samba - September 13, 2004 - September 13, 2004: 01 + 2004-09-13 + 2004-09-13: 01 remote @@ -54,17 +53,17 @@ # emerge sync - # emerge -pv ">=net-fs/samba-3.0.7" - # emerge ">=net-fs/samba-3.0.7" + # emerge -pv ">=net-fs/samba-3.0.7" + # emerge ">=net-fs/samba-3.0.7" - CAN-2004-0807 - CAN-2004-0808 + CAN-2004-0807 + CAN-2004-0808 - + koon - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-17.xml index 3157dc5d07..ba472be79a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-17.xml @@ -1,6 +1,5 @@ - SUS: Local root vulnerability @@ -8,8 +7,8 @@ escalation. SUS - September 14, 2004 - May 22, 2006: 02 + 2004-09-14 + 2006-05-22: 02 63927 local @@ -50,21 +49,21 @@ # emerge sync - # emerge -pv ">=app-admin/sus-2.0.2-r1" - # emerge ">=app-admin/sus-2.0.2-r1" + # emerge -pv ">=app-admin/sus-2.0.2-r1" + # emerge ">=app-admin/sus-2.0.2-r1" SUS ChangeLog BugTraq Advisory - CVE-2004-1469 + CVE-2004-1469 - + jaervosz - + lewk - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-18.xml index d3d4e7cb5f..99683ad32d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-18.xml @@ -1,6 +1,5 @@ - cdrtools: Local root vulnerability in cdrecord if set SUID root @@ -8,8 +7,8 @@ allowing users to escalate privileges. cdrtools - September 14, 2004 - September 14, 2004: 01 + 2004-09-14 + 2004-09-14: 01 63187 local @@ -56,19 +55,19 @@ # emerge sync - # emerge -pv ">=app-cdr/cdrtools-2.01_alpha37-r1" - # emerge ">=app-cdr/cdrtools-2.01_alpha37-r1" + # emerge -pv ">=app-cdr/cdrtools-2.01_alpha37-r1" + # emerge ">=app-cdr/cdrtools-2.01_alpha37-r1" - CAN-2004-0806 + CAN-2004-0806 - + jaervosz - + koon - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-19.xml index 2a87710565..53ae7d97bf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-19.xml @@ -1,6 +1,5 @@ - Heimdal: ftpd root escalation @@ -8,8 +7,8 @@ attacker to gain root privileges. heimdal - September 16, 2004 - September 16, 2004: 01 + 2004-09-16 + 2004-09-16: 01 61412 remote @@ -52,18 +51,18 @@ # emerge sync - # emerge -pv ">=app-crypt/heimdal-0.6.3" - # emerge ">=app-crypt/heimdal-0.6.3" + # emerge -pv ">=app-crypt/heimdal-0.6.3" + # emerge ">=app-crypt/heimdal-0.6.3" - Heimdal advisory + Heimdal advisory Advisory by Przemyslaw Frasunek - CAN-2004-0794 + CAN-2004-0794 - + vorlon078 - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-20.xml index 18971432a7..16684aeb50 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-20.xml @@ -1,6 +1,5 @@ - mpg123: Buffer overflow vulnerability @@ -8,8 +7,8 @@ lead to arbitrary code execution. mpg123 - September 16, 2004 - September 16, 2004: 01 + 2004-09-16 + 2004-09-16: 01 63079 remote @@ -47,20 +46,20 @@ # emerge sync - # emerge -pv ">=media-sound/mpg123-0.59s-r4" - # emerge ">=media-sound/mpg123-0.59s-r4" + # emerge -pv ">=media-sound/mpg123-0.59s-r4" + # emerge ">=media-sound/mpg123-0.59s-r4" BugTraq Announcement - CAN-2004-0805 + CAN-2004-0805 - + jaervosz - + jaervosz - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-21.xml index ddda1cd812..58fb0c8e33 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-21.xml @@ -1,6 +1,5 @@ - Apache 2, mod_dav: Multiple vulnerabilities @@ -9,8 +8,8 @@ local user to get escalated privileges. apache - September 16, 2004 - December 30, 2007: 02 + 2004-09-16 + 2007-12-30: 02 62626 63948 64145 @@ -69,31 +68,31 @@ # emerge sync - # emerge -pv ">=www-servers/apache-2.0.51" - # emerge ">=www-servers/apache-2.0.51" + # emerge -pv ">=www-servers/apache-2.0.51" + # emerge ">=www-servers/apache-2.0.51"

All mod_dav users should upgrade to the latest version:

# emerge sync - # emerge -pv ">=net-www/mod_dav-1.0.3-r2" - # emerge ">=net-www/mod_dav-1.0.3-r2" + # emerge -pv ">=net-www/mod_dav-1.0.3-r2" + # emerge ">=net-www/mod_dav-1.0.3-r2" - CAN-2004-0747 - CAN-2004-0748 - CAN-2004-0751 - CAN-2004-0786 - CAN-2004-0809 + CAN-2004-0747 + CAN-2004-0748 + CAN-2004-0751 + CAN-2004-0786 + CAN-2004-0809 - + jaervosz - + vorlon078 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-22.xml index fab7174bdf..5954d35e83 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-22.xml @@ -1,6 +1,5 @@ - phpGroupWare: XSS vulnerability in wiki module @@ -8,8 +7,8 @@ the wiki module. phpGroupWare - September 16, 2004 - May 22, 2006: 02 + 2004-09-16 + 2006-05-22: 02 63063 remote @@ -49,21 +48,21 @@ # emerge sync - # emerge -pv ">=www-apps/phpgroupware-0.9.16.003" - # emerge ">=www-apps/phpgroupware-0.9.16.003" + # emerge -pv ">=www-apps/phpgroupware-0.9.16.003" + # emerge ">=www-apps/phpgroupware-0.9.16.003" phpGroupWare ChangeLog - Secunia Advisory SA12466 - CVE-2004-0875 + Secunia Advisory SA12466 + CVE-2004-0875 - + koon - + lewk - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-23.xml index c1e3122afa..b9710d6e99 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-23.xml @@ -1,6 +1,5 @@ - SnipSnap: HTTP response splitting @@ -8,8 +7,8 @@ poisoning, cross-user defacement, and cross-site scripting. snipsnap - September 17, 2004 - May 22, 2006: 02 + 2004-09-17 + 2006-05-22: 02 64154 remote @@ -52,17 +51,17 @@ # emerge sync - # emerge -pv ">=dev-java/snipsnap-bin-1.0_beta1" - # emerge ">=dev-java/snipsnap-bin-1.0beta1" + # emerge -pv ">=dev-java/snipsnap-bin-1.0_beta1" + # emerge ">=dev-java/snipsnap-bin-1.0beta1" SnipSnap Release Notes - CVE-2004-1470 + CVE-2004-1470 - + lewk - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-24.xml index 496d7e1fac..c45834b2be 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-24.xml @@ -1,6 +1,5 @@ - Foomatic: Arbitrary command execution in foomatic-rip filter @@ -8,8 +7,8 @@ may allow arbitrary command execution on the print server. foomatic - September 20, 2004 - September 20, 2004: 01 + 2004-09-20 + 2004-09-20: 01 64166 remote @@ -40,7 +39,7 @@

This vulnerability may allow both local and remote attackers to execute arbitrary commands on the print server with the permissions of the spooler - (oftentimes the "lp" user). + (oftentimes the "lp" user).

@@ -55,8 +54,8 @@ # emerge sync - # emerge -pv ">=net-print/foomatic-3.0.2" - # emerge ">=net-print/foomatic-3.0.2" + # emerge -pv ">=net-print/foomatic-3.0.2" + # emerge ">=net-print/foomatic-3.0.2"

PLEASE NOTE: You should update foomatic, instead of foomatic-filters. This will help to ensure that all other foomatic components remain functional. @@ -65,12 +64,12 @@ Foomatic Announcement Mandrakesoft Security Advisory - CAN 2004-0801 + CAN 2004-0801 - + condordes - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-25.xml index aed97b95f6..6c97b08df1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-25.xml @@ -1,6 +1,5 @@ - CUPS: Denial of service vulnerability @@ -8,8 +7,8 @@ service when sending a carefully-crafted UDP packet to the IPP port. CUPS - September 20, 2004 - September 21, 2004: 02 + 2004-09-20 + 2004-09-21: 02 64168 remote @@ -49,20 +48,20 @@ # emerge sync - # emerge -pv ">=net-print/cups-1.1.20-r2" - # emerge ">=net-print/cups-1.1.20-r2" + # emerge -pv ">=net-print/cups-1.1.20-r2" + # emerge ">=net-print/cups-1.1.20-r2" - CUPS Software Trouble Report - CAN-2004-0558 + CUPS Software Trouble Report + CAN-2004-0558 - + lewk - + lewk - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-26.xml index 4e5c84e464..c8c29e8683 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-26.xml @@ -1,6 +1,5 @@ - Mozilla, Firefox, Thunderbird, Epiphany: New releases fix vulnerabilities @@ -9,8 +8,8 @@ code. Mozilla - September 20, 2004 - December 30, 2007: 03 + 2004-09-20 + 2007-12-30: 03 63996 remote @@ -99,21 +98,21 @@ # emerge your-version - Mozilla Security Advisory - US-CERT Security Alert TA04-261A - CVE-2004-0902 - CVE-2004-0903 - CVE-2004-0904 - CVE-2004-0905 - CVE-2004-0906 - CVE-2004-0907 - CVE-2004-0908 - CVE-2004-0909 + Mozilla Security Advisory + US-CERT Security Alert TA04-261A + CVE-2004-0902 + CVE-2004-0903 + CVE-2004-0904 + CVE-2004-0905 + CVE-2004-0906 + CVE-2004-0907 + CVE-2004-0908 + CVE-2004-0909 - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-27.xml index cb50058f8c..ca50fe5dc1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-27.xml @@ -1,6 +1,5 @@ - glFTPd: Local buffer overflow vulnerability @@ -8,8 +7,8 @@ code execution. glftpd - September 21, 2004 - September 21, 2004: 01 + 2004-09-21 + 2004-09-21: 01 64809 local @@ -51,17 +50,17 @@ # emerge sync - # emerge -pv ">=net-ftp/glftpd-1.32-r1" - # emerge ">=net-ftp/glftpd-1.32-r1" + # emerge -pv ">=net-ftp/glftpd-1.32-r1" + # emerge ">=net-ftp/glftpd-1.32-r1" BugTraq Advisory glFTPd Announcement - + lewk - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-28.xml index 6ff33fe880..d9bb49684f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-28.xml @@ -1,6 +1,5 @@ - GTK+ 2, gdk-pixbuf: Multiple image decoding vulnerabilities @@ -9,8 +8,8 @@ arbitrary code. gtk+ - September 21, 2004 - September 21, 2004: 01 + 2004-09-21 + 2004-09-21: 01 64230 remote @@ -62,31 +61,31 @@ # emerge sync - # emerge -pv ">=x11-libs/gtk+-2.4.9-r1" - # emerge ">=x11-libs/gtk+-2.4.9-r1" + # emerge -pv ">=x11-libs/gtk+-2.4.9-r1" + # emerge ">=x11-libs/gtk+-2.4.9-r1"

All GdkPixbuf users should upgrade to the latest version:

# emerge sync - # emerge -pv ">=media-libs/gdk-pixbuf-0.22.0-r3" - # emerge ">=media-libs/gdk-pixbuf-0.22.0-r3" + # emerge -pv ">=media-libs/gdk-pixbuf-0.22.0-r3" + # emerge ">=media-libs/gdk-pixbuf-0.22.0-r3" - CAN-2004-0753 - CAN-2004-0782 - CAN-2004-0783 - CAN-2004-0788 - GNOME Bug 150601 + CAN-2004-0753 + CAN-2004-0782 + CAN-2004-0783 + CAN-2004-0788 + GNOME Bug 150601 - + jaervosz - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-29.xml index cc41ce0903..51161d8b05 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-29.xml @@ -1,6 +1,5 @@ - FreeRADIUS: Multiple Denial of Service vulnerabilities @@ -8,8 +7,8 @@ FreeRADIUS. FreeRADIUS - September 22, 2004 - May 22, 2006: 02 + 2004-09-22 + 2006-05-22: 02 60587 remote @@ -49,22 +48,22 @@ # emerge sync - # emerge -pv ">=net-dialup/freeradius-1.0.1" - # emerge ">=net-dialup/freeradius-1.0.1" + # emerge -pv ">=net-dialup/freeradius-1.0.1" + # emerge ">=net-dialup/freeradius-1.0.1" - FreeRADIUS Vulnerability Notifications - CVE-2004-0938 - CVE-2004-0960 - CVE-2004-0961 + FreeRADIUS Vulnerability Notifications + CVE-2004-0938 + CVE-2004-0960 + CVE-2004-0961 - + jaervosz - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-30.xml index 2353d7ac12..f05c9eb6b9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-30.xml @@ -1,6 +1,5 @@ - xine-lib: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code. xine-lib - September 22, 2004 - May 22, 2006: 02 + 2004-09-22 + 2006-05-22: 02 64348 remote @@ -57,23 +56,23 @@ # emerge sync - # emerge -pv ">=media-libs/xine-lib-1_rc6" - # emerge ">=media-libs/xine-lib-1_rc6" + # emerge -pv ">=media-libs/xine-lib-1_rc6" + # emerge ">=media-libs/xine-lib-1_rc6" BugTraq Announcement (XSA-2004-4) BugTraq Announcement (XSA-2004-5) - CVE-2004-1379 - CVE-2004-1475 - CVE-2004-1476 + CVE-2004-1379 + CVE-2004-1475 + CVE-2004-1476 - + jaervosz - + jaervosz - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-31.xml index b1e2d66fff..09aa2b7bd6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-31.xml @@ -1,6 +1,5 @@ - jabberd 1.x: Denial of Service vulnerability @@ -8,8 +7,8 @@ attack. jabberd - September 23, 2004 - May 22, 2006: 02 + 2004-09-23 + 2006-05-22: 02 64741 remote @@ -50,21 +49,21 @@ # emerge sync - # emerge -pv ">=net-im/jabberd-1.4.3-r4" - # emerge ">=net-im/jabberd-1.4.3-r4" + # emerge -pv ">=net-im/jabberd-1.4.3-r4" + # emerge ">=net-im/jabberd-1.4.3-r4" - Vulnerability disclosure - Jabber announcement - CVE-2004-1378 + Vulnerability disclosure + Jabber announcement + CVE-2004-1378 - + koon - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-32.xml index bd80339bef..f6084efd90 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-32.xml @@ -1,6 +1,5 @@ - getmail: Filesystem overwrite vulnerability @@ -9,8 +8,8 @@ can be escalated further and possibly lead to a complete system compromise. getmail - September 23, 2004 - May 22, 2006: 02 + 2004-09-23 + 2006-05-22: 02 64643 local @@ -54,19 +53,19 @@ # emerge sync - # emerge -pv ">=net-mail/getmail-4.2.0" - # emerge ">=net-mail/getmail-4.2.0" + # emerge -pv ">=net-mail/getmail-4.2.0" + # emerge ">=net-mail/getmail-4.2.0" getmail ChangeLog - getmail Mailing List - CVE-2004-0880 - CVE-2004-0881 + getmail Mailing List + CVE-2004-0880 + CVE-2004-0881 - + lewk - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-33.xml index 498b7aec66..aa79eea5ae 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-33.xml @@ -1,6 +1,5 @@ - Apache: Exposure of protected directories @@ -8,8 +7,8 @@ exposure of protected directories to unauthorized users. net=www/apache - September 24, 2004 - December 30, 2007: 02 + 2004-09-24 + 2007-12-30: 02 64804 remote @@ -50,17 +49,17 @@ # emerge sync - # emerge -pv ">=www-servers/apache-2.0.51-r1" - # emerge ">=www-servers/apache-2.0.51-r1" + # emerge -pv ">=www-servers/apache-2.0.51-r1" + # emerge ">=www-servers/apache-2.0.51-r1" - Apache Bug #31315 - CAN-2004-0811 + Apache Bug #31315 + CAN-2004-0811 - + dmargoli - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-34.xml index cbfeaf5690..022ee134ea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-34.xml @@ -1,6 +1,5 @@ - X.org, XFree86: Integer and stack overflows in libXpm @@ -10,8 +9,8 @@ potentially allowing the execution of arbitrary code. X - September 27, 2004 - May 27, 2006: 02 + 2004-09-27 + 2006-05-27: 02 64152 remote @@ -62,16 +61,16 @@ # emerge sync - # emerge -pv ">=x11-base/xorg-x11-6.7.0-r2" - # emerge ">=x11-base/xorg-x11-6.7.0-r2" + # emerge -pv ">=x11-base/xorg-x11-6.7.0-r2" + # emerge ">=x11-base/xorg-x11-6.7.0-r2"

All XFree86 users should upgrade to the latest version:

# emerge sync - # emerge -pv ">=x11-base/xfree-4.3.0-r7" - # emerge ">=x11-base/xfree-4.3.0-r7" + # emerge -pv ">=x11-base/xfree-4.3.0-r7" + # emerge ">=x11-base/xfree-4.3.0-r7"

Note: Usage of XFree86 is deprecated on the AMD64, HPPA, IA64, MIPS, PPC and SPARC architectures: XFree86 users on those architectures @@ -79,18 +78,18 @@

- X.org Security Advisory - X11R6.8.1 Release Notes - CAN-2004-0687 - CAN-2004-0688 + X.org Security Advisory + X11R6.8.1 Release Notes + CAN-2004-0687 + CAN-2004-0688 - + koon - + lewk - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-35.xml index 006ce47306..90f8d1e36b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-35.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200409-35.xml @@ -1,6 +1,5 @@ - Subversion: Metadata information leak @@ -8,8 +7,8 @@ protected areas to be leaked to unauthorized users. Subversion - September 29, 2004 - September 29, 2004: 01 + 2004-09-29 + 2004-09-29: 01 65085 remote @@ -52,20 +51,20 @@ # emerge sync - # emerge -pv ">=dev-util/subversion-1.0.8" - # emerge ">=dev-util/subversion-1.0.8" + # emerge -pv ">=dev-util/subversion-1.0.8" + # emerge ">=dev-util/subversion-1.0.8" - CAN-2004-0749 + CAN-2004-0749 Subversion Advisory - + jaervosz - + dmargoli - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-01.xml index bc8eb4793c..9036c18303 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-01.xml @@ -1,6 +1,5 @@ - sharutils: Buffer overflows in shar.c and unshar.c @@ -8,8 +7,8 @@ arbitrary code execution. sharutils - October 01, 2004 - May 22, 2006: 02 + 2004-10-01 + 2006-05-22: 02 65773 remote @@ -49,20 +48,20 @@ # emerge sync - # emerge -pv ">=app-arch/sharutils-4.2.1-r10" - # emerge ">=app-arch/sharutils-4.2.1-r10" + # emerge -pv ">=app-arch/sharutils-4.2.1-r10" + # emerge ">=app-arch/sharutils-4.2.1-r10" - Debian Bug #265904 - CVE-2004-1773 + Debian Bug #265904 + CVE-2004-1773 - + jaervosz - + jaervosz - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-02.xml index 8b28b749c9..f88fc0a045 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-02.xml @@ -1,6 +1,5 @@ - Netpbm: Multiple temporary file issues @@ -9,8 +8,8 @@ files with the rights of the user running the utility. Netpbm - October 04, 2004 - October 04, 2004: 01 + 2004-10-04 + 2004-10-04: 01 65647 local @@ -53,20 +52,20 @@ # emerge sync - # emerge -pv ">=media-libs/netpbm-10.0" - # emerge ">=media-libs/netpbm-10.0" + # emerge -pv ">=media-libs/netpbm-10.0" + # emerge ">=media-libs/netpbm-10.0" - CVE-2003-0924 - US-CERT VU#487102 + CVE-2003-0924 + US-CERT VU#487102 - + lewk - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-03.xml index 47d4451433..f0d45ced2b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-03.xml @@ -1,6 +1,5 @@ - NetKit-telnetd: buffer overflows in telnet and telnetd @@ -9,8 +8,8 @@ privileges and compromise the system. netkit-telnetd - October 05, 2004 - October 05, 2004: 01 + 2004-10-05 + 2004-10-05: 01 64632 remote @@ -55,20 +54,20 @@ # emerge sync - # emerge -pv ">=net-misc/netkit-telnetd-0.17-r4" - # emerge ">=net-misc/netkit-telnetd-0.17-r4" + # emerge -pv ">=net-misc/netkit-telnetd-0.17-r4" + # emerge ">=net-misc/netkit-telnetd-0.17-r4" - CVE-2001-0554 - Debian Bug #264846 + CVE-2001-0554 + Debian Bug #264846 - + koon - + vorlon078 - + vorlon078 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-04.xml index 05ee584bce..33074e838a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-04.xml @@ -1,6 +1,5 @@ - PHP: Memory disclosure and arbitrary location file upload @@ -8,8 +7,8 @@ remote attackers to upload files to arbitrary locations. PHP - October 06, 2004 - October 06, 2004: 01 + 2004-10-06 + 2004-10-06: 01 64223 remote @@ -65,27 +64,27 @@ # emerge sync - # emerge -pv ">=dev-php/php-4.3.9" - # emerge ">=dev-php/php-4.3.9" + # emerge -pv ">=dev-php/php-4.3.9" + # emerge ">=dev-php/php-4.3.9" - # emerge -pv ">=dev-php/mod_php-4.3.9" - # emerge ">=dev-php/mod_php-4.3.9" + # emerge -pv ">=dev-php/mod_php-4.3.9" + # emerge ">=dev-php/mod_php-4.3.9" - # emerge -pv ">=dev-php/php-cgi-4.3.9" - # emerge ">=dev-php/php-cgi-4.3.9" + # emerge -pv ">=dev-php/php-cgi-4.3.9" + # emerge ">=dev-php/php-cgi-4.3.9" - Secunia Advisory + Secunia Advisory BugTraq post regarding the php_variables.c issue BugTraq post regarding the rfc1867.c issue - + dmargoli - + koon - + dmargoli diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-05.xml index af0116967e..d2649f1788 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-05.xml @@ -1,6 +1,5 @@ - Cyrus-SASL: Buffer overflow and SASL_PATH vulnerabilities @@ -8,8 +7,8 @@ completely compromise the vulnerable system. Cyrus-SASL - October 07, 2004 - May 22, 2006: 02 + 2004-10-07 + 2006-05-22: 02 56016 remote @@ -50,17 +49,17 @@ # emerge sync - # emerge -pv ">=dev-libs/cyrus-sasl-2.1.18-r2" - # emerge ">=dev-libs/cyrus-sasl-2.1.18-r2" + # emerge -pv ">=dev-libs/cyrus-sasl-2.1.18-r2" + # emerge ">=dev-libs/cyrus-sasl-2.1.18-r2" - CAN-2004-0884 - CVE-2005-0373 + CAN-2004-0884 + CVE-2005-0373 jaervosz - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-06.xml index 4e00f7530b..855e26ac63 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-06.xml @@ -1,6 +1,5 @@ - CUPS: Leakage of sensitive information @@ -8,8 +7,8 @@ printing to SMB-shared printers which require authentication. cups - October 09, 2004 - October 09, 2004: 01 + 2004-10-09 + 2004-10-09: 01 66501 local @@ -48,16 +47,16 @@ # emerge sync - # emerge -pv ">=net-print/cups-1.1.20-r3" - # emerge ">=net-print/cups-1.1.20-r3" + # emerge -pv ">=net-print/cups-1.1.20-r3" + # emerge ">=net-print/cups-1.1.20-r3" - CAN-2004-0923 + CAN-2004-0923 - + vorlon078 - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-07.xml index 7d7bc6922c..1f513a9b46 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-07.xml @@ -1,6 +1,5 @@ - ed: Insecure temporary file handling @@ -9,8 +8,8 @@ of the user running ed, which could be the root user. ed - October 09, 2004 - October 09, 2004: 01 + 2004-10-09 + 2004-10-09: 01 66400 local @@ -52,19 +51,19 @@ # emerge sync - # emerge -pv ">=sys-apps/ed-0.2-r4" - # emerge ">=sys-apps/ed-0.2-r4" + # emerge -pv ">=sys-apps/ed-0.2-r4" + # emerge ">=sys-apps/ed-0.2-r4" - CVE-2000-1137 + CVE-2000-1137 - + koon - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-08.xml index d2b5ae40ca..12dac3bb3c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-08.xml @@ -1,6 +1,5 @@ - ncompress: Buffer overflow @@ -9,8 +8,8 @@ the rights of the daemon process. ncompress - October 09, 2004 - May 22, 2006: 02 + 2004-10-09 + 2006-05-22: 02 66251 remote @@ -55,20 +54,20 @@ # emerge sync - # emerge -pv ">=app-arch/ncompress-4.2.4-r1" - # emerge ">=app-arch/ncompress-4.2.4-r1" + # emerge -pv ">=app-arch/ncompress-4.2.4-r1" + # emerge ">=app-arch/ncompress-4.2.4-r1" - US-CERT Vulnerability Note VU#176363 - CVE-2001-1413 + US-CERT Vulnerability Note VU#176363 + CVE-2001-1413 - + koon - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-09.xml index 8c2e86b170..c5ac9bd2c5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-09.xml @@ -1,6 +1,5 @@ - LessTif: Integer and stack overflows in libXpm @@ -8,8 +7,8 @@ in LessTif, that can potentially lead to remote code execution. lesstif - October 09, 2004 - October 09, 2004: 01 + 2004-10-09 + 2004-10-09: 01 66647 remote @@ -50,19 +49,19 @@ # emerge sync - # emerge -pv ">=x11-libs/lesstif-0.93.97" - # emerge ">=x11-libs/lesstif-0.93.97" + # emerge -pv ">=x11-libs/lesstif-0.93.97" + # emerge ">=x11-libs/lesstif-0.93.97" - CAN-2004-0687 - CAN-2004-0688 - GLSA-200409-34 + CAN-2004-0687 + CAN-2004-0688 + GLSA-200409-34 LessTif Release Notes - + lewk - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-10.xml index 4cbc06dbf8..35535da80f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-10.xml @@ -1,6 +1,5 @@ - gettext: Insecure temporary file handling @@ -9,8 +8,8 @@ rights of the user running gettext, which could be the root user. gettext - October 10, 2004 - May 22, 2006: 04 + 2004-10-10 + 2006-05-22: 04 66355 85766 local @@ -53,19 +52,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-devel/gettext-0.14.1-r1" + # emerge --ask --oneshot --verbose ">=sys-devel/gettext-0.14.1-r1" BugTraq Advisory - CVE-2004-0966 + CVE-2004-0966 - + koon - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-11.xml index 88925e1338..2f2120174b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-11.xml @@ -1,6 +1,5 @@ - tiff: Buffer overflows in image decoding @@ -9,8 +8,8 @@ rights of the user viewing a malicious image. tiff - October 13, 2004 - October 13, 2004: 01 + 2004-10-13 + 2004-10-13: 01 remote @@ -57,8 +56,8 @@ # emerge sync - # emerge -pv ">=media-libs/tiff-3.6.1-r2" - # emerge ">=media-libs/tiff-3.6.1-r2" + # emerge -pv ">=media-libs/tiff-3.6.1-r2" + # emerge ">=media-libs/tiff-3.6.1-r2"

xv makes use of the tiff library and needs to be recompiled to receive the new patched version of the library. All xv users should also upgrade to the @@ -67,16 +66,16 @@ # emerge sync - # emerge -pv ">=media-gfx/xv-3.10a-r8" - # emerge ">=media-gfx/xv-3.10a-r8" + # emerge -pv ">=media-gfx/xv-3.10a-r8" + # emerge ">=media-gfx/xv-3.10a-r8" - CAN-2004-0803 + CAN-2004-0803 - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-12.xml index b72044ef11..c25cbd1897 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-12.xml @@ -1,6 +1,5 @@ - WordPress: HTTP response splitting and XSS vulnerabilities @@ -8,8 +7,8 @@ vulnerabilities. wordpress - October 14, 2004 - May 22, 2006: 04 + 2004-10-14 + 2006-05-22: 04 65798 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/wordpress-1.2.2" + # emerge --ask --oneshot --verbose ">=www-apps/wordpress-1.2.2" - WordPress 1.2.2 Release Notes - CVE-2004-1584 + WordPress 1.2.2 Release Notes + CVE-2004-1584 - + koon - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-13.xml index b5bbb24ff4..d1e21c0c94 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-13.xml @@ -1,6 +1,5 @@ - BNC: Input validation flaw @@ -8,8 +7,8 @@ to issue arbitrary IRC related commands. bnc - October 15, 2004 - May 22, 2006: 02 + 2004-10-15 + 2006-05-22: 02 66912 remote @@ -48,20 +47,20 @@ # emerge sync - # emerge -pv ">=net-irc/bnc-2.8.9" - # emerge ">=net-irc/bnc-2.8.9" + # emerge -pv ">=net-irc/bnc-2.8.9" + # emerge ">=net-irc/bnc-2.8.9" BNC Changes - CVE-2004-1482 + CVE-2004-1482 - + koon - + koon - + vorlon078 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-14.xml index e7c9dbb27e..42ac75ae7a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-14.xml @@ -1,6 +1,5 @@ - phpMyAdmin: Vulnerability in MIME-based transformation system @@ -9,8 +8,8 @@ "safe mode" is disabled. phpMyAdmin - October 18, 2004 - May 22, 2006: 02 + 2004-10-18 + 2006-05-22: 02 67409 remote @@ -53,21 +52,21 @@ # emerge sync - # emerge -pv ">=dev-db/phpmyadmin-2.6.0_p2" - # emerge ">=dev-db/phpmyadmin-2.6.0_p2" + # emerge -pv ">=dev-db/phpmyadmin-2.6.0_p2" + # emerge ">=dev-db/phpmyadmin-2.6.0_p2" - phpMyAdmin 2.6.0_pl2 Release Announcement - Secunia Advisory SA12813 - CVE-2004-2630 + phpMyAdmin 2.6.0_pl2 Release Announcement + Secunia Advisory SA12813 + CVE-2004-2630 - + vorlon078 - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-15.xml index a84b6a9bbc..b4284006ae 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-15.xml @@ -1,6 +1,5 @@ - Squid: Remote DoS vulnerability @@ -8,8 +7,8 @@ denial of service. squid - October 18, 2004 - December 30, 2007: 03 + 2004-10-18 + 2007-12-30: 03 67167 remote @@ -61,20 +60,20 @@ # emerge sync - # emerge -pv ">=net-proxy/squid-2.5.7" - # emerge ">=net-proxy/squid-2.5.7" + # emerge -pv ">=net-proxy/squid-2.5.7" + # emerge ">=net-proxy/squid-2.5.7" iDEFENSE Advisory - CVE-2004-0918 + CVE-2004-0918 - + koon - + koon - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-16.xml index b815fb6b03..0e70f2d750 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-16.xml @@ -1,6 +1,5 @@ - PostgreSQL: Insecure temporary file use in make_oidjoins_check @@ -9,8 +8,8 @@ overwrite arbitrary files with the rights of the user running the utility. PostgreSQL - October 18, 2004 - May 28, 2009: 04 + 2004-10-18 + 2009-05-28: 04 66371 local @@ -58,21 +57,21 @@ # emerge sync - # emerge -pv ">=dev-db/postgresql-7.4.5-r2" - # emerge ">=dev-db/postgresql-7.4.5-r2" + # emerge -pv ">=dev-db/postgresql-7.4.5-r2" + # emerge ">=dev-db/postgresql-7.4.5-r2"

Upgrade notes: PostgreSQL 7.3.x users should upgrade to the latest available 7.3.x version to retain database compatibility.

- Trustix Advisory #2004-0050 - CVE-2004-0977 + Trustix Advisory #2004-0050 + CVE-2004-0977 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-17.xml index 9520c5a5c6..f5ac3e2d83 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-17.xml @@ -1,6 +1,5 @@ - OpenOffice.org: Temporary files disclosure @@ -9,8 +8,8 @@ documents. openoffice - October 20, 2004 - October 20, 2004: 01 + 2004-10-20 + 2004-10-20: 01 63556 local @@ -63,8 +62,8 @@ # emerge sync - # emerge -pv ">=app-office/openoffice-1.1.3" - # emerge ">=app-office/openoffice-1.1.3" + # emerge -pv ">=app-office/openoffice-1.1.3" + # emerge ">=app-office/openoffice-1.1.3"

All affected OpenOffice.org binary users should upgrade to the latest version: @@ -72,8 +71,8 @@ # emerge sync - # emerge -pv ">=app-office/openoffice-bin-1.1.3" - # emerge ">=app-office/openoffice-bin-1.1.3" + # emerge -pv ">=app-office/openoffice-bin-1.1.3" + # emerge ">=app-office/openoffice-bin-1.1.3"

All affected OpenOffice.org Ximian users should upgrade to the latest version: @@ -81,20 +80,20 @@ # emerge sync - # emerge -pv ">=app-office/openoffice-ximian-1.3.4" - # emerge ">=app-office/openoffice-1.3.4" + # emerge -pv ">=app-office/openoffice-ximian-1.3.4" + # emerge ">=app-office/openoffice-1.3.4" - CAN-2004-0752 - OpenOffice.org Issue 33357 + CAN-2004-0752 + OpenOffice.org Issue 33357 - + koon - + vorlon078 - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-18.xml index 396bc29cf2..aa02a924c1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-18.xml @@ -1,6 +1,5 @@ - Ghostscript: Insecure temporary file use in multiple scripts @@ -9,8 +8,8 @@ with the rights of the user running the script. Ghostscript - October 20, 2004 - December 30, 2007: 02 + 2004-10-20 + 2007-12-30: 02 66357 local @@ -55,8 +54,8 @@ # emerge sync - # emerge -pv ">=app-text/ghostscript-esp-7.07.1-r7" - # emerge ">=app-text/ghostscript-esp-7.07.1-r7" + # emerge -pv ">=app-text/ghostscript-esp-7.07.1-r7" + # emerge ">=app-text/ghostscript-esp-7.07.1-r7"

Ghostscript users on the PPC architecture should upgrade to the latest stable version on their architecture: @@ -64,16 +63,16 @@ # emerge sync - # emerge -pv ">=app-text/ghostscript-esp-7.05.6-r2" - # emerge ">=app-text/ghostscript-esp-7.05.6-r2" + # emerge -pv ">=app-text/ghostscript-esp-7.05.6-r2" + # emerge ">=app-text/ghostscript-esp-7.05.6-r2" - CAN-2004-0967 + CAN-2004-0967 - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-19.xml index d59b7642aa..4da854efb9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-19.xml @@ -1,6 +1,5 @@ - glibc: Insecure tempfile handling in catchsegv script @@ -9,8 +8,8 @@ rights of the user running the script. glibc - October 21, 2004 - October 21, 2004: 01 + 2004-10-21 + 2004-10-21: 01 66358 local @@ -59,15 +58,15 @@ # emerge sys-libs/glibc - CAN-2004-0968 + CAN-2004-0968 - + koon - + koon - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-20.xml index 1afa3db5b9..6d74eea6c6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-20.xml @@ -1,6 +1,5 @@ - Xpdf, CUPS: Multiple integer overflows @@ -9,8 +8,8 @@ includes Xpdf code and therefore is vulnerable to the same issues. Xpdf - October 21, 2004 - November 06, 2004: 02 + 2004-10-21 + 2004-11-06: 02 69662 remote @@ -56,22 +55,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.00-r5" + # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.00-r5"

All CUPS users should also upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/cups-1.1.20-r5" + # emerge --ask --oneshot --verbose ">=net-print/cups-1.1.20-r5" - CAN-2004-0888 - CAN-2004-0889 + CAN-2004-0888 + CAN-2004-0889 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-21.xml index 6fb13f181a..216ced9ce0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-21.xml @@ -1,6 +1,5 @@ - Apache 2, mod_ssl: Bypass of SSLCipherSuite directive @@ -8,8 +7,8 @@ the "SSLCipherSuite" directive of mod_ssl. apache - October 21, 2004 - December 30, 2007: 02 + 2004-10-21 + 2007-12-30: 02 66807 remote @@ -56,28 +55,28 @@ # emerge sync - # emerge -pv ">=www-servers/apache-2.0.52" - # emerge ">=www-servers/apache-2.0.52" + # emerge -pv ">=www-servers/apache-2.0.52" + # emerge ">=www-servers/apache-2.0.52"

All mod_ssl users should upgrade to the latest version:

# emerge sync - # emerge -pv ">=net-www/mod_ssl-2.8.20" - # emerge ">=net-www/mod_ssl-2.8.20" + # emerge -pv ">=net-www/mod_ssl-2.8.20" + # emerge ">=net-www/mod_ssl-2.8.20" - CAN-2004-0885 - Apache HTTPD Bug 31505 + CAN-2004-0885 + Apache HTTPD Bug 31505 - + koon - + vorlon078 - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-22.xml index b71b0f38cb..bb5f90055e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-22.xml @@ -1,6 +1,5 @@ - MySQL: Multiple vulnerabilities @@ -8,8 +7,8 @@ potentially remote arbitrary code execution have been discovered in MySQL. MySQL - October 24, 2004 - October 24, 2004: 01 + 2004-10-24 + 2004-10-24: 01 67062 remote @@ -67,23 +66,23 @@ # emerge sync - # emerge -pv ">=dev-db/mysql-4.0.21" - # emerge ">=dev-db/mysql-4.0.21" + # emerge -pv ">=dev-db/mysql-4.0.21" + # emerge ">=dev-db/mysql-4.0.21" - CAN-2004-0835 - CAN-2004-0836 - CAN-2004-0837 - Privilege granting bug - MATCH ... AGAINST crash bug + CAN-2004-0835 + CAN-2004-0836 + CAN-2004-0837 + Privilege granting bug + MATCH ... AGAINST crash bug - + koon - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-23.xml index 852f1fcdc5..86e1abb1d8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-23.xml @@ -1,6 +1,5 @@ - Gaim: Multiple vulnerabilities @@ -8,8 +7,8 @@ attacker to crash the application, or possibly execute arbitrary code. gaim - October 24, 2004 - October 24, 2004: 01 + 2004-10-24 + 2004-10-24: 01 68271 remote @@ -53,20 +52,20 @@ # emerge sync - # emerge -pv ">=net-im/gaim-1.0.2" - # emerge ">=net-im/gaim-1.0.2" + # emerge -pv ">=net-im/gaim-1.0.2" + # emerge ">=net-im/gaim-1.0.2" - CAN-2004-0891 - Gaim Security Issues + CAN-2004-0891 + Gaim Security Issues - + lewk - + koon - + vorlon078 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-24.xml index acda5ccbfb..704c6031db 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-24.xml @@ -1,6 +1,5 @@ - MIT krb5: Insecure temporary file use in send-pr.sh @@ -9,8 +8,8 @@ files with the rights of the user running the utility. mit-krb5 - October 25, 2004 - January 30, 2005: 02 + 2004-10-25 + 2005-01-30: 02 66359 local @@ -54,16 +53,16 @@ # emerge sync - # emerge -pv ">=app-crypt/mit-krb5-1.3.4-r1" - # emerge ">=app-crypt/mit-krb5-1.3.4-r1" + # emerge -pv ">=app-crypt/mit-krb5-1.3.4-r1" + # emerge ">=app-crypt/mit-krb5-1.3.4-r1" - CAN-2004-0971 + CAN-2004-0971 - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-25.xml index 883f0f9bb9..6900e4ca6f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-25.xml @@ -1,6 +1,5 @@ - Netatalk: Insecure tempfile handling in etc2ps.sh @@ -9,8 +8,8 @@ files with the rights of the user running the utility. Netatalk - October 25, 2004 - October 25, 2004: 01 + 2004-10-25 + 2004-10-25: 01 66370 local @@ -52,16 +51,16 @@ # emerge sync - # emerge -pv ">=net-fs/netatalk-1.6.4-r1" - # emerge ">=net-fs/netatalk-1.6.4-r1" + # emerge -pv ">=net-fs/netatalk-1.6.4-r1" + # emerge ">=net-fs/netatalk-1.6.4-r1" - CAN-2004-0974 + CAN-2004-0974 - + lewk - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-26.xml index 4d7ebf369f..23260bba87 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-26.xml @@ -1,6 +1,5 @@ - socat: Format string vulnerability @@ -9,8 +8,8 @@ socat process. socat - October 25, 2004 - May 22, 2006: 02 + 2004-10-25 + 2006-05-22: 02 68547 remote @@ -53,19 +52,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/socat-1.4.0.3" + # emerge --ask --oneshot --verbose ">=net-misc/socat-1.4.0.3" socat Security Advisory - CVE-2004-1484 + CVE-2004-1484 - + vorlon078 - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-27.xml index fcbf0e8050..167b81b691 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-27.xml @@ -1,6 +1,5 @@ - mpg123: Buffer overflow vulnerabilities @@ -8,8 +7,8 @@ to execution of arbitrary code. mpg123 - October 27, 2004 - May 22, 2006: 02 + 2004-10-27 + 2006-05-22: 02 68343 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/mpg123-0.59s-r5" + # emerge --ask --oneshot --verbose ">=media-sound/mpg123-0.59s-r5" Security Advisory by Carlos Barros - CVE-2004-0982 + CVE-2004-0982 - + koon - + vorlon078 - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-28.xml index ebe7955f4a..aa67382321 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-28.xml @@ -1,6 +1,5 @@ - rssh: Format string vulnerability @@ -9,8 +8,8 @@ rssh restrictions. rssh - October 27, 2004 - May 22, 2006: 02 + 2004-10-27 + 2006-05-22: 02 66988 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-shells/rssh-2.2.2" + # emerge --ask --oneshot --verbose ">=app-shells/rssh-2.2.2" rssh security announcement - CVE-2004-1628 + CVE-2004-1628 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-29.xml index 101be6b309..dbafcbe110 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-29.xml @@ -1,6 +1,5 @@ - PuTTY: Pre-authentication buffer overflow @@ -8,8 +7,8 @@ code on the connecting client. putty - October 27, 2004 - May 22, 2006: 02 + 2004-10-27 + 2006-05-22: 02 69123 remote @@ -52,20 +51,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/putty-0.56" + # emerge --ask --oneshot --verbose ">=net-misc/putty-0.56" iDEFENSE Security Advisory 10.27.04 - PuTTY ChangeLog - CVE-2004-1008 + PuTTY ChangeLog + CVE-2004-1008 - + koon - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-30.xml index b4c1a09847..96985ef737 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-30.xml @@ -1,6 +1,5 @@ - GPdf, KPDF, KOffice: Vulnerabilities in included xpdf @@ -9,8 +8,8 @@ malicious PDF file. GPdf - October 28, 2004 - November 06, 2004: 02 + 2004-10-28 + 2004-11-06: 02 68558 68665 68571 @@ -65,32 +64,32 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/gpdf-0.132-r2" + # emerge --ask --oneshot --verbose ">=app-text/gpdf-0.132-r2"

All KDE users should upgrade to the latest version of kdegraphics:

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.3.0-r2" + # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.3.0-r2"

All KOffice users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/koffice-1.3.3-r2" + # emerge --ask --oneshot --verbose ">=app-office/koffice-1.3.3-r2" - GLSA 200410-20 - CAN-2004-0888 - CAN-2004-0889 + GLSA 200410-20 + CAN-2004-0888 + CAN-2004-0889 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-31.xml index b46e45f7fa..bf9a71dc69 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200410-31.xml @@ -1,6 +1,5 @@ - Archive::Zip: Virus detection evasion @@ -9,8 +8,8 @@ detection evasion. Archive::Zip - October 29, 2004 - May 22, 2006: 02 + 2004-10-29 + 2006-05-22: 02 68616 remote @@ -52,20 +51,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-perl/Archive-Zip-1.14" + # emerge --ask --oneshot --verbose ">=dev-perl/Archive-Zip-1.14" iDEFENSE Security Advisory 10.18.04 - rt.cpan.org bug #8077 - CVE-2004-1096 + rt.cpan.org bug #8077 + CVE-2004-1096 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-01.xml index b76836ffdb..710526a32e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-01.xml @@ -1,6 +1,5 @@ - ppp: No denial of service vulnerability @@ -8,8 +7,8 @@ but it cannot be used to deny service to other users. ppp - November 01, 2004 - November 02, 2004: 02 + 2004-11-01 + 2004-11-02: 02 69152 remote @@ -48,13 +47,13 @@ Incorrect BugTraq Advisory - + koon - + koon - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-02.xml index 5fc972f79e..d0b2018aad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-02.xml @@ -1,6 +1,5 @@ - Cherokee: Format string vulnerability @@ -8,8 +7,8 @@ of service or the execution of arbitary code. cherokee - November 01, 2004 - May 22, 2006: 02 + 2004-11-01 + 2006-05-22: 02 67667 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/cherokee-0.4.17.1" + # emerge --ask --oneshot --verbose ">=www-servers/cherokee-0.4.17.1" - CVE-2004-1097 + CVE-2004-1097 - + koon - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-03.xml index 9a74573497..3dd788f2f2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-03.xml @@ -1,6 +1,5 @@ - Apache 1.3: Buffer overflow vulnerability in mod_include @@ -8,8 +7,8 @@ allow a local attacker to gain escalated privileges. apache - November 02, 2004 - December 30, 2007: 02 + 2004-11-02 + 2007-12-30: 02 68564 local @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/apache-1.3.32-r1" + # emerge --ask --oneshot --verbose ">=www-servers/apache-1.3.32-r1" - CAN-2004-0940 + CAN-2004-0940 Security vulnerabilities in Apache httpd 1.3 - + koon - + vorlon078 - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-04.xml index d5f246e888..6b110a084d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-04.xml @@ -1,6 +1,5 @@ - Speedtouch USB driver: Privilege escalation vulnerability @@ -8,8 +7,8 @@ local users to execute arbitrary code with escalated privileges. speedtouch - November 02, 2004 - November 02, 2004: 01 + 2004-11-02 + 2004-11-02: 01 68436 local @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dialup/speedtouch-1.3.1" + # emerge --ask --oneshot --verbose ">=net-dialup/speedtouch-1.3.1" - CAN-2004-0834 - Speedtouch Project News Announcements + CAN-2004-0834 + Speedtouch Project News Announcements - + koon - + lewk - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-05.xml index 4c92af0c54..e1b3427d37 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-05.xml @@ -1,6 +1,5 @@ - libxml2: Remotely exploitable buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. libxml2 - November 02, 2004 - November 02, 2004: 01 + 2004-11-02 + 2004-11-02: 01 69154 remote @@ -48,20 +47,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.6.15" + # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.6.15" BugTraq Advisory libxml2 ChangeLog - CAN-2004-0989 + CAN-2004-0989 - + koon - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-06.xml index 8671fe6b8c..af017f038c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-06.xml @@ -1,6 +1,5 @@ - MIME-tools: Virus detection evasion @@ -9,8 +8,8 @@ viruses. MIME-tools - November 02, 2004 - May 22, 2006: 02 + 2004-11-02 + 2006-05-22: 02 69181 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-perl/MIME-tools-5.415" + # emerge --ask --oneshot --verbose ">=dev-perl/MIME-tools-5.415" - MIMEDefang announcement - CVE-2004-1098 + MIMEDefang announcement + CVE-2004-1098 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-07.xml index 98471006e4..fbad50e58b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-07.xml @@ -1,6 +1,5 @@ - Proxytunnel: Format string vulnerability @@ -9,8 +8,8 @@ Proxytunnel process. Proxytunnel - November 03, 2004 - November 03, 2004: 01 + 2004-11-03 + 2004-11-03: 01 69379 remote @@ -53,19 +52,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/proxytunnel-1.2.3" + # emerge --ask --oneshot --verbose ">=net-misc/proxytunnel-1.2.3" - CAN-2004-0992 - Proxytunnel News + CAN-2004-0992 + Proxytunnel News - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-08.xml index be9b872645..078457b78c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-08.xml @@ -1,6 +1,5 @@ - GD: Integer overflow @@ -9,8 +8,8 @@ program decoding a malicious PNG image. GD - November 03, 2004 - November 03, 2004: 01 + 2004-11-03 + 2004-11-03: 01 69070 remote @@ -52,19 +51,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/gd-2.0.32" + # emerge --ask --oneshot --verbose ">=media-libs/gd-2.0.32" Original BugTraq advisory - CAN-2004-0990 + CAN-2004-0990 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-09.xml index 1876095e3b..0a2b29e2be 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-09.xml @@ -1,6 +1,5 @@ - shadow: Unauthorized modification of account information @@ -8,8 +7,8 @@ properties by unauthorized users. shadow - November 04, 2004 - November 05, 2004: 02 + 2004-11-04 + 2004-11-05: 02 69212 local @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.0.5-r1" + # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.0.5-r1" shadow NEWS file - CAN-2004-1001 + CAN-2004-1001 - + koon - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-10.xml index 16eab1e480..16bfcfc6e2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-10.xml @@ -1,14 +1,13 @@ - Gallery: Cross-site scripting vulnerability Gallery is vulnerable to cross-site scripting attacks. gallery - November 06, 2004 - May 22, 2006: 02 + 2004-11-06 + 2006-05-22: 02 69904 remote @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/gallery-1.4.4_p4" + # emerge --ask --oneshot --verbose ">=www-apps/gallery-1.4.4_p4" Gallery Announcement - CVE-2004-1106 + CVE-2004-1106 - + lewk - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-11.xml index f8a886d526..3be22123d9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-11.xml @@ -1,6 +1,5 @@ - ImageMagick: EXIF buffer overflow @@ -8,8 +7,8 @@ information, which could lead to arbitrary code execution. imagemagick - November 06, 2004 - November 06, 2004: 01 + 2004-11-06 + 2004-11-06: 01 69825 remote @@ -48,20 +47,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.1.3.2" + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.1.3.2" - CAN-2004-0981 - ImageMagick ChangeLog - SA 12995 + CAN-2004-0981 + ImageMagick ChangeLog + SA 12995 - + koon - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-12.xml index e66d8583b7..0a75755857 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-12.xml @@ -1,6 +1,5 @@ - zgv: Multiple buffer overflows @@ -8,8 +7,8 @@ execution of arbitrary code. zgv - November 07, 2004 - May 22, 2006: 02 + 2004-11-07 + 2006-05-22: 02 69150 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/zgv-5.8" + # emerge --ask --oneshot --verbose ">=media-gfx/zgv-5.8" BugTraq Advisory - CVE-2004-1095 + CVE-2004-1095 - + lewk - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-13.xml index 45d38c7f7a..ba3644e00f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-13.xml @@ -1,6 +1,5 @@ - Portage, Gentoolkit: Temporary file vulnerabilities @@ -9,8 +8,8 @@ overwrite arbitrary files with the rights of the user running the script. portage gentoolkit - November 07, 2004 - May 22, 2006: 02 + 2004-11-07 + 2006-05-22: 02 68846 69147 local @@ -59,25 +58,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/portage-2.0.51-r3" + # emerge --ask --oneshot --verbose ">=sys-apps/portage-2.0.51-r3"

All Gentoolkit users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-portage/gentoolkit-0.2.0_pre8-r1" + # emerge --ask --oneshot --verbose ">=app-portage/gentoolkit-0.2.0_pre8-r1" - CVE-2004-1107 - CVE-2004-1108 + CVE-2004-1107 + CVE-2004-1108 - + koon - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-14.xml index adb165317d..4e06a01c7e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-14.xml @@ -1,6 +1,5 @@ - Kaffeine, gxine: Remotely exploitable buffer overflow @@ -9,8 +8,8 @@ headers. kaffeine gxine - November 07, 2004 - May 22, 2006: 02 + 2004-11-07 + 2006-05-22: 02 69663 70055 remote @@ -56,26 +55,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/kaffeine-0.4.3b-r1" + # emerge --ask --oneshot --verbose ">=media-video/kaffeine-0.4.3b-r1"

All gxine users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/gxine-0.3.3-r1" + # emerge --ask --oneshot --verbose ">=media-video/gxine-0.3.3-r1" SecurityTracker Advisory - gxine Bug Report - CVE-2004-1034 + gxine Bug Report + CVE-2004-1034 - + koon - + lewk - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-15.xml index 3bcc5581be..773294f099 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-15.xml @@ -1,6 +1,5 @@ - OpenSSL, Groff: Insecure tempfile handling @@ -10,8 +9,8 @@ user running the utility. OpenSSL - November 08, 2004 - August 23, 2006: 02 + 2004-11-08 + 2006-08-23: 02 68404 68407 local @@ -69,7 +68,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.7d-r2" + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.7d-r2"

Note: /etc/ssl/misc/der_chop is protected by Portage as a configuration file. Don't forget to use etc-update and overwrite the old version with @@ -77,13 +76,13 @@

- CAN-2004-0969 - CAN-2004-0975 + CAN-2004-0969 + CAN-2004-0975 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-16.xml index c2ea2c53a4..183641be2a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-16.xml @@ -1,6 +1,5 @@ - zip: Path name buffer overflow @@ -8,8 +7,8 @@ very long path names. This could lead to the execution of arbitrary code. zip - November 09, 2004 - May 22, 2006: 02 + 2004-11-09 + 2006-05-22: 02 70227 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/zip-2.3-r4" + # emerge --ask --oneshot --verbose ">=app-arch/zip-2.3-r4" HexView zip Advisory - CVE-2004-1010 + CVE-2004-1010 - + koon - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-17.xml index dc07d10c6d..7637eb6c3a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-17.xml @@ -1,6 +1,5 @@ - mtink: Insecure tempfile handling @@ -9,8 +8,8 @@ utility. mtink - November 09, 2004 - May 22, 2006: 02 + 2004-11-09 + 2006-05-22: 02 70310 local @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/mtink-1.0.5" + # emerge --ask --oneshot --verbose ">=net-print/mtink-1.0.5" - CVE-2004-1110 + CVE-2004-1110 - + jaervosz - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-18.xml index 5912fea82f..2d7ac3b814 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-18.xml @@ -1,6 +1,5 @@ - Apache 2.0: Denial of Service by memory consumption @@ -8,8 +7,8 @@ Service. apache - November 10, 2004 - December 30, 2007: 02 + 2004-11-10 + 2007-12-30: 02 70138 remote @@ -45,16 +44,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.52-r1" + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.52-r1" - CAN-2004-0942 + CAN-2004-0942 Security vulnerabilities in Apache httpd 2.0 - + vorlon078 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-19.xml index be8937f093..62f87808d8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-19.xml @@ -1,6 +1,5 @@ - Pavuk: Multiple buffer overflows @@ -8,8 +7,8 @@ to run arbitrary code. pavuk - November 10, 2004 - November 10, 2004: 01 + 2004-11-10 + 2004-11-10: 01 70516 remote @@ -44,20 +43,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/pavuk-0.9.31" + # emerge --ask --oneshot --verbose ">=net-misc/pavuk-0.9.31" - GLSA-200407-19 - SA13120 - CAN-2004-0456 + GLSA-200407-19 + SA13120 + CAN-2004-0456 - + jaervosz - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-20.xml index 12c87cb968..dee1d74303 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-20.xml @@ -1,6 +1,5 @@ - ez-ipupdate: Format string vulnerability @@ -8,8 +7,8 @@ execution of arbitrary code. ez-ipupdate - November 11, 2004 - November 11, 2004: 01 + 2004-11-11 + 2004-11-11: 01 69658 remote @@ -44,16 +43,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/ez-ipupdate-3.0.11_beta8-r1" + # emerge --ask --oneshot --verbose ">=net-dns/ez-ipupdate-3.0.11_beta8-r1" - CAN-2004-0980 + CAN-2004-0980 Full Disclosure Announcement - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-21.xml index b5edec5763..275719dc68 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-21.xml @@ -1,6 +1,5 @@ - Samba: Multiple vulnerabilities @@ -10,8 +9,8 @@ cycles (CAN-2004-0930). samba - November 11, 2004 - November 15, 2004: 02 + 2004-11-11 + 2004-11-15: 02 70429 remote @@ -54,21 +53,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.8" + # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.8" - Samba Security Announcement - CAN-2004-0930 - CAN-2004-0882 + Samba Security Announcement + CAN-2004-0930 + CAN-2004-0882 E-Matters Advisory 13/2004 - + koon - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-22.xml index 87bd3a9521..c3072fd07f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-22.xml @@ -1,6 +1,5 @@ - Davfs2, lvm-user: Insecure tempfile handling @@ -9,8 +8,8 @@ to overwrite arbitrary files with the rights of the user running them. davfs2 - November 11, 2004 - November 11, 2004: 01 + 2004-11-11 + 2004-11-11: 01 68406 69149 local @@ -60,21 +59,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/davfs2-0.2.2-r1" + # emerge --ask --oneshot --verbose ">=net-fs/davfs2-0.2.2-r1"

All lvm-user users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-fs/lvm-user-1.0.7-r2" + # emerge --ask --oneshot --verbose ">=sys-fs/lvm-user-1.0.7-r2" - CAN-2004-0972 + CAN-2004-0972 - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-23.xml index 82d13bc6ec..3ee3ec1f24 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-23.xml @@ -1,6 +1,5 @@ - Ruby: Denial of Service issue @@ -8,8 +7,8 @@ Denial of Service condition. Ruby - November 16, 2004 - November 16, 2004: 01 + 2004-11-16 + 2004-11-16: 01 69985 remote @@ -50,24 +49,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.6.8-r12" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.6.8-r12"

All Ruby 1.8.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.2_pre3" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.2_pre3" - CAN-2004-0983 + CAN-2004-0983 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-24.xml index 6c2972c66d..d2f04e298d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-24.xml @@ -1,6 +1,5 @@ - BNC: Buffer overflow vulnerability @@ -8,8 +7,8 @@ Service and execution of arbitrary code. BNC - November 16, 2004 - November 16, 2004: 01 + 2004-11-16 + 2004-11-16: 01 70674 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/bnc-2.9.1" + # emerge --ask --oneshot --verbose ">=net-irc/bnc-2.9.1" BNC ChangeLog LSS-2004-11-03 - + lewk - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-25.xml index a6d2346ce0..0fdb3ddfc4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-25.xml @@ -1,6 +1,5 @@ - SquirrelMail: Encoded text XSS vulnerability @@ -8,8 +7,8 @@ compromise of webmail accounts. SquirrelMail - November 17, 2004 - May 22, 2006: 02 + 2004-11-17 + 2006-05-22: 02 70739 remote @@ -49,23 +48,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.3a-r2" + # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.3a-r2"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

- SquirrelMail Advisory - CVE-2004-1036 + SquirrelMail Advisory + CVE-2004-1036 - + jaervosz - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-26.xml index 09c652ae9a..2aa3295203 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-26.xml @@ -1,6 +1,5 @@ - GIMPS, SETI@home, ChessBrain: Insecure installation @@ -8,8 +7,8 @@ privileges by init scripts. GIMPS,SETI@home,ChessBrain - November 17, 2004 - May 22, 2006: 03 + 2004-11-17 + 2006-05-22: 03 69868 local @@ -57,32 +56,32 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sci-misc/gimps-23.9-r1" + # emerge --ask --oneshot --verbose ">=sci-misc/gimps-23.9-r1"

All SETI@home users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=sci-misc/setiathome-3.03-r2" + # emerge --ask --oneshot --verbose ">=sci-misc/setiathome-3.03-r2"

All ChessBrain users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=sci-misc/chessbrain-20407-r1" + # emerge --ask --oneshot --verbose ">=sci-misc/chessbrain-20407-r1" - CVE-2004-1115 - CVE-2004-1116 - CVE-2004-1117 + CVE-2004-1115 + CVE-2004-1116 + CVE-2004-1117 - + jaervosz - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-27.xml index 0f405638e2..2e1753f9b2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-27.xml @@ -1,6 +1,5 @@ - Fcron: Multiple vulnerabilities @@ -8,8 +7,8 @@ cause a Denial of Service. fcron - November 18, 2004 - November 18, 2004: 01 + 2004-11-18 + 2004-11-18: 01 71311 local @@ -53,21 +52,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-process/fcron-2.0.2" + # emerge --ask --oneshot --verbose ">=sys-process/fcron-2.0.2" - CAN-2004-1030 - CAN-2004-1031 - CAN-2004-1032 - CAN-2004-1033 + CAN-2004-1030 + CAN-2004-1031 + CAN-2004-1032 + CAN-2004-1033 - + lewk - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-28.xml index c7a35b9839..565b1a1b57 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-28.xml @@ -1,6 +1,5 @@ - X.Org, XFree86: libXpm vulnerabilities @@ -8,8 +7,8 @@ Service and arbitrary code execution. X.Org, XFree86 - November 19, 2004 - November 19, 2004: 01 + 2004-11-19 + 2004-11-19: 01 68544 remote @@ -54,24 +53,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-base/xorg-x11-6.7.0-r3" + # emerge --ask --oneshot --verbose ">=x11-base/xorg-x11-6.7.0-r3"

All XFree86 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-base/xfree-x11-4.3.0-r8" + # emerge --ask --oneshot --verbose ">=x11-base/xfree-x11-4.3.0-r8" - CAN-2004-0914 + CAN-2004-0914 - + jaervosz - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-29.xml index f680f7c02c..0d87c76045 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-29.xml @@ -1,6 +1,5 @@ - unarj: Long filenames buffer overflow and a path traversal vulnerability @@ -9,8 +8,8 @@ arbitrary code. unarj - November 19, 2004 - November 19, 2004: 01 + 2004-11-19 + 2004-11-19: 01 70966 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/unarj-2.63a-r2" + # emerge --ask --oneshot --verbose ">=app-arch/unarj-2.63a-r2" - CAN-2004-0947 - CAN-2004-1027 + CAN-2004-0947 + CAN-2004-1027 - + jaervosz - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-30.xml index 603e72d056..0d62636d82 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-30.xml @@ -1,6 +1,5 @@ - pdftohtml: Vulnerabilities in included Xpdf @@ -9,8 +8,8 @@ file. pdftohtml - November 23, 2004 - November 23, 2004: 01 + 2004-11-23 + 2004-11-23: 01 69019 remote @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/pdftohtml-0.36-r1" + # emerge --ask --oneshot --verbose ">=app-text/pdftohtml-0.36-r1" - GLSA 200410-20 - CAN-2004-0888 + GLSA 200410-20 + CAN-2004-0888 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-31.xml index 5878241f99..4ea2f45a6f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-31.xml @@ -1,6 +1,5 @@ - ProZilla: Multiple vulnerabilities @@ -9,8 +8,8 @@ of the user running ProZilla. ProZilla - November 23, 2004 - May 22, 2006: 03 + 2004-11-23 + 2006-05-22: 03 70090 remote @@ -53,15 +52,15 @@

- CVE-2004-1120 + CVE-2004-1120 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-32.xml index 70b1aa895e..399b55b4ea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-32.xml @@ -1,6 +1,5 @@ - phpBB: Remote command execution @@ -8,8 +7,8 @@ arbitrary commands with the rights of the web server user. phpBB - November 24, 2004 - May 22, 2006: 02 + 2004-11-24 + 2006-05-22: 02 71681 remote @@ -81,16 +80,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpbb-2.0.11" + # emerge --ask --oneshot --verbose ">=www-apps/phpbb-2.0.11" - phpBB.com Announcement - CVE-2004-1315 + phpBB.com Announcement + CVE-2004-1315 - + klieber - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-33.xml index e97fe626c6..b8e00248a2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-33.xml @@ -1,6 +1,5 @@ - TWiki: Arbitrary command execution @@ -8,8 +7,8 @@ commands with the permissions of the user running TWiki. www-apps/twiki - November 24, 2004 - September 08, 2006: 02 + 2004-11-24 + 2006-09-08: 02 71035 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/twiki-20040902" + # emerge --ask --oneshot --verbose ">=www-apps/twiki-20040902" TWiki Security Alert - CAN-2004-1037 + CAN-2004-1037 - + koon - + dmargoli - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-34.xml index b25135928e..9f5dec05ed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-34.xml @@ -1,6 +1,5 @@ - Cyrus IMAP Server: Multiple remote vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code. cyrus-imapd - November 25, 2004 - November 25, 2004: 01 + 2004-11-25 + 2004-11-25: 01 72194 remote @@ -50,23 +49,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/cyrus-imapd-2.2.10" + # emerge --ask --oneshot --verbose ">=net-mail/cyrus-imapd-2.2.10" - CAN-2004-1011 - CAN-2004-1012 - CAN-2004-1013 - CAN-2004-1015 + CAN-2004-1011 + CAN-2004-1012 + CAN-2004-1013 + CAN-2004-1015 e-matters Advisory Cyrus IMAP Server ChangeLog - + koon - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-35.xml index 7eec8be186..92077c7970 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-35.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-35.xml @@ -1,14 +1,13 @@ - phpWebSite: HTTP response splitting vulnerability phpWebSite is vulnerable to possible HTTP response splitting attacks. phpwebsite - November 26, 2004 - May 22, 2006: 03 + 2004-11-26 + 2006-05-22: 03 71502 remote @@ -47,20 +46,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpwebsite-0.9.3_p4-r2" + # emerge --ask --oneshot --verbose ">=www-apps/phpwebsite-0.9.3_p4-r2" BugTraq Posting phpWebSite Announcement - CVE-2004-1516 + CVE-2004-1516 - + lewk - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-36.xml index 924495b9a8..dcefea84ed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-36.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-36.xml @@ -1,14 +1,13 @@ - phpMyAdmin: Multiple XSS vulnerabilities phpMyAdmin is vulnerable to cross-site scripting attacks. phpmyadmin - November 27, 2004 - November 27, 2004: 01 + 2004-11-27 + 2004-11-27: 01 71819 remote @@ -50,20 +49,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.0_p3" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.0_p3" - CAN-2004-1055 - PMASA-2004-3 + CAN-2004-1055 + PMASA-2004-3 netVigilance Advisory - + jaervosz - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-37.xml index 5e7cfa9121..bdba394afc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-37.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-37.xml @@ -1,6 +1,5 @@ - Open DC Hub: Remote code execution @@ -8,8 +7,8 @@ remote code execution. opendchub - November 28, 2004 - May 22, 2006: 02 + 2004-11-28 + 2006-05-22: 02 72371 remote @@ -47,16 +46,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-p2p/opendchub-0.7.14-r2" + # emerge --ask --oneshot --verbose ">=net-p2p/opendchub-0.7.14-r2" Full-Disclosure Advisory - CVE-2004-1127 + CVE-2004-1127 - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-38.xml index faa22f30a6..167c5e782e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-38.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200411-38.xml @@ -1,6 +1,5 @@ - Sun and Blackdown Java: Applet privilege escalation @@ -9,8 +8,8 @@ perform unrestricted actions on the host system. Java - November 29, 2004 - May 31, 2006: 02 + 2004-11-29 + 2006-05-31: 02 72172 72221 remote @@ -65,41 +64,41 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.06" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.06"

All Sun JRE users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.06" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.06"

All Blackdown JDK users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jdk-1.4.2.01" + # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jdk-1.4.2.01"

All Blackdown JRE users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jre-1.4.2.01" + # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jre-1.4.2.01"

Note: You should unmerge all vulnerable versions to be fully protected.

iDEFENSE Security Advisory 11.22.04 - CAN-2004-1029 + CAN-2004-1029 Blackdown Security Advisory 2004-01 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-01.xml index 7c1f32144b..a1e7e796a8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-01.xml @@ -1,6 +1,5 @@ - rssh, scponly: Unrestricted command execution @@ -9,8 +8,8 @@ the restricted shell. scponly - December 03, 2004 - May 22, 2006: 03 + 2004-12-03 + 2006-05-22: 03 72815 72816 remote @@ -58,26 +57,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/scponly-4.0" + # emerge --ask --oneshot --verbose ">=net-misc/scponly-4.0"

All rssh users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-shells/rssh/rssh-2.2.3" + # emerge --ask --oneshot --verbose ">=app-shells/rssh/rssh-2.2.3" BugTraq Posting - CVE-2004-1161 - CVE-2004-1162 + CVE-2004-1161 + CVE-2004-1162 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-02.xml index 180b8f2390..563b7541be 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-02.xml @@ -1,6 +1,5 @@ - PDFlib: Multiple overflows in the included TIFF library @@ -8,8 +7,8 @@ the execution of arbitrary code. PDFlib - December 05, 2004 - December 05, 2004: 01 + 2004-12-05 + 2004-12-05: 01 69043 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/pdflib-5.0.4_p1" + # emerge --ask --oneshot --verbose ">=media-libs/pdflib-5.0.4_p1" - PDFlib ChangeLog - CAN-2004-0803 - CAN-2004-0804 - CAN-2004-0886 - GLSA 200410-11 + PDFlib ChangeLog + CAN-2004-0803 + CAN-2004-0804 + CAN-2004-0886 + GLSA 200410-11 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-03.xml index cb198e01e9..2cc5af6f45 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-03.xml @@ -1,6 +1,5 @@ - imlib: Buffer overflows in image decoding @@ -8,8 +7,8 @@ routines, potentially allowing execution of arbitrary code. imlib - December 06, 2004 - December 06, 2004: 01 + 2004-12-06 + 2004-12-06: 01 72681 remote @@ -51,16 +50,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/imlib-1.9.14-r3" + # emerge --ask --oneshot --verbose ">=media-libs/imlib-1.9.14-r3" - GLSA 200409-34 - CAN-2004-1026 + GLSA 200409-34 + CAN-2004-1026 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-04.xml index b8ed263479..b15c90e99e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-04.xml @@ -1,6 +1,5 @@ - Perl: Insecure temporary file creation @@ -8,8 +7,8 @@ overwrite arbitrary files. perl - December 07, 2004 - December 07, 2004: 01 + 2004-12-07 + 2004-12-07: 01 66360 local @@ -52,16 +51,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=perl-5.8.5-r2" + # emerge --ask --oneshot --verbose ">=perl-5.8.5-r2" - CAN-2004-0976 - Trustix Advisory #2004-0050 + CAN-2004-0976 + Trustix Advisory #2004-0050 - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-05.xml index de5fbd81ac..6c5e878694 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-05.xml @@ -1,6 +1,5 @@ - mirrorselect: Insecure temporary file creation @@ -8,8 +7,8 @@ user to overwrite arbitrary files. mirrorselect - December 07, 2004 - May 22, 2006: 04 + 2004-12-07 + 2006-05-22: 04 73545 local @@ -49,15 +48,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-portage/mirrorselect-0.89" + # emerge --ask --oneshot --verbose ">=app-portage/mirrorselect-0.89" - CVE-2004-1167 + CVE-2004-1167 - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-06.xml index f482c8e364..5b94c6c680 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-06.xml @@ -1,6 +1,5 @@ - PHProjekt: setup.php vulnerability @@ -8,8 +7,8 @@ users without admin rights to change the configuration. PHProjekt - December 10, 2004 - December 10, 2004: 01 + 2004-12-10 + 2004-12-10: 01 73021 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phprojekt-4.2-r1" + # emerge --ask --oneshot --verbose ">=www-apps/phprojekt-4.2-r1" PHProjekt Advisory - + vorlon078 - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-07.xml index d20e9a88b2..2fe14c18fb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-07.xml @@ -1,6 +1,5 @@ - file: Arbitrary code execution @@ -8,8 +7,8 @@ attacker to execute arbitrary code. file - December 13, 2004 - May 22, 2006: 02 + 2004-12-13 + 2006-05-22: 02 72521 remote @@ -46,19 +45,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/file-4.12" + # emerge --ask --oneshot --verbose ">=sys-apps/file-4.12" SecurityTracker Alert ID 1012433 - CVE-2004-1304 + CVE-2004-1304 - + koon - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-08.xml index c8d6fbab5f..c97cb073f1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-08.xml @@ -1,6 +1,5 @@ - nfs-utils: Multiple remote vulnerabilities @@ -8,8 +7,8 @@ to a Denial of Service, or the execution of arbitrary code. nfs-utils - December 14, 2004 - December 14, 2004: 01 + 2004-12-14 + 2004-12-14: 01 72113 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/nfs-utils-1.0.6-r6" + # emerge --ask --oneshot --verbose ">=net-fs/nfs-utils-1.0.6-r6" - CAN-2004-0946 - CAN-2004-1014 + CAN-2004-0946 + CAN-2004-1014 - + koon - + lewk - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-09.xml index ea8cb262a7..6a1abdb349 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-09.xml @@ -1,6 +1,5 @@ - ncpfs: Buffer overflow in ncplogin and ncpmap @@ -8,8 +7,8 @@ of arbitrary code with elevated privileges. ncpfs - December 15, 2004 - December 15, 2004: 01 + 2004-12-15 + 2004-12-15: 01 72820 local @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/ncpfs-2.2.5" + # emerge --ask --oneshot --verbose ">=net-fs/ncpfs-2.2.5" Full Disclosure Advisory - CAN-2004-1079 + CAN-2004-1079 - + jaervosz - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-10.xml index b79551b8e5..49ffc220bc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-10.xml @@ -1,6 +1,5 @@ - Vim, gVim: Vulnerable options in modelines @@ -9,8 +8,8 @@ escalating privileges. vim - December 15, 2004 - December 15, 2004: 01 + 2004-12-15 + 2004-12-15: 01 73715 local @@ -57,24 +56,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/vim-6.3-r2" + # emerge --ask --oneshot --verbose ">=app-editors/vim-6.3-r2"

All gVim users should also upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/gvim-6.3-r2" + # emerge --ask --oneshot --verbose ">=app-editors/gvim-6.3-r2" - CAN-2004-1138 + CAN-2004-1138 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-11.xml index e825577ec4..0e26dc2659 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-11.xml @@ -1,6 +1,5 @@ - Cscope: Insecure creation of temporary files @@ -8,8 +7,8 @@ to overwrite arbitrary files. cscope - December 16, 2004 - December 16, 2004: 01 + 2004-12-16 + 2004-12-16: 01 71595 local @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/cscope-15.5-r2" + # emerge --ask --oneshot --verbose ">=dev-util/cscope-15.5-r2" - CAN-2004-0996 + CAN-2004-0996 BugTraq Advisory - + lewk - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-12.xml index a9292af251..a4383d3f8f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-12.xml @@ -1,6 +1,5 @@ - Adobe Acrobat Reader: Buffer overflow vulnerability @@ -8,8 +7,8 @@ remote execution of arbitrary code. acroread - December 16, 2004 - December 16, 2004: 01 + 2004-12-16 + 2004-12-16: 01 74406 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-5.10" + # emerge --ask --oneshot --verbose ">=app-text/acroread-5.10" - CAN-2004-1152 - Adobe Announcement + CAN-2004-1152 + Adobe Announcement - + koon - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-13.xml index 8d4de3b9b9..ad038c1f44 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-13.xml @@ -1,14 +1,13 @@ - Samba: Integer overflow Samba contains a bug that could lead to remote execution of arbitrary code. Samba - December 17, 2004 - December 17, 2004: 01 + 2004-12-17 + 2004-12-17: 01 73943 remote @@ -47,16 +46,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.9-r1" + # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.9-r1" - CAN 2004-1154 - Samba Announcement + CAN 2004-1154 + Samba Announcement - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-14.xml index 9ac9b72792..0e72e6b8a7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-14.xml @@ -1,6 +1,5 @@ - PHP: Multiple vulnerabilities @@ -9,8 +8,8 @@ execution of arbitrary code. PHP - December 19, 2004 - May 22, 2006: 02 + 2004-12-19 + 2006-05-22: 02 74547 remote @@ -76,37 +75,37 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/php-4.3.10" + # emerge --ask --oneshot --verbose ">=dev-php/php-4.3.10"

All mod_php users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/mod_php-4.3.10" + # emerge --ask --oneshot --verbose ">=dev-php/mod_php-4.3.10"

All php-cgi users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/php-cgi-4.3.10" + # emerge --ask --oneshot --verbose ">=dev-php/php-cgi-4.3.10" - PHP 4.3.10 Release Announcement - Hardened-PHP Security Advisory + PHP 4.3.10 Release Announcement + Hardened-PHP Security Advisory SEC Consult Advisory - CAN-2004-1019 - CAN-2004-1020 - CVE-2004-1063 - CVE-2004-1064 - CVE-2004-1065 + CAN-2004-1019 + CAN-2004-1020 + CVE-2004-1063 + CVE-2004-1064 + CVE-2004-1065 - + jaervosz - + Koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-15.xml index 2d23d195a2..11ece103c2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-15.xml @@ -1,6 +1,5 @@ - Ethereal: Multiple vulnerabilities @@ -9,8 +8,8 @@ utilization. Ethereal - December 19, 2004 - December 19, 2004: 01 + 2004-12-19 + 2004-12-19: 01 74443 remote @@ -52,7 +51,7 @@

For a temporary workaround you can disable all affected protocol - dissectors by selecting Analyze->Enabled Protocols... and deselecting + dissectors by selecting Analyze->Enabled Protocols... and deselecting them from the list. However, it is strongly recommended to upgrade to the latest stable version.

@@ -63,19 +62,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.8" + # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.8" Ethereal enpa-sa-00016 - CAN 2004-1139 - CAN 2004-1140 - CAN 2004-1141 - CAN 2004-1142 + CAN 2004-1139 + CAN 2004-1140 + CAN 2004-1141 + CAN 2004-1142 - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-16.xml index 2757d8b7f4..f28d9e2320 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-16.xml @@ -1,6 +1,5 @@ - kdelibs, kdebase: Multiple vulnerabilities @@ -9,8 +8,8 @@ window injection. KDE - December 19, 2004 - December 19, 2004: 01 + 2004-12-19 + 2004-12-19: 01 72804 73869 remote and local @@ -68,24 +67,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdelibs-3.2.3-r4" + # emerge --ask --oneshot --verbose ">=kde-base/kdelibs-3.2.3-r4"

All kdebase users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdebase-3.2.3-r3" + # emerge --ask --oneshot --verbose ">=kde-base/kdebase-3.2.3-r3" - KDE Security Advisory: plain text password exposure - CAN 2004-1171 - KDE Security Advisory: Konqueror Window Injection Vulnerability - CAN 2004-1158 + KDE Security Advisory: plain text password exposure + CAN 2004-1171 + KDE Security Advisory: Konqueror Window Injection Vulnerability + CAN 2004-1158 - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-17.xml index d1bd0585f5..271000e45f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-17.xml @@ -1,6 +1,5 @@ - kfax: Multiple overflows in the included TIFF library @@ -8,8 +7,8 @@ arbitrary code. kfax - December 19, 2004 - January 12, 2005: 04 + 2004-12-19 + 2005-01-12: 04 73795 remote @@ -62,19 +61,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.3.2" + # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.3.2" - KDE Security Advisory: kfax libtiff vulnerabilities - GLSA 200410-11 - CAN-2004-0803 - CAN-2004-0804 - CAN-2004-0886 + KDE Security Advisory: kfax libtiff vulnerabilities + GLSA 200410-11 + CAN-2004-0803 + CAN-2004-0804 + CAN-2004-0886 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-18.xml index 08c8a70a3c..d608587e6b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-18.xml @@ -1,6 +1,5 @@ - abcm2ps: Buffer overflow vulnerability @@ -8,8 +7,8 @@ execution of arbitrary code. abcm2ps - December 19, 2004 - December 19, 2004: 02 + 2004-12-19 + 2004-12-19: 02 74702 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/abcm2ps-3.7.21" + # emerge --ask --oneshot --verbose ">=media-sound/abcm2ps-3.7.21" abcm2ps ChangeLog - Secunia Advisory + Secunia Advisory - + lewk - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-19.xml index 43481dc89a..3bc3901895 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-19.xml @@ -1,6 +1,5 @@ - phpMyAdmin: Multiple vulnerabilities @@ -8,8 +7,8 @@ disclosure or command execution. phpmyadmin - December 19, 2004 - December 19, 2004: 01 + 2004-12-19 + 2004-12-19: 01 74303 remote @@ -53,18 +52,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.1_rc1" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.1_rc1" - CAN-2004-1147 - CAN-2004-1148 - PHPMyAdmin advisory: PMASA-2004-4 + CAN-2004-1147 + CAN-2004-1148 + PHPMyAdmin advisory: PMASA-2004-4 Exaprobe.com advisory: esa-2004-1213 - + SeJo - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-20.xml index 18f7199307..4ea8c9945b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-20.xml @@ -1,6 +1,5 @@ - NASM: Buffer overflow vulnerability @@ -8,8 +7,8 @@ arbitrary code through the use of a malicious object file. NASM - December 20, 2004 - December 20, 2004: 01 + 2004-12-20 + 2004-12-20: 01 74477 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/nasm-0.98.38-r1" + # emerge --ask --oneshot --verbose ">=dev-lang/nasm-0.98.38-r1" - Original Advisory + Original Advisory - + koon - + koon - + SeJo
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-21.xml index 98d92da4e4..058eeb440f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-21.xml @@ -1,6 +1,5 @@ - MPlayer: Multiple overflows @@ -8,8 +7,8 @@ resulting in remote executing of arbitrary code. MPlayer - December 20, 2004 - December 20, 2004: 01 + 2004-12-20 + 2004-12-20: 01 74473 remote @@ -52,7 +51,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_pre5-r5" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_pre5-r5" iDEFENSE Advisory @@ -60,13 +59,13 @@ iDEFENSE Advisory Ariel Berkman Advisory - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-22.xml index 5e03ada41a..db36087af7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-22.xml @@ -1,6 +1,5 @@ - mpg123: Playlist buffer overflow @@ -8,8 +7,8 @@ execute arbitrary code through the use of a malicious playlist. mpg123 - December 21, 2004 - December 21, 2004: 01 + 2004-12-21 + 2004-12-21: 01 74692 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/mpg123-0.59s-r8" + # emerge --ask --oneshot --verbose ">=media-sound/mpg123-0.59s-r8" Original Advisory - CAN-2004-1284 + CAN-2004-1284 - + koon - + koon - + SeJo
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-23.xml index 7b9107d007..51c1b80df8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-23.xml @@ -1,14 +1,13 @@ - Zwiki: XSS vulnerability Zwiki is vulnerable to cross-site scripting attacks. zwiki - December 21, 2004 - May 22, 2006: 02 + 2004-12-21 + 2006-05-22: 02 72315 remote @@ -46,19 +45,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-zope/zwiki-0.36.2-r1" + # emerge --ask --oneshot --verbose ">=net-zope/zwiki-0.36.2-r1" Zwiki Bug Report - CVE-2004-1075 + CVE-2004-1075 - + vorlon078 - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-24.xml index 5ffa1f6886..321d513edd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-24.xml @@ -1,6 +1,5 @@ - Xpdf, GPdf: New integer overflows @@ -9,8 +8,8 @@ vulnerable to the same issues. Xpdf - December 28, 2004 - December 28, 2004: 01 + 2004-12-28 + 2004-12-28: 01 75191 75201 remote @@ -54,22 +53,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.00-r7" + # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.00-r7"

All GPdf users should also upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.8.1-r1" + # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.8.1-r1" - CAN-2004-1125 + CAN-2004-1125 iDEFENSE Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-25.xml index 54f58a7c2a..72f1dca99b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-25.xml @@ -1,6 +1,5 @@ - CUPS: Multiple vulnerabilities @@ -8,8 +7,8 @@ of Service attacks to the remote execution of arbitrary code. CUPS - December 28, 2004 - January 12, 2005: 02 + 2004-12-28 + 2005-01-12: 02 74479 75197 77023 @@ -59,24 +58,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/cups-1.1.23" + # emerge --ask --oneshot --verbose ">=net-print/cups-1.1.23" - CAN-2004-1125 - CAN-2004-1267 - CAN-2004-1268 - CAN-2004-1269 - CAN-2004-1270 + CAN-2004-1125 + CAN-2004-1267 + CAN-2004-1268 + CAN-2004-1269 + CAN-2004-1270 Ariel Berkman Advisory Bartlomiej Sieka Advisory - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-26.xml index 99052ec259..9c093f08d7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-26.xml @@ -1,6 +1,5 @@ - ViewCVS: Information leak and XSS vulnerabilities @@ -8,8 +7,8 @@ (XSS) issues. ViewCVS - December 28, 2004 - December 28, 2004: 01 + 2004-12-28 + 2004-12-28: 01 72461 73772 remote @@ -53,16 +52,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/viewcvs-0.9.2_p20041207-r1" + # emerge --ask --oneshot --verbose ">=www-apps/viewcvs-0.9.2_p20041207-r1" - CAN-2004-0915 - CAN-2004-1062 + CAN-2004-0915 + CAN-2004-1062 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-27.xml index 486973e7c4..7bdf45a64d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200412-27.xml @@ -1,6 +1,5 @@ - PHProjekt: Remote code execution vulnerability @@ -8,8 +7,8 @@ arbitrary PHP code. PHProjekt - December 30, 2004 - December 30, 2004: 01 + 2004-12-30 + 2004-12-30: 01 75858 remote @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phprojekt-4.2-r2" + # emerge --ask --oneshot --verbose ">=www-apps/phprojekt-4.2-r2" PHProjekt Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-01.xml index e0cffee1a5..15bf3182e5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-01.xml @@ -1,6 +1,5 @@ - LinPopUp: Buffer overflow in message reply @@ -8,8 +7,8 @@ arbitrary code. Linpopup - January 04, 2005 - January 04, 2005: 01 + 2005-01-04 + 2005-01-04: 01 74705 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/linpopup-2.0.4-r1" + # emerge --ask --oneshot --verbose ">=net-im/linpopup-2.0.4-r1" - CAN-2004-1282 + CAN-2004-1282 Stephen Dranger Advisory - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-02.xml index 29b3fff64c..d0eb3af3dc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-02.xml @@ -1,6 +1,5 @@ - a2ps: Multiple vulnerabilities @@ -10,8 +9,8 @@ arbitrary command execution. a2ps - January 04, 2005 - May 22, 2006: 03 + 2005-01-04 + 2006-05-22: 03 75784 61500 local and remote @@ -59,21 +58,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/a2ps-4.13c-r2" + # emerge --ask --oneshot --verbose ">=app-text/a2ps-4.13c-r2" - Secunia SA13641 - CAN-2004-1170 - CVE-2004-1377 + Secunia SA13641 + CAN-2004-1170 + CVE-2004-1377 Full-Disclosure Advisory - + koon - + koon - + SeJo
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-03.xml index e5c4124ba0..eb2f959e58 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-03.xml @@ -1,6 +1,5 @@ - Mozilla, Firefox, Thunderbird: Various vulnerabilities @@ -9,8 +8,8 @@ anti-spoofing issues. Mozilla - January 05, 2005 - December 30, 2007: 03 + 2005-01-05 + 2007-12-30: 03 76112 68976 70749 @@ -83,49 +82,49 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.5" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.5"

All Mozilla binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.5" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.5"

All Firefox users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0"

All Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0"

All Thunderbird users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-0.9" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-0.9"

All Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-0.9" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-0.9" isec.pl Advisory Martin (from ptraced.net) Advisory - Secunia Advisory SA13144 - CVE-2004-2227 - CVE-2004-2228 + Secunia Advisory SA13144 + CVE-2004-2227 + CVE-2004-2228 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-04.xml index 588604f6c7..beb2b5d200 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-04.xml @@ -1,6 +1,5 @@ - Shoutcast Server: Remote code execution @@ -8,8 +7,8 @@ execution of arbitrary code. Shoutcast-server-bin - January 05, 2005 - May 22, 2006: 02 + 2005-01-05 + 2006-05-22: 02 75482 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/shoutcast-server-bin-1.9.5" + # emerge --ask --oneshot --verbose ">=media-sound/shoutcast-server-bin-1.9.5" BugTraq Announcement - CVE-2004-1373 + CVE-2004-1373 - + lewk - + koon - + chriswhite
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-05.xml index 0bc9bce070..61794c01d8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-05.xml @@ -1,6 +1,5 @@ - mit-krb5: Heap overflow in libkadm5srv @@ -8,8 +7,8 @@ overflow that could lead to execution of arbitrary code. mit-krb5 - January 05, 2005 - January 05, 2005: 01 + 2005-01-05 + 2005-01-05: 01 75143 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.3.6" + # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.3.6" - CAN 2004-1189 + CAN 2004-1189 - + koon - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-06.xml index a783c67c82..85522655cd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-06.xml @@ -1,6 +1,5 @@ - tiff: New overflows in image decoding @@ -9,8 +8,8 @@ execution. tiff - January 05, 2005 - January 05, 2005: 01 + 2005-01-05 + 2005-01-05: 01 75213 remote @@ -54,17 +53,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.7.1-r1" + # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.7.1-r1" - CAN-2004-1183 - CAN-2004-1308 + CAN-2004-1183 + CAN-2004-1308 iDEFENSE Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-07.xml index 3c2d07ada4..077074c595 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-07.xml @@ -1,6 +1,5 @@ - xine-lib: Multiple overflows @@ -8,8 +7,8 @@ arbitrary code. xine-lib - January 06, 2005 - January 06, 2005: 01 + 2005-01-06 + 2005-01-06: 01 74475 remote @@ -59,20 +58,20 @@ # emerge --ask --oneshot --verbose media-libs/xine-lib - CAN-2004-1187 - CAN-2004-1188 - CAN-2004-1300 + CAN-2004-1187 + CAN-2004-1188 + CAN-2004-1300 iDefense Advisory iDefense Advisory Ariel Berkman Advisory - + koon - + SeJo - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-08.xml index 6b79d2f815..4ccdbe1583 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-08.xml @@ -1,6 +1,5 @@ - phpGroupWare: Various vulnerabilities @@ -8,8 +7,8 @@ lead to information disclosure or remote compromise. phpgroupware - January 06, 2005 - May 22, 2006: 04 + 2005-01-06 + 2006-05-22: 04 74487 remote @@ -49,7 +48,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpgroupware-0.9.16.004" + # emerge --ask --oneshot --verbose ">=www-apps/phpgroupware-0.9.16.004"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update. @@ -57,17 +56,17 @@ BugTraq Advisory - CVE-2004-1383 - CVE-2004-1384 - CVE-2004-1385 + CVE-2004-1383 + CVE-2004-1384 + CVE-2004-1385 - + koon - + koon - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-09.xml index f0a8d8e031..325edc7727 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-09.xml @@ -1,6 +1,5 @@ - xzgv: Multiple overflows @@ -8,8 +7,8 @@ arbitrary code. xzgv - January 06, 2005 - January 06, 2005: 01 + 2005-01-06 + 2005-01-06: 01 74069 remote @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/xzgv-0.8-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/xzgv-0.8-r1" - CAN-2004-0994 + CAN-2004-0994 iDEFENSE Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-10.xml index 20a1823a1b..ca72a46f10 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-10.xml @@ -1,6 +1,5 @@ - Vilistextum: Buffer overflow vulnerability @@ -8,8 +7,8 @@ execute arbitrary code through the use of a malicious webpage. vilistextum - January 06, 2005 - January 06, 2005: 01 + 2005-01-06 + 2005-01-06: 01 74694 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/vilistextum-2.6.7" + # emerge --ask --oneshot --verbose ">=app-text/vilistextum-2.6.7" Original Advisory - CAN-2004-1299 + CAN-2004-1299 - + koon - + koon - + SeJo
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-11.xml index 23b864e2ef..c16f5230eb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-11.xml @@ -1,6 +1,5 @@ - Dillo: Format string vulnerability @@ -8,8 +7,8 @@ execution of arbitrary code. Dillo - January 09, 2005 - January 09, 2005: 01 + 2005-01-09 + 2005-01-09: 01 76665 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/dillo-0.8.3-r4" + # emerge --ask --oneshot --verbose ">=www-client/dillo-0.8.3-r4" - CAN-2005-0012 + CAN-2005-0012 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-12.xml index f25d5faa80..0fe8acee5f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-12.xml @@ -1,6 +1,5 @@ - TikiWiki: Arbitrary command execution @@ -8,8 +7,8 @@ scripts. tikiwiki - January 10, 2005 - May 22, 2006: 03 + 2005-01-10 + 2006-05-22: 03 75568 remote @@ -46,7 +45,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.4.1" + # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.4.1"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update. @@ -54,15 +53,15 @@ TikiWiki Advisory - CVE-2004-1386 + CVE-2004-1386 - + koon - + koon - + vorlon078 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-13.xml index b1ae8dc71c..88759ffd99 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-13.xml @@ -1,6 +1,5 @@ - pdftohtml: Vulnerabilities in included Xpdf @@ -9,8 +8,8 @@ file. pdftohtml - January 10, 2005 - January 10, 2005: 01 + 2005-01-10 + 2005-01-10: 01 75200 remote @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/pdftohtml-0.36-r2" + # emerge --ask --oneshot --verbose ">=app-text/pdftohtml-0.36-r2" - GLSA 200412-24 - CAN-2004-1125 + GLSA 200412-24 + CAN-2004-1125 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-14.xml index 52f2e0ae6c..0f0487792b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-14.xml @@ -1,6 +1,5 @@ - mpg123: Buffer overflow @@ -8,8 +7,8 @@ crafted MP2 or MP3 files. media-sound/mpg123 - January 10, 2005 - January 10, 2005: 01 + 2005-01-10 + 2005-01-10: 01 76862 remote @@ -46,19 +45,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/mpg123-0.59s-r9" + # emerge --ask --oneshot --verbose ">=media-sound/mpg123-0.59s-r9" - CAN-2004-0991 + CAN-2004-0991 Bugtraq Announcement - + koon - + vorlon078 - + dmargoli
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-15.xml index 5082046fd2..c02462027c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-15.xml @@ -1,6 +1,5 @@ - UnRTF: Buffer overflow @@ -8,8 +7,8 @@ way of a specially crafted RTF file. app-text/unrtf - January 10, 2005 - January 10, 2005: 01 + 2005-01-10 + 2005-01-10: 01 74480 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/unrtf-0.19.3-r1" + # emerge --ask --oneshot --verbose ">=app-text/unrtf-0.19.3-r1" Original Announcement - + vorlon078 - + vorlon078 - + dmargoli
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-16.xml index 40691e9e67..2e25889138 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-16.xml @@ -1,6 +1,5 @@ - Konqueror: Java sandbox vulnerabilities @@ -9,8 +8,8 @@ actions on the host system. Konqueror, kde, kdelibs - January 11, 2005 - January 12, 2005: 02 + 2005-01-11 + 2005-01-12: 02 72750 remote @@ -54,13 +53,13 @@ # emerge --ask --oneshot --verbose kde-base/kdelibs - KDE Security Advisory: Konqueror Java Vulnerability - CAN 2004-1145 + KDE Security Advisory: Konqueror Java Vulnerability + CAN 2004-1145 - + jaervosz - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-17.xml index 7fd89abb95..b063ed2633 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-17.xml @@ -1,6 +1,5 @@ - KPdf, KOffice: More vulnerabilities in included Xpdf @@ -9,8 +8,8 @@ enticed to view a malicious PDF file. kpdf, koffice - January 11, 2005 - January 12, 2005: 02 + 2005-01-11 + 2005-01-12: 02 75203 75204 remote @@ -65,15 +64,15 @@ # emerge --ask --oneshot --verbose app-office/koffice - GLSA 200412-24 - CAN-2004-1125 - KDE Security Advisory: kpdf Buffer Overflow Vulnerability - KOffice XPDF Integer Overflow 2 + GLSA 200412-24 + CAN-2004-1125 + KDE Security Advisory: kpdf Buffer Overflow Vulnerability + KOffice XPDF Integer Overflow 2 - + jaervosz - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-18.xml index 61ad41d4d1..5c12a0a5fd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-18.xml @@ -1,6 +1,5 @@ - KDE FTP KIOslave: Command injection @@ -8,8 +7,8 @@ commands. konqueror - January 11, 2005 - January 12, 2005: 02 + 2005-01-11 + 2005-01-12: 02 73759 remote @@ -55,13 +54,13 @@ # emerge --ask --oneshot --verbose kde-base/kdelibs - KDE Security Advisory: ftp kioslave command injection - CAN-2004-1165 + KDE Security Advisory: ftp kioslave command injection + CAN-2004-1165 - + jaervosz - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-19.xml index 3beddb86b9..76f1525cfe 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-19.xml @@ -1,6 +1,5 @@ - imlib2: Buffer overflows in image decoding @@ -8,8 +7,8 @@ routines, potentially allowing the execution of arbitrary code. imlib2 - January 11, 2005 - January 11, 2005: 01 + 2005-01-11 + 2005-01-11: 01 77002 remote @@ -52,19 +51,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/imlib2-1.2.0" + # emerge --ask --oneshot --verbose ">=media-libs/imlib2-1.2.0" - CAN-2004-1026 - GLSA 200412-03 + CAN-2004-1026 + GLSA 200412-03 - + koon - + dmargoli - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-20.xml index d53b2ef21e..6540e3bc47 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-20.xml @@ -1,6 +1,5 @@ - o3read: Buffer overflow during file conversion @@ -8,8 +7,8 @@ way of a specially crafted XML file. o3read - January 11, 2005 - January 11, 2005: 01 + 2005-01-11 + 2005-01-11: 01 74478 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/o3read-0.0.4" + # emerge --ask --oneshot --verbose ">=app-text/o3read-0.0.4" - CAN-2004-1288 + CAN-2004-1288 Wiktor Kopec advisory - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-21.xml index 634a42450e..53e906ceb4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-21.xml @@ -1,6 +1,5 @@ - HylaFAX: hfaxd unauthorized login vulnerability @@ -8,8 +7,8 @@ potentially allowing remote users to bypass access control lists. HylaFAX - January 11, 2005 - January 11, 2005: 01 + 2005-01-11 + 2005-01-11: 01 75941 remote @@ -50,7 +49,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/hylafax-4.2.0-r2" + # emerge --ask --oneshot --verbose ">=net-misc/hylafax-4.2.0-r2"

Note: Due to heightened security, weak entries in the hosts.hfaxd file may no longer work. Please see the HylaFAX @@ -58,16 +57,16 @@

- CAN-2004-1182 + CAN-2004-1182 HylaFAX Announcement - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-22.xml index dd598b3842..bf6bcb7784 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-22.xml @@ -1,6 +1,5 @@ - poppassd_pam: Unauthorized password changing @@ -8,8 +7,8 @@ authenticating the user first. poppassd_pam - January 11, 2005 - January 11, 2005: 01 + 2005-01-11 + 2005-01-11: 01 75820 remote @@ -56,22 +55,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/poppassd_ceti-1.8.4" + # emerge --ask --oneshot --verbose ">=net-mail/poppassd_ceti-1.8.4"

Note: Portage will automatically replace the poppassd_pam package by the poppassd_ceti package.

- CAN-2005-0002 + CAN-2005-0002 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-23.xml index a049ddac0d..86e98471fc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-23.xml @@ -1,6 +1,5 @@ - Exim: Two buffer overflows @@ -9,8 +8,8 @@ the SPA authentication mechanism in Exim. exim - January 12, 2005 - January 12, 2005: 01 + 2005-01-12 + 2005-01-12: 01 76893 remote @@ -53,20 +52,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/exim-4.43-r2" + # emerge --ask --oneshot --verbose ">=mail-mta/exim-4.43-r2" - Exim Announcement - CAN-2005-0021 - CAN-2005-0022 + Exim Announcement + CAN-2005-0021 + CAN-2005-0022 - + koon - + vorlon078 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-24.xml index d6ae2e0b28..29f23e26d1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-24.xml @@ -1,6 +1,5 @@ - tnftp: Arbitrary file overwriting @@ -8,8 +7,8 @@ vulnerable to arbitrary file overwriting. tnftp - January 14, 2005 - January 14, 2005: 01 + 2005-01-14 + 2005-01-14: 01 74704 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/tnftp-20050103" + # emerge --ask --oneshot --verbose ">=net-ftp/tnftp-20050103" - CAN-2004-1294 + CAN-2004-1294 Original Advisory - + koon - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-25.xml index 326f299b5c..f40a701442 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-25.xml @@ -1,6 +1,5 @@ - Squid: Multiple vulnerabilities @@ -10,8 +9,8 @@ execution. squid - January 16, 2005 - February 07, 2005: 03 + 2005-01-16 + 2005-02-07: 03 77934 77521 remote @@ -61,21 +60,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.7-r2" + # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.7-r2" - Secunia Advisory SA13825 - Secunia Advisory SA13789 - CAN-2005-0094 - CAN-2005-0095 - CAN-2005-0096 - CAN-2005-0097 - CAN-2005-0194 + Secunia Advisory SA13825 + Secunia Advisory SA13789 + CAN-2005-0094 + CAN-2005-0095 + CAN-2005-0096 + CAN-2005-0097 + CAN-2005-0194 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-26.xml index 43deeb5192..a593b2c7f0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-26.xml @@ -1,6 +1,5 @@ - ImageMagick: PSD decoding heap overflow @@ -8,8 +7,8 @@ Document (PSD) files, which could lead to arbitrary code execution. imagemagick - January 20, 2005 - January 20, 2005: 01 + 2005-01-20 + 2005-01-20: 01 77932 remote @@ -48,16 +47,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.1.8.8" + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.1.8.8" - CAN-2005-0005 + CAN-2005-0005 iDEFENSE Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-27.xml index 79a3964122..a3283897bd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-27.xml @@ -1,6 +1,5 @@ - Ethereal: Multiple vulnerabilities @@ -9,8 +8,8 @@ utilization. ethereal - January 20, 2005 - January 20, 2005: 01 + 2005-01-20 + 2005-01-20: 01 78559 remote @@ -56,7 +55,7 @@

For a temporary workaround you can disable all affected protocol - dissectors by selecting Analyze->Enabled Protocols... and deselecting + dissectors by selecting Analyze->Enabled Protocols... and deselecting them from the list. However, it is strongly recommended to upgrade to the latest stable version.

@@ -67,21 +66,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.9" + # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.9" - CAN-2005-0006 - CAN-2005-0007 - CAN-2005-0008 - CAN-2005-0009 - CAN-2005-0010 - CAN-2005-0084 + CAN-2005-0006 + CAN-2005-0007 + CAN-2005-0008 + CAN-2005-0009 + CAN-2005-0010 + CAN-2005-0084 Ethereal Release Notes - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-28.xml index a603e2d4ac..d8ac333faf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-28.xml @@ -1,6 +1,5 @@ - Xpdf, GPdf: Stack overflow in Decrypt::makeFileKey2 @@ -9,8 +8,8 @@ vulnerable to the same issue. Xpdf - January 21, 2005 - January 21, 2005: 01 + 2005-01-21 + 2005-01-21: 01 77888 78128 remote @@ -56,22 +55,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.00-r8" + # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.00-r8"

All GPdf users should also upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.8.2" + # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.8.2" - CAN-2005-0064 + CAN-2005-0064 iDEFENSE Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-29.xml index f256e77561..b60980a73f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-29.xml @@ -1,14 +1,13 @@ - Mailman: Cross-site scripting vulnerability Mailman is vulnerable to cross-site scripting attacks. mailman - January 22, 2005 - January 22, 2005: 01 + 2005-01-22 + 2005-01-22: 01 77524 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/mailman-2.1.5-r3" + # emerge --ask --oneshot --verbose ">=net-mail/mailman-2.1.5-r3" - CAN-2004-1177 + CAN-2004-1177 - + koon - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-30.xml index cbebbe4d41..518f6220c3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-30.xml @@ -1,6 +1,5 @@ - CUPS: Stack overflow in included Xpdf code @@ -9,8 +8,8 @@ code. CUPS - January 22, 2005 - January 22, 2005: 01 + 2005-01-22 + 2005-01-22: 01 78249 remote @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/cups-1.1.23-r1" + # emerge --ask --oneshot --verbose ">=net-print/cups-1.1.23-r1" - CAN-2005-0064 - GLSA 200501-28 + CAN-2005-0064 + GLSA 200501-28 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-31.xml index ef8d273b12..72a038d647 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-31.xml @@ -1,6 +1,5 @@ - teTeX, pTeX, CSTeX: Multiple vulnerabilities @@ -9,8 +8,8 @@ vulnerable to temporary file handling issues. teTeX - January 23, 2005 - January 23, 2005: 01 + 2005-01-23 + 2005-01-23: 01 75801 remote and local @@ -67,33 +66,33 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/tetex-2.0.2-r5" + # emerge --ask --oneshot --verbose ">=app-text/tetex-2.0.2-r5"

All CSTeX users should also upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/cstetex-2.0.2-r1" + # emerge --ask --oneshot --verbose ">=app-text/cstetex-2.0.2-r1"

Finally, all pTeX users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/ptex-3.1.4-r2" + # emerge --ask --oneshot --verbose ">=app-text/ptex-3.1.4-r2" - CAN-2004-0888 - CAN-2004-0889 - CAN-2004-1125 - CAN-2005-0064 + CAN-2004-0888 + CAN-2004-0889 + CAN-2004-1125 + CAN-2005-0064 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-32.xml index 0698405037..c92495fb5c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-32.xml @@ -1,6 +1,5 @@ - KPdf, KOffice: Stack overflow in included Xpdf code @@ -8,8 +7,8 @@ making them vulnerable to the execution of arbitrary code. kpdf, koffice - January 23, 2005 - January 23, 2005: 01 + 2005-01-23 + 2005-01-23: 01 78619 78620 remote @@ -64,15 +63,15 @@ # emerge --ask --oneshot --verbose app-office/koffice - GLSA 200501-18 - CAN-2005-0064 - KDE Security Advisory: kpdf Buffer Overflow Vulnerability - KDE Security Advisory: KOffice PDF Import Filter Vulnerability + GLSA 200501-18 + CAN-2005-0064 + KDE Security Advisory: kpdf Buffer Overflow Vulnerability + KDE Security Advisory: KOffice PDF Import Filter Vulnerability - + jaervosz - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-33.xml index 4cb3ac3530..a56261ed1e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-33.xml @@ -1,6 +1,5 @@ - MySQL: Insecure temporary file creation @@ -8,8 +7,8 @@ to overwrite arbitrary files. mysql - January 23, 2005 - January 23, 2005: 01 + 2005-01-23 + 2005-01-23: 01 77805 local @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/mysql-4.0.22-r2" + # emerge --ask --oneshot --verbose ">=dev-db/mysql-4.0.22-r2" - CAN-2005-0004 - Secunia Advisory SA13867 + CAN-2005-0004 + Secunia Advisory SA13867 - + koon - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-34.xml index 377bf955d8..e01c05069b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-34.xml @@ -1,6 +1,5 @@ - Konversation: Various vulnerabilities @@ -8,8 +7,8 @@ command execution or information leaks. konversation - January 24, 2005 - January 24, 2005: 01 + 2005-01-24 + 2005-01-24: 01 78712 remote @@ -59,21 +58,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/konversation-0.15.1" + # emerge --ask --oneshot --verbose ">=net-irc/konversation-0.15.1" - CAN-2005-0129 - CAN-2005-0130 - CAN-2005-0131 - KDE Security Advisory: Multiple vulnerabilities in Konversation + CAN-2005-0129 + CAN-2005-0130 + CAN-2005-0131 + KDE Security Advisory: Multiple vulnerabilities in Konversation - + jaervosz - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-35.xml index 83722a5ec0..a118b4810a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-35.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-35.xml @@ -1,6 +1,5 @@ - Evolution: Integer overflow in camel-lock-helper @@ -8,8 +7,8 @@ attacker to execute arbitrary code with elevated privileges. evolution - January 24, 2005 - January 24, 2005: 01 + 2005-01-24 + 2005-01-24: 01 79183 local and remote @@ -50,15 +49,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/evolution-2.0.2-r1" + # emerge --ask --oneshot --verbose ">=mail-client/evolution-2.0.2-r1" - CAN-2005-0102 + CAN-2005-0102 - + DerCorny - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-36.xml index 1d0c50f3a5..6e1556c858 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-36.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-36.xml @@ -1,6 +1,5 @@ - AWStats: Remote code execution @@ -8,8 +7,8 @@ execution of arbitrary code or to the leak of information. awstats - January 25, 2005 - May 28, 2009: 04 + 2005-01-25 + 2009-05-28: 04 77963 81775 remote @@ -52,26 +51,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-misc/awstats-6.3-r2" + # emerge --ask --oneshot --verbose ">=www-misc/awstats-6.3-r2"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

- AWStats ChangeLog + AWStats ChangeLog iDEFENSE Advisory - CAN-2005-0116 - CAN-2005-0362 - CAN-2005-0363 + CAN-2005-0116 + CAN-2005-0362 + CAN-2005-0363 - + koon - + lewk - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-37.xml index fc0ac731f1..7525ba2eea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-37.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-37.xml @@ -1,6 +1,5 @@ - GraphicsMagick: PSD decoding heap overflow @@ -8,8 +7,8 @@ Document (PSD) files, which could lead to arbitrary code execution. GraphicsMagick - January 26, 2005 - January 26, 2005: 01 + 2005-01-26 + 2005-01-26: 01 79336 remote @@ -51,16 +50,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.1.5" + # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.1.5" - CAN-2005-0005 - GLSA 200501-26 + CAN-2005-0005 + GLSA 200501-26 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-38.xml index d941af80b4..3a0ab17ff1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-38.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-38.xml @@ -1,6 +1,5 @@ - Perl: rmtree and DBI tmpfile vulnerabilities @@ -8,8 +7,8 @@ symlink attacks. Perl - January 26, 2005 - March 15, 2005: 03 + 2005-01-26 + 2005-03-15: 03 75696 78634 79685 @@ -71,14 +70,14 @@ # emerge --ask --oneshot --verbose dev-perl/DBI - CAN-2004-0452 - CAN-2005-0077 - CAN-2005-0448 + CAN-2004-0452 + CAN-2005-0077 + CAN-2005-0448 - + DerCorny - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-39.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-39.xml index 4f0c700aeb..3f8a23289e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-39.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-39.xml @@ -1,6 +1,5 @@ - SquirrelMail: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code execution and compromise webmail accounts. SquirrelMail - January 28, 2005 - January 28, 2005: 01 + 2005-01-28 + 2005-01-28: 01 78116 remote @@ -62,22 +61,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.4" + # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.4"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

- SquirrelMail Advisory - CAN-2005-0075 - CAN-2005-0103 - CAN-2005-0104 + SquirrelMail Advisory + CAN-2005-0075 + CAN-2005-0103 + CAN-2005-0104 - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-40.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-40.xml index 9e60708852..4096f35c7b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-40.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-40.xml @@ -1,6 +1,5 @@ - ngIRCd: Buffer overflow @@ -8,8 +7,8 @@ daemon and possibly execute arbitrary code. ngIRCd - January 28, 2005 - May 22, 2006: 02 + 2005-01-28 + 2006-05-22: 02 79705 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/ngIRCd-0.8.2" + # emerge --ask --oneshot --verbose ">=net-irc/ngIRCd-0.8.2" ngIRCd Release Annoucement - CVE-2005-0199 + CVE-2005-0199 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-41.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-41.xml index bb6acb9d4a..fbc6191045 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-41.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-41.xml @@ -1,6 +1,5 @@ - TikiWiki: Arbitrary command execution @@ -8,8 +7,8 @@ scripts. tikiwiki - January 30, 2005 - May 22, 2006: 02 + 2005-01-30 + 2006-05-22: 02 78944 remote @@ -46,16 +45,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5" + # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5" TikiWiki Advisory - CVE-2005-0200 + CVE-2005-0200 - + DerCorny - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-42.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-42.xml index 2e20cf95d0..a1b2b5e9cc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-42.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-42.xml @@ -1,6 +1,5 @@ - VDR: Arbitrary file overwriting issue @@ -8,8 +7,8 @@ the overwriting of arbitrary files. VDR - January 30, 2005 - January 30, 2005: 01 + 2005-01-30 + 2005-01-30: 01 78230 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/vdr-1.2.6-r1" + # emerge --ask --oneshot --verbose ">=media-video/vdr-1.2.6-r1" - CAN-2005-0071 + CAN-2005-0071 - + jaervosz - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-43.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-43.xml index 29f5ae2c98..448554eed1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-43.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-43.xml @@ -1,6 +1,5 @@ - f2c: Insecure temporary file creation @@ -8,8 +7,8 @@ overwrite arbitrary files. f2c - January 30, 2005 - January 30, 2005: 01 + 2005-01-30 + 2005-01-30: 01 79725 local @@ -51,15 +50,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/f2c-20030320-r1" + # emerge --ask --oneshot --verbose ">=dev-lang/f2c-20030320-r1" - CAN-2005-0017 + CAN-2005-0017 - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-44.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-44.xml index ef393b11e2..c45290f43b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-44.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-44.xml @@ -1,6 +1,5 @@ - ncpfs: Multiple vulnerabilities @@ -9,8 +8,8 @@ privileges. ncpfs - January 30, 2005 - January 30, 2005: 01 + 2005-01-30 + 2005-01-30: 01 77414 remote and local @@ -54,20 +53,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/ncpfs-2.2.6" + # emerge --ask --oneshot --verbose ">=net-fs/ncpfs-2.2.6" - CAN-2005-0013 - CAN-2005-0014 + CAN-2005-0013 + CAN-2005-0014 ncpfs ChangeLog - + jaervosz - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-45.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-45.xml index 39f31e059d..b272511a84 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-45.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-45.xml @@ -1,14 +1,13 @@ - Gallery: Cross-site scripting vulnerability Gallery is vulnerable to cross-site scripting attacks. gallery - January 30, 2005 - May 22, 2006: 04 + 2005-01-30 + 2006-05-22: 04 78522 remote @@ -49,7 +48,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/gallery-1.4.4_p6" + # emerge --ask --oneshot --verbose ">=www-apps/gallery-1.4.4_p6"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update. @@ -57,13 +56,13 @@ Gallery Announcement - Secunia Advisory SA13887 - CVE-2005-0220 + Secunia Advisory SA13887 + CVE-2005-0220 - + DerCorny - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-46.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-46.xml index e09944285b..1cf14781c8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-46.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200501-46.xml @@ -1,6 +1,5 @@ - ClamAV: Multiple issues @@ -8,8 +7,8 @@ and evasion of virus scanning. clamav - January 31, 2005 - May 22, 2006: 02 + 2005-01-31 + 2006-05-22: 02 78656 79194 remote @@ -49,21 +48,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.81" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.81" - CAN-2005-0133 - CVE-2005-0218 - ClamAV Release Announcement - Secunia SA13900 + CAN-2005-0133 + CVE-2005-0218 + ClamAV Release Announcement + Secunia SA13900 - + koon - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-01.xml index dc4c970f79..1173a8d253 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-01.xml @@ -1,6 +1,5 @@ - FireHOL: Insecure temporary file creation @@ -8,8 +7,8 @@ to overwrite arbitrary files. FireHOL - February 01, 2005 - May 22, 2006: 02 + 2005-02-01 + 2006-05-22: 02 79330 local @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-firewall/firehol-1.224" + # emerge --ask --oneshot --verbose ">=net-firewall/firehol-1.224" - FireHOL CVS log - CVE-2005-0225 + FireHOL CVS log + CVE-2005-0225 - + koon - + vorlon078 - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-02.xml index f0adcaebb5..253ff0d266 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-02.xml @@ -1,6 +1,5 @@ - UW IMAP: CRAM-MD5 authentication bypass @@ -8,8 +7,8 @@ authentication allowing authentication bypass. uw-imap - February 02, 2005 - May 22, 2006: 02 + 2005-02-02 + 2006-05-22: 02 79874 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/uw-imap-2004b" + # emerge --ask --oneshot --verbose ">=net-mail/uw-imap-2004b" - US-CERT VU#702777 - CVE-2005-0198 + US-CERT VU#702777 + CVE-2005-0198 - + koon - + jaervosz - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-03.xml index b1528150fe..819d9b3e02 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-03.xml @@ -1,6 +1,5 @@ - enscript: Multiple vulnerabilities @@ -8,8 +7,8 @@ resulting in the execution of arbitrary code. enscript - February 02, 2005 - February 02, 2005: 01 + 2005-02-02 + 2005-02-02: 01 77408 remote @@ -50,20 +49,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/enscript-1.6.3-r3" + # emerge --ask --oneshot --verbose ">=app-text/enscript-1.6.3-r3" - CAN-2004-1184 - CAN-2004-1185 - CAN-2004-1186 + CAN-2004-1184 + CAN-2004-1185 + CAN-2004-1186 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-04.xml index bcdf616b94..43961f8334 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-04.xml @@ -1,6 +1,5 @@ - Squid: Multiple vulnerabilities @@ -9,8 +8,8 @@ log poisoning. squid - February 02, 2005 - February 02, 2005: 02 + 2005-02-02 + 2005-02-02: 02 79495 78776 80201 @@ -68,18 +67,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.7-r5" + # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.7-r5" - CAN-2005-0173 - CAN-2005-0174 - CAN-2005-0175 - CAN-2005-0211 + CAN-2005-0173 + CAN-2005-0174 + CAN-2005-0175 + CAN-2005-0211 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-05.xml index 980864b9fb..d64923b138 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-05.xml @@ -1,6 +1,5 @@ - Newspost: Buffer overflow vulnerability @@ -8,8 +7,8 @@ potentially execute arbitrary code. newspost - February 03, 2005 - February 21, 2005: 02 + 2005-02-03 + 2005-02-21: 02 78530 remote @@ -50,15 +49,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-nntp/newspost-2.0-r1" + # emerge --ask --oneshot --verbose ">=net-nntp/newspost-2.0-r1" - CAN-2005-0101 + CAN-2005-0101 - + DerCorny - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-06.xml index b03beab3e0..85af50681c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-06.xml @@ -1,6 +1,5 @@ - LessTif: Multiple vulnerabilities in libXpm @@ -8,8 +7,8 @@ in LessTif, that can potentially lead to remote code execution. lesstif - February 06, 2005 - February 06, 2005: 01 + 2005-02-06 + 2005-02-06: 01 78483 remote @@ -50,16 +49,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/lesstif-0.94.0" + # emerge --ask --oneshot --verbose ">=x11-libs/lesstif-0.94.0" - CAN-2004-0914 + CAN-2004-0914 LessTif Release Notes - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-07.xml index e182e7a723..faa1b36507 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-07.xml @@ -1,6 +1,5 @@ - OpenMotif: Multiple vulnerabilities in libXpm @@ -8,8 +7,8 @@ in OpenMotif, that can potentially lead to remote code execution. openmotif - February 07, 2005 - February 25, 2005: 03 + 2005-02-07 + 2005-02-25: 03 78111 remote @@ -59,19 +58,19 @@

- CAN-2004-0687 - CAN-2004-0688 - CAN-2004-0914 - GLSA 200409-34 - GLSA 200411-28 + CAN-2004-0687 + CAN-2004-0688 + CAN-2004-0914 + GLSA 200409-34 + GLSA 200411-28 - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-08.xml index 64d6fd8a30..6d756972fb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-08.xml @@ -1,6 +1,5 @@ - PostgreSQL: Multiple vulnerabilities @@ -8,8 +7,8 @@ of arbitrary code, Denial of Service and security bypass. postgresql - February 07, 2005 - June 26, 2007: 06 + 2005-02-07 + 2007-06-26: 06 80342 remote and local @@ -64,19 +63,19 @@ # emerge --ask --oneshot --verbose dev-db/postgresql - PostgreSQL Announcement - CAN-2005-0227 - CAN-2005-0244 - CAN-2005-0245 - CAN-2005-0246 + PostgreSQL Announcement + CAN-2005-0227 + CAN-2005-0244 + CAN-2005-0245 + CAN-2005-0246 - + koon - + DerCorny - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-09.xml index 445b64ea5f..be774ed298 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-09.xml @@ -1,6 +1,5 @@ - Python: Arbitrary code execution through SimpleXMLRPCServer @@ -8,8 +7,8 @@ arbitrary code. Python - February 08, 2005 - February 08, 2005: 01 + 2005-02-08 + 2005-02-08: 01 80592 remote @@ -57,16 +56,16 @@ # emerge --ask --oneshot --verbose dev-lang/python - CAN-2005-0089 - Python PSF-2005-001 + CAN-2005-0089 + Python PSF-2005-001 - + koon - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-10.xml index a91da56579..678d0790ba 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-10.xml @@ -1,6 +1,5 @@ - pdftohtml: Vulnerabilities in included Xpdf @@ -9,8 +8,8 @@ file. pdftohtml - February 09, 2005 - February 09, 2005: 01 + 2005-02-09 + 2005-02-09: 01 78629 remote @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/pdftohtml-0.36-r3" + # emerge --ask --oneshot --verbose ">=app-text/pdftohtml-0.36-r3" - GLSA 200501-28 - CAN-2005-0064 + GLSA 200501-28 + CAN-2005-0064 - + vorlon078 - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-11.xml index 87c17e8f67..61309e1f07 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-11.xml @@ -1,6 +1,5 @@ - Mailman: Directory traversal vulnerability @@ -8,8 +7,8 @@ disclosure. mailman - February 10, 2005 - February 10, 2005: 01 + 2005-02-10 + 2005-02-10: 01 81109 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/mailman-2.1.5-r4" + # emerge --ask --oneshot --verbose ">=net-mail/mailman-2.1.5-r4" Full Disclosure Announcement - CAN-2005-0202 + CAN-2005-0202 - + koon - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-12.xml index 176b21e3a2..a3096a4227 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-12.xml @@ -1,6 +1,5 @@ - Webmin: Information leak in Gentoo binary package @@ -8,8 +7,8 @@ the local encrypted root password. Webmin - February 11, 2005 - May 22, 2006: 02 + 2005-02-11 + 2006-05-22: 02 77731 remote @@ -59,15 +58,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/webmin-1.170-r3" + # emerge --ask --oneshot --verbose ">=app-admin/webmin-1.170-r3" - CVE-2005-0427 + CVE-2005-0427 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-13.xml index 9887db4e0d..b92795742e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-13.xml @@ -1,6 +1,5 @@ - Perl: Vulnerabilities in perl-suid wrapper @@ -8,8 +7,8 @@ elevated privileges have been discovered in the perl-suid wrapper. Perl - February 11, 2005 - February 11, 2005: 01 + 2005-02-11 + 2005-02-11: 01 80460 local @@ -60,16 +59,16 @@ # emerge --ask --oneshot --verbose dev-lang/perl - CAN-2005-0155 - CAN-2005-0156 + CAN-2005-0155 + CAN-2005-0156 - + koon - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-14.xml index 355f10b83f..9d3d73386d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-14.xml @@ -1,6 +1,5 @@ - mod_python: Publisher Handler vulnerability @@ -8,8 +7,8 @@ leading to information disclosure. mod_python - February 13, 2005 - December 30, 2007: 03 + 2005-02-13 + 2007-12-30: 03 80109 remote @@ -51,15 +50,15 @@ # emerge --ask --oneshot --verbose www-apache/mod_python - CAN-2005-0088 + CAN-2005-0088 - + jaervosz - + jaervosz - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-15.xml index 6e37278163..65df58bca7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-15.xml @@ -1,14 +1,13 @@ - PowerDNS: Denial of Service vulnerability A vulnerability in PowerDNS could lead to a temporary Denial of Service. PowerDNS - February 13, 2005 - May 22, 2006: 02 + 2005-02-13 + 2006-05-22: 02 80713 remote @@ -46,17 +45,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/pdns-2.9.17" + # emerge --ask --oneshot --verbose ">=net-dns/pdns-2.9.17" - PowerDNS Release Notes + PowerDNS Release Notes PowerDNS Ticket #21 - CVE-2005-0428 + CVE-2005-0428 - + vorlon078 - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-16.xml index 2f9347fb0b..df725f504c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-16.xml @@ -1,14 +1,13 @@ - ht://Dig: Cross-site scripting vulnerability ht://Dig is vulnerable to cross-site scripting attacks. htdig - February 13, 2005 - February 13, 2005: 01 + 2005-02-13 + 2005-02-13: 01 80602 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-misc/htdig-3.1.6-r7" + # emerge --ask --oneshot --verbose ">=www-misc/htdig-3.1.6-r7" - CAN-2005-0085 + CAN-2005-0085 SecurityTracker #1013078 - + vorlon078 - + vorlon078 - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-17.xml index 3cfecd370e..c891bc1f6c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-17.xml @@ -1,6 +1,5 @@ - Opera: Multiple vulnerabilities @@ -8,8 +7,8 @@ information disclosure and facilitate execution of arbitrary code. Opera - February 14, 2005 - December 30, 2007: 03 + 2005-02-14 + 2007-12-30: 03 73871 74076 74321 @@ -62,22 +61,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-7.54-r3" + # emerge --ask --oneshot --verbose ">=www-client/opera-7.54-r3" - Opera Changelog for 7.54u1 - Opera Changelog for 7.54u2 - CVE-2004-1157 - CVE-2004-1489 - CVE-2004-1490 - CVE-2004-1491 - CVE-2005-0456 - CVE-2005-0457 + Opera Changelog for 7.54u1 + Opera Changelog for 7.54u2 + CVE-2004-1157 + CVE-2004-1489 + CVE-2004-1490 + CVE-2004-1491 + CVE-2005-0456 + CVE-2005-0457 - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-18.xml index d0dedb3f00..fcc334eb9f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-18.xml @@ -1,6 +1,5 @@ - VMware Workstation: Untrusted library search path @@ -8,8 +7,8 @@ directory, resulting in the execution of arbitrary code. VMware - February 14, 2005 - May 25, 2006: 03 + 2005-02-14 + 2006-05-25: 03 81344 local @@ -53,18 +52,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/vmware-workstation-3.2.1.2242-r4" + # emerge --ask --oneshot --verbose ">=app-emulation/vmware-workstation-3.2.1.2242-r4" - CVE-2005-0444 + CVE-2005-0444 - + koon - + koon - + taviso
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-19.xml index 84a26a3615..1b0d993fd0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-19.xml @@ -1,6 +1,5 @@ - PostgreSQL: Buffer overflows in PL/PgSQL parser @@ -8,8 +7,8 @@ leading to execution of arbitrary code. postgresql - February 14, 2005 - June 26, 2007: 04 + 2005-02-14 + 2007-06-26: 04 81350 remote @@ -55,15 +54,15 @@ # emerge --ask --oneshot --verbose dev-db/postgresql - CAN-2005-0247 + CAN-2005-0247 - + koon - + jaervosz - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-20.xml index c335bf1f89..79e60556ba 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-20.xml @@ -1,6 +1,5 @@ - Emacs, XEmacs: Format string vulnerabilities in movemail @@ -9,8 +8,8 @@ code. Emacs - February 15, 2005 - July 23, 2006: 02 + 2005-02-15 + 2006-07-23: 02 79686 remote @@ -55,24 +54,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/emacs-21.4" + # emerge --ask --oneshot --verbose ">=app-editors/emacs-21.4"

All XEmacs users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/xemacs-21.4.15-r3" + # emerge --ask --oneshot --verbose ">=app-editors/xemacs-21.4.15-r3" - CAN-2005-0100 + CAN-2005-0100 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-21.xml index 16a9a7bc71..edebbf6478 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-21.xml @@ -1,6 +1,5 @@ - lighttpd: Script source disclosure @@ -8,8 +7,8 @@ should be executed as CGI or FastCGI applications. lighttpd - February 15, 2005 - May 22, 2006: 02 + 2005-02-15 + 2006-05-22: 02 81776 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.3.10-r1" + # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.3.10-r1" - lighttpd-announce Advisory - CVE-2005-0453 + lighttpd-announce Advisory + CVE-2005-0453 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-22.xml index 92a3529c4a..8c625df40d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-22.xml @@ -1,6 +1,5 @@ - wpa_supplicant: Buffer overflow vulnerability @@ -8,8 +7,8 @@ Service. wpa_supplicant - February 16, 2005 - May 22, 2006: 02 + 2005-02-16 + 2006-05-22: 02 81993 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-wireless/wpa_supplicant-0.2.7" + # emerge --ask --oneshot --verbose ">=net-wireless/wpa_supplicant-0.2.7" wpa_supplicant Announcement - CVE-2005-0470 + CVE-2005-0470 - + jaervosz - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-23.xml index e6fb174aa3..b419e04b9d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-23.xml @@ -1,6 +1,5 @@ - KStars: Buffer overflow in fliccd @@ -8,8 +7,8 @@ execution with elevated privileges. kstars - February 16, 2005 - February 16, 2005: 01 + 2005-02-16 + 2005-02-16: 01 79585 remote and local @@ -51,15 +50,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdeedu-3.3.2-r1" + # emerge --ask --oneshot --verbose ">=kde-base/kdeedu-3.3.2-r1" - CAN-2005-0011 + CAN-2005-0011 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-24.xml index 95b79e561e..9e8bd04e26 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-24.xml @@ -1,6 +1,5 @@ - Midnight Commander: Multiple vulnerabilities @@ -8,8 +7,8 @@ and one buffer underflow leading to execution of arbitrary code. mc - February 17, 2005 - February 17, 2005: 01 + 2005-02-17 + 2005-02-17: 01 77992 remote @@ -49,21 +48,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-misc/mc-4.6.0-r13" + # emerge --ask --oneshot --verbose ">=app-misc/mc-4.6.0-r13" - CAN-2004-1004 - CAN-2004-1005 - CAN-2004-1092 - CAN-2004-1176 + CAN-2004-1004 + CAN-2004-1005 + CAN-2004-1092 + CAN-2004-1176 - + koon - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-25.xml index 9cdf5e07d7..9f814d1125 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-25.xml @@ -1,6 +1,5 @@ - Squid: Denial of Service through DNS responses @@ -8,8 +7,8 @@ a Denial of Service. Squid - February 18, 2005 - February 18, 2005: 01 + 2005-02-18 + 2005-02-18: 01 81997 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.8" + # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.8" - CAN-2005-0446 + CAN-2005-0446 - + vorlon078 - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-26.xml index 3e2513bfa6..93e76f0bac 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-26.xml @@ -1,6 +1,5 @@ - GProFTPD: gprostats format string vulnerability @@ -8,8 +7,8 @@ vulnerability, potentially leading to the execution of arbitrary code. GProFTPD - February 18, 2005 - May 22, 2006: 02 + 2005-02-18 + 2006-05-22: 02 81894 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/gproftpd-8.1.9" + # emerge --ask --oneshot --verbose ">=net-ftp/gproftpd-8.1.9" - CVE-2005-0484 + CVE-2005-0484 - + koon - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-27.xml index 1100596609..15cb1ebd4b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-27.xml @@ -1,6 +1,5 @@ - gFTP: Directory traversal vulnerability @@ -8,8 +7,8 @@ creation or overwriting of arbitrary files. gFTP - February 19, 2005 - February 19, 2005: 01 + 2005-02-19 + 2005-02-19: 01 81994 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/gftp-2.0.18-r1" + # emerge --ask --oneshot --verbose ">=net-ftp/gftp-2.0.18-r1" gFTP Announcement - CAN-2005-0372 + CAN-2005-0372 - + koon - + vorlon078 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-28.xml index ad9f4be5de..d515b7c64a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-28.xml @@ -1,6 +1,5 @@ - PuTTY: Remote code execution @@ -8,8 +7,8 @@ server to execute arbitrary code on unsuspecting PSCP and PSFTP clients. Putty - February 21, 2005 - February 21, 2005: 01 + 2005-02-21 + 2005-02-21: 01 82753 remote @@ -50,21 +49,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/putty-0.57" + # emerge --ask --oneshot --verbose ">=net-misc/putty-0.57" - PuTTY vulnerability vuln-sftp-readdir - PuTTY vulnerability vuln-sftp-string - CAN-2005-0467 + PuTTY vulnerability vuln-sftp-readdir + PuTTY vulnerability vuln-sftp-string + CAN-2005-0467 iDEFENSE Advisory - + vorlon078 - + vorlon078 - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-29.xml index fbb66001ff..4e479f38d3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-29.xml @@ -1,6 +1,5 @@ - Cyrus IMAP Server: Multiple overflow vulnerabilities @@ -8,8 +7,8 @@ could potentially lead to the remote execution of arbitrary code. cyrus-imapd - February 23, 2005 - May 22, 2006: 02 + 2005-02-23 + 2006-05-22: 02 82404 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/cyrus-imapd-2.2.12" + # emerge --ask --oneshot --verbose ">=net-mail/cyrus-imapd-2.2.12" Cyrus IMAP Announcement - CVE-2005-0546 + CVE-2005-0546 - + koon - + vorlon078 - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-30.xml index 14f232130d..b69638d94c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-30.xml @@ -1,6 +1,5 @@ - cmd5checkpw: Local password leak vulnerability @@ -8,8 +7,8 @@ cmd5checkpw passwords. cmd5checkpw - February 25, 2005 - May 22, 2006: 02 + 2005-02-25 + 2006-05-22: 02 78256 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/cmd5checkpw-0.22-r2" + # emerge --ask --oneshot --verbose ">=net-mail/cmd5checkpw-0.22-r2" - CVE-2005-0580 + CVE-2005-0580 - + vorlon078 - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-31.xml index 878b71a397..36521e3347 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-31.xml @@ -1,6 +1,5 @@ - uim: Privilege escalation vulnerability @@ -8,8 +7,8 @@ privilege escalation vulnerability. uim - February 28, 2005 - February 28, 2005: 01 + 2005-02-28 + 2005-02-28: 01 82678 local @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-i18n/uim-0.4.5.1" + # emerge --ask --oneshot --verbose ">=app-i18n/uim-0.4.5.1" - CAN-2005-0503 - uim announcement + CAN-2005-0503 + uim announcement - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-32.xml index 6224c72c94..c7e698e6a9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-32.xml @@ -6,8 +6,8 @@ traversal attacks. unace - February 28, 2005 - May 19, 2014: 2 + 2005-02-28 + 2014-05-19: 2 81958 remote @@ -47,14 +47,14 @@ - + CAN-2005-0160 - + CAN-2005-0161 - system - system - system + system + system + system
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-33.xml index 045f2c127c..6174e7ca50 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200502-33.xml @@ -1,6 +1,5 @@ - MediaWiki: Multiple vulnerabilities @@ -8,8 +7,8 @@ security bypass attacks. mediawiki - February 28, 2005 - February 28, 2005: 01 + 2005-02-28 + 2005-02-28: 01 80729 82954 remote @@ -56,21 +55,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.3.11" + # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.3.11" - Secunia Advisory SA14125 - CAN-2005-0534 - CAN-2005-0535 - CAN-2005-0536 + Secunia Advisory SA14125 + CAN-2005-0534 + CAN-2005-0535 + CAN-2005-0536 - + vorlon078 - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-01.xml index a992d8104f..fdc43a842d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-01.xml @@ -1,6 +1,5 @@ - Qt: Untrusted library search path @@ -8,8 +7,8 @@ resulting in the execution of arbitrary code. qt - March 01, 2005 - May 22, 2006: 02 + 2005-03-01 + 2006-05-22: 02 75181 local @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.4-r2" + # emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.4-r2" - CVE-2005-0627 + CVE-2005-0627 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-02.xml index 3c399ba38e..99b566752e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-02.xml @@ -1,6 +1,5 @@ - phpBB: Multiple vulnerabilities @@ -8,8 +7,8 @@ rights or expose and manipulate sensitive data. phpbb - March 01, 2005 - March 01, 2005: 01 + 2005-03-01 + 2005-03-01: 01 82955 local and remote @@ -58,20 +57,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpBB-2.0.13" + # emerge --ask --oneshot --verbose ">=www-apps/phpBB-2.0.13" - CAN-2005-0258 - CAN-2005-0259 - phpBB announcement + CAN-2005-0258 + CAN-2005-0259 + phpBB announcement - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-03.xml index 5fc3180652..90a6f6e983 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-03.xml @@ -1,6 +1,5 @@ - Gaim: Multiple Denial of Service issues @@ -8,8 +7,8 @@ attacker to crash the application. gaim - March 01, 2005 - March 01, 2005: 01 + 2005-03-01 + 2005-03-01: 01 83253 remote @@ -49,20 +48,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/gaim-1.1.4" + # emerge --ask --oneshot --verbose ">=net-im/gaim-1.1.4" - CAN-2005-0208 - CAN-2005-0472 - CAN-2005-0473 + CAN-2005-0208 + CAN-2005-0472 + CAN-2005-0473 - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-04.xml index 192c2c946a..14307ba698 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-04.xml @@ -1,6 +1,5 @@ - phpWebSite: Arbitrary PHP execution and path disclosure @@ -8,8 +7,8 @@ reveals the full path of scripts. phpwebsite - March 01, 2005 - May 22, 2006: 02 + 2005-03-01 + 2006-05-22: 02 83297 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpwebsite-0.10.0-r2" + # emerge --ask --oneshot --verbose ">=www-apps/phpwebsite-0.10.0-r2" - Secunia Advisory SA14399 + Secunia Advisory SA14399 phpWebSite announcement - CVE-2005-0565 - CVE-2005-0572 + CVE-2005-0565 + CVE-2005-0572 - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-05.xml index d3a5173e4b..0ef8beaf3d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-05.xml @@ -1,6 +1,5 @@ - xli, xloadimage: Multiple vulnerabilities @@ -8,8 +7,8 @@ to the execution of arbitrary code. xli - March 02, 2005 - May 22, 2006: 02 + 2005-03-02 + 2006-05-22: 02 79762 remote @@ -58,26 +57,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/xli-1.17.0-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/xli-1.17.0-r1"

All xloadimage users should also upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/xloadimage-4.1-r2" + # emerge --ask --oneshot --verbose ">=media-gfx/xloadimage-4.1-r2" - CAN-2001-0775 - CVE-2005-0638 - CVE-2005-0639 + CAN-2001-0775 + CVE-2005-0638 + CVE-2005-0639 - + koon - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-06.xml index 9be933515c..2a7bf1c021 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-06.xml @@ -1,6 +1,5 @@ - BidWatcher: Format string vulnerability @@ -8,8 +7,8 @@ allowing arbitrary code execution. bidwatcher - March 03, 2005 - March 03, 2005: 01 + 2005-03-03 + 2005-03-03: 01 82460 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/bidwatcher-1.13.17" + # emerge --ask --oneshot --verbose ">=net-misc/bidwatcher-1.13.17" - CAN-2005-0158 + CAN-2005-0158 - + koon - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-07.xml index b44ef69860..203a940119 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-07.xml @@ -1,6 +1,5 @@ - phpMyAdmin: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution, XSS issues and bypass of security restrictions. phpMyAdmin - March 03, 2005 - May 22, 2006: 02 + 2005-03-03 + 2006-05-22: 02 83190 83792 remote @@ -59,23 +58,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.1_p2-r1" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.1_p2-r1" - PMASA-2005-1 - PMASA-2005-2 - phpMyAdmin bug 1113788 - CVE-2005-0543 - CVE-2005-0544 - CVE-2005-0653 + PMASA-2005-1 + PMASA-2005-2 + phpMyAdmin bug 1113788 + CVE-2005-0543 + CVE-2005-0544 + CVE-2005-0653 - + koon - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-08.xml index f9e5f54d92..4621b75d7e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-08.xml @@ -1,6 +1,5 @@ - OpenMotif, LessTif: New libXpm buffer overflows @@ -8,8 +7,8 @@ OpenMotif and LessTif, that can potentially lead to remote code execution. openmotif - March 04, 2005 - March 04, 2005: 01 + 2005-03-04 + 2005-03-04: 01 83655 83656 remote @@ -63,18 +62,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/lesstif-0.94.0-r2" + # emerge --ask --oneshot --verbose ">=x11-libs/lesstif-0.94.0-r2" - CAN-2005-0605 + CAN-2005-0605 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-09.xml index d9b8ddb725..5541c6026b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-09.xml @@ -1,6 +1,5 @@ - xv: Filename handling vulnerability @@ -8,8 +7,8 @@ execution of arbitrary code. xv - March 04, 2005 - May 22, 2006: 02 + 2005-03-04 + 2006-05-22: 02 83686 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/xv-3.10a-r10" + # emerge --ask --oneshot --verbose ">=media-gfx/xv-3.10a-r10" - CVE-2005-0665 + CVE-2005-0665 - + koon - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-10.xml index c670e55077..a810dbffa8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-10.xml @@ -1,6 +1,5 @@ - Mozilla Firefox: Various vulnerabilities @@ -9,8 +8,8 @@ interacting with privileged content. Firefox - March 04, 2005 - March 04, 2005: 01 + 2005-03-04 + 2005-03-04: 01 83267 remote and local @@ -102,38 +101,38 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.1" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.1"

All Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.1" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.1" - CAN-2004-1156 - CAN-2005-0230 - CAN-2005-0231 - CAN-2005-0232 - CAN-2005-0233 - CAN-2005-0255 - CAN-2005-0527 - CAN-2005-0578 - CAN-2005-0584 - CAN-2005-0585 - CAN-2005-0586 - CAN-2005-0588 - CAN-2005-0589 - CAN-2005-0590 - CAN-2005-0591 - CAN-2005-0592 - CAN-2005-0593 - Mozilla Security Advisories + CAN-2004-1156 + CAN-2005-0230 + CAN-2005-0231 + CAN-2005-0232 + CAN-2005-0233 + CAN-2005-0255 + CAN-2005-0527 + CAN-2005-0578 + CAN-2005-0584 + CAN-2005-0585 + CAN-2005-0586 + CAN-2005-0588 + CAN-2005-0589 + CAN-2005-0590 + CAN-2005-0591 + CAN-2005-0592 + CAN-2005-0593 + Mozilla Security Advisories - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-11.xml index 27c0df1f27..ae8c7a8e24 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-11.xml @@ -1,6 +1,5 @@ - ImageMagick: Filename handling vulnerability @@ -8,8 +7,8 @@ attacker to execute arbitrary code. ImageMagick - March 06, 2005 - May 22, 2006: 02 + 2005-03-06 + 2006-05-22: 02 83542 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.2.0.4" + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.2.0.4" - CVE-2005-0397 + CVE-2005-0397 - + koon - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-12.xml index 611c6c283b..5686e364cd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-12.xml @@ -1,6 +1,5 @@ - Hashcash: Format string vulnerability @@ -8,8 +7,8 @@ attacker to execute arbitrary code. Hashcash - March 06, 2005 - May 22, 2006: 02 + 2005-03-06 + 2006-05-22: 02 83541 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/hashcash-1.16-r1" + # emerge --ask --oneshot --verbose ">=net-misc/hashcash-1.16-r1" - CVE-2005-0687 + CVE-2005-0687 - + koon - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-13.xml index a86ca959b7..742092638c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-13.xml @@ -1,6 +1,5 @@ - mlterm: Integer overflow vulnerability @@ -8,8 +7,8 @@ the execution of arbitrary code. mlterm - March 07, 2005 - May 22, 2006: 02 + 2005-03-07 + 2006-05-22: 02 84174 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/mlterm-2.9.2" + # emerge --ask --oneshot --verbose ">=x11-terms/mlterm-2.9.2" mlterm ChangeLog - CVE-2005-0686 + CVE-2005-0686 - + koon - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-14.xml index 079de819aa..030b9260b6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-14.xml @@ -1,6 +1,5 @@ - KDE dcopidlng: Insecure temporary file creation @@ -8,8 +7,8 @@ a local user to overwrite arbitrary files. dcopidlng - March 07, 2005 - March 07, 2005: 01 + 2005-03-07 + 2005-03-07: 01 81652 local @@ -55,12 +54,12 @@ # emerge --ask --oneshot --verbose kde-base/kdelibs - CAN-2005-0365 + CAN-2005-0365 - + jaervosz - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-15.xml index 7a6d0cd243..cf3c3651e0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-15.xml @@ -1,6 +1,5 @@ - X.org: libXpm vulnerability @@ -8,8 +7,8 @@ X.org, that can potentially lead to remote code execution. X.org - March 12, 2005 - March 12, 2005: 02 + 2005-03-12 + 2005-03-12: 02 83598 remote @@ -52,16 +51,16 @@ # emerge --ask --oneshot --verbose x11-base/xorg-x11 - CAN-2005-0605 + CAN-2005-0605 Freedesktop bug - + koon - + SeJo - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-16.xml index fba6a0ac28..64de0ea274 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-16.xml @@ -1,6 +1,5 @@ - Ethereal: Multiple vulnerabilities @@ -8,8 +7,8 @@ run arbitrary code or crash the program. ethereal - March 12, 2005 - May 22, 2006: 03 + 2005-03-12 + 2006-05-22: 03 84547 remote @@ -56,21 +55,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.10" + # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.10" - CAN-2005-0699 - CAN-2005-0704 - CAN-2005-0705 - CAN-2005-0739 - CVE-2005-0765 - CVE-2005-0766 + CAN-2005-0699 + CAN-2005-0704 + CAN-2005-0705 + CAN-2005-0739 + CVE-2005-0765 + CVE-2005-0766 Ethereal enpa-sa-00018 - + jaervosz - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-17.xml index 029cfb4de6..0f8d0fc27b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-17.xml @@ -1,6 +1,5 @@ - libexif: Buffer overflow vulnerability @@ -8,8 +7,8 @@ overflows. libexif - March 12, 2005 - March 12, 2005: 01 + 2005-03-12 + 2005-03-12: 01 84076 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libexif-0.5.12-r1" + # emerge --ask --oneshot --verbose ">=media-libs/libexif-0.5.12-r1" - CAN-2005-0664 + CAN-2005-0664 - + vorlon078 - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-18.xml index bd00804963..f27152a368 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-18.xml @@ -1,6 +1,5 @@ - Ringtone Tools: Buffer overflow vulnerability @@ -8,8 +7,8 @@ potentially leading to the execution of arbitrary code. ringtonetools - March 15, 2005 - March 15, 2005: 01 + 2005-03-15 + 2005-03-15: 01 74700 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-mobilephone/ringtonetools-2.23" + # emerge --ask --oneshot --verbose ">=app-mobilephone/ringtonetools-2.23" - CAN-2004-1292 + CAN-2004-1292 - + lewk - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-19.xml index 11627d5850..cf9780ec0b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-19.xml @@ -1,6 +1,5 @@ - MySQL: Multiple vulnerabilities @@ -8,8 +7,8 @@ overwriting of local files or to the execution of arbitrary code. mysql - March 16, 2005 - March 16, 2005: 02 + 2005-03-16 + 2005-03-16: 02 84819 remote and local @@ -51,20 +50,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/mysql-4.0.24" + # emerge --ask --oneshot --verbose ">=dev-db/mysql-4.0.24" - CAN-2005-0709 - CAN-2005-0710 - CAN-2005-0711 + CAN-2005-0709 + CAN-2005-0710 + CAN-2005-0711 - + jaervosz - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-20.xml index 2d3869fe53..17f89a8a99 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-20.xml @@ -1,6 +1,5 @@ - curl: NTLM response buffer overflow @@ -8,8 +7,8 @@ of arbitrary code. curl - March 16, 2005 - March 16, 2005: 01 + 2005-03-16 + 2005-03-16: 01 82534 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/curl-7.13.1" + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.13.1" - CAN-2005-0490 + CAN-2005-0490 - + vorlon078 - + lewk - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-21.xml index 7431289333..94539cc3aa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-21.xml @@ -1,6 +1,5 @@ - Grip: CDDB response overflow @@ -8,8 +7,8 @@ response, potentially allowing the execution of arbitrary code. grip - March 17, 2005 - March 17, 2005: 01 + 2005-03-17 + 2005-03-17: 01 84704 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/grip-3.3.0" + # emerge --ask --oneshot --verbose ">=media-sound/grip-3.3.0" - CAN-2005-0706 - Original Bug Report + CAN-2005-0706 + Original Bug Report - + koon - + lewk - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-22.xml index 440e9e3de7..f9fd1d3456 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-22.xml @@ -1,14 +1,13 @@ - KDE: Local Denial of Service KDE is vulnerable to a local Denial of Service attack. kde, dcopserver - March 19, 2005 - March 19, 2005: 01 + 2005-03-19 + 2005-03-19: 01 83814 local @@ -51,12 +50,12 @@ # emerge --ask --oneshot --verbose kde-base/kdelibs - CAN-2005-0396 + CAN-2005-0396 - + jaervosz - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-23.xml index 7c58343a2f..085e511a7c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-23.xml @@ -1,6 +1,5 @@ - rxvt-unicode: Buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. rxvt-unicode - March 20, 2005 - March 20, 2005: 01 + 2005-03-20 + 2005-03-20: 01 84680 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/rxvt-unicode-5.3" + # emerge --ask --oneshot --verbose ">=x11-terms/rxvt-unicode-5.3" - CAN-2005-0764 + CAN-2005-0764 - + koon - + lewk - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-24.xml index fa844335fa..4e178cae90 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-24.xml @@ -1,6 +1,5 @@ - LTris: Buffer overflow @@ -8,8 +7,8 @@ of arbitrary code. LTris - March 20, 2005 - March 20, 2005: 01 + 2005-03-20 + 2005-03-20: 01 85770 local @@ -46,16 +45,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-puzzle/ltris-1.0.10" + # emerge --ask --oneshot --verbose ">=games-puzzle/ltris-1.0.10" - + koon - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-25.xml index 7beb0c8286..f379c7b3c8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-25.xml @@ -1,6 +1,5 @@ - OpenSLP: Multiple buffer overflows @@ -8,8 +7,8 @@ the remote execution of arbitrary code. OpenSLP - March 20, 2005 - May 22, 2006: 02 + 2005-03-20 + 2006-05-22: 02 85347 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/openslp-1.2.1" + # emerge --ask --oneshot --verbose ">=net-libs/openslp-1.2.1" SUSE Security Announcement - CVE-2005-0769 + CVE-2005-0769 - + lewk - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-26.xml index 6e722122a2..cf60bb09d8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-26.xml @@ -1,6 +1,5 @@ - Sylpheed, Sylpheed-claws: Message reply overflow @@ -8,8 +7,8 @@ when replying to specially crafted messages. sylpheed sylpheed-claws - March 20, 2005 - March 20, 2005: 01 + 2005-03-20 + 2005-03-20: 01 84056 remote @@ -53,25 +52,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-1.0.3" + # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-1.0.3"

All Sylpheed-claws users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-claws-1.0.3" + # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-claws-1.0.3" Sylpheed ChangeLog - CAN-2005-0667 + CAN-2005-0667 - + koon - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-27.xml index 3ae24aaa8d..3b46945719 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-27.xml @@ -1,6 +1,5 @@ - Xzabite dyndnsupdate: Multiple vulnerabilities @@ -8,8 +7,8 @@ potentially resulting in the remote execution of arbitrary code. dyndnsupdate - March 21, 2005 - May 22, 2006: 02 + 2005-03-21 + 2006-05-22: 02 84659 remote @@ -53,12 +52,12 @@ # emerge --unmerge net-misc/dyndnsupdate - CVE-2005-0830 + CVE-2005-0830 - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-28.xml index 5cf43afeba..f4ccee9475 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-28.xml @@ -1,6 +1,5 @@ - Sun Java: Web Start argument injection vulnerability @@ -8,8 +7,8 @@ execute arbitrary code. Java - March 24, 2005 - May 22, 2006: 02 + 2005-03-24 + 2006-05-22: 02 85804 remote @@ -57,26 +56,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.07" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.07"

All Sun JRE users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.07" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.07" Jouko Pynnonen advisory Sun Microsystems Alert Notification - CVE-2005-0836 + CVE-2005-0836 - + koon - + koon - + formula7
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-29.xml index ebeee9ed62..5ef4e03abc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-29.xml @@ -1,6 +1,5 @@ - GnuPG: OpenPGP protocol attack @@ -8,8 +7,8 @@ message. GnuPG - March 24, 2005 - March 24, 2005: 01 + 2005-03-24 + 2005-03-24: 01 85547 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.1" + # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.1" - CERT VU#303094 - CAN-2005-0366 + CERT VU#303094 + CAN-2005-0366 - + koon - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-30.xml index 077b7e9de9..1797a53d8d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-30.xml @@ -1,6 +1,5 @@ - Mozilla Suite: Multiple vulnerabilities @@ -9,8 +8,8 @@ into trusting fake web sites or interacting with privileged content. Mozilla - March 25, 2005 - March 25, 2005: 01 + 2005-03-25 + 2005-03-25: 01 84074 remote and local @@ -100,39 +99,39 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.6" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.6"

All Mozilla Suite binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.6" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.6" - CAN-2004-1156 - CAN-2005-0230 - CAN-2005-0231 - CAN-2005-0232 - CAN-2005-0233 - CAN-2005-0255 - CAN-2005-0399 - CAN-2005-0401 - CAN-2005-0527 - CAN-2005-0578 - CAN-2005-0584 - CAN-2005-0585 - CAN-2005-0588 - CAN-2005-0590 - CAN-2005-0591 - CAN-2005-0592 - CAN-2005-0593 - Mozilla Security Advisories + CAN-2004-1156 + CAN-2005-0230 + CAN-2005-0231 + CAN-2005-0232 + CAN-2005-0233 + CAN-2005-0255 + CAN-2005-0399 + CAN-2005-0401 + CAN-2005-0527 + CAN-2005-0578 + CAN-2005-0584 + CAN-2005-0585 + CAN-2005-0588 + CAN-2005-0590 + CAN-2005-0591 + CAN-2005-0592 + CAN-2005-0593 + Mozilla Security Advisories - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-31.xml index 6a9c3db2e8..3240cb836a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-31.xml @@ -1,6 +1,5 @@ - Mozilla Firefox: Multiple vulnerabilities @@ -9,8 +8,8 @@ sidebars. Firefox - March 25, 2005 - March 25, 2005: 01 + 2005-03-25 + 2005-03-25: 01 86148 remote @@ -73,25 +72,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.2" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.2"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.2" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.2" - CAN-2005-0399 - CAN-2005-0401 - CAN-2005-0402 - Mozilla Security Advisories + CAN-2005-0399 + CAN-2005-0401 + CAN-2005-0402 + Mozilla Security Advisories - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-32.xml index 6965ffc6e8..b1607a23a0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-32.xml @@ -1,6 +1,5 @@ - Mozilla Thunderbird: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code through malicious GIF images. Thunderbird - March 25, 2005 - March 25, 2005: 01 + 2005-03-25 + 2005-03-25: 01 84075 remote @@ -68,26 +67,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.0.2" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.0.2"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.0.2" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.0.2" - CAN-2005-0255 - CAN-2005-0399 - CAN-2005-0590 - CAN-2005-0592 - Mozilla Security Advisories + CAN-2005-0255 + CAN-2005-0399 + CAN-2005-0590 + CAN-2005-0592 + Mozilla Security Advisories - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-33.xml index 049b4e4d78..3714a60358 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-33.xml @@ -1,14 +1,13 @@ - IPsec-Tools: racoon Denial of Service IPsec-Tools' racoon is affected by a remote Denial of Service vulnerability. IPsec-Tools - March 25, 2005 - March 25, 2005: 01 + 2005-03-25 + 2005-03-25: 01 84479 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-firewall/ipsec-tools-0.4-r1" + # emerge --ask --oneshot --verbose ">=net-firewall/ipsec-tools-0.4-r1" - CAN-2005-0398 - ipsec-tools-devel posting + CAN-2005-0398 + ipsec-tools-devel posting - + jaervosz - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-34.xml index d3a27c7ec3..648a7d482b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-34.xml @@ -1,6 +1,5 @@ - mpg321: Format string vulnerability @@ -8,8 +7,8 @@ the execution of arbitrary code. mpg321 - March 28, 2005 - March 28, 2005: 01 + 2005-03-28 + 2005-03-28: 01 86033 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/mpg321-0.2.10-r2" + # emerge --ask --oneshot --verbose ">=media-sound/mpg321-0.2.10-r2" - CVE-2003-0969 + CVE-2003-0969 - + koon - + taviso - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-35.xml index 4647de95c7..fc25b3fb90 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-35.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-35.xml @@ -1,6 +1,5 @@ - Smarty: Template vulnerability @@ -8,8 +7,8 @@ a remote attacker to execute arbitrary PHP code. smarty - March 30, 2005 - May 22, 2006: 03 + 2005-03-30 + 2006-05-22: 03 86488 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/smarty-2.6.9" + # emerge --ask --oneshot --verbose ">=dev-php/smarty-2.6.9" - Smarty ChangeLog - CVE-2005-0913 + Smarty ChangeLog + CVE-2005-0913 - + koon - + koon - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-36.xml index 1b48e63840..32973b6ef7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-36.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-36.xml @@ -1,6 +1,5 @@ - netkit-telnetd: Buffer overflow @@ -8,8 +7,8 @@ could allow a malicious telnet server operator to execute arbitrary code. netkit-telnetd - March 31, 2005 - March 31, 2005: 01 + 2005-03-31 + 2005-03-31: 01 87211 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/netkit-telnetd-0.17-r6" + # emerge --ask --oneshot --verbose ">=net-misc/netkit-telnetd-0.17-r6" - CAN-2005-0469 + CAN-2005-0469 iDEFENSE Advisory 03-28-05 - + koon - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-37.xml index 4c21db1c5c..1455ea41f0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-37.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200503-37.xml @@ -1,6 +1,5 @@ - LimeWire: Disclosure of sensitive information @@ -8,8 +7,8 @@ information. LimeWire - March 31, 2005 - March 31, 2005: 01 + 2005-03-31 + 2005-03-31: 01 85380 remote @@ -48,20 +47,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-p2p/limewire-4.8.1" + # emerge --ask --oneshot --verbose ">=net-p2p/limewire-4.8.1" - CAN-2005-0788 - CAN-2005-0789 - Secunia Advisory SA14555 + CAN-2005-0788 + CAN-2005-0789 + Secunia Advisory SA14555 - + koon - + koon - + formula7
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-01.xml index 71d20af6a5..bd5f2ecec6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-01.xml @@ -1,6 +1,5 @@ - telnet-bsd: Multiple buffer overflows @@ -8,8 +7,8 @@ could allow a malicious telnet server operator to execute arbitrary code. telnet - April 01, 2005 - April 01, 2005: 01 + 2005-04-01 + 2005-04-01: 01 87019 remote @@ -51,21 +50,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/telnet-bsd-1.0-r1" + # emerge --ask --oneshot --verbose ">=net-misc/telnet-bsd-1.0-r1" - CAN-2005-0468 + CAN-2005-0468 IDEF0867 - CAN-2005-0469 + CAN-2005-0469 IDEF0866 - + koon - + taviso - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-02.xml index e5cdd5c84c..ce865c7f43 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-02.xml @@ -1,6 +1,5 @@ - Sylpheed, Sylpheed-claws: Buffer overflow on message display @@ -8,8 +7,8 @@ when displaying messages with specially crafted attachments. sylpheed - April 02, 2005 - April 02, 2005: 01 + 2005-04-02 + 2005-04-02: 01 86541 remote @@ -53,21 +52,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-1.0.4" + # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-1.0.4"

All Sylpheed-claws users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-claws-1.0.4" + # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-claws-1.0.4" Sylpheed ChangeLog - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-03.xml index ef44389f1f..55ae1c0072 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-03.xml @@ -1,6 +1,5 @@ - Dnsmasq: Poisoning and Denial of Service vulnerabilities @@ -8,8 +7,8 @@ of Service from the local network. Dnsmasq - April 04, 2005 - April 04, 2005: 01 + 2005-04-04 + 2005-04-04: 01 86718 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.22" + # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.22" Dnsmasq Changelog - + jaervosz - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-04.xml index 301e37aa7b..3c9e6b5de5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-04.xml @@ -1,6 +1,5 @@ - mit-krb5: Multiple buffer overflows in telnet client @@ -8,8 +7,8 @@ could allow a malicious telnet server operator to execute arbitrary code. telnet - April 06, 2005 - April 06, 2005: 01 + 2005-04-06 + 2005-04-06: 01 87145 remote @@ -51,17 +50,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.3.6-r2" + # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.3.6-r2" - CAN-2005-0468 - CAN-2005-0469 + CAN-2005-0468 + CAN-2005-0469 MITKRB5-SA-2005-001 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-05.xml index 1a05644d7d..6151a33c64 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-05.xml @@ -1,6 +1,5 @@ - Gaim: Denial of Service issues @@ -8,8 +7,8 @@ Service. Gaim - April 06, 2005 - April 06, 2005: 03 + 2005-04-06 + 2005-04-06: 03 87903 remote @@ -54,21 +53,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/gaim-1.2.1" + # emerge --ask --oneshot --verbose ">=net-im/gaim-1.2.1" - CAN-2005-0967 - CAN-2005-0966 - CAN-2005-0965 - Gaim Vulnerability Index + CAN-2005-0967 + CAN-2005-0966 + CAN-2005-0965 + Gaim Vulnerability Index - + koon - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-06.xml index 1215382038..14d0f29dde 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-06.xml @@ -1,6 +1,5 @@ - sharutils: Insecure temporary file creation @@ -8,8 +7,8 @@ local user to overwrite arbitrary files. sharutils - April 06, 2005 - April 06, 2005: 01 + 2005-04-06 + 2005-04-06: 01 87939 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/sharutils-4.2.1-r11" + # emerge --ask --oneshot --verbose ">=app-arch/sharutils-4.2.1-r11" - Ubuntu Advisory + Ubuntu Advisory - + koon - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-07.xml index 72b81b11f2..b39d00989c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-07.xml @@ -1,6 +1,5 @@ - GnomeVFS, libcdaudio: CDDB response overflow @@ -9,8 +8,8 @@ arbitrary code. GnomeVFS - April 08, 2005 - April 13, 2005: 02 + 2005-04-08 + 2005-04-13: 02 84936 remote @@ -63,16 +62,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libcdaudio-0.99.10-r1" + # emerge --ask --oneshot --verbose ">=media-libs/libcdaudio-0.99.10-r1" - CAN-2005-0706 - GLSA 200503-21 + CAN-2005-0706 + GLSA 200503-21 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-08.xml index b17f7101be..3a98d4f259 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-08.xml @@ -1,14 +1,13 @@ - phpMyAdmin: Cross-site scripting vulnerability phpMyAdmin is vulnerable to a cross-site scripting attack. phpMyAdmin - April 11, 2005 - May 22, 2006: 02 + 2005-04-11 + 2006-05-22: 02 87952 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.2_rc1" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.2_rc1" - PMASA-2005-3 - CVE-2005-0992 + PMASA-2005-3 + CVE-2005-0992 - + lewk - + lewk - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-09.xml index 1bdaf21ccc..4fcd1fc7a7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-09.xml @@ -1,6 +1,5 @@ - Axel: Vulnerability in HTTP redirection handling @@ -8,8 +7,8 @@ the execution of arbitrary code. Axel - April 12, 2005 - April 12, 2005: 01 + 2005-04-12 + 2005-04-12: 01 88264 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/axel-1.0b" + # emerge --ask --oneshot --verbose ">=net-misc/axel-1.0b" - CAN-2005-0390 + CAN-2005-0390 - + koon - + vorlon078 - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-10.xml index b160c2cd8d..d2bee6b524 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-10.xml @@ -1,6 +1,5 @@ - Gld: Remote execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code as the root user. Gld - April 13, 2005 - May 22, 2006: 02 + 2005-04-13 + 2006-05-22: 02 88904 remote @@ -47,17 +46,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-filter/gld-1.5" + # emerge --ask --oneshot --verbose ">=mail-filter/gld-1.5" SecurityTracker ID 1013678 - CVE-2005-1099 - CVE-2005-1100 + CVE-2005-1099 + CVE-2005-1100 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-11.xml index 659fdfb5d3..a817d9956a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-11.xml @@ -1,6 +1,5 @@ - JunkBuster: Multiple vulnerabilities @@ -8,8 +7,8 @@ certain configurations may allow an attacker to modify settings. junkbuster - April 13, 2005 - April 21, 2005: 02 + 2005-04-13 + 2005-04-21: 02 88537 remote @@ -54,19 +53,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/junkbuster-2.0.2-r3" + # emerge --ask --oneshot --verbose ">=net-proxy/junkbuster-2.0.2-r3" - CAN-2005-1108 - CAN-2005-1109 + CAN-2005-1108 + CAN-2005-1109 - + jaervosz - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-12.xml index 210e00bf4f..a77b58d395 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-12.xml @@ -1,6 +1,5 @@ - rsnapshot: Local privilege escalation @@ -8,8 +7,8 @@ in privilege escalation. rsnapshot - April 13, 2005 - December 30, 2007: 05 + 2005-04-13 + 2007-12-30: 05 88681 local @@ -55,15 +54,15 @@ rsnapshot Security Advisory 001 - CVE-2005-1064 + CVE-2005-1064 - + koon - + lewk - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-13.xml index a3806adad0..f27573498f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-13.xml @@ -1,6 +1,5 @@ - OpenOffice.Org: DOC document Heap Overflow @@ -8,8 +7,8 @@ documents, which could lead to arbitrary code execution. OpenOffice - April 15, 2005 - May 08, 2005: 02 + 2005-04-15 + 2005-05-08: 02 88863 remote @@ -60,13 +59,13 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-1.1.4-r1" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-1.1.4-r1"

All OpenOffice.Org binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-1.1.4-r1" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-1.1.4-r1"

All OpenOffice.Org Ximian users should upgrade to the latest version:

@@ -85,16 +84,16 @@

- OpenOffice.Org Issue 46388 - CAN-2005-0941 + OpenOffice.Org Issue 46388 + CAN-2005-0941 - + koon - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-14.xml index 677435e776..b810714a45 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-14.xml @@ -1,6 +1,5 @@ - monkeyd: Multiple vulnerabilities @@ -9,8 +8,8 @@ arbitrary code. monkeyd - April 15, 2005 - May 22, 2006: 02 + 2005-04-15 + 2006-05-22: 02 87916 remote @@ -54,19 +53,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/monkeyd-0.9.1" + # emerge --ask --oneshot --verbose ">=www-servers/monkeyd-0.9.1" - CVE-2005-1122 - CVE-2005-1123 + CVE-2005-1122 + CVE-2005-1123 - + koon - + taviso - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-15.xml index e5dfac0eb6..53dcbad2c5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-15.xml @@ -1,6 +1,5 @@ - PHP: Multiple vulnerabilities @@ -9,8 +8,8 @@ remote execution of arbitrary code. PHP - April 18, 2005 - April 18, 2005: 01 + 2005-04-18 + 2005-04-18: 01 87517 remote @@ -65,31 +64,31 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/php-4.3.11" + # emerge --ask --oneshot --verbose ">=dev-php/php-4.3.11"

All mod_php users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/mod_php-4.3.11" + # emerge --ask --oneshot --verbose ">=dev-php/mod_php-4.3.11"

All php-cgi users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/php-cgi-4.3.11" + # emerge --ask --oneshot --verbose ">=dev-php/php-cgi-4.3.11" - PHP 4.3.11 Release Announcement - CAN-2005-0524 - CAN-2005-0525 - CAN-2005-1042 - CAN-2005-1043 + PHP 4.3.11 Release Announcement + CAN-2005-0524 + CAN-2005-0525 + CAN-2005-1042 + CAN-2005-1043 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-16.xml index 14ce82f7d6..467fb7082c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-16.xml @@ -1,6 +1,5 @@ - CVS: Multiple vulnerabilities @@ -8,8 +7,8 @@ attacker to remotely compromise a CVS server or cause a DoS. CVS - April 18, 2005 - April 22, 2005: 03 + 2005-04-18 + 2005-04-22: 03 86476 89579 remote @@ -52,15 +51,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/cvs-1.11.20" + # emerge --ask --oneshot --verbose ">=dev-util/cvs-1.11.20" - CAN-2005-0753 + CAN-2005-0753 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-17.xml index 51225907dc..134a2c49bb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-17.xml @@ -1,6 +1,5 @@ - XV: Multiple vulnerabilities @@ -8,8 +7,8 @@ in the execution of arbitrary code. xv - April 19, 2005 - April 19, 2005: 01 + 2005-04-19 + 2005-04-19: 01 88742 remote @@ -52,16 +51,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/xv-3.10a-r11" + # emerge --ask --oneshot --verbose ">=media-gfx/xv-3.10a-r11" - + koon - + taviso - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-18.xml index 536c1bcca1..7f3dc36760 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-18.xml @@ -1,6 +1,5 @@ - Mozilla Firefox, Mozilla Suite: Multiple vulnerabilities @@ -9,8 +8,8 @@ JavaScript code with elevated privileges. Mozilla - April 19, 2005 - May 22, 2006: 02 + 2005-04-19 + 2006-05-22: 02 89303 89305 remote @@ -96,40 +95,40 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.3" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.3"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.3" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.3"

All Mozilla Suite users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.7" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.7"

All Mozilla Suite binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.7" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.7" - Mozilla Security Advisories - CAN-2005-0989 - CVE-2005-1153 - CVE-2005-1154 - CVE-2005-1155 - CVE-2005-1156 - CVE-2005-1159 - CVE-2005-1160 + Mozilla Security Advisories + CAN-2005-0989 + CVE-2005-1153 + CVE-2005-1154 + CVE-2005-1155 + CVE-2005-1156 + CVE-2005-1159 + CVE-2005-1160 - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-19.xml index db4e981913..ccd8f4481f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-19.xml @@ -1,6 +1,5 @@ - MPlayer: Two heap overflow vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code. MPlayer - April 20, 2005 - May 22, 2006: 02 + 2005-04-20 + 2006-05-22: 02 89277 remote @@ -49,20 +48,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_pre6-r4" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_pre6-r4" MPlayer News: Real RTSP heap overflow MPlayer News: MMST heap overflow - CVE-2005-1195 + CVE-2005-1195 - + koon - + vorlon078 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-20.xml index 3573e29127..1faa03c346 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-20.xml @@ -1,6 +1,5 @@ - openMosixview: Insecure temporary file creation @@ -8,8 +7,8 @@ attacks, potentially allowing a local user to overwrite arbitrary files. openMosixview - April 21, 2005 - April 21, 2005: 01 + 2005-04-21 + 2005-04-21: 01 86686 local @@ -52,15 +51,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-cluster/openmosixview-1.5-r1" + # emerge --ask --oneshot --verbose ">=sys-cluster/openmosixview-1.5-r1" - CAN-2005-0894 + CAN-2005-0894 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-21.xml index 742232a841..69de790160 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-21.xml @@ -1,6 +1,5 @@ - RealPlayer, Helix Player: Buffer overflow vulnerability @@ -8,8 +7,8 @@ lead to remote execution of arbitrary code. RealPlayer - April 22, 2005 - April 22, 2005: 01 + 2005-04-22 + 2005-04-22: 01 89862 remote @@ -53,25 +52,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/realplayer-10.0.4" + # emerge --ask --oneshot --verbose ">=media-video/realplayer-10.0.4"

All Helix Player users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/helixplayer-1.0.4" + # emerge --ask --oneshot --verbose ">=media-video/helixplayer-1.0.4" - CAN-2005-0755 + CAN-2005-0755 RealNetworks Advisory - + koon - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-22.xml index 79a10fbbc6..378954c174 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-22.xml @@ -1,6 +1,5 @@ - KDE kimgio: PCX handling buffer overflow @@ -8,8 +7,8 @@ resulting in the execution of arbitrary code. KDE - April 22, 2005 - April 22, 2005: 01 + 2005-04-22 + 2005-04-22: 01 88862 remote @@ -51,13 +50,13 @@ # emerge --ask --oneshot --verbose kde-base/kdelibs - CAN-2005-1046 - KDE Security Advisory: kimgio input validation errors + CAN-2005-1046 + KDE Security Advisory: kimgio input validation errors - + jaervosz - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-23.xml index 179cb1626a..451ef6602f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-23.xml @@ -1,6 +1,5 @@ - Kommander: Insecure remote script execution @@ -8,8 +7,8 @@ resulting in the execution of arbitrary code. Kommander - April 22, 2005 - May 20, 2005: 02 + 2005-04-22 + 2005-05-20: 02 89092 remote @@ -48,16 +47,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdewebdev-3.3.2-r2" + # emerge --ask --oneshot --verbose ">=kde-base/kdewebdev-3.3.2-r2" - CAN-2005-0754 - KDE Security Advisory: Kommander untrusted code execution + CAN-2005-0754 + KDE Security Advisory: Kommander untrusted code execution - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-24.xml index 1eb0943a4a..e7bd5d80ce 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-24.xml @@ -1,6 +1,5 @@ - eGroupWare: XSS and SQL injection vulnerabilities @@ -8,8 +7,8 @@ (XSS) vulnerabilities. eGroupWare - April 25, 2005 - May 22, 2006: 02 + 2005-04-25 + 2006-05-22: 02 89517 remote @@ -50,20 +49,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/egroupware-1.0.0.007" + # emerge --ask --oneshot --verbose ">=www-apps/egroupware-1.0.0.007" GulfTech Security Research Advisory - CVE-2005-1202 - CVE-2005-1203 + CVE-2005-1202 + CVE-2005-1203 - + jaervosz - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-25.xml index 5fe87837a7..80a6f316ac 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-25.xml @@ -1,6 +1,5 @@ - Rootkit Hunter: Insecure temporary file creation @@ -8,8 +7,8 @@ local user to overwrite arbitrary files. rkhunter - April 26, 2005 - April 26, 2005: 01 + 2005-04-26 + 2005-04-26: 01 90007 local @@ -54,15 +53,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-forensics/rkhunter-1.2.3-r1" + # emerge --ask --oneshot --verbose ">=app-forensics/rkhunter-1.2.3-r1" - CAN-2005-1270 + CAN-2005-1270 - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-26.xml index 68327d5758..e1417c4391 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-26.xml @@ -1,6 +1,5 @@ - Convert-UUlib: Buffer overflow @@ -8,8 +7,8 @@ in the execution of arbitrary code. Convert-UUlib - April 26, 2005 - May 22, 2006: 02 + 2005-04-26 + 2006-05-22: 02 89501 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-perl/Convert-UUlib-1.051" + # emerge --ask --oneshot --verbose ">=dev-perl/Convert-UUlib-1.051" - CVE-2005-1349 + CVE-2005-1349 - + koon - + koon - + taviso
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-27.xml index d5edd70ade..d42f172158 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-27.xml @@ -1,6 +1,5 @@ - xine-lib: Two heap overflow vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code. xine-lib - April 26, 2005 - April 26, 2005: 01 + 2005-04-26 + 2005-04-26: 01 89976 remote @@ -55,10 +54,10 @@ Xine Advisory XSA-2004-8 - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-28.xml index 5612743e95..6b7deab6e7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-28.xml @@ -1,6 +1,5 @@ - Heimdal: Buffer overflow vulnerabilities @@ -8,8 +7,8 @@ Heimdal which could lead to execution of arbitrary code. Heimdal - April 28, 2005 - April 28, 2005: 01 + 2005-04-28 + 2005-04-28: 01 89861 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/heimdal-0.6.4" + # emerge --ask --oneshot --verbose ">=app-crypt/heimdal-0.6.4" - CAN-2005-0468 - CAN-2005-0469 + CAN-2005-0468 + CAN-2005-0469 - + koon - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-29.xml index 37d82560ef..4ca8cd2765 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-29.xml @@ -1,6 +1,5 @@ - Pound: Buffer overflow vulnerability @@ -8,8 +7,8 @@ execution of arbitrary code. Pound - April 30, 2005 - May 22, 2006: 02 + 2005-04-30 + 2006-05-22: 02 90851 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/pound-1.8.3" + # emerge --ask --oneshot --verbose ">=www-servers/pound-1.8.3" Original announcement - CVE-2005-1391 + CVE-2005-1391 - + koon - + formula7 - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-30.xml index 808ef3dac6..22aa6ae9c7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200504-30.xml @@ -1,6 +1,5 @@ - phpMyAdmin: Insecure SQL script installation @@ -8,8 +7,8 @@ potentially leading to a database compromise. phpmyadmin - April 30, 2005 - May 22, 2006: 02 + 2005-04-30 + 2006-05-22: 02 88831 local @@ -59,15 +58,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.2-r1" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.2-r1" - CVE-2005-1392 + CVE-2005-1392 - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-01.xml index a801e6bf5e..a6ed7a6a08 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-01.xml @@ -1,6 +1,5 @@ - Horde Framework: Multiple XSS vulnerabilities @@ -8,8 +7,8 @@ cross-site scripting (XSS) vulnerabilities. Horde - May 01, 2005 - May 01, 2005: 01 + 2005-05-01 + 2005-05-01: 01 90365 remote @@ -88,78 +87,78 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-2.2.8" + # emerge --ask --oneshot --verbose ">=www-apps/horde-2.2.8"

All Horde Vacation users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-vacation-2.2.2" + # emerge --ask --oneshot --verbose ">=www-apps/horde-vacation-2.2.2"

All Horde Turba users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-turba-1.2.5" + # emerge --ask --oneshot --verbose ">=www-apps/horde-turba-1.2.5"

All Horde Passwd users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-passwd-2.2.2" + # emerge --ask --oneshot --verbose ">=www-apps/horde-passwd-2.2.2"

All Horde Nag users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-nag-1.1.3" + # emerge --ask --oneshot --verbose ">=www-apps/horde-nag-1.1.3"

All Horde Mnemo users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-mnemo-1.1.4" + # emerge --ask --oneshot --verbose ">=www-apps/horde-mnemo-1.1.4"

All Horde Kronolith users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-kronolith-1.1.4" + # emerge --ask --oneshot --verbose ">=www-apps/horde-kronolith-1.1.4"

All Horde IMP users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-imp-3.2.8" + # emerge --ask --oneshot --verbose ">=www-apps/horde-imp-3.2.8"

All Horde Accounts users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-accounts-2.1.2" + # emerge --ask --oneshot --verbose ">=www-apps/horde-accounts-2.1.2"

All Horde Forwards users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-forwards-2.2.2" + # emerge --ask --oneshot --verbose ">=www-apps/horde-forwards-2.2.2"

All Horde Chora users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-chora-1.2.3" + # emerge --ask --oneshot --verbose ">=www-apps/horde-chora-1.2.3" Horde Announcement - + koon - + koon - + formula7
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-02.xml index 4bf8fac430..2c0cb1145a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-02.xml @@ -1,6 +1,5 @@ - Oops!: Remote code execution @@ -9,8 +8,8 @@ code. oops - May 05, 2005 - May 05, 2005: 02 + 2005-05-05 + 2005-05-05: 02 91303 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/oops-1.5.24_pre20050503" + # emerge --ask --oneshot --verbose ">=net-proxy/oops-1.5.24_pre20050503" - CAN-2005-1121 + CAN-2005-1121 - + jaervosz - + jaervosz - + lewk
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-03.xml index 5dd7699724..61e7b9c675 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-03.xml @@ -1,6 +1,5 @@ - Ethereal: Numerous vulnerabilities @@ -8,8 +7,8 @@ the execution of arbitrary code or abnormal termination. Ethereal - May 06, 2005 - May 06, 2005: 01 + 2005-05-06 + 2005-05-06: 01 90539 remote @@ -72,30 +71,30 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.11" + # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.11" Ethereal enpa-sa-00019 - CAN-2005-1456 - CAN-2005-1457 - CAN-2005-1458 - CAN-2005-1459 - CAN-2005-1460 - CAN-2005-1461 - CAN-2005-1462 - CAN-2005-1463 - CAN-2005-1464 - CAN-2005-1465 - CAN-2005-1466 - CAN-2005-1467 - CAN-2005-1468 - CAN-2005-1469 - CAN-2005-1470 + CAN-2005-1456 + CAN-2005-1457 + CAN-2005-1458 + CAN-2005-1459 + CAN-2005-1460 + CAN-2005-1461 + CAN-2005-1462 + CAN-2005-1463 + CAN-2005-1464 + CAN-2005-1465 + CAN-2005-1466 + CAN-2005-1467 + CAN-2005-1468 + CAN-2005-1469 + CAN-2005-1470 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-04.xml index 19056a1bbd..68bd0df3ed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-04.xml @@ -1,14 +1,13 @@ - GnuTLS: Denial of Service vulnerability The GnuTLS library is vulnerable to Denial of Service attacks. GnuTLS - May 09, 2005 - May 09, 2005: 01 + 2005-05-09 + 2005-05-09: 01 90726 remote @@ -67,15 +66,15 @@ GnuTLS Announcement - CAN-2005-1431 + CAN-2005-1431 - + koon - + koon - + lewk diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-05.xml index 097a411087..eb08e9bc8d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-05.xml @@ -1,6 +1,5 @@ - gzip: Multiple vulnerabilities @@ -8,8 +7,8 @@ execute arbitrary commands. gzip - May 09, 2005 - May 09, 2005: 01 + 2005-05-09 + 2005-05-09: 01 89946 90626 local @@ -52,17 +51,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r6" + # emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r6" - CAN-2005-0758 - CAN-2005-0988 - CAN-2005-1228 + CAN-2005-0758 + CAN-2005-0988 + CAN-2005-1228 - + r2d2 - + r2d2
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-06.xml index 9fa4462da5..dbbb7c14ff 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-06.xml @@ -1,6 +1,5 @@ - TCPDump: Decoding routines Denial of Service vulnerability @@ -8,8 +7,8 @@ remote Denial of Service attack. tcpdump - May 09, 2005 - June 12, 2005: 02 + 2005-05-09 + 2005-06-12: 02 90541 95349 remote @@ -50,21 +49,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/tcpdump-3.8.3-r3" + # emerge --ask --oneshot --verbose ">=net-analyzer/tcpdump-3.8.3-r3" - CAN-2005-1267 - CAN-2005-1278 - CAN-2005-1279 - CAN-2005-1280 + CAN-2005-1267 + CAN-2005-1278 + CAN-2005-1279 + CAN-2005-1280 - + jaervosz - + DerCorny - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-07.xml index 2d5b9be1c6..2a98ed3e9f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-07.xml @@ -1,6 +1,5 @@ - libTIFF: Buffer overflow @@ -8,8 +7,8 @@ resulting in the execution of arbitrary code. tiff - May 10, 2005 - May 22, 2006: 02 + 2005-05-10 + 2006-05-22: 02 91584 remote @@ -48,16 +47,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.7.2" + # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.7.2" LIBTIFF BUG#863 - CVE-2005-1544 + CVE-2005-1544 - + taviso - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-08.xml index 019696bf23..61cbd1b8bc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-08.xml @@ -1,6 +1,5 @@ - HT Editor: Multiple buffer overflows @@ -8,8 +7,8 @@ to the execution of arbitrary code. hteditor - May 10, 2005 - May 22, 2006: 02 + 2005-05-10 + 2006-05-22: 02 91569 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/hteditor-0.8.0-r2" + # emerge --ask --oneshot --verbose ">=app-editors/hteditor-0.8.0-r2" - CVE-2005-1545 - CVE-2005-1546 + CVE-2005-1545 + CVE-2005-1546 - + jaervosz - + taviso - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-09.xml index 7ad2973371..b59b136f18 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-09.xml @@ -1,6 +1,5 @@ - Gaim: Denial of Service and buffer overflow vulnerabilties @@ -8,8 +7,8 @@ of arbitrary code or Denial of Service. gaim - May 12, 2005 - May 12, 2005: 01 + 2005-05-12 + 2005-05-12: 01 91862 remote @@ -54,16 +53,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/gaim-1.3.0" + # emerge --ask --oneshot --verbose ">=net-im/gaim-1.3.0" - CAN-2005-1261 - CAN-2005-1262 + CAN-2005-1261 + CAN-2005-1262 - + DerCorny - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-10.xml index 8496d94a23..4dfee54937 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-10.xml @@ -1,6 +1,5 @@ - phpBB: Cross-Site Scripting Vulnerability @@ -8,8 +7,8 @@ arbitrary scripting code execution. phpBB - May 14, 2005 - May 14, 2005: 01 + 2005-05-14 + 2005-05-14: 01 90213 remote @@ -49,19 +48,19 @@

emerge --sync - emerge --ask --oneshot --verbose ">=www-apps/phpBB-2.0.15" + emerge --ask --oneshot --verbose ">=www-apps/phpBB-2.0.15" BugTraq ID 13344 SecurityTracker ID 1013918 - + koon - + koon - + r2d2
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-11.xml index 6824b7fd6c..ab29551f8e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-11.xml @@ -1,6 +1,5 @@ - Mozilla Suite, Mozilla Firefox: Remote compromise @@ -8,8 +7,8 @@ to conduct cross-site scripting attacks or to execute arbitrary code. mozilla - May 15, 2005 - May 15, 2005: 01 + 2005-05-15 + 2005-05-15: 01 91859 92393 92394 @@ -77,40 +76,40 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.4" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.4"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.4" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.4"

All Mozilla Suite users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.8" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.8"

All Mozilla Suite binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.8" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.8" - CAN-2005-1476 - CAN-2005-1477 - Mozilla Foundation Security Advisory 2005-43 + CAN-2005-1476 + CAN-2005-1477 + Mozilla Foundation Security Advisory 2005-43 - + jaervosz - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-12.xml index 57b3e95210..91c7fbe16b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-12.xml @@ -1,6 +1,5 @@ - PostgreSQL: Multiple vulnerabilities @@ -8,8 +7,8 @@ unprivileged users to gain administrator rights. postgresql - May 15, 2005 - June 26, 2007: 04 + 2005-05-15 + 2007-06-26: 04 91231 remote @@ -55,8 +54,7 @@

All PostgreSQL users should update to the latest available version and - follow the guide at http://www.postgresql.o + follow the guide at http://www.postgresql.o rg/about/news.315

@@ -65,14 +63,14 @@ # emerge --ask --oneshot --verbose dev-db/postgresql
- CAN-2005-1409 - CAN-2005-1410 - PostgreSQL Announcement + CAN-2005-1409 + CAN-2005-1410 + PostgreSQL Announcement - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-13.xml index 7c630928e1..9d5733e884 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-13.xml @@ -1,6 +1,5 @@ - FreeRADIUS: SQL injection and Denial of Service vulnerability @@ -9,8 +8,8 @@ Denial of Service. freeradius - May 17, 2005 - May 22, 2006: 03 + 2005-05-17 + 2006-05-22: 03 91736 remote @@ -52,21 +51,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.0.2-r4" + # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.0.2-r4" BugTraq ID 13540 BugTraq ID 13541 - CVE-2005-1454 - CVE-2005-1455 + CVE-2005-1454 + CVE-2005-1455 - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-14.xml index 36d0bf4453..0f94421136 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-14.xml @@ -1,6 +1,5 @@ - Cheetah: Untrusted module search path @@ -8,8 +7,8 @@ allow a local user to gain escalated privileges. Cheetah - May 19, 2005 - May 17, 2006: 02 + 2005-05-19 + 2006-05-17: 02 92926 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-python/cheetah-0.9.17_rc1" + # emerge --ask --oneshot --verbose ">=dev-python/cheetah-0.9.17_rc1" - Secunia Advisory SA15386 + Secunia Advisory SA15386 - + jaervosz - + r2d2 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-15.xml index da2e894f01..14bea9a7ee 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-15.xml @@ -1,6 +1,5 @@ - gdb: Multiple vulnerabilities @@ -8,8 +7,8 @@ potentially allowing the execution of arbitrary code. gdb - May 20, 2005 - May 22, 2006: 02 + 2005-05-20 + 2006-05-22: 02 88398 91398 91654 @@ -53,19 +52,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-devel/gdb-6.3-r3" + # emerge --ask --oneshot --verbose ">=sys-devel/gdb-6.3-r3" - CVE-2005-1704 - CVE-2005-1705 + CVE-2005-1704 + CVE-2005-1705 - + jaervosz - + r2d2 - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-16.xml index 94ee3b47ef..8275d53521 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-16.xml @@ -1,6 +1,5 @@ - ImageMagick, GraphicsMagick: Denial of Service vulnerability @@ -8,8 +7,8 @@ of Service attack. ImageMagick - May 21, 2005 - May 22, 2006: 02 + 2005-05-21 + 2006-05-22: 02 90423 90595 remote @@ -54,24 +53,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.2.2.3" + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.2.2.3"

All GraphicsMagick users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.1.6-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.1.6-r1" - CVE-2005-1739 + CVE-2005-1739 - + jaervosz - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-17.xml index cc6b590895..81cbb9fda3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-17.xml @@ -1,6 +1,5 @@ - Qpopper: Multiple Vulnerabilities @@ -8,8 +7,8 @@ arbitrary files and create files with insecure permissions. qpopper - May 23, 2005 - May 23, 2005: 01 + 2005-05-23 + 2005-05-23: 01 90622 local @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/qpopper-4.0.5-r3" + # emerge --ask --oneshot --verbose ">=net-mail/qpopper-4.0.5-r3" - CAN-2005-1151 - CAN-2005-1152 + CAN-2005-1151 + CAN-2005-1152 - + DerCorny - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-18.xml index adb4d75abe..293a82c188 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-18.xml @@ -1,6 +1,5 @@ - Net-SNMP: fixproc insecure temporary file creation @@ -8,8 +7,8 @@ the execution of arbitrary code. net-snmp - May 23, 2005 - May 22, 2006: 02 + 2005-05-23 + 2006-05-22: 02 91792 local @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.2.1-r1" + # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.2.1-r1" - CVE-2005-1740 + CVE-2005-1740 - + vorlon078 - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-19.xml index 6aae76c0f6..401b23b4f3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-19.xml @@ -1,6 +1,5 @@ - gxine: Format string vulnerability @@ -8,8 +7,8 @@ execute arbitrary code. gxine - May 26, 2005 - May 26, 2005: 01 + 2005-05-26 + 2005-05-26: 01 93532 remote @@ -51,14 +50,14 @@ # emerge --ask --oneshot --verbose media-video/gxine - CAN-2005-1692 + CAN-2005-1692 Bugtraq ID 13707 Original Advisory - + DerCorny - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-20.xml index d02c849e4d..c5ac4079ac 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200505-20.xml @@ -1,6 +1,5 @@ - Mailutils: Multiple vulnerabilities in imap4d and mail @@ -9,8 +8,8 @@ arbitrary code with root privileges. mailutils - May 27, 2005 - May 27, 2005: 01 + 2005-05-27 + 2005-05-27: 01 94053 remote @@ -59,19 +58,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/mailutils-0.6-r1" + # emerge --ask --oneshot --verbose ">=net-mail/mailutils-0.6-r1" - CAN-2005-1520 - CAN-2005-1521 - CAN-2005-1522 - CAN-2005-1523 + CAN-2005-1520 + CAN-2005-1521 + CAN-2005-1522 + CAN-2005-1523 iDEFENSE 05.25.05 advisories - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-01.xml index ad788bef86..d6cad10e5e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-01.xml @@ -1,6 +1,5 @@ - Binutils, elfutils: Buffer overflow @@ -9,8 +8,8 @@ execution of arbitrary code. binutils - June 01, 2005 - May 22, 2006: 02 + 2005-06-01 + 2006-05-22: 02 91398 91817 remote @@ -67,15 +66,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/elfutils-0.108" + # emerge --ask --oneshot --verbose ">=dev-libs/elfutils-0.108" - CVE-2005-1704 + CVE-2005-1704 - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-02.xml index 0d85c6d056..2a01aca0d3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-02.xml @@ -1,14 +1,13 @@ - Mailutils: SQL Injection GNU Mailutils is vulnerable to SQL command injection attacks. mailutils - June 06, 2005 - June 06, 2005: 01 + 2005-06-06 + 2005-06-06: 01 94824 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/mailutils-0.6-r1" + # emerge --ask --oneshot --verbose ">=net-mail/mailutils-0.6-r1" - CAN-2005-1824 + CAN-2005-1824 - + jaervosz - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-03.xml index 36a4e8e452..3a571124f3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-03.xml @@ -1,14 +1,13 @@ - Dzip: Directory traversal vulnerability Dzip is vulnerable to a directory traversal attack. dzip - June 06, 2005 - May 22, 2006: 02 + 2005-06-06 + 2006-05-22: 02 93079 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-utils/dzip-2.9-r1" + # emerge --ask --oneshot --verbose ">=games-utils/dzip-2.9-r1" - CVE-2005-1874 + CVE-2005-1874 - + koon - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-04.xml index afa084d9e4..2d4f938e28 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-04.xml @@ -1,14 +1,13 @@ - Wordpress: Multiple vulnerabilities Wordpress contains SQL injection and XSS vulnerabilities. Wordpress - June 06, 2005 - May 22, 2006: 02 + 2005-06-06 + 2006-05-22: 02 88926 94512 remote @@ -50,20 +49,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/wordpress-1.5.1.2" + # emerge --ask --oneshot --verbose ">=www-apps/wordpress-1.5.1.2" - CVE-2005-1102 - CVE-2005-1687 - CVE-2005-1810 + CVE-2005-1102 + CVE-2005-1687 + CVE-2005-1810 - + koon - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-05.xml index 9e88bb7f8b..1899fbfaa5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-05.xml @@ -1,6 +1,5 @@ - SilverCity: Insecure file permissions @@ -8,8 +7,8 @@ unsuspecting user to run arbitrary code. silvercity - June 08, 2005 - May 22, 2006: 02 + 2005-06-08 + 2006-05-22: 02 93558 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/silvercity-0.9.5-r1" + # emerge --ask --oneshot --verbose ">=app-text/silvercity-0.9.5-r1" - CVE-2005-1941 + CVE-2005-1941 - + koon - + koon - + r2d2
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-06.xml index cf23d455b4..571b3df853 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-06.xml @@ -1,6 +1,5 @@ - libextractor: Multiple overflow vulnerabilities @@ -9,8 +8,8 @@ code. libextractor - June 09, 2005 - June 09, 2005: 01 + 2005-06-09 + 2005-06-09: 01 79704 remote @@ -51,20 +50,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libextractor-0.5.0" + # emerge --ask --oneshot --verbose ">=media-libs/libextractor-0.5.0" - CAN-2005-0064 - GLSA 200501-28 - libextractor security announcement + CAN-2005-0064 + GLSA 200501-28 + libextractor security announcement - + koon - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-07.xml index b74ef01de5..b13e0f38d5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-07.xml @@ -1,6 +1,5 @@ - Ettercap: Format string vulnerability @@ -8,8 +7,8 @@ execute arbitrary code. ettercap - June 11, 2005 - June 11, 2005: 01 + 2005-06-11 + 2005-06-11: 01 94474 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/ettercap-0.7.3" + # emerge --ask --oneshot --verbose ">=net-analyzer/ettercap-0.7.3" - CAN-2005-1796 + CAN-2005-1796 - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-08.xml index 4bb6a65489..db6d5a8b39 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-08.xml @@ -1,6 +1,5 @@ - GNU shtool, ocaml-mysql: Insecure temporary file creation @@ -8,8 +7,8 @@ allowing a local user to overwrite arbitrary files. GNU shtool - June 11, 2005 - June 11, 2005: 01 + 2005-06-11 + 2005-06-11: 01 93782 93784 local @@ -57,25 +56,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/shtool-2.0.1-r2" + # emerge --ask --oneshot --verbose ">=dev-util/shtool-2.0.1-r2"

All ocaml-mysql users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-ml/ocaml-mysql-1.0.3-r1" + # emerge --ask --oneshot --verbose ">=dev-ml/ocaml-mysql-1.0.3-r1" - CAN-2005-1751 - CAN-2005-1759 + CAN-2005-1751 + CAN-2005-1759 - + vorlon078 - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-09.xml index fd359ad1f8..4a3e39910b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-09.xml @@ -1,6 +1,5 @@ - gedit: Format string vulnerability @@ -8,8 +7,8 @@ code execution. gedit - June 11, 2005 - May 22, 2006: 02 + 2005-06-11 + 2006-05-22: 02 93352 remote @@ -46,20 +45,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/gedit-2.10.3" + # emerge --ask --oneshot --verbose ">=app-editors/gedit-2.10.3" BugTraq ID 13699 - gedit 10.3 Release Notes - CVE-2005-1686 + gedit 10.3 Release Notes + CVE-2005-1686 - + koon - + r2d2 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-10.xml index f7910c4f03..17f422ad8d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-10.xml @@ -1,6 +1,5 @@ - LutelWall: Insecure temporary file creation @@ -8,8 +7,8 @@ user to overwrite arbitrary files. LutelWall - June 11, 2005 - June 11, 2005: 01 + 2005-06-11 + 2005-06-11: 01 95378 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-firewall/lutelwall-0.98" + # emerge --ask --oneshot --verbose ">=net-firewall/lutelwall-0.98" - CAN-2005-1879 + CAN-2005-1879 - + vorlon078 - + koon - + formula7
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-11.xml index 76f87c6779..519b821fcb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-11.xml @@ -1,14 +1,13 @@ - Gaim: Denial of Service vulnerabilities Gaim contains two remote Denial of Service vulnerabilities. gaim - June 12, 2005 - June 12, 2005: 01 + 2005-06-12 + 2005-06-12: 01 95347 remote @@ -51,21 +50,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/gaim-1.3.1" + # emerge --ask --oneshot --verbose ">=net-im/gaim-1.3.1" - Gaim Vulnerability: Remote Yahoo! crash - Gaim Vulnerability: MSN Remote DoS - CAN-2005-1269 - CAN-2005-1934 + Gaim Vulnerability: Remote Yahoo! crash + Gaim Vulnerability: MSN Remote DoS + CAN-2005-1269 + CAN-2005-1934 - + koon - + r2d2 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-12.xml index e26f0aa363..101daac723 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-12.xml @@ -1,6 +1,5 @@ - MediaWiki: Cross-site scripting vulnerability @@ -8,8 +7,8 @@ arbitrary scripting code execution. mediawiki - June 13, 2005 - June 13, 2005: 01 + 2005-06-13 + 2005-06-13: 01 95255 remote @@ -53,15 +52,15 @@ # emerge --ask --oneshot --verbose www-apps/mediawiki - MediaWiki 1.4.5 Release Notes + MediaWiki 1.4.5 Release Notes - + koon - + koon - + DerCorny diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-13.xml index 9f50360e10..51f1cdcdc5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-13.xml @@ -1,6 +1,5 @@ - webapp-config: Insecure temporary file handling @@ -9,8 +8,8 @@ commands. webapp-config - June 17, 2005 - December 30, 2007: 03 + 2005-06-17 + 2007-12-30: 03 91785 local @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/webapp-config-1.11" + # emerge --ask --oneshot --verbose ">=app-admin/webapp-config-1.11" - CVE-2005-1707 + CVE-2005-1707 - + jaervosz - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-14.xml index 3557bde771..fda4b5bdbd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-14.xml @@ -1,6 +1,5 @@ - Sun and Blackdown Java: Applet privilege escalation @@ -8,8 +7,8 @@ their privileges. sun-jdk sun-jre-bin blackdown-jre blackdown-jdk - June 19, 2005 - June 19, 2005: 01 + 2005-06-19 + 2005-06-19: 01 96092 96229 remote @@ -62,25 +61,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.08" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.08"

All Sun JRE users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.08" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.08"

All Blackdown JDK users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jdk-1.4.2.02" + # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jdk-1.4.2.02"

All Blackdown JRE users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jre-1.4.2.02" + # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jre-1.4.2.02"

Note to SPARC users: There is no stable secure Blackdown Java for the SPARC architecture. Affected users should remove the package @@ -91,13 +90,13 @@ Sun Security Alert ID 101749 Blackdown Java Security Advisory - + koon - + DerCorny - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-15.xml index dd92091f40..a0d187bd4b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-15.xml @@ -1,6 +1,5 @@ - PeerCast: Format string vulnerability @@ -8,8 +7,8 @@ arbitrary code execution. peercast - June 19, 2005 - May 22, 2006: 02 + 2005-06-19 + 2006-05-22: 02 96199 remote @@ -48,20 +47,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1212" + # emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1212" GulfTech Advisory PeerCast Announcement - CVE-2005-1806 + CVE-2005-1806 - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-16.xml index 4c0f246bcd..63ade67a14 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-16.xml @@ -1,6 +1,5 @@ - cpio: Directory traversal vulnerability @@ -8,8 +7,8 @@ extract files to an arbitrary directory. cpio - June 20, 2005 - June 20, 2005: 01 + 2005-06-20 + 2005-06-20: 01 90619 local @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/cpio-2.6-r3" + # emerge --ask --oneshot --verbose ">=app-arch/cpio-2.6-r3" Original Advisory - CAN-2005-1111 + CAN-2005-1111 - + jaervosz - + lewk - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-17.xml index 70de5953da..7658fd3a4e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-17.xml @@ -1,6 +1,5 @@ - SpamAssassin 3, Vipul's Razor: Denial of Service vulnerability @@ -8,8 +7,8 @@ when handling certain malformed messages. SpamAssassin, Vipul's Razor - June 21, 2005 - May 22, 2006: 03 + 2005-06-21 + 2006-05-22: 03 94722 95492 96776 @@ -55,24 +54,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-filter/spamassassin-3.0.4" + # emerge --ask --oneshot --verbose ">=mail-filter/spamassassin-3.0.4"

All Vipul's Razor users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-filter/razor-2.74" + # emerge --ask --oneshot --verbose ">=mail-filter/razor-2.74" - CAN-2005-1266 - CVE-2005-2024 - SpamAssassin Announcement - Vipul's Razor Announcement + CAN-2005-1266 + CVE-2005-2024 + SpamAssassin Announcement + Vipul's Razor Announcement - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-18.xml index 4d105d99aa..f376b99ad3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-18.xml @@ -1,14 +1,13 @@ - Tor: Information disclosure A flaw in Tor may allow the disclosure of arbitrary memory portions. tor - June 21, 2005 - May 22, 2006: 02 + 2005-06-21 + 2006-05-22: 02 96320 remote @@ -46,19 +45,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/tor-0.0.9.10" + # emerge --ask --oneshot --verbose ">=net-misc/tor-0.0.9.10" Tor Security Announcement - CVE-2005-2050 + CVE-2005-2050 - + vorlon078 - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-19.xml index 7735e3d01a..a8ca7c387c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-19.xml @@ -1,6 +1,5 @@ - SquirrelMail: Several XSS vulnerabilities @@ -8,8 +7,8 @@ which could lead to a compromise of webmail accounts. SquirrelMail - June 21, 2005 - June 21, 2005: 01 + 2005-06-21 + 2005-06-21: 01 95937 remote @@ -50,20 +49,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.4" + # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.4"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

- SquirrelMail Advisory - CAN-2005-1769 + SquirrelMail Advisory + CAN-2005-1769 - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-20.xml index a4291aae95..9ba3799364 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-20.xml @@ -1,6 +1,5 @@ - Cacti: Several vulnerabilities @@ -8,8 +7,8 @@ file inclusion vulnerabilities. cacti - June 22, 2005 - May 22, 2006: 03 + 2005-06-22 + 2006-05-22: 03 96243 97475 remote @@ -52,29 +51,29 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-0.8.6f" + # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-0.8.6f"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

- Cacti Release Notes - 0.8.6e + Cacti Release Notes - 0.8.6e iDEFENSE SQL injection advisory iDEFENSE config_settings advisory iDEFENSE remote file inclusion advisory - Cacti Release Notes - 0.8.6f - Hardened - PHP Project Cacti Multiple SQL Injection Vulnerabilities - Hardened - PHP Project Cacti Remote Command Execution Vulnerability - Hardened - PHP Project Cacti Authentification/Addslashes Bypass Vulnerability - CVE-2005-1524 - CVE-2005-1525 - CVE-2005-1526 + Cacti Release Notes - 0.8.6f + Hardened - PHP Project Cacti Multiple SQL Injection Vulnerabilities + Hardened - PHP Project Cacti Remote Command Execution Vulnerability + Hardened - PHP Project Cacti Authentification/Addslashes Bypass Vulnerability + CVE-2005-1524 + CVE-2005-1525 + CVE-2005-1526 - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-21.xml index b58232f035..9925e20b87 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-21.xml @@ -1,6 +1,5 @@ - Trac: File upload vulnerability @@ -8,8 +7,8 @@ execution of arbitrary code. trac - June 22, 2005 - June 22, 2005: 01 + 2005-06-22 + 2005-06-22: 01 96572 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/trac-0.8.4" + # emerge --ask --oneshot --verbose ">=www-apps/trac-0.8.4" - Hardened PHP Advisory 012005 + Hardened PHP Advisory 012005 - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-22.xml index 0ca9e67489..14944b05a1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-22.xml @@ -1,14 +1,13 @@ - sudo: Arbitrary command execution A vulnerability in sudo may allow local users to elevate privileges. sudo - June 23, 2005 - June 23, 2005: 01 + 2005-06-23 + 2005-06-23: 01 96618 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.6.8_p9" + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.6.8_p9" - Sudo Announcement + Sudo Announcement - + koon - + taviso - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-23.xml index 04041a6310..2fe85ff872 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-23.xml @@ -1,6 +1,5 @@ - Clam AntiVirus: Denial of Service vulnerability @@ -8,8 +7,8 @@ certain Quantum archives. clamav - June 27, 2005 - May 22, 2006: 02 + 2005-06-27 + 2006-05-22: 02 96960 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.86.1" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.86.1" - Clam AntiVirus Release Notes - CVE-2005-2056 + Clam AntiVirus Release Notes + CVE-2005-2056 - + jaervosz - + DerCorny - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-24.xml index c00864d8ff..302129270a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200506-24.xml @@ -1,6 +1,5 @@ - Heimdal: Buffer overflow vulnerabilities @@ -8,8 +7,8 @@ allow the execution of arbitrary code. heimdal - June 29, 2005 - June 29, 2005: 01 + 2005-06-29 + 2005-06-29: 01 96727 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/heimdal-0.6.5" + # emerge --ask --oneshot --verbose ">=app-crypt/heimdal-0.6.5" - CAN-2005-2040 - Heimdal Advisory 2005-06-20 + CAN-2005-2040 + Heimdal Advisory 2005-06-20 - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-01.xml index 8536d4c622..23ddc8772c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-01.xml @@ -1,6 +1,5 @@ - PEAR XML-RPC, phpxmlrpc: PHP script injection vulnerability @@ -8,8 +7,8 @@ arbitrary PHP script commands. pear-xml_rpc phpxmlrpc - July 03, 2005 - July 03, 2005: 01 + 2005-07-03 + 2005-07-03: 01 97399 97629 remote @@ -55,26 +54,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/PEAR-XML_RPC-1.3.1" + # emerge --ask --oneshot --verbose ">=dev-php/PEAR-XML_RPC-1.3.1"

All phpxmlrpc users should upgrade to the latest available version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/phpxmlrpc-1.1.1" + # emerge --ask --oneshot --verbose ">=dev-php/phpxmlrpc-1.1.1" - CAN-2005-1921 + CAN-2005-1921 GulfTech Advisory - + koon - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-02.xml index 6f29d958ff..7dd9d42b5b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-02.xml @@ -1,6 +1,5 @@ - WordPress: Multiple vulnerabilities @@ -8,8 +7,8 @@ disclosure vulnerabilities. wordpress - July 04, 2005 - July 04, 2005: 01 + 2005-07-04 + 2005-07-04: 01 97374 remote @@ -53,19 +52,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/wordpress-1.5.1.3" + # emerge --ask --oneshot --verbose ">=www-apps/wordpress-1.5.1.3" - CAN-2005-1921 + CAN-2005-1921 GulfTech Advisory - + jaervosz - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-03.xml index f68b346464..8bf0eaea0e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-03.xml @@ -1,6 +1,5 @@ - phpBB: Arbitrary command execution @@ -8,8 +7,8 @@ commands with the rights of the web server. phpBB - July 04, 2005 - September 03, 2005: 03 + 2005-07-04 + 2005-09-03: 03 97278 remote @@ -54,16 +53,16 @@

- CAN-2005-2086 - phpBB Announcement + CAN-2005-2086 + phpBB Announcement - + jaervosz - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-04.xml index 1d2e094751..5d9f5e7807 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-04.xml @@ -1,6 +1,5 @@ - RealPlayer: Heap overflow vulnerability @@ -8,8 +7,8 @@ execution of arbitrary code. realplayer - July 06, 2005 - July 06, 2005: 01 + 2005-07-06 + 2005-07-06: 01 96923 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/realplayer-10.0.5" + # emerge --ask --oneshot --verbose ">=media-video/realplayer-10.0.5" RealNetworks Security Advisory - CAN-2005-1766 + CAN-2005-1766 - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-05.xml index 7ba55f82a7..feae444815 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-05.xml @@ -1,6 +1,5 @@ - zlib: Buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. zlib - July 06, 2005 - July 06, 2005: 01 + 2005-07-06 + 2005-07-06: 01 98121 remote @@ -51,15 +50,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-libs/zlib-1.2.2-r1" + # emerge --ask --oneshot --verbose ">=sys-libs/zlib-1.2.2-r1" - CAN-2005-2096 + CAN-2005-2096 - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-06.xml index 4a3d53672f..39fe1e4725 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-06.xml @@ -1,6 +1,5 @@ - TikiWiki: Arbitrary command execution through XML-RPC @@ -8,8 +7,8 @@ command execution. Tikiwiki - July 06, 2005 - July 06, 2005: 01 + 2005-07-06 + 2005-07-06: 01 97648 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r1" + # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r1" - GLSA 200507-01 - CAN-2005-1921 + GLSA 200507-01 + CAN-2005-1921 - + koon - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-07.xml index d8117247c8..91fd88e0be 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-07.xml @@ -1,6 +1,5 @@ - phpWebSite: Multiple vulnerabilities @@ -8,8 +7,8 @@ code and to other, yet undisclosed, vulnerabilities. phpwebsite - July 10, 2005 - July 10, 2005: 01 + 2005-07-10 + 2005-07-10: 01 97461 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-app/phpwebsite-0.10.1-r1" + # emerge --ask --oneshot --verbose ">=www-app/phpwebsite-0.10.1-r1" - CAN-2005-1921 + CAN-2005-1921 phpWebSite announcement - + koon - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-08.xml index 581e092747..306a9a7bdc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-08.xml @@ -1,6 +1,5 @@ - phpGroupWare, eGroupWare: PHP script injection vulnerability @@ -8,8 +7,8 @@ remote attackers to execute arbitrary PHP script commands. phpgroupware egroupware - July 10, 2005 - July 10, 2005: 01 + 2005-07-10 + 2005-07-10: 01 97460 97651 remote @@ -54,25 +53,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-app/phpgroupware-0.9.16.006" + # emerge --ask --oneshot --verbose ">=www-app/phpgroupware-0.9.16.006"

All eGroupWare users should upgrade to the latest available version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-app/egroupware-1.0.0.008" + # emerge --ask --oneshot --verbose ">=www-app/egroupware-1.0.0.008" - CAN-2005-1921 + CAN-2005-1921 - + koon - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-09.xml index 7768b11488..b7c20e3283 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-09.xml @@ -1,6 +1,5 @@ - Adobe Acrobat Reader: Buffer overflow vulnerability @@ -8,8 +7,8 @@ remote execution of arbitrary code. acroread - July 11, 2005 - July 11, 2005: 01 + 2005-07-11 + 2005-07-11: 01 98101 remote @@ -50,20 +49,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-7.0" + # emerge --ask --oneshot --verbose ">=app-text/acroread-7.0" - CAN-2005-1625 + CAN-2005-1625 iDEFENSE Security Advisory - Adobe Security Advisory + Adobe Security Advisory - + koon - + DerCorny - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-10.xml index baed01a1fb..6e935fb87d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-10.xml @@ -1,6 +1,5 @@ - Ruby: Arbitrary command execution through XML-RPC @@ -8,8 +7,8 @@ arbitrary commands. ruby - July 11, 2005 - July 11, 2005: 01 + 2005-07-11 + 2005-07-11: 01 96784 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.2-r2" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.2-r2" - CAN-2005-1992 - Ruby Security Announcement + CAN-2005-1992 + Ruby Security Announcement - + vorlon078 - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-11.xml index 82a22a7626..260e28ce1a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-11.xml @@ -1,6 +1,5 @@ - MIT Kerberos 5: Multiple vulnerabilities @@ -9,8 +8,8 @@ entire Kerberos realm. mit-krb5 - July 12, 2005 - July 12, 2005: 01 + 2005-07-12 + 2005-07-12: 01 98799 remote @@ -56,22 +55,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.4.1-r1" + # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.4.1-r1" - CAN-2005-1174 - CAN-2005-1175 - CAN-2005-1689 + CAN-2005-1174 + CAN-2005-1175 + CAN-2005-1689 MITKRB5-SA-2005-002 MITKRB5-SA-2005-003 - + koon - + DerCorny - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-12.xml index 455644eaec..307a15a405 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-12.xml @@ -1,6 +1,5 @@ - Bugzilla: Unauthorized access and information disclosure @@ -8,8 +7,8 @@ flags or gain sensitive information. bugzilla - July 13, 2005 - July 13, 2005: 01 + 2005-07-13 + 2005-07-13: 01 98348 remote @@ -52,20 +51,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/bugzilla-2.18.3" + # emerge --ask --oneshot --verbose ">=www-apps/bugzilla-2.18.3" - CAN-2005-2173 - CAN-2005-2174 - Bugzilla Security Advisory + CAN-2005-2173 + CAN-2005-2174 + Bugzilla Security Advisory - + vorlon078 - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-13.xml index 7ee8984115..4af0b16cd1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-13.xml @@ -1,6 +1,5 @@ - pam_ldap and nss_ldap: Plain text authentication leak @@ -8,8 +7,8 @@ possibly leading to credentials being sent in plain text. pam_ldap nss_ldap - July 14, 2005 - July 14, 2005: 01 + 2005-07-14 + 2005-07-14: 01 96767 remote @@ -58,7 +57,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-178-r1" + # emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-178-r1"

All nss_ldap users should upgrade to the latest version:

@@ -67,15 +66,15 @@ # emerge --ask --oneshot --verbose sys-auth/nss_ldap - CAN-2005-2069 + CAN-2005-2069 - + tigger - + tigger - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-14.xml index 5b74ccc792..91ad0e29d3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-14.xml @@ -1,6 +1,5 @@ - Mozilla Firefox: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of script code with elevated privileges to information leak. mozilla - July 15, 2005 - July 15, 2005: 01 + 2005-07-15 + 2005-07-15: 01 95199 remote @@ -77,22 +76,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.5" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.5"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.5" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.5" - Mozilla Foundation Security Advisories + Mozilla Foundation Security Advisories - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-15.xml index 09ed534409..6ecf41ed93 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-15.xml @@ -1,6 +1,5 @@ - PHP: Script injection through XML-RPC @@ -8,8 +7,8 @@ execute arbitrary PHP script commands. PHP - July 15, 2005 - July 15, 2005: 01 + 2005-07-15 + 2005-07-15: 01 97655 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/php-4.4.0" + # emerge --ask --oneshot --verbose ">=dev-php/php-4.4.0" - CAN-2005-1921 + CAN-2005-1921 - + koon - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-16.xml index b6b7c43bfe..1afb85c863 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-16.xml @@ -1,14 +1,13 @@ - dhcpcd: Denial of Service vulnerability A vulnerability in dhcpcd may cause the dhcpcd daemon to crash. dhcpcd - July 15, 2005 - July 15, 2005: 01 + 2005-07-15 + 2005-07-15: 01 98394 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/dhcpcd-1.3.22_p4-r11" + # emerge --ask --oneshot --verbose ">=net-misc/dhcpcd-1.3.22_p4-r11" - CAN-2005-1848 + CAN-2005-1848 - + koon - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-17.xml index d5ff482d69..c70fba53b0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-17.xml @@ -1,6 +1,5 @@ - Mozilla Thunderbird: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of script code with elevated privileges to information leak. thunderbird - July 18, 2005 - July 18, 2005: 01 + 2005-07-18 + 2005-07-18: 01 98855 remote @@ -77,23 +76,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.0.5" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.0.5"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.0.5" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.0.5" - Mozilla Foundation Security Advisories - CAN-2005-0989 + Mozilla Foundation Security Advisories + CAN-2005-0989 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-18.xml index 076ef7d476..6df084ce75 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-18.xml @@ -1,6 +1,5 @@ - MediaWiki: Cross-site scripting vulnerability @@ -8,8 +7,8 @@ arbitrary JavaScript code execution. mediawiki - July 20, 2005 - August 11, 2005: 03 + 2005-07-20 + 2005-08-11: 03 99132 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.4.7" + # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.4.7" - CAN-2005-2396 - MediaWiki Release Notes + CAN-2005-2396 + MediaWiki Release Notes - + koon - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-19.xml index 4e8649c734..7d2255ead0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-19.xml @@ -1,6 +1,5 @@ - zlib: Buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. zlib - July 22, 2005 - July 22, 2005: 01 + 2005-07-22 + 2005-07-22: 01 99751 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-libs/zlib-1.2.3" + # emerge --ask --oneshot --verbose ">=sys-libs/zlib-1.2.3" Full Disclosure Announcement - CAN-2005-1849 + CAN-2005-1849 - + jaervosz - + adir - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-20.xml index 6251aeed78..d04e7614d1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-20.xml @@ -1,6 +1,5 @@ - Shorewall: Security policy bypass @@ -8,8 +7,8 @@ filtering to bypass all other security rules. shorewall - July 22, 2005 - September 14, 2005: 02 + 2005-07-22 + 2005-09-14: 02 99398 remote @@ -55,16 +54,16 @@ # emerge --ask --oneshot --verbose net-firewall/shorewall - CAN-2005-2317 + CAN-2005-2317 Shorewall Announcement - + koon - + DerCorny - + DerCorny diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-21.xml index bdf105c4ad..c8eb1c7d34 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-21.xml @@ -1,6 +1,5 @@ - fetchmail: Buffer Overflow @@ -8,8 +7,8 @@ Service or arbitrary code execution. fetchmail - July 25, 2005 - July 25, 2005: 01 + 2005-07-25 + 2005-07-25: 01 99865 remote @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.2.5.2" + # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.2.5.2" Fetchmail Security Advisory - CAN-2005-2335 + CAN-2005-2335 - + r2d2 - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-22.xml index a63a7a26b7..ecf509f004 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-22.xml @@ -1,14 +1,13 @@ - sandbox: Insecure temporary file handling The sandbox utility may create temporary files in an insecure manner. sandbox - July 25, 2005 - August 11, 2005: 02 + 2005-07-25 + 2005-08-11: 02 96782 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/sandbox-1.2.11" + # emerge --ask --oneshot --verbose ">=sys-apps/sandbox-1.2.11" - CAN-2005-2449 + CAN-2005-2449 - + jaervosz - + taviso - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-23.xml index 9f697949c6..661ac4683d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-23.xml @@ -1,6 +1,5 @@ - Kopete: Vulnerability in included Gadu library @@ -8,8 +7,8 @@ lead to execution of arbitrary code. kopete - July 25, 2005 - July 25, 2005: 01 + 2005-07-25 + 2005-07-25: 01 99754 remote @@ -60,16 +59,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kopete-3.4.1-r1" + # emerge --ask --oneshot --verbose ">=kde-base/kopete-3.4.1-r1" - KDE Security Advisory: libgadu vulnerabilities - CAN-2005-1852 + KDE Security Advisory: libgadu vulnerabilities + CAN-2005-1852 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-24.xml index 53e2e7791f..27fc0f52d7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-24.xml @@ -1,6 +1,5 @@ - Mozilla Suite: Multiple vulnerabilities @@ -9,8 +8,8 @@ leakage. mozilla - July 26, 2005 - July 26, 2005: 01 + 2005-07-26 + 2005-07-26: 01 98846 remote @@ -86,25 +85,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.10" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.10"

All Mozilla Suite binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.10" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.10" - Mozilla Foundation Security Advisories + Mozilla Foundation Security Advisories - + DerCorny - + DerCorny - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-25.xml index 81f3657dcf..d720a31c27 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-25.xml @@ -1,6 +1,5 @@ - Clam AntiVirus: Integer overflows @@ -8,8 +7,8 @@ file formats, potentially resulting in the execution of arbitrary code. clamav - July 26, 2005 - August 11, 2005: 02 + 2005-07-26 + 2005-08-11: 02 100178 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.86.2" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.86.2" - CAN-2005-2450 - Clam AntiVirus: Release Notes + CAN-2005-2450 + Clam AntiVirus: Release Notes - + jaervosz - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-26.xml index 39db4491ce..6b382fec63 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-26.xml @@ -1,6 +1,5 @@ - GNU Gadu, CenterICQ, Kadu, EKG, libgadu: Remote code execution in Gadu library @@ -9,8 +8,8 @@ a Denial of Service. gnugadu centericq kadu ekg libgadu - July 27, 2005 - February 26, 2007: 02 + 2005-07-27 + 2007-02-26: 02 99816 99890 99583 @@ -67,47 +66,47 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/gnugadu-2.2.6-r1" + # emerge --ask --oneshot --verbose ">=net-im/gnugadu-2.2.6-r1"

All Kadu users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/kadu-0.4.1" + # emerge --ask --oneshot --verbose ">=net-im/kadu-0.4.1"

All EKG users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/ekg-1.6_rc3" + # emerge --ask --oneshot --verbose ">=net-im/ekg-1.6_rc3"

All libgadu users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/libgadu-20050719" + # emerge --ask --oneshot --verbose ">=net-libs/libgadu-20050719"

All CenterICQ users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/centericq-4.20.0-r3" + # emerge --ask --oneshot --verbose ">=net-im/centericq-4.20.0-r3"

CenterICQ is no longer distributed with Gadu Gadu support, affected users are encouraged to migrate to an alternative package.

- CAN-2005-1852 + CAN-2005-1852 BugTraq Announcement - + jaervosz - + adir - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-27.xml index 1a08c99b02..5f3ab415e4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-27.xml @@ -1,6 +1,5 @@ - Ethereal: Multiple vulnerabilities @@ -8,8 +7,8 @@ the execution of arbitrary code or abnormal termination. Ethereal - July 28, 2005 - July 28, 2005: 01 + 2005-07-28 + 2005-07-28: 01 100316 remote @@ -57,23 +56,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.12" + # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.12" Ethereal enpa-sa-00020 - CAN-2005-2360 - CAN-2005-2361 - CAN-2005-2362 - CAN-2005-2363 - CAN-2005-2364 - CAN-2005-2365 - CAN-2005-2366 - CAN-2005-2367 + CAN-2005-2360 + CAN-2005-2361 + CAN-2005-2362 + CAN-2005-2363 + CAN-2005-2364 + CAN-2005-2365 + CAN-2005-2366 + CAN-2005-2367 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-28.xml index 307121c427..d66e6520e4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-28.xml @@ -1,6 +1,5 @@ - AMD64 x86 emulation base libraries: Buffer overflow @@ -8,8 +7,8 @@ zlib which could potentially lead to execution of arbitrary code. emul-linux-x86-baselibs - July 30, 2005 - August 02, 2005: 02 + 2005-07-30 + 2005-08-02: 02 100686 remote @@ -53,18 +52,18 @@ # emerge --ask --oneshot --verbose app-emulation/emul-linux-x86-baselibs - GLSA 200507-05 - GLSA 200507-19 - CAN-2005-1849 - CAN-2005-2096 + GLSA 200507-05 + GLSA 200507-19 + CAN-2005-1849 + CAN-2005-2096 - + koon - + koon - + adir diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-29.xml index 5865f8edc5..3d16cf1527 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-29.xml @@ -1,6 +1,5 @@ - pstotext: Remote execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. pstotext - July 31, 2005 - August 11, 2005: 02 + 2005-07-31 + 2005-08-11: 02 100245 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/pstotext-1.8g-r1" + # emerge --ask --oneshot --verbose ">=app-text/pstotext-1.8g-r1" - CAN-2005-2536 - Secunia Advisory SA16183 + CAN-2005-2536 + Secunia Advisory SA16183 - + koon - + adir - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-01.xml index 8cb9ee8e46..39aade58e3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-01.xml @@ -1,6 +1,5 @@ - Compress::Zlib: Buffer overflow @@ -8,8 +7,8 @@ lead to execution of arbitrary code. Compress-Zlib - August 01, 2005 - May 28, 2009: 02 + 2005-08-01 + 2009-05-28: 02 100540 remote @@ -49,21 +48,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=perl-core/Compress-Zlib-1.35" + # emerge --ask --oneshot --verbose ">=perl-core/Compress-Zlib-1.35" - GLSA 200507-19 - GLSA 200507-05 - CAN-2005-1849 - CAN-2005-2096 + GLSA 200507-19 + GLSA 200507-05 + CAN-2005-1849 + CAN-2005-2096 - + koon - + adir - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-02.xml index ce7f372897..9965ca5f33 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-02.xml @@ -1,6 +1,5 @@ - ProFTPD: Format string vulnerabilities @@ -8,8 +7,8 @@ vulnerabilities, potentially resulting in the execution of arbitrary code. proftpd - August 01, 2005 - August 01, 2005: 01 + 2005-08-01 + 2005-08-01: 01 100364 remote @@ -55,18 +54,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.2.10-r7" + # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.2.10-r7" - CAN-2005-2390 + CAN-2005-2390 - + koon - + adir - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-03.xml index 25da2e0583..0be0f65ba9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-03.xml @@ -1,6 +1,5 @@ - nbSMTP: Format string vulnerability @@ -8,8 +7,8 @@ remote execution of arbitrary code. nbsmtp - August 02, 2005 - August 11, 2005: 02 + 2005-08-02 + 2005-08-11: 02 100274 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/nbsmtp-1.0" + # emerge --ask --oneshot --verbose ">=mail-mta/nbsmtp-1.0" - CAN-2005-2409 - nbSMTP official site + CAN-2005-2409 + nbSMTP official site - + koon - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-04.xml index 8fde1cebaf..9ad88245b3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-04.xml @@ -1,6 +1,5 @@ - Netpbm: Arbitrary code execution in pstopnm @@ -8,8 +7,8 @@ which can potentially result in the execution of arbitrary code. Netpbm - August 05, 2005 - May 28, 2009: 06 + 2005-08-05 + 2009-05-28: 06 100398 remote @@ -62,16 +61,16 @@ # emerge --ask --oneshot --verbose media-libs/netpbm - CAN-2005-2471 - Secunia Advisory SA16184 + CAN-2005-2471 + Secunia Advisory SA16184 - + koon - + adir - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-05.xml index ef3ab947cf..44fdd5a36e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-05.xml @@ -1,6 +1,5 @@ - Heartbeat: Insecure temporary file creation @@ -8,8 +7,8 @@ user to overwrite arbitrary files. Heartbeat - August 07, 2005 - August 07, 2005: 01 + 2005-08-07 + 2005-08-07: 01 97175 local @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-cluster/heartbeat-1.2.3-r1" + # emerge --ask --oneshot --verbose ">=sys-cluster/heartbeat-1.2.3-r1" - CAN-2005-2231 + CAN-2005-2231 - + koon - + formula7 - + formula7
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-06.xml index bf1454d1f0..ceb685f568 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-06.xml @@ -1,6 +1,5 @@ - Gaim: Remote execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary code or to a Denial of Service. Gaim - August 15, 2005 - August 15, 2005: 01 + 2005-08-15 + 2005-08-15: 01 102000 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/gaim-1.5.0" + # emerge --ask --oneshot --verbose ">=net-im/gaim-1.5.0" - CAN-2005-2102 - CAN-2005-2103 + CAN-2005-2102 + CAN-2005-2103 - + koon - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-07.xml index d4ecdd3b46..4b16fc7e3c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-07.xml @@ -1,6 +1,5 @@ - AWStats: Arbitrary code execution using malicious Referrer information @@ -8,8 +7,8 @@ execution of arbitrary Perl code during the generation of the statistics. awstats - August 16, 2005 - May 28, 2009: 02 + 2005-08-16 + 2009-05-28: 02 102145 remote @@ -51,20 +50,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-misc/awstats-6.5" + # emerge --ask --oneshot --verbose ">=www-misc/awstats-6.5"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

- CAN-2005-1527 + CAN-2005-1527 iDEFENSE Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-08.xml index 13ff3f7082..34e50eb19d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-08.xml @@ -1,6 +1,5 @@ - Xpdf, Kpdf, GPdf: Denial of Service vulnerability @@ -8,8 +7,8 @@ vulnerability. xpdf kpdf gpdf - August 16, 2005 - August 16, 2005: 01 + 2005-08-16 + 2005-08-16: 01 99769 100263 100265 @@ -65,37 +64,37 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.00-r10" + # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.00-r10"

All GPdf users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.10.0-r1" + # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.10.0-r1"

All Kpdf users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.3.2-r3" + # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.3.2-r3"

All KDE Split Ebuild Kpdf users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.4.1-r1" + # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.4.1-r1" - CAN-2005-2097 + CAN-2005-2097 - + koon - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-09.xml index 725701fa71..3dbfc021a8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-09.xml @@ -1,6 +1,5 @@ - bluez-utils: Bluetooth device name validation vulnerability @@ -8,8 +7,8 @@ execution. bluez-utils - August 17, 2005 - August 17, 2005: 01 + 2005-08-17 + 2005-08-17: 01 101557 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-wireless/bluez-utils-2.19" + # emerge --ask --oneshot --verbose ">=net-wireless/bluez-utils-2.19" - CAN-2005-2547 - bluez-utils ChangeLog + CAN-2005-2547 + bluez-utils ChangeLog - + koon - + r2d2 - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-10.xml index 1bbea807ce..0b97e67d1b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-10.xml @@ -1,6 +1,5 @@ - Kismet: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code. Kismet - August 19, 2005 - May 22, 2006: 02 + 2005-08-19 + 2006-05-22: 02 102702 remote @@ -47,20 +46,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-wireless/kismet-2005.08.1" + # emerge --ask --oneshot --verbose ">=net-wireless/kismet-2005.08.1" - Kismet Release Notes - CVE-2005-2626 - CVE-2005-2627 + Kismet Release Notes + CVE-2005-2626 + CVE-2005-2627 - + jaervosz - + jaervosz - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-11.xml index 0828e25e5f..8ad1984257 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-11.xml @@ -1,6 +1,5 @@ - Adobe Reader: Buffer Overflow @@ -8,8 +7,8 @@ lead to execution of arbitrary code. acroread - August 19, 2005 - August 19, 2005: 01 + 2005-08-19 + 2005-08-19: 01 102730 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-7.0.1.1" + # emerge --ask --oneshot --verbose ">=app-text/acroread-7.0.1.1" - CAN-2005-2470 - Adobe Document 321644 + CAN-2005-2470 + Adobe Document 321644 - + formula7 - + adir - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-12.xml index 6794894ee4..8700302e39 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-12.xml @@ -1,6 +1,5 @@ - Evolution: Format string vulnerabilities @@ -8,8 +7,8 @@ in remote execution of arbitrary code. evolution - August 23, 2005 - August 23, 2005: 01 + 2005-08-23 + 2005-08-23: 01 102051 remote @@ -53,20 +52,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/evolution-2.2.3-r3" + # emerge --ask --oneshot --verbose ">=mail-client/evolution-2.2.3-r3" - CAN-2005-2549 - CAN-2005-2550 + CAN-2005-2549 + CAN-2005-2550 SITIC Vulnerability Advisory SA05-001 - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-13.xml index 5de3ef7124..422f574eb7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-13.xml @@ -1,6 +1,5 @@ - PEAR XML-RPC, phpxmlrpc: New PHP script injection vulnerability @@ -8,8 +7,8 @@ arbitrary PHP script commands. pear-xml_rpc phpxmlrpc - August 24, 2005 - August 24, 2005: 01 + 2005-08-24 + 2005-08-24: 01 102378 102576 remote @@ -55,24 +54,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/PEAR-XML_RPC-1.4.0" + # emerge --ask --oneshot --verbose ">=dev-php/PEAR-XML_RPC-1.4.0"

All phpxmlrpc users should upgrade to the latest available version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/phpxmlrpc-1.2-r1" + # emerge --ask --oneshot --verbose ">=dev-php/phpxmlrpc-1.2-r1" - CAN-2005-2498 - Hardened-PHP 14/2005 Advisory - Hardened-PHP 15/2005 Advisory + CAN-2005-2498 + Hardened-PHP 14/2005 Advisory + Hardened-PHP 15/2005 Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-14.xml index 3440351e4d..abd586e7ca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-14.xml @@ -1,6 +1,5 @@ - TikiWiki, eGroupWare: Arbitrary command execution through XML-RPC @@ -8,8 +7,8 @@ arbitrary command execution. tikiwiki egroupware - August 24, 2005 - August 24, 2005: 01 + 2005-08-24 + 2005-08-24: 01 102374 102377 remote @@ -55,24 +54,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r2" + # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.8.5-r2"

All eGroupWare users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/egroupware-1.0.0.009" + # emerge --ask --oneshot --verbose ">=www-apps/egroupware-1.0.0.009" - CAN-2005-2498 + CAN-2005-2498 - + DerCorny - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-15.xml index d775a2811b..41a6dfec4d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-15.xml @@ -1,6 +1,5 @@ - Apache 2.0: Denial of Service vulnerability @@ -8,8 +7,8 @@ attack. apache - August 25, 2005 - December 30, 2007: 03 + 2005-08-25 + 2007-12-30: 03 102991 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.54-r9" + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.54-r9" - ASF Bugzilla Bug 29962 - CVE-2005-2728 + ASF Bugzilla Bug 29962 + CVE-2005-2728 - + DerCorny - + koon - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-16.xml index c90d5976ec..05edeabaea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-16.xml @@ -1,6 +1,5 @@ - Tor: Information disclosure @@ -8,8 +7,8 @@ anonymity, integrity and confidentiality. tor - August 25, 2005 - August 25, 2005: 01 + 2005-08-25 + 2005-08-25: 01 102245 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/tor-0.1.0.14" + # emerge --ask --oneshot --verbose ">=net-misc/tor-0.1.0.14" - CAN-2005-2643 + CAN-2005-2643 Tor Security Announcement - + koon - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-17.xml index 6ec5e04693..da525d5752 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-17.xml @@ -1,6 +1,5 @@ - libpcre: Heap integer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. libpcre - August 25, 2005 - August 25, 2005: 01 + 2005-08-25 + 2005-08-25: 01 103337 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libpcre-6.3" + # emerge --ask --oneshot --verbose ">=dev-libs/libpcre-6.3" - CAN-2005-2491 + CAN-2005-2491 SecurityTracker Alert ID 1014744 - + koon - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-18.xml index cb56908d0c..be0fbbf797 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-18.xml @@ -1,6 +1,5 @@ - PhpWiki: Arbitrary command execution through XML-RPC @@ -8,8 +7,8 @@ execution. phpwiki - August 26, 2005 - August 26, 2005: 01 + 2005-08-26 + 2005-08-26: 01 102380 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpwiki-1.3.10-r2" + # emerge --ask --oneshot --verbose ">=www-apps/phpwiki-1.3.10-r2" - CAN-2005-2498 + CAN-2005-2498 - + koon - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-19.xml index 7f29c0cc9f..6d949660f6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-19.xml @@ -1,6 +1,5 @@ - lm_sensors: Insecure temporary file creation @@ -8,8 +7,8 @@ user to overwrite arbitrary files. lm_sensors - August 30, 2005 - August 30, 2005: 01 + 2005-08-30 + 2005-08-30: 01 103568 local @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/lm_sensors-2.9.1-r1" + # emerge --ask --oneshot --verbose ">=sys-apps/lm_sensors-2.9.1-r1" - CAN-2005-2672 + CAN-2005-2672 - + koon - + koon - + formula7
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-20.xml index 54cb4f99b0..3d0d6d92cc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-20.xml @@ -1,6 +1,5 @@ - phpGroupWare: Multiple vulnerabilities @@ -8,8 +7,8 @@ disclosure to a potential execution of arbitrary code. phpgroupware - August 30, 2005 - August 30, 2005: 01 + 2005-08-30 + 2005-08-30: 01 102379 remote @@ -49,20 +48,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpgroupware-0.9.16.008" + # emerge --ask --oneshot --verbose ">=www-apps/phpgroupware-0.9.16.008" - CAN-2005-2498 - CAN-2005-2600 - Secunia Advisory SA16414 + CAN-2005-2498 + CAN-2005-2600 + Secunia Advisory SA16414 - + DerCorny - + adir - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-21.xml index 0299cda391..d654cf9f5b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-21.xml @@ -1,6 +1,5 @@ - phpWebSite: Arbitrary command execution through XML-RPC and SQL injection @@ -8,8 +7,8 @@ of arbitrary code and SQL injection. phpwebsite - August 31, 2005 - August 31, 2005: 01 + 2005-08-31 + 2005-08-31: 01 102785 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpwebsite-0.10.2_rc2" + # emerge --ask --oneshot --verbose ">=www-apps/phpwebsite-0.10.2_rc2" - CAN-2005-2498 + CAN-2005-2498 Original Advisory - + koon - + adir - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-22.xml index 9023f08899..8d72fe7842 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200508-22.xml @@ -1,6 +1,5 @@ - pam_ldap: Authentication bypass vulnerability @@ -8,8 +7,8 @@ system access. pam_ldap - August 31, 2005 - August 31, 2005: 01 + 2005-08-31 + 2005-08-31: 01 103659 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-180" + # emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-180" - CAN-2005-2641 - US-CERT VU#778916 + CAN-2005-2641 + US-CERT VU#778916 - + koon - + koon - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-01.xml index c3c6aff17b..c0210eac85 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-01.xml @@ -1,14 +1,13 @@ - MPlayer: Heap overflow in ad_pcm.c A heap overflow in MPlayer might lead to the execution of arbitrary code. MPlayer - September 01, 2005 - September 01, 2005: 01 + 2005-09-01 + 2005-09-01: 01 103555 remote @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_pre7-r1" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_pre7-r1" - CAN-2005-2718 + CAN-2005-2718 Original Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-02.xml index 81fe8cca76..61c7524f48 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-02.xml @@ -1,6 +1,5 @@ - Gnumeric: Heap overflow in the included PCRE library @@ -8,8 +7,8 @@ execution of arbitrary code. Gnumeric - September 03, 2005 - September 03, 2005: 01 + 2005-09-03 + 2005-09-03: 01 104010 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/gnumeric-1.4.3-r2" + # emerge --ask --oneshot --verbose ">=app-office/gnumeric-1.4.3-r2" - CAN-2005-2491 - GLSA 200508-17 + CAN-2005-2491 + GLSA 200508-17 - + koon - + koon - + formula7
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-03.xml index ac11b90de0..12a72e1307 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-03.xml @@ -1,6 +1,5 @@ - OpenTTD: Format string vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code. openttd - September 05, 2005 - May 22, 2006: 02 + 2005-09-05 + 2006-05-22: 02 102631 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-simulation/openttd-0.4.0.1-r1" + # emerge --ask --oneshot --verbose ">=games-simulation/openttd-0.4.0.1-r1" - CAN-2005-2763 - CVE-2005-2764 + CAN-2005-2763 + CVE-2005-2764 - + jaervosz - + adir - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-04.xml index c9e7331445..6e96d06b78 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-04.xml @@ -1,6 +1,5 @@ - phpLDAPadmin: Authentication bypass @@ -8,8 +7,8 @@ and connect anonymously. phpLDAPadmin - September 06, 2005 - September 06, 2005: 01 + 2005-09-06 + 2005-09-06: 01 104293 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-nds/phpldapadmin-0.9.7_alpha6" + # emerge --ask --oneshot --verbose ">=net-nds/phpldapadmin-0.9.7_alpha6" - CAN-2005-2654 - Secunia Advisory SA16611 + CAN-2005-2654 + Secunia Advisory SA16611 - + DerCorny - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-05.xml index 479da6e6c0..a072ab57f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-05.xml @@ -1,6 +1,5 @@ - Net-SNMP: Insecure RPATH @@ -8,8 +7,8 @@ DT_RPATH, potentially allowing privilege escalation. net-snmp - September 06, 2005 - May 22, 2006: 02 + 2005-09-06 + 2006-05-22: 02 103776 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.2.1.2-r1" + # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.2.1.2-r1" - CVE-2005-2811 + CVE-2005-2811 - + DerCorny - + DerCorny - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-06.xml index 44e14710e2..847d94eb58 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-06.xml @@ -1,6 +1,5 @@ - Squid: Denial of Service vulnerabilities @@ -8,8 +7,8 @@ resulting in a Denial of Service. Squid - September 07, 2005 - May 22, 2006: 03 + 2005-09-07 + 2006-05-22: 03 104603 remote @@ -50,17 +49,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.10-r2" + # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.5.10-r2" Squid Patches - CVE-2005-2794 - CVE-2005-2796 + CVE-2005-2794 + CVE-2005-2796 - + jaervosz - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-07.xml index f09f61d559..1586543cd5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-07.xml @@ -1,6 +1,5 @@ - X.Org: Heap overflow in pixmap allocation @@ -8,8 +7,8 @@ X.Org user to execute arbitrary code with elevated privileges. X.Org - September 12, 2005 - September 12, 2005: 01 + 2005-09-12 + 2005-09-12: 01 105688 local @@ -47,15 +46,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-base/xorg-x11-6.8.2-r3" + # emerge --ask --oneshot --verbose ">=x11-base/xorg-x11-6.8.2-r3" - CAN-2005-2495 + CAN-2005-2495 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-08.xml index 4f8d849ca7..c960d6d165 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-08.xml @@ -1,6 +1,5 @@ - Python: Heap overflow in the included PCRE library @@ -8,8 +7,8 @@ to the execution of arbitrary code. Python - September 12, 2005 - September 12, 2005: 01 + 2005-09-12 + 2005-09-12: 01 104009 remote @@ -53,19 +52,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/python-2.3.5-r2" + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.3.5-r2" - CAN-2005-2491 - GLSA 200508-17 + CAN-2005-2491 + GLSA 200508-17 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-09.xml index 15c976c91b..8cfd2f4b7f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-09.xml @@ -1,14 +1,13 @@ - Py2Play: Remote execution of arbitrary Python code A design error in Py2Play allows attackers to execute arbitrary code. py2play - September 17, 2005 - September 05, 2006: 02 + 2005-09-17 + 2006-09-05: 02 103524 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-python/py2play-0.1.8" + # emerge --ask --oneshot --verbose ">=dev-python/py2play-0.1.8" - CAN-2005-2875 + CAN-2005-2875 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-10.xml index aeb1a38dfe..6fe31b2dfa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-10.xml @@ -1,6 +1,5 @@ - Mailutils: Format string vulnerability in imap4d @@ -8,8 +7,8 @@ to execute arbitrary code with the privileges of the imap4d process. mailutils - September 17, 2005 - May 22, 2006: 02 + 2005-09-17 + 2006-05-22: 02 105458 remote @@ -48,16 +47,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/mailutils-0.6-r2" + # emerge --ask --oneshot --verbose ">=net-mail/mailutils-0.6-r2" iDEFENSE 09.09.05 advisory - CVE-2005-2878 + CVE-2005-2878 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-11.xml index 83904701e1..c7248b601b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-11.xml @@ -1,6 +1,5 @@ - Mozilla Suite, Mozilla Firefox: Multiple vulnerabilities @@ -8,8 +7,8 @@ that might be exploited to execute arbitrary code. mozilla - September 18, 2005 - September 29, 2005: 02 + 2005-09-18 + 2005-09-29: 02 105396 remote @@ -83,50 +82,50 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.7-r2" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.7-r2"

All Mozilla Suite users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.12-r2" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.12-r2"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.7" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.7"

All Mozilla Suite binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.12" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.12"

All Gecko library users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/gecko-sdk-1.7.12" + # emerge --ask --oneshot --verbose ">=net-libs/gecko-sdk-1.7.12"

- CAN-2005-2701 - CAN-2005-2702 - CAN-2005-2703 - CAN-2005-2704 - CAN-2005-2705 - CAN-2005-2706 - CAN-2005-2707 - CAN-2005-2871 - Mozilla Foundation Security Advisories + CAN-2005-2701 + CAN-2005-2702 + CAN-2005-2703 + CAN-2005-2704 + CAN-2005-2705 + CAN-2005-2706 + CAN-2005-2707 + CAN-2005-2871 + Mozilla Foundation Security Advisories - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-12.xml index 2499a5735b..2e1fc0e3cf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-12.xml @@ -1,6 +1,5 @@ - Apache, mod_ssl: Multiple vulnerabilities @@ -8,8 +7,8 @@ local privilege escalation. Apache - September 19, 2005 - December 30, 2007: 03 + 2005-09-19 + 2007-12-30: 03 103554 104807 remote and local @@ -61,25 +60,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-www/mod_ssl-2.8.24" + # emerge --ask --oneshot --verbose ">=net-www/mod_ssl-2.8.24"

All Apache 2 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.54-r15" + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.54-r15" - CAN-2005-2491 - CAN-2005-2700 + CAN-2005-2491 + CAN-2005-2700 - + koon - + koon - + formula7
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-13.xml index b8096bd62d..4592d8943a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-13.xml @@ -1,6 +1,5 @@ - Clam AntiVirus: Multiple vulnerabilities @@ -8,8 +7,8 @@ to execution of arbitrary code when handling compressed executables. clamav - September 19, 2005 - September 19, 2005: 01 + 2005-09-19 + 2005-09-19: 01 106279 remote @@ -52,17 +51,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.87" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.87" - CAN-2005-2919 - CAN-2005-2920 - Clam AntiVirus: Release Notes + CAN-2005-2919 + CAN-2005-2920 + Clam AntiVirus: Release Notes - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-14.xml index 0239eba343..3aac45f541 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-14.xml @@ -1,6 +1,5 @@ - Zebedee: Denial of Service vulnerability @@ -8,8 +7,8 @@ attack. zebedee - September 20, 2005 - May 22, 2006: 02 + 2005-09-20 + 2006-05-22: 02 105115 remote @@ -52,15 +51,15 @@ BugTraq ID 14796 - CVE-2005-2904 + CVE-2005-2904 - + koon - + koon - + adir diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-15.xml index 9a8648d4c0..762d958c31 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-15.xml @@ -1,6 +1,5 @@ - util-linux: umount command validation error @@ -8,8 +7,8 @@ privileges. util-linux - September 20, 2005 - September 20, 2005: 01 + 2005-09-20 + 2005-09-20: 01 105805 local @@ -56,18 +55,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/util-linux-2.12q-r3" + # emerge --ask --oneshot --verbose ">=sys-apps/util-linux-2.12q-r3" - CAN-2005-2876 + CAN-2005-2876 - + koon - + r2d2 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-16.xml index 76baa76ef2..6d6dbb2001 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-16.xml @@ -1,6 +1,5 @@ - Mantis: XSS and SQL injection vulnerabilities @@ -8,8 +7,8 @@ (XSS) vulnerabilities. Mantis - September 24, 2005 - September 24, 2005: 01 + 2005-09-24 + 2005-09-24: 01 103308 remote @@ -50,17 +49,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-0.19.2" + # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-0.19.2" - CAN-2005-2556 - CAN-2005-2557 - Secunia Advisory SA16506 + CAN-2005-2556 + CAN-2005-2557 + Secunia Advisory SA16506 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-17.xml index df15ad4711..084bb564fa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-17.xml @@ -1,6 +1,5 @@ - Webmin, Usermin: Remote code execution through PAM authentication @@ -8,8 +7,8 @@ vulnerable to the remote execution of arbitrary code with root privileges. Webmin Usermin - September 24, 2005 - September 24, 2005: 01 + 2005-09-24 + 2005-09-24: 01 106705 remote @@ -58,22 +57,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/webmin-1.230" + # emerge --ask --oneshot --verbose ">=app-admin/webmin-1.230"

All Usermin users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/usermin-1.160" + # emerge --ask --oneshot --verbose ">=app-admin/usermin-1.160" - CAN-2005-3042 + CAN-2005-3042 Original Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-18.xml index 8db1bf579f..0b611e57d0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-18.xml @@ -1,6 +1,5 @@ - Qt: Buffer overflow in the included zlib library @@ -8,8 +7,8 @@ execution of arbitrary code. qt - September 26, 2005 - September 26, 2005: 02 + 2005-09-26 + 2005-09-26: 02 105695 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.4-r8" + # emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.4-r8" - GLSA 200507-05 - GLSA 200507-19 - CAN-2005-1849 - CAN-2005-2096 + GLSA 200507-05 + GLSA 200507-19 + CAN-2005-1849 + CAN-2005-2096 - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-19.xml index b884de3d0a..30274bbd2a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-19.xml @@ -1,6 +1,5 @@ - PHP: Vulnerabilities in included PCRE and XML-RPC libraries @@ -9,8 +8,8 @@ of arbitrary code. PHP - September 27, 2005 - September 27, 2005: 01 + 2005-09-27 + 2005-09-27: 01 102373 remote @@ -81,15 +80,15 @@ # emerge --ask --oneshot --verbose dev-php/php-cgi - CAN-2005-2491 - CAN-2005-2498 - GLSA 200508-13 - GLSA 200508-17 + CAN-2005-2491 + CAN-2005-2498 + GLSA 200508-13 + GLSA 200508-17 - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-20.xml index 3228b85ea9..3f8b5898ea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-20.xml @@ -1,6 +1,5 @@ - AbiWord: RTF import stack-based buffer overflow @@ -8,8 +7,8 @@ making it vulnerable to the execution of arbitrary code. AbiWord - September 30, 2005 - September 30, 2005: 01 + 2005-09-30 + 2005-09-30: 01 107351 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/abiword-2.2.10" + # emerge --ask --oneshot --verbose ">=app-office/abiword-2.2.10" - CAN-2005-2964 + CAN-2005-2964 - + koon - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-21.xml index 270185c848..8d46ac80cb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200509-21.xml @@ -1,6 +1,5 @@ - Hylafax: Insecure temporary file creation in xferfaxstats script @@ -8,8 +7,8 @@ to overwrite arbitrary files. hylafax - September 30, 2005 - May 22, 2006: 02 + 2005-09-30 + 2006-05-22: 02 106882 local @@ -55,16 +54,16 @@ # emerge --ask --oneshot --verbose net-misc/hylafax - Original bug report - CVE-2005-3069 + Original bug report + CVE-2005-3069 - + jaervosz - + jaervosz - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-01.xml index 6d6bb803bc..a62831d27b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-01.xml @@ -1,6 +1,5 @@ - gtkdiskfree: Insecure temporary file creation @@ -8,8 +7,8 @@ user to overwrite arbitrary files. gtkdiskfree - October 03, 2005 - October 03, 2005: 01 + 2005-10-03 + 2005-10-03: 01 104565 local @@ -48,16 +47,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/gtkdiskfree-1.9.3-r1" + # emerge --ask --oneshot --verbose ">=app-admin/gtkdiskfree-1.9.3-r1" - CAN-2005-2918 + CAN-2005-2918 Original Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-02.xml index 51b9f3478b..5f5f9047e7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-02.xml @@ -1,6 +1,5 @@ - Berkeley MPEG Tools: Multiple insecure temporary files @@ -8,8 +7,8 @@ potentially allowing a local user to overwrite arbitrary files. MPEG Tools - October 03, 2005 - October 03, 2005: 01 + 2005-10-03 + 2005-10-03: 01 107344 local @@ -54,18 +53,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mpeg-tools-1.5b-r2" + # emerge --ask --oneshot --verbose ">=media-video/mpeg-tools-1.5b-r2" - CAN-2005-3115 + CAN-2005-3115 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-03.xml index 2e9a8ab715..e6d13be7a8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-03.xml @@ -1,6 +1,5 @@ - Uim: Privilege escalation vulnerability @@ -8,8 +7,8 @@ privilege escalation vulnerability. uim - October 04, 2005 - May 22, 2006: 02 + 2005-10-04 + 2006-05-22: 02 107748 local @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-i18n/uim-0.4.9.1" + # emerge --ask --oneshot --verbose ">=app-i18n/uim-0.4.9.1" - Original advisory - CVE-2005-3149 + Original advisory + CVE-2005-3149 - + koon - + koon - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-04.xml index ee67cc9cca..82731dcae8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-04.xml @@ -1,6 +1,5 @@ - Texinfo: Insecure temporary file creation @@ -8,8 +7,8 @@ to overwrite arbitrary files. Texinfo - October 05, 2005 - October 05, 2005: 01 + 2005-10-05 + 2005-10-05: 01 106105 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/texinfo-4.8-r1" + # emerge --ask --oneshot --verbose ">=sys-apps/texinfo-4.8-r1" - CAN-2005-3011 + CAN-2005-3011 - + koon - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-05.xml index 70e6814535..ec1951db96 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-05.xml @@ -1,14 +1,13 @@ - Ruby: Security bypass vulnerability Ruby is vulnerable to a security bypass of the safe level mechanism. ruby - October 06, 2005 - October 06, 2005: 01 + 2005-10-06 + 2005-10-06: 01 106996 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.3" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.3" - CAN-2005-2337 - Ruby release announcement + CAN-2005-2337 + Ruby release announcement - + koon - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-06.xml index b6632aa652..a27d285ffd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-06.xml @@ -1,6 +1,5 @@ - Dia: Arbitrary code execution through SVG import @@ -8,8 +7,8 @@ arbitrary code. dia - October 06, 2005 - October 06, 2005: 01 + 2005-10-06 + 2005-10-06: 01 107916 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/dia-0.94-r3" + # emerge --ask --oneshot --verbose ">=app-office/dia-0.94-r3" - CAN-2005-2966 + CAN-2005-2966 - + koon - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-07.xml index c9929b9916..880eb3b49d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-07.xml @@ -1,6 +1,5 @@ - RealPlayer, Helix Player: Format string vulnerability @@ -8,8 +7,8 @@ resulting in the execution of arbitrary code. realplayer helixplayer - October 07, 2005 - November 22, 2005: 02 + 2005-10-07 + 2005-11-22: 02 107309 remote @@ -52,7 +51,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/realplayer-10.0.6" + # emerge --ask --oneshot --verbose ">=media-video/realplayer-10.0.6"

Note to Helix Player users: There is currently no stable secure Helix Player package. Affected users should remove the package until an @@ -60,15 +59,15 @@

- CAN-2005-2710 + CAN-2005-2710 - + koon - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-08.xml index ec0416845f..c2f19abad6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-08.xml @@ -1,6 +1,5 @@ - xine-lib: Format string vulnerability @@ -8,8 +7,8 @@ be exploited to execute arbitrary code. xine-lib - October 08, 2005 - October 08, 2005: 01 + 2005-10-08 + 2005-10-08: 01 107854 remote @@ -55,12 +54,12 @@ # emerge --ask --oneshot --verbose media-libs/xine-lib - CAN-2005-2967 + CAN-2005-2967 - + koon - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-09.xml index 074cfa30e7..78272be214 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-09.xml @@ -1,6 +1,5 @@ - Weex: Format string vulnerability @@ -8,8 +7,8 @@ servers to execute arbitrary code. Weex - October 08, 2005 - October 08, 2005: 01 + 2005-10-08 + 2005-10-08: 01 107849 remote @@ -49,15 +48,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/weex-2.6.1.5-r1" + # emerge --ask --oneshot --verbose ">=net-ftp/weex-2.6.1.5-r1" - CAN-2005-3150 + CAN-2005-3150 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-10.xml index b7d8a20086..34fd03a94f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-10.xml @@ -1,6 +1,5 @@ - uw-imap: Remote buffer overflow @@ -8,8 +7,8 @@ leading to execution of arbitrary code. uw-imap - October 11, 2005 - October 11, 2005: 01 + 2005-10-11 + 2005-10-11: 01 108206 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/uw-imap-2004g" + # emerge --ask --oneshot --verbose ">=net-mail/uw-imap-2004g" - CAN-2005-2933 + CAN-2005-2933 iDEFENSE Security Advisory - + koon - + koon - + r2d2
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-11.xml index 070e070a63..bab0ad1e4c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-11.xml @@ -1,6 +1,5 @@ - OpenSSL: SSL 2.0 protocol rollback @@ -8,8 +7,8 @@ secure SSL 2.0 protocol. OpenSSL - October 12, 2005 - November 07, 2005: 02 + 2005-10-12 + 2005-11-07: 02 108852 remote @@ -56,16 +55,16 @@ # emerge --ask --oneshot --verbose dev-libs/openssl - CAN-2005-2969 - OpenSSL security advisory + CAN-2005-2969 + OpenSSL security advisory - + koon - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-12.xml index 86a53c3599..0a818ea43d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-12.xml @@ -1,6 +1,5 @@ - KOffice, KWord: RTF import buffer overflow @@ -8,8 +7,8 @@ potentially resulting in the execution of arbitrary code. koffice, kword - October 14, 2005 - October 14, 2005: 01 + 2005-10-14 + 2005-10-14: 01 108411 remote @@ -52,22 +51,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/koffice-1.4.1-r1" + # emerge --ask --oneshot --verbose ">=app-office/koffice-1.4.1-r1"

All KWord users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/kword-1.4.1-r1" + # emerge --ask --oneshot --verbose ">=app-office/kword-1.4.1-r1" - CAN-2005-2971 - KDE Security Advisory: KWord RTF import buffer overflow + CAN-2005-2971 + KDE Security Advisory: KWord RTF import buffer overflow - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-13.xml index 121f11d93e..c187155a59 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-13.xml @@ -1,6 +1,5 @@ - SPE: Insecure file permissions @@ -8,8 +7,8 @@ leading to privilege escalation. spe - October 15, 2005 - May 22, 2006: 02 + 2005-10-15 + 2006-05-22: 02 108538 local @@ -51,15 +50,15 @@ # emerge --ask --oneshot --verbose dev-util/spe - CVE-2005-3291 + CVE-2005-3291 - + jaervosz - + adir - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-14.xml index d53181a6ef..62112839d7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-14.xml @@ -1,6 +1,5 @@ - Perl, Qt-UnixODBC, CMake: RUNPATH issues @@ -8,8 +7,8 @@ "portage" group to escalate privileges. Perl Qt-UnixODBC CMake - October 17, 2005 - May 22, 2006: 03 + 2005-10-17 + 2006-05-22: 03 105719 105721 106678 @@ -70,7 +69,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/qt-unixODBC-3.3.4-r1" + # emerge --ask --oneshot --verbose ">=dev-db/qt-unixODBC-3.3.4-r1"

All CMake users should upgrade to the latest version:

@@ -79,17 +78,17 @@ # emerge --ask --oneshot --verbose dev-util/cmake - CVE-2005-4278 - CVE-2005-4279 - CVE-2005-4280 + CVE-2005-4278 + CVE-2005-4279 + CVE-2005-4280 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-15.xml index cd4ff86bad..191ef6e265 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-15.xml @@ -1,6 +1,5 @@ - Lynx: Buffer overflow in NNTP processing @@ -8,8 +7,8 @@ code. Lynx - October 17, 2005 - October 17, 2005: 01 + 2005-10-17 + 2005-10-17: 01 108451 remote @@ -52,15 +51,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/lynx-2.8.5-r1" + # emerge --ask --oneshot --verbose ">=www-client/lynx-2.8.5-r1" - CAN-2005-3120 + CAN-2005-3120 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-16.xml index aa2df98dbe..7395ab2495 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-16.xml @@ -1,6 +1,5 @@ - phpMyAdmin: Local file inclusion vulnerability @@ -8,8 +7,8 @@ the execution of arbitrary code. phpmyadmin - October 17, 2005 - May 22, 2006: 02 + 2005-10-17 + 2006-05-22: 02 108939 local @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.4_p2" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.4_p2" - PMASA-2005-4 - CVE-2005-3299 + PMASA-2005-4 + CVE-2005-3299 - + koon - + koon - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-17.xml index c2a2192799..87f82b36d6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-17.xml @@ -1,6 +1,5 @@ - AbiWord: New RTF import buffer overflows @@ -8,8 +7,8 @@ import, making it vulnerable to the execution of arbitrary code. AbiWord - October 20, 2005 - October 20, 2005: 01 + 2005-10-20 + 2005-10-20: 01 109157 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/abiword-2.2.11" + # emerge --ask --oneshot --verbose ">=app-office/abiword-2.2.11" - GLSA-200509-20 - CAN-2005-2972 + GLSA-200509-20 + CAN-2005-2972 - + koon - + formula7 - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-18.xml index 5dc29e79ad..31402e7730 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-18.xml @@ -1,6 +1,5 @@ - Netpbm: Buffer overflow in pnmtopng @@ -8,8 +7,8 @@ which can potentially result in the execution of arbitrary code. Netpbm - October 20, 2005 - May 28, 2009: 06 + 2005-10-20 + 2009-05-28: 06 109705 remote @@ -62,12 +61,12 @@ # emerge --ask --oneshot --verbose media-libs/netpbm - CAN-2005-2978 + CAN-2005-2978 - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-19.xml index a102d105d8..5919447d83 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-19.xml @@ -1,6 +1,5 @@ - cURL: NTLM username stack overflow @@ -8,8 +7,8 @@ of arbitrary code. cURL - October 22, 2005 - October 22, 2005: 01 + 2005-10-22 + 2005-10-22: 01 109097 remote @@ -53,16 +52,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/curl-7.15.0" + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.15.0" - CVE-2005-3185 + CVE-2005-3185 iDefense Security Advisory 10.13.05 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-20.xml index 996f84d659..c15fda05fa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-20.xml @@ -1,6 +1,5 @@ - Zope: File inclusion through RestructuredText @@ -8,8 +7,8 @@ RestructuredText functionalities to untrusted users. Zope - October 25, 2005 - May 22, 2006: 02 + 2005-10-25 + 2006-05-22: 02 109087 remote @@ -55,15 +54,15 @@ Zope Hotfix 2005-10-09 Alert - CVE-2005-3323 + CVE-2005-3323 - + koon - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-21.xml index e7c7719b2b..f835c9db1c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-21.xml @@ -1,6 +1,5 @@ - phpMyAdmin: Local file inclusion and XSS vulnerabilities @@ -9,8 +8,8 @@ issues. phpmyadmin - October 25, 2005 - May 22, 2006: 02 + 2005-10-25 + 2006-05-22: 02 110146 local and remote @@ -56,17 +55,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.4_p3" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.6.4_p3" - PMASA-2005-5 - CVE-2005-3300 - CVE-2005-3301 + PMASA-2005-5 + CVE-2005-3300 + CVE-2005-3301 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-22.xml index a382162144..9a6e12117d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-22.xml @@ -1,6 +1,5 @@ - SELinux PAM: Local password guessing attack @@ -8,8 +7,8 @@ brute-force system passwords. PAM - October 28, 2005 - October 28, 2005: 01 + 2005-10-28 + 2005-10-28: 01 109485 local @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-libs/pam-0.78-r3" + # emerge --ask --oneshot --verbose ">=sys-libs/pam-0.78-r3" - CVE-2005-2977 + CVE-2005-2977 - + jaervosz - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-23.xml index 0cf8291c9c..e811987afc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-23.xml @@ -1,14 +1,13 @@ - TikiWiki: XSS vulnerability TikiWiki is vulnerable to cross-site scripting attacks. tikiwiki - October 28, 2005 - May 22, 2006: 02 + 2005-10-28 + 2006-05-22: 02 109858 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.1.1" + # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.1.1"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

- CVE-2005-3283 + CVE-2005-3283 - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-24.xml index 876c266cda..6ba2621d6d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-24.xml @@ -1,6 +1,5 @@ - Mantis: Multiple vulnerabilities @@ -8,8 +7,8 @@ disclosure to arbitrary script execution. Mantis - October 28, 2005 - May 22, 2006: 02 + 2005-10-28 + 2006-05-22: 02 110326 remote @@ -57,20 +56,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-0.19.3" + # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-0.19.3" - Mantis ChangeLog - CVE-2005-3335 - CVE-2005-3336 - CVE-2005-3337 - CVE-2005-3338 - CVE-2005-3339 + Mantis ChangeLog + CVE-2005-3335 + CVE-2005-3336 + CVE-2005-3337 + CVE-2005-3338 + CVE-2005-3339 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-25.xml index 09939cd84b..d8724e94e2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-25.xml @@ -1,6 +1,5 @@ - Ethereal: Multiple vulnerabilities in protocol dissectors @@ -8,8 +7,8 @@ in the execution of arbitrary code or abnormal termination. Ethereal - October 30, 2005 - October 30, 2005: 01 + 2005-10-30 + 2005-10-30: 01 109348 remote @@ -60,26 +59,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.13-r1" + # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.13-r1" - CVE-2005-3184 - CVE-2005-3241 - CVE-2005-3242 - CVE-2005-3243 - CVE-2005-3244 - CVE-2005-3245 - CVE-2005-3246 - CVE-2005-3247 - CVE-2005-3248 - CVE-2005-3249 - CVE-2005-3313 + CVE-2005-3184 + CVE-2005-3241 + CVE-2005-3242 + CVE-2005-3243 + CVE-2005-3244 + CVE-2005-3245 + CVE-2005-3246 + CVE-2005-3247 + CVE-2005-3248 + CVE-2005-3249 + CVE-2005-3313 Ethereal enpa-sa-00021 - + jaervosz - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-26.xml index 9caa1d54ce..fe2e85f38f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200510-26.xml @@ -1,6 +1,5 @@ - XLI, Xloadimage: Buffer overflow @@ -8,8 +7,8 @@ in the execution of arbitrary code. xli xloadimage - October 30, 2005 - October 30, 2005: 01 + 2005-10-30 + 2005-10-30: 01 108365 remote @@ -56,24 +55,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/xli-1.17.0-r2" + # emerge --ask --oneshot --verbose ">=media-gfx/xli-1.17.0-r2"

All Xloadimage users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/xloadimage-4.1-r4" + # emerge --ask --oneshot --verbose ">=media-gfx/xloadimage-4.1-r4" - CAN-2005-3178 + CAN-2005-3178 - + koon - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-01.xml index a486e0716c..6a4846ee1b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-01.xml @@ -1,6 +1,5 @@ - libgda: Format string vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. libgda - November 02, 2005 - November 02, 2005: 01 + 2005-11-02 + 2005-11-02: 01 110467 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=gnome-extra/libgda-1.2.2-r1" + # emerge --ask --oneshot --verbose ">=gnome-extra/libgda-1.2.2-r1" - CVE-2005-2958 + CVE-2005-2958 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-02.xml index 55f8f16005..cf3ab8def8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-02.xml @@ -1,6 +1,5 @@ - QDBM, ImageMagick, GDAL: RUNPATH issues @@ -8,8 +7,8 @@ "portage" group to escalate privileges. QDBM ImageMagick GDAL - November 02, 2005 - May 22, 2006: 02 + 2005-11-02 + 2006-05-22: 02 105717 105760 108534 @@ -63,13 +62,13 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/qdbm-1.8.33-r2" + # emerge --ask --oneshot --verbose ">=dev-db/qdbm-1.8.33-r2"

All ImageMagick users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.2.4.2-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.2.4.2-r1"

All GDAL users should upgrade to the latest version:

@@ -78,14 +77,14 @@ # emerge --ask --oneshot --verbose sci-libs/gdal - CVE-2005-3580 - CVE-2005-3581 - CVE-2005-3582 + CVE-2005-3580 + CVE-2005-3581 + CVE-2005-3582 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-03.xml index 9ddf1b008c..045c52c628 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-03.xml @@ -1,6 +1,5 @@ - giflib: Multiple vulnerabilities @@ -9,8 +8,8 @@ code execution. giflib - November 04, 2005 - November 04, 2005: 01 + 2005-11-04 + 2005-11-04: 01 109997 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/giflib-4.1.4" + # emerge --ask --oneshot --verbose ">=media-libs/giflib-4.1.4" - CVE-2005-2974 - CVE-2005-3350 + CVE-2005-2974 + CVE-2005-3350 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-04.xml index 140fd276ce..f68bcdb749 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-04.xml @@ -1,6 +1,5 @@ - ClamAV: Multiple vulnerabilities @@ -8,8 +7,8 @@ of arbitrary code and a Denial of Service. clamav - November 06, 2005 - May 22, 2006: 02 + 2005-11-06 + 2006-05-22: 02 109213 remote @@ -53,24 +52,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.87.1" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.87.1" - CAN-2005-3239 - CAN-2005-3303 - CVE-2005-3500 - CVE-2005-3501 - CVE-2005-3587 - ClamAV release notes - Zero Day Initiative advisory + CAN-2005-3239 + CAN-2005-3303 + CVE-2005-3500 + CVE-2005-3501 + CVE-2005-3587 + ClamAV release notes + Zero Day Initiative advisory - + koon - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-05.xml index a38eba1252..70581a635a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-05.xml @@ -1,6 +1,5 @@ - GNUMP3d: Directory traversal and XSS vulnerabilities @@ -9,8 +8,8 @@ browser. gnump3d - November 06, 2005 - August 21, 2007: 02 + 2005-11-06 + 2007-08-21: 02 109667 remote @@ -51,20 +50,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/gnump3d-2.9_pre7" + # emerge --ask --oneshot --verbose ">=media-sound/gnump3d-2.9_pre7" - CVE-2005-3123 - CVE-2005-3424 - CVE-2005-3425 + CVE-2005-3123 + CVE-2005-3424 + CVE-2005-3425 - + koon - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-06.xml index 67ff8f87bb..11c6f49fd9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-06.xml @@ -1,6 +1,5 @@ - fetchmail: Password exposure in fetchmailconf @@ -8,8 +7,8 @@ exposing sensitive information to other local users. fetchmail - November 06, 2005 - November 06, 2005: 01 + 2005-11-06 + 2005-11-06: 01 110366 local @@ -50,16 +49,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.2.5.2-r1" + # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.2.5.2-r1" Fetchmail Security Advisory - CVE-2005-3088 + CVE-2005-3088 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-07.xml index 64c36820be..74c8cfa307 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-07.xml @@ -1,6 +1,5 @@ - OpenVPN: Multiple vulnerabilities @@ -8,8 +7,8 @@ code and the OpenVPN server is vulnerable to a Denial of Service issue. OpenVPN - November 06, 2005 - November 06, 2005: 01 + 2005-11-06 + 2005-11-06: 01 111116 remote @@ -52,20 +51,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/openvpn-2.0.4" + # emerge --ask --oneshot --verbose ">=net-misc/openvpn-2.0.4" - CVE-2005-3393 - CVE-2005-3409 - OpenVPN changelog + CVE-2005-3393 + CVE-2005-3409 + OpenVPN changelog - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-08.xml index 7b7f495dea..de2f94d466 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-08.xml @@ -1,6 +1,5 @@ - PHP: Multiple vulnerabilities @@ -8,8 +7,8 @@ local Denial of service, cross-site scripting or PHP variables overwrite. PHP - November 13, 2005 - November 13, 2005: 01 + 2005-11-13 + 2005-11-13: 01 107602 111032 remote and local @@ -99,18 +98,18 @@ # emerge --ask --oneshot --verbose dev-php/php-cgi - CVE-2005-3054 - CVE-2005-3319 - CVE-2005-3388 - CVE-2005-3389 - CVE-2005-3390 - CVE-2005-3391 - CVE-2005-3392 + CVE-2005-3054 + CVE-2005-3319 + CVE-2005-3388 + CVE-2005-3389 + CVE-2005-3390 + CVE-2005-3391 + CVE-2005-3392 - + koon - + vorlon078 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-09.xml index 3193f8a99a..85f8865787 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-09.xml @@ -1,6 +1,5 @@ - Lynx: Arbitrary command execution @@ -8,8 +7,8 @@ arbitrary commands. lynx - November 13, 2005 - November 13, 2005: 01 + 2005-11-13 + 2005-11-13: 01 112213 remote @@ -53,19 +52,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/lynx-2.8.5-r2" + # emerge --ask --oneshot --verbose ">=www-client/lynx-2.8.5-r2" - CVE-2005-2929 + CVE-2005-2929 iDefense Security Advisory 11.11.05 - + taviso - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-10.xml index e29eb2a006..a53a563608 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-10.xml @@ -1,6 +1,5 @@ - RAR: Format string and buffer overflow vulnerabilities @@ -8,8 +7,8 @@ may be used to execute arbitrary code. rar - November 13, 2005 - November 13, 2005: 01 + 2005-11-13 + 2005-11-13: 01 111926 remote @@ -63,19 +62,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/rar-3.5.1" + # emerge --ask --oneshot --verbose ">=app-arch/rar-3.5.1" RAR Release Notes - Secunia Research 11/10/2005 + Secunia Research 11/10/2005 - + jaervosz - + adir - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-11.xml index 4af034f0d0..d65cb2600b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-11.xml @@ -1,6 +1,5 @@ - linux-ftpd-ssl: Remote buffer overflow @@ -8,8 +7,8 @@ to execute arbitrary code with escalated privileges on the local system. linux-ftpd-ssl - November 13, 2005 - December 30, 2007: 02 + 2005-11-13 + 2007-12-30: 02 111573 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/netkit-ftpd-0.17-r3" + # emerge --ask --oneshot --verbose ">=net-ftp/netkit-ftpd-0.17-r3" - CVE-2005-3524 + CVE-2005-3524 - + koon - + shellsage - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-12.xml index 35ac66b13f..716ebb6692 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-12.xml @@ -1,6 +1,5 @@ - Scorched 3D: Multiple vulnerabilities @@ -8,8 +7,8 @@ service or execute arbitrary code on game servers. scorched3d - November 15, 2005 - August 10, 2006: 03 + 2005-11-15 + 2006-08-10: 03 111421 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-strategy/scorched3d-40" + # emerge --ask --oneshot --verbose ">=games-strategy/scorched3d-40" Original advisory - CVE-2005-3486 - CVE-2005-3487 - CVE-2005-3488 + CVE-2005-3486 + CVE-2005-3487 + CVE-2005-3488 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-13.xml index 5c01d1118f..479d57c416 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-13.xml @@ -1,6 +1,5 @@ - Sylpheed, Sylpheed-Claws: Buffer overflow in LDIF importer @@ -8,8 +7,8 @@ may lead to the execution of arbitrary code. sylpheed sylpheed-claws - November 15, 2005 - November 15, 2005: 01 + 2005-11-15 + 2005-11-15: 01 111853 remote @@ -57,24 +56,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-2.0.4" + # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-2.0.4"

All Sylpheed-Claws users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-claws-1.0.5-r1" + # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-claws-1.0.5-r1" - CVE-2005-3354 + CVE-2005-3354 - + koon - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-14.xml index 9720f8708c..be9da5f06b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-14.xml @@ -1,6 +1,5 @@ - GTK+ 2, GdkPixbuf: Multiple XPM decoding vulnerabilities @@ -9,8 +8,8 @@ arbitrary code. gtk+ - November 16, 2005 - November 16, 2005: 01 + 2005-11-16 + 2005-11-16: 01 112608 remote @@ -66,18 +65,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/gdk-pixbuf-0.22.0-r5" + # emerge --ask --oneshot --verbose ">=media-libs/gdk-pixbuf-0.22.0-r5" - CVE-2005-2975 - CVE-2005-2976 - CVE-2005-3186 + CVE-2005-2975 + CVE-2005-2976 + CVE-2005-3186 iDefense Security Advisory 11.15.05 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-15.xml index 1773b7842f..e490aae6e3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-15.xml @@ -1,6 +1,5 @@ - Smb4k: Local unauthorized file access @@ -8,8 +7,8 @@ contents of /etc/sudoers and /etc/super.tab files. Smb4k - November 18, 2005 - November 18, 2005: 01 + 2005-11-18 + 2005-11-18: 01 111089 local @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/smb4k-0.6.4" + # emerge --ask --oneshot --verbose ">=net-misc/smb4k-0.6.4" - CVE-2005-2851 + CVE-2005-2851 Smb4k Announcement - + koon - + koon - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-16.xml index cd4078c085..921370bff5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-16.xml @@ -1,6 +1,5 @@ - GNUMP3d: Directory traversal and insecure temporary file creation @@ -8,8 +7,8 @@ directory traversal and insecure temporary file creation. GNUMP3d - November 21, 2005 - August 21, 2007: 02 + 2005-11-21 + 2007-08-21: 02 111990 remote @@ -54,20 +53,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/gnump3d-2.9_pre7" + # emerge --ask --oneshot --verbose ">=media-sound/gnump3d-2.9_pre7" - CVE-2005-3349 - CVE-2005-3355 - GNUMP3d Changelog + CVE-2005-3349 + CVE-2005-3355 + GNUMP3d Changelog - + koon - + koon - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-17.xml index 3b0c673bf3..bf5b088e50 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-17.xml @@ -1,6 +1,5 @@ - FUSE: mtab corruption through fusermount @@ -9,8 +8,8 @@ mount options. FUSE - November 22, 2005 - November 22, 2005: 01 + 2005-11-22 + 2005-11-22: 01 112902 local @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-fs/fuse-2.4.1-r1" + # emerge --ask --oneshot --verbose ">=sys-fs/fuse-2.4.1-r1" - CVE-2005-3531 + CVE-2005-3531 - + jaervosz - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-18.xml index 78dbe89b08..420e82a0ac 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-18.xml @@ -1,6 +1,5 @@ - phpSysInfo: Multiple vulnerabilities @@ -9,8 +8,8 @@ arbitrary code. phpsysinfo - November 22, 2005 - November 22, 2005: 01 + 2005-11-22 + 2005-11-22: 01 112482 local and remote @@ -55,20 +54,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpsysinfo-2.4.1" + # emerge --ask --oneshot --verbose ">=www-apps/phpsysinfo-2.4.1" - Original advisory - CVE-2005-3347 - CVE-2005-3348 + Original advisory + CVE-2005-3347 + CVE-2005-3348 - + jaervosz - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-19.xml index 7a5e26db4e..6354dd45a8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-19.xml @@ -1,6 +1,5 @@ - eix: Insecure temporary file creation @@ -8,8 +7,8 @@ allowing a local user to overwrite arbitrary files. eix - November 22, 2005 - May 22, 2006: 02 + 2005-11-22 + 2006-05-22: 02 112061 local @@ -55,15 +54,15 @@ # emerge --ask --oneshot --verbose app-portage/eix - CVE-2005-3785 + CVE-2005-3785 - + koon - + adir - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-20.xml index 779863bc7f..baebb98345 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-20.xml @@ -1,6 +1,5 @@ - Horde Application Framework: XSS vulnerability @@ -9,8 +8,8 @@ content. horde - November 22, 2005 - November 22, 2005: 01 + 2005-11-22 + 2005-11-22: 01 112491 remote @@ -54,19 +53,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-2.2.9" + # emerge --ask --oneshot --verbose ">=www-apps/horde-2.2.9" - CVE-2005-3570 - Horde Announcement + CVE-2005-3570 + Horde Announcement - + jaervosz - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-21.xml index 762ca04859..9e52ac8dc9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-21.xml @@ -1,6 +1,5 @@ - Macromedia Flash Player: Remote arbitrary code execution @@ -8,8 +7,8 @@ a user's system via the handling of malicious SWF files. Flash - November 25, 2005 - May 28, 2009: 02 + 2005-11-25 + 2009-05-28: 02 112251 remote @@ -55,19 +54,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-7.0.61" + # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-7.0.61" - CVE-2005-2628 + CVE-2005-2628 Macromedia Announcement - + koon - + shellsage - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-22.xml index 2ba0a5f91b..15413622c9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-22.xml @@ -1,6 +1,5 @@ - Inkscape: Buffer overflow @@ -9,8 +8,8 @@ when opened. Inkscape - November 28, 2005 - November 28, 2005: 01 + 2005-11-28 + 2005-11-28: 01 109993 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/inkscape-0.43" + # emerge --ask --oneshot --verbose ">=media-gfx/inkscape-0.43" - CVE-2005-3737 + CVE-2005-3737 - + koon - + shellsage - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-23.xml index 24e69b190e..367b52f411 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200511-23.xml @@ -1,6 +1,5 @@ - chmlib, KchmViewer: Stack-based buffer overflow @@ -8,8 +7,8 @@ lead to the execution of arbitrary code. chmlib kchmviewer - November 28, 2005 - May 28, 2009: 03 + 2005-11-28 + 2009-05-28: 03 110557 remote @@ -55,24 +54,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/chmlib-0.37.4" + # emerge --ask --oneshot --verbose ">=dev-libs/chmlib-0.37.4"

All KchmViewer users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/kchmviewer-1.1" + # emerge --ask --oneshot --verbose ">=app-text/kchmviewer-1.1" - CVE-2005-3318 + CVE-2005-3318 - + koon - + adir - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-01.xml index 5ff3cfcff3..e595beca30 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-01.xml @@ -1,6 +1,5 @@ - Perl: Format string errors can lead to code execution @@ -9,8 +8,8 @@ code. Perl - December 07, 2005 - December 07, 2005: 01 + 2005-12-07 + 2005-12-07: 01 114113 remote and local @@ -68,17 +67,17 @@ # emerge --ask --oneshot --verbose dev-lang/perl - CVE-2005-3962 - Dyad Security Advisory + CVE-2005-3962 + Dyad Security Advisory Research on format string errors in Perl - + koon - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-02.xml index 0da8a3d03c..feb883b0ac 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-02.xml @@ -1,6 +1,5 @@ - Webmin, Usermin: Format string vulnerability @@ -8,8 +7,8 @@ may lead to the execution of arbitrary code. webmin usermin - December 07, 2005 - December 07, 2005: 01 + 2005-12-07 + 2005-12-07: 01 113888 remote @@ -57,25 +56,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/webmin-1.250" + # emerge --ask --oneshot --verbose ">=app-admin/webmin-1.250"

All Usermin users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/usermin-1.180" + # emerge --ask --oneshot --verbose ">=app-admin/usermin-1.180" - CVE-2005-3912 - Dyad Security Advisory + CVE-2005-3912 + Dyad Security Advisory - + koon - + jaervosz - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-03.xml index 6d5388c3b4..cf22b93f52 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-03.xml @@ -1,6 +1,5 @@ - phpMyAdmin: Multiple vulnerabilities @@ -8,8 +7,8 @@ remote file inclusion vulnerabilities. phpmyadmin - December 11, 2005 - December 11, 2005: 01 + 2005-12-11 + 2005-12-11: 01 114662 remote @@ -57,22 +56,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.7.0_p1" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.7.0_p1" - CVE-2005-3665 - CVE-2005-4079 - PMASA-2005-8 - PMASA-2005-9 - Hardened-PHP Advisory 25/2005 + CVE-2005-3665 + CVE-2005-4079 + PMASA-2005-8 + PMASA-2005-9 + Hardened-PHP Advisory 25/2005 - + jaervosz - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-04.xml index e13e4a17ee..0d7b0a4631 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-04.xml @@ -1,6 +1,5 @@ - Openswan, IPsec-Tools: Vulnerabilities in ISAKMP Protocol implementation @@ -8,8 +7,8 @@ a Denial of Service attack. openswan ipsec-tools - December 12, 2005 - December 14, 2005: 02 + 2005-12-12 + 2005-12-14: 02 112568 113201 remote @@ -62,7 +61,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/openswan-2.4.4" + # emerge --ask --oneshot --verbose ">=net-misc/openswan-2.4.4"

All IPsec-Tools users should upgrade to the latest version:

@@ -71,17 +70,17 @@ # emerge --ask --oneshot --verbose net-firewall/ipsec-tools - CVE-2005-3671 - CVE-2005-3732 + CVE-2005-3671 + CVE-2005-3732 Original Advisory - + jaervosz - + adir - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-05.xml index 36c17e95ee..9c033f7866 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-05.xml @@ -1,6 +1,5 @@ - Xmail: Privilege escalation through sendmail @@ -8,8 +7,8 @@ potentially resulting in local privilege escalation. xmail - December 14, 2005 - December 14, 2005: 01 + 2005-12-14 + 2005-12-14: 01 109381 local @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/xmail-1.22" + # emerge --ask --oneshot --verbose ">=mail-mta/xmail-1.22" - CVE-2005-2943 + CVE-2005-2943 iDEFENSE Security Advisory - + koon - + koon - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-06.xml index 79a82a847a..bcc94721e9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-06.xml @@ -1,6 +1,5 @@ - Ethereal: Buffer overflow in OSPF protocol dissector @@ -9,8 +8,8 @@ code. Ethereal - December 14, 2005 - December 14, 2005: 01 + 2005-12-14 + 2005-12-14: 01 115030 remote @@ -52,16 +51,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.13-r2" + # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.10.13-r2" - CVE-2005-3651 + CVE-2005-3651 iDEFENSE Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-07.xml index 52d8604c26..e037428177 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-07.xml @@ -1,6 +1,5 @@ - OpenLDAP, Gauche: RUNPATH issues @@ -8,8 +7,8 @@ "portage" group to escalate privileges. OpenLDAP Gauche - December 15, 2005 - December 30, 2007: 03 + 2005-12-15 + 2007-12-30: 03 105380 112577 local @@ -62,16 +61,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-scheme/gauche-0.8.6-r1" + # emerge --ask --oneshot --verbose ">=dev-scheme/gauche-0.8.6-r1" - CVE-2005-4442 - CVE-2005-4443 + CVE-2005-4442 + CVE-2005-4443 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-08.xml index 7bb32e7dea..8ffe8e9623 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-08.xml @@ -1,6 +1,5 @@ - Xpdf, GPdf, CUPS, Poppler: Multiple vulnerabilities @@ -8,8 +7,8 @@ Poppler potentially resulting in the execution of arbitrary code. xpdf, gpdf, poppler,cups - December 16, 2005 - December 17, 2005: 02 + 2005-12-16 + 2005-12-17: 02 114428 115286 remote @@ -65,13 +64,13 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.01-r2" + # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.01-r2"

All GPdf users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.10.0-r2" + # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.10.0-r2"

All Poppler users should upgrade to the latest version:

@@ -83,20 +82,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/cups-1.1.23-r3" + # emerge --ask --oneshot --verbose ">=net-print/cups-1.1.23-r3" - CVE-2005-3191 - CVE-2005-3192 - CVE-2005-3193 + CVE-2005-3191 + CVE-2005-3192 + CVE-2005-3193 - + jaervosz - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-09.xml index 72d3f938a1..e277cec83c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-09.xml @@ -1,6 +1,5 @@ - cURL: Off-by-one errors in URL handling @@ -8,8 +7,8 @@ due to the insecure parsing of URLs. cURL - December 16, 2005 - December 16, 2005: 01 + 2005-12-16 + 2005-12-16: 01 114710 local @@ -57,19 +56,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/curl-7.15.1" + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.15.1" - CVE-2005-4077 - Hardened-PHP Advisory + CVE-2005-4077 + Hardened-PHP Advisory - + koon - + shellsage - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-10.xml index 8425233746..22eba89293 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-10.xml @@ -1,6 +1,5 @@ - Opera: Command-line URL shell command injection @@ -8,8 +7,8 @@ execute arbitrary commands. opera - December 18, 2005 - December 18, 2005: 01 + 2005-12-18 + 2005-12-18: 01 113239 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-8.51" + # emerge --ask --oneshot --verbose ">=www-client/opera-8.51" - CVE-2005-3750 - Opera 8.51 Changelog + CVE-2005-3750 + Opera 8.51 Changelog - + koon - + koon - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-11.xml index 238fee3659..3355ac85d8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-11.xml @@ -1,6 +1,5 @@ - CenterICQ: Multiple vulnerabilities @@ -9,8 +8,8 @@ library. CenterICQ - December 20, 2005 - December 20, 2005: 01 + 2005-12-20 + 2005-12-20: 01 100519 114038 remote @@ -54,20 +53,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/centericq-4.21.0-r2" + # emerge --ask --oneshot --verbose ">=net-im/centericq-4.21.0-r2" - CVE-2005-3694 - CVE-2005-3863 + CVE-2005-3694 + CVE-2005-3863 Zone-H Research ZRCSA 200503 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-12.xml index dc2da3e906..e5ec620717 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-12.xml @@ -1,6 +1,5 @@ - Mantis: Multiple vulnerabilities @@ -8,8 +7,8 @@ SQL injection to cross-site scripting and HTTP response splitting. Mantis - December 22, 2005 - May 22, 2006: 02 + 2005-12-22 + 2006-05-22: 02 116036 remote @@ -58,20 +57,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-0.19.4" + # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-0.19.4" - Mantis ChangeLog - CVE-2005-4518 - CVE-2005-4519 - CVE-2005-4520 - CVE-2005-4521 - CVE-2005-4522 + Mantis ChangeLog + CVE-2005-4518 + CVE-2005-4519 + CVE-2005-4520 + CVE-2005-4521 + CVE-2005-4522 - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-13.xml index efe43b69a2..6b9bf55b10 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-13.xml @@ -1,6 +1,5 @@ - Dropbear: Privilege escalation @@ -8,8 +7,8 @@ arbitrary code as the root user. dropbear - December 23, 2005 - December 23, 2005: 01 + 2005-12-23 + 2005-12-23: 01 116006 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/dropbear-0.47" + # emerge --ask --oneshot --verbose ">=net-misc/dropbear-0.47" - CVE-2005-4178 + CVE-2005-4178 - + koon - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-14.xml index 3532089379..7d6c0af7b3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-14.xml @@ -1,6 +1,5 @@ - NBD Tools: Buffer overflow in NBD server @@ -8,8 +7,8 @@ execution of arbitrary code. NBD - December 23, 2005 - December 23, 2005: 01 + 2005-12-23 + 2005-12-23: 01 116314 remote @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-block/nbd-2.8.2-r1" + # emerge --ask --oneshot --verbose ">=sys-block/nbd-2.8.2-r1" - CVE-2005-3534 + CVE-2005-3534 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-15.xml index 4613e4d32e..6500cdd2ad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-15.xml @@ -1,6 +1,5 @@ - rssh: Privilege escalation @@ -8,8 +7,8 @@ directories. rssh - December 27, 2005 - December 27, 2005: 01 + 2005-12-27 + 2005-12-27: 01 115082 local @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-shells/rssh-2.3.0" + # emerge --ask --oneshot --verbose ">=app-shells/rssh-2.3.0" - CVE-2005-3345 + CVE-2005-3345 rssh security announcement - + koon - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-16.xml index c5ee35508e..ed6871abef 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-16.xml @@ -1,6 +1,5 @@ - OpenMotif, AMD64 x86 emulation X libraries: Buffer overflows in libUil library @@ -8,8 +7,8 @@ toolkit, that can potentially lead to the execution of arbitrary code. openmotif - December 28, 2005 - January 29, 2006: 03 + 2005-12-28 + 2006-01-29: 03 114234 116481 remote @@ -67,13 +66,13 @@ # emerge --ask --oneshot --verbose app-emulation/emul-linux-x86-xlibs - CVE-2005-3964 + CVE-2005-3964 xfocus SD-051202 Original Advisory - + koon - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-17.xml index fa0d13a483..13e5378491 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-17.xml @@ -1,6 +1,5 @@ - scponly: Multiple privilege escalation issues @@ -9,8 +8,8 @@ restrictions. scponly - December 29, 2005 - May 22, 2006: 02 + 2005-12-29 + 2006-05-22: 02 116526 local and remote @@ -54,17 +53,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/scponly-4.2" + # emerge --ask --oneshot --verbose ">=net-misc/scponly-4.2" scponly release notes - CVE-2005-4532 - CVE-2005-4533 + CVE-2005-4532 + CVE-2005-4533 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-18.xml index 808df8257c..5414300202 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-18.xml @@ -1,6 +1,5 @@ - XnView: Privilege escalation @@ -9,8 +8,8 @@ privileges of another user. xnview - December 30, 2005 - May 22, 2006: 02 + 2005-12-30 + 2006-05-22: 02 117063 local @@ -57,15 +56,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-misc/xnview-1.70-r1" + # emerge --ask --oneshot --verbose ">=x11-misc/xnview-1.70-r1" - CVE-2005-4595 + CVE-2005-4595 - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-01.xml index 31f3e169eb..63c4d3af5d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-01.xml @@ -1,14 +1,13 @@ - pinentry: Local privilege escalation pinentry is vulnerable to privilege escalation. pinentry - January 03, 2006 - January 03, 2006: 01 + 2006-01-03 + 2006-01-03: 01 116822 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/pinentry-0.7.2-r2" + # emerge --ask --oneshot --verbose ">=app-crypt/pinentry-0.7.2-r2" - CVE-2006-0071 + CVE-2006-0071 - + koon - + koon - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-02.xml index 79ec4e782c..ec7d8df6a7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-02.xml @@ -1,6 +1,5 @@ - KPdf, KWord: Multiple overflows in included Xpdf code @@ -8,8 +7,8 @@ making them vulnerable to the execution of arbitrary code. kdegraphics, kpdf, koffice, kword - January 04, 2006 - January 07, 2006: 03 + 2006-01-04 + 2006-01-07: 03 114429 115851 remote @@ -64,43 +63,43 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.4.3-r3" + # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.4.3-r3"

All Kpdf users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.4.3-r3" + # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.4.3-r3"

All KOffice users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/koffice-1.4.2-r6" + # emerge --ask --oneshot --verbose ">=app-office/koffice-1.4.2-r6"

All KWord users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/kword-1.4.2-r6" + # emerge --ask --oneshot --verbose ">=app-office/kword-1.4.2-r6" - CAN-2005-3191 - CAN-2005-3192 - CAN-2005-3193 - CVE-2005-3624 - CVE-2005-3625 - CVE-2005-3626 - CVE-2005-3627 - CVE-2005-3628 - GLSA 200512-08 - KDE Security Advisory: kpdf/xpdf multiple integer overflows + CAN-2005-3191 + CAN-2005-3192 + CAN-2005-3193 + CVE-2005-3624 + CVE-2005-3625 + CVE-2005-3626 + CVE-2005-3627 + CVE-2005-3628 + GLSA 200512-08 + KDE Security Advisory: kpdf/xpdf multiple integer overflows CESA-2005-003 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-03.xml index e5907b8969..e10e720216 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-03.xml @@ -1,6 +1,5 @@ - HylaFAX: Multiple vulnerabilities @@ -8,8 +7,8 @@ vulnerabilities. hylafax - January 06, 2006 - January 06, 2006: 01 + 2006-01-06 + 2006-01-06: 01 116389 remote @@ -50,17 +49,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/hylafax-4.2.3-r1" + # emerge --ask --oneshot --verbose ">=net-misc/hylafax-4.2.3-r1" - CVE-2005-3538 - CVE-2005-3539 - HylaFAX release announcement + CVE-2005-3538 + CVE-2005-3539 + HylaFAX release announcement - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-04.xml index 17792d3cd1..2b1c0855df 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-04.xml @@ -1,6 +1,5 @@ - VMware Workstation: Vulnerability in NAT networking @@ -8,8 +7,8 @@ privileges on the host operating system through a flaw in NAT networking. VMware - January 07, 2006 - May 25, 2006: 02 + 2006-01-07 + 2006-05-25: 02 116238 remote and local @@ -42,8 +41,7 @@

- Disable the NAT service by following the instructions at http://www.vmware.com/support/k + Disable the NAT service by following the instructions at http://www.vmware.com/support/k b, Answer ID 2002.

@@ -56,13 +54,13 @@ # emerge --ask --oneshot --verbose app-emulation/vmware-workstation - CVE-2005-4459 - VMware Security Response + CVE-2005-4459 + VMware Security Response - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-05.xml index 17a8018948..7484eceadd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-05.xml @@ -1,6 +1,5 @@ - mod_auth_pgsql: Multiple format string vulnerabilities @@ -8,8 +7,8 @@ of arbitrary code. mod_auth_pgsql - January 10, 2006 - December 30, 2007: 03 + 2006-01-10 + 2007-12-30: 03 118096 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apache/mod_auth_pgsql-2.0.3" + # emerge --ask --oneshot --verbose ">=www-apache/mod_auth_pgsql-2.0.3" - CVE-2005-3656 + CVE-2005-3656 FrSIRT ADV-2006-0070 - + DerCorny - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-06.xml index 2cc1ea14cf..f779a5d710 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-06.xml @@ -1,6 +1,5 @@ - xine-lib, FFmpeg: Heap-based buffer overflow @@ -8,8 +7,8 @@ exploited by attackers to execute arbitrary code. xine-lib ffmpeg - January 10, 2006 - January 10, 2006: 01 + 2006-01-10 + 2006-01-10: 01 115849 116181 remote @@ -57,25 +56,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.1-r3" + # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.1-r3"

All FFmpeg users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-0.4.9_p20051216" + # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-0.4.9_p20051216" - CVE-2005-4048 - Original advisory + CVE-2005-4048 + Original advisory - + koon - + adir - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-07.xml index 67c792702f..7f371087cd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-07.xml @@ -1,6 +1,5 @@ - ClamAV: Remote execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. clamav - January 13, 2006 - January 13, 2006: 01 + 2006-01-13 + 2006-01-13: 01 118459 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88" - CVE-2006-0162 + CVE-2006-0162 - + DerCorny - + adir - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-08.xml index c533c06926..4ffb6b91ad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-08.xml @@ -1,6 +1,5 @@ - Blender: Heap-based buffer overflow @@ -8,8 +7,8 @@ attackers to execute arbitrary code. blender - January 13, 2006 - January 13, 2006: 01 + 2006-01-13 + 2006-01-13: 01 118163 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/blender-2.40" + # emerge --ask --oneshot --verbose ">=media-gfx/blender-2.40" - CVE-2005-4470 + CVE-2005-4470 - + DerCorny - + DerCorny - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-09.xml index be6b5c02a8..3ae02dc054 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-09.xml @@ -1,6 +1,5 @@ - Wine: Windows Metafile SETABORTPROC vulnerability @@ -8,8 +7,8 @@ which could possibly result in the execution of arbitrary code. wine - January 13, 2006 - February 26, 2007: 03 + 2006-01-13 + 2007-02-26: 03 118101 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/wine-0.9.0" + # emerge --ask --oneshot --verbose ">=app-emulation/wine-0.9.0" - CVE-2006-0106 + CVE-2006-0106 - + DerCorny - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-10.xml index b581baffa4..68a4d4eb77 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-10.xml @@ -1,6 +1,5 @@ - Sun and Blackdown Java: Applet privilege escalation @@ -8,8 +7,8 @@ their privileges. sun-jdk sun-jre-bin blackdown-jre blackdown-jdk - January 16, 2006 - January 16, 2006: 01 + 2006-01-16 + 2006-01-16: 01 118114 remote @@ -62,25 +61,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.09" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.09"

All Sun JRE users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.09" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.09"

All Blackdown JDK users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jdk-1.4.2.03" + # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jdk-1.4.2.03"

All Blackdown JRE users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jre-1.4.2.03" + # emerge --ask --oneshot --verbose ">=dev-java/blackdown-jre-1.4.2.03"

Note to SPARC and PPC users: There is no stable secure Blackdown Java for the SPARC or PPC architectures. Affected users on @@ -90,15 +89,15 @@

- CVE-2005-3905 - CVE-2005-3906 + CVE-2005-3905 + CVE-2005-3906 Sun Security Alert ID 102003 Blackdown Java-Linux Security Advisory - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-11.xml index 4ec44092f1..afb9e6b5c1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-11.xml @@ -1,6 +1,5 @@ - KDE kjs: URI heap overflow vulnerability @@ -8,8 +7,8 @@ resulting in the execution of arbitrary code. KDE - January 22, 2006 - January 22, 2006: 01 + 2006-01-22 + 2006-01-22: 01 118550 remote @@ -52,13 +51,13 @@ # emerge --ask --oneshot --verbose kde-base/kdelibs-3.4.3-r1 - CVE-2006-0019 - KDE Security Advisory: kjs encodeuri/decodeuri heap overflow vulnerability + CVE-2006-0019 + KDE Security Advisory: kjs encodeuri/decodeuri heap overflow vulnerability - + jaervosz - + DerCorny diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-12.xml index 68319bdf67..f4da02e865 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-12.xml @@ -1,6 +1,5 @@ - Trac: Cross-site scripting vulnerability @@ -8,8 +7,8 @@ arbitrary JavaScript code execution. trac - January 26, 2006 - January 26, 2006: 01 + 2006-01-26 + 2006-01-26: 01 118302 remote @@ -48,23 +47,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/trac-0.9.3" + # emerge --ask --oneshot --verbose ">=www-apps/trac-0.9.3"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

- CVE-2005-4305 + CVE-2005-4305 Trac Changelog - + koon - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-13.xml index 3b34bd6c5a..d394557a54 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-13.xml @@ -1,6 +1,5 @@ - Gallery: Cross-site scripting vulnerability @@ -8,8 +7,8 @@ allow arbitrary JavaScript code execution. gallery - January 26, 2006 - January 26, 2006: 01 + 2006-01-26 + 2006-01-26: 01 119590 remote @@ -51,7 +50,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/gallery-1.5.2" + # emerge --ask --oneshot --verbose ">=www-apps/gallery-1.5.2"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update. @@ -59,15 +58,15 @@ Gallery Announcement - CVE-2006-0330 + CVE-2006-0330 - + DerCorny - + DerCorny - + DerCorny diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-14.xml index bf262341b9..25e33fdb34 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-14.xml @@ -1,6 +1,5 @@ - LibAST: Privilege escalation @@ -8,8 +7,8 @@ escalated privileges. LibAST - January 29, 2006 - January 29, 2006: 02 + 2006-01-29 + 2006-01-29: 02 120106 local @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/libast-0.7" + # emerge --ask --oneshot --verbose ">=x11-libs/libast-0.7" # revdep-rebuild - CVE-2006-0224 + CVE-2006-0224 - + DerCorny - + frilled - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-15.xml index b5c2a15b25..8240f3e9aa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-15.xml @@ -1,6 +1,5 @@ - Paros: Default administrator password @@ -8,8 +7,8 @@ execution of arbitrary system commands. Paros - January 29, 2006 - January 29, 2006: 01 + 2006-01-29 + 2006-01-29: 01 120352 remote @@ -50,15 +49,15 @@

# emerge --snyc - # emerge --ask --oneshot --verbose ">=net-proxy/paros-3.2.8" + # emerge --ask --oneshot --verbose ">=net-proxy/paros-3.2.8" - CVE-2005-3280 + CVE-2005-3280 - + frilled - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-16.xml index 55ab9402fc..093625d0d8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-16.xml @@ -1,14 +1,13 @@ - MyDNS: Denial of Service MyDNS contains a vulnerability that may lead to a Denial of Service attack. MyDNS - January 30, 2006 - January 30, 2006: 01 + 2006-01-30 + 2006-01-30: 01 119548 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/mydns-1.1.0" + # emerge --ask --oneshot --verbose ">=net-dns/mydns-1.1.0" - CVE-2006-0351 + CVE-2006-0351 - + DerCorny - + frilled - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-17.xml index 0f2c314026..0734dbb89f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200601-17.xml @@ -1,6 +1,5 @@ - Xpdf, Poppler, GPdf, libextractor, pdftohtml: Heap overflows @@ -8,8 +7,8 @@ overflows that may be exploited to execute arbitrary code. xpdf poppler gpdf libextractor pdftohtml - January 30, 2006 - January 30, 2006: 01 + 2006-01-30 + 2006-01-30: 01 117481 117494 117495 @@ -73,43 +72,43 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.01-r5" + # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.01-r5"

All Poppler users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/poppler-0.4.3-r4" + # emerge --ask --oneshot --verbose ">=app-text/poppler-0.4.3-r4"

All GPdf users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.10.0-r3" + # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.10.0-r3"

All libextractor users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libextractor-0.5.9" + # emerge --ask --oneshot --verbose ">=media-libs/libextractor-0.5.9"

All pdftohtml users should migrate to the latest stable version of Poppler.

- CVE-2005-3627 - CVE-2005-3626 - CVE-2005-3625 - CVE-2005-3624 + CVE-2005-3627 + CVE-2005-3626 + CVE-2005-3625 + CVE-2005-3624 - + jaervosz - + adir - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-01.xml index 9cc96bc3c8..b20d64829c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-01.xml @@ -1,6 +1,5 @@ - GStreamer FFmpeg plugin: Heap-based buffer overflow @@ -8,8 +7,8 @@ exploited by attackers to execute arbitrary code. gst-plugins-ffmpeg - February 05, 2006 - February 05, 2006: 01 + 2006-02-05 + 2006-02-05: 01 119512 remote @@ -54,19 +53,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-ffmpeg-0.8.7-r1" + # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-ffmpeg-0.8.7-r1" - CVE-2005-4048 - GLSA 200601-06 + CVE-2005-4048 + GLSA 200601-06 - + DerCorny - + adir - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-02.xml index b0c676c2f3..175729f6a3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-02.xml @@ -1,6 +1,5 @@ - ADOdb: PostgresSQL command injection @@ -8,8 +7,8 @@ PostgreSQL database. ADOdb - February 06, 2006 - February 06, 2006: 01 + 2006-02-06 + 2006-02-06: 01 120215 remote @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/adodb-4.71" + # emerge --ask --oneshot --verbose ">=dev-php/adodb-4.71" - CVE-2006-0410 + CVE-2006-0410 - + DerCorny - + frilled
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-03.xml index 26d6ee249e..b7139a9e0f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-03.xml @@ -1,6 +1,5 @@ - Apache: Multiple vulnerabilities @@ -8,8 +7,8 @@ to a Denial of Service attack. Apache - February 06, 2006 - December 30, 2007: 03 + 2006-02-06 + 2007-12-30: 03 115324 118875 remote @@ -63,37 +62,37 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.55-r1" + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.55-r1"

2.0.x users, old style config:

# emerge --sync - # emerge --ask --oneshot --verbose "=www-servers/apache-2.0.54-r16" + # emerge --ask --oneshot --verbose "=www-servers/apache-2.0.54-r16"

1.x users, new style config:

# emerge --sync - # emerge --ask --oneshot --verbose "=www-servers/apache-1.3.34-r11" + # emerge --ask --oneshot --verbose "=www-servers/apache-1.3.34-r11"

1.x users, old style config:

# emerge --sync - # emerge --ask --oneshot --verbose "=www-servers/apache-1.3.34-r2" + # emerge --ask --oneshot --verbose "=www-servers/apache-1.3.34-r2" - CVE-2005-3352 - CVE-2005-3357 + CVE-2005-3352 + CVE-2005-3357 - + koon - + frilled - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-04.xml index d950f9fba3..e0b99be398 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-04.xml @@ -1,6 +1,5 @@ - Xpdf, Poppler: Heap overflow @@ -8,8 +7,8 @@ execute arbitrary code. xpdf poppler - February 12, 2006 - February 12, 2006: 01 + 2006-02-12 + 2006-02-12: 01 120985 remote @@ -53,23 +52,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.01-r7" + # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.01-r7"

All Poppler users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/poppler-0.5.0-r4" + # emerge --ask --oneshot --verbose ">=app-text/poppler-0.5.0-r4"

- CVE-2006-0301 + CVE-2006-0301 - + adir - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-05.xml index ed8fc501fc..cee3c41427 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-05.xml @@ -1,6 +1,5 @@ - KPdf: Heap based overflow @@ -8,8 +7,8 @@ vulnerable to the execution of arbitrary code. kdegraphics, kpdf - February 12, 2006 - February 12, 2006: 01 + 2006-02-12 + 2006-02-12: 01 121375 remote @@ -53,22 +52,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.4.3-r4" + # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.4.3-r4"

All Kpdf users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.4.3-r4" + # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.4.3-r4" - CVE-2006-0301 - KDE Security Advisory: kpdf/xpdf heap based buffer overflow + CVE-2006-0301 + KDE Security Advisory: kpdf/xpdf heap based buffer overflow - + jaervosz - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-06.xml index 41c5b8ed00..db1a2920e2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-06.xml @@ -1,6 +1,5 @@ - ImageMagick: Format string vulnerability @@ -8,8 +7,8 @@ and potentially execute arbitrary code. ImageMagick - February 13, 2006 - February 13, 2006: 01 + 2006-02-13 + 2006-02-13: 01 83542 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.2.5.5" + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.2.5.5" - CVE-2006-0082 - GLSA 200503-11 + CVE-2006-0082 + GLSA 200503-11 - + jaervosz - + frilled - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-07.xml index 84b77ebd24..a9720b7478 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-07.xml @@ -1,6 +1,5 @@ - Sun JDK/JRE: Applet privilege escalation @@ -9,8 +8,8 @@ execution. Sun JDK, applet - February 15, 2006 - February 15, 2006: 01 + 2006-02-15 + 2006-02-15: 01 122156 remote @@ -60,26 +59,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.10" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.10"

All Sun JRE users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.10" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.10" Sun Security Alert ID 102170 Sun Security Alert ID 102171 - CVE-2006-0614 - CVE-2006-0615 - CVE-2006-0616 - CVE-2006-0617 + CVE-2006-0614 + CVE-2006-0615 + CVE-2006-0616 + CVE-2006-0617 - + dragonheart - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-08.xml index 85b9cabc42..7b3c4d942d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-08.xml @@ -1,6 +1,5 @@ - libtasn1, GNU TLS: Security flaw in DER decoding @@ -9,8 +8,8 @@ code. libtasn1 - February 16, 2006 - February 16, 2006: 01 + 2006-02-16 + 2006-02-16: 01 122307 remote @@ -57,24 +56,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libtasn1-0.2.18" + # emerge --ask --oneshot --verbose ">=dev-libs/libtasn1-0.2.18"

All GNU TLS users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/gnutls-1.2.10" + # emerge --ask --oneshot --verbose ">=net-libs/gnutls-1.2.10" - CVE-2006-0645 + CVE-2006-0645 - + koon - + koon - + taviso
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-09.xml index 5b5e5a435d..9b226cf5ac 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-09.xml @@ -1,6 +1,5 @@ - BomberClone: Remote execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. games-action/bomberclone - February 16, 2006 - February 16, 2006: 01 + 2006-02-16 + 2006-02-16: 01 121605 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-action/bomberclone-0.11.6.2-r1" + # emerge --ask --oneshot --verbose ">=games-action/bomberclone-0.11.6.2-r1" - CVE-2006-0460 + CVE-2006-0460 - + koon - + koon - + frilled
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-10.xml index a949449012..588867e483 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-10.xml @@ -1,6 +1,5 @@ - GnuPG: Incorrect signature verification @@ -8,8 +7,8 @@ incorrectly believe a signature has been verified. gnupg - February 18, 2006 - February 18, 2006: 01 + 2006-02-18 + 2006-02-18: 01 122721 remote @@ -54,16 +53,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.2.1" + # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.2.1" GnuPG Security Announcement - CVE-2006-0455 + CVE-2006-0455 - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-11.xml index cc92681b7a..2c7685683e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-11.xml @@ -1,6 +1,5 @@ - OpenSSH, Dropbear: Insecure use of system() call @@ -8,8 +7,8 @@ privileges via scp. OpenSSH - February 20, 2006 - February 20, 2006: 01 + 2006-02-20 + 2006-02-20: 01 119232 local @@ -57,24 +56,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.2_p1-r1" + # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.2_p1-r1"

All Dropbear users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/dropbear-0.47-r1" + # emerge --ask --oneshot --verbose ">=net-misc/dropbear-0.47-r1" - CVE-2006-0225 + CVE-2006-0225 - + jaervosz - + frilled - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-12.xml index caee5f4337..1bc991bd24 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-12.xml @@ -1,6 +1,5 @@ - GPdf: heap overflows in included Xpdf code @@ -8,8 +7,8 @@ vulnerable to the execution of arbitrary code. gpdf - February 21, 2006 - February 21, 2006: 01 + 2006-02-21 + 2006-02-21: 01 121511 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.10.0-r4" + # emerge --ask --oneshot --verbose ">=app-text/gpdf-2.10.0-r4" - CVE-2006-0301 + CVE-2006-0301 - + koon - + koon - + dragonheart
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-13.xml index 6a05487d3b..c5876b15a3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-13.xml @@ -1,6 +1,5 @@ - GraphicsMagick: Format string vulnerability @@ -8,8 +7,8 @@ and potentially execute arbitrary code. graphicsmagick - February 26, 2006 - February 26, 2006: 01 + 2006-02-26 + 2006-02-26: 01 119476 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.1.7" + # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.1.7" - GLSA 200602-06 - CVE-2006-0082 + GLSA 200602-06 + CVE-2006-0082 - + koon - + dragonheart - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-14.xml index 6bb30b05fe..e074a8efe5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200602-14.xml @@ -1,6 +1,5 @@ - noweb: Insecure temporary file creation @@ -8,8 +7,8 @@ to overwrite arbitrary files. noweb - February 26, 2006 - February 26, 2006: 01 + 2006-02-26 + 2006-02-26: 01 122705 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/noweb-2.9-r5" + # emerge --ask --oneshot --verbose ">=app-text/noweb-2.9-r5" - CVE-2005-3342 + CVE-2005-3342 - + DerCorny - + DerCorny - + formula7
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-01.xml index 83b7d94301..42d28bd54c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-01.xml @@ -1,14 +1,13 @@ - WordPress: SQL injection vulnerability WordPress is vulnerable to an SQL injection vulnerability. WordPress - March 04, 2006 - March 04, 2006: 01 + 2006-03-04 + 2006-03-04: 01 121661 remote @@ -51,16 +50,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.1" + # emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.1" - CVE-2006-1012 + CVE-2006-1012 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-02.xml index ceec8b49c6..731ae8b8df 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-02.xml @@ -1,6 +1,5 @@ - teTeX, pTeX, CSTeX: Multiple overflows in included XPdf code @@ -8,8 +7,8 @@ making them vulnerable to the execution of arbitrary code. tetex - March 04, 2006 - March 04, 2006: 01 + 2006-03-04 + 2006-03-04: 01 115775 remote @@ -60,32 +59,32 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/tetex-2.0.2-r8" + # emerge --ask --oneshot --verbose ">=app-text/tetex-2.0.2-r8"

All CSTeX users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/cstetex-2.0.2-r2" + # emerge --ask --oneshot --verbose ">=app-text/cstetex-2.0.2-r2"

All pTeX users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/ptex-3.1.5-r1" + # emerge --ask --oneshot --verbose ">=app-text/ptex-3.1.5-r1" - CVE-2005-3193 - GLSA 200512-08 + CVE-2005-3193 + GLSA 200512-08 CESA-2005-003 - + koon - + dragonheart - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-03.xml index 5200b6ce65..8bd6b3beb3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-03.xml @@ -1,6 +1,5 @@ - MPlayer: Multiple integer overflows @@ -8,8 +7,8 @@ could potentially result in the execution of arbitrary code. MPlayer - March 04, 2006 - June 21, 2006: 02 + 2006-03-04 + 2006-06-21: 02 115760 122029 remote @@ -55,17 +54,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20060217" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20060217" - CVE-2005-4048 - CVE-2006-0579 - GLSA 200601-06 + CVE-2005-4048 + CVE-2006-0579 + GLSA 200601-06 - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-04.xml index e9fed24633..264a26cf31 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-04.xml @@ -1,6 +1,5 @@ - IMAP Proxy: Format string vulnerabilities @@ -8,8 +7,8 @@ arbitrary code when connected to malicious IMAP servers. up-imapproxy - March 06, 2006 - March 06, 2006: 01 + 2006-03-06 + 2006-03-06: 01 107679 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/up-imapproxy-1.2.4" + # emerge --ask --oneshot --verbose ">=net-mail/up-imapproxy-1.2.4" - CVE-2005-2661 + CVE-2005-2661 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-05.xml index 033a4b7afe..89cdeb575c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-05.xml @@ -1,6 +1,5 @@ - zoo: Stack-based buffer overflow @@ -8,8 +7,8 @@ code through malicious ZOO archives. zoo - March 06, 2006 - March 06, 2006: 01 + 2006-03-06 + 2006-03-06: 01 123782 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/zoo-2.10-r1" + # emerge --ask --oneshot --verbose ">=app-arch/zoo-2.10-r1" - CVE-2006-0855 + CVE-2006-0855 Original Advisory - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-06.xml index d59679606a..743fd062f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-06.xml @@ -1,6 +1,5 @@ - GNU tar: Buffer overflow @@ -8,8 +7,8 @@ potentially resulting in the execution of arbitrary code. tar - March 10, 2006 - March 10, 2006: 01 + 2006-03-10 + 2006-03-10: 01 123038 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/tar-1.15.1-r1" + # emerge --ask --oneshot --verbose ">=app-arch/tar-1.15.1-r1" - CVE-2006-0300 + CVE-2006-0300 - + koon - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-07.xml index 84fc016a4d..13d9fd534e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-07.xml @@ -1,6 +1,5 @@ - flex: Potential insecure code generation @@ -8,8 +7,8 @@ such scanners vulnerable to the execution of arbitrary code. flex - March 10, 2006 - March 10, 2006: 01 + 2006-03-10 + 2006-03-10: 01 122940 remote and local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-devel/flex-2.5.33-r1" + # emerge --ask --oneshot --verbose ">=sys-devel/flex-2.5.33-r1" - CVE-2006-0459 + CVE-2006-0459 - + koon - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-08.xml index e4f1315da9..912f171fbc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-08.xml @@ -1,6 +1,5 @@ - GnuPG: Incorrect signature verification @@ -8,8 +7,8 @@ digital signature. gnupg - March 10, 2006 - March 10, 2006: 01 + 2006-03-10 + 2006-03-10: 01 125217 remote @@ -56,16 +55,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.2.2" + # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.2.2" - CVE-2006-0049 + CVE-2006-0049 GnuPG Announcement - + taviso - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-09.xml index f7356de1e8..47832c444d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-09.xml @@ -1,6 +1,5 @@ - SquirrelMail: Cross-site scripting and IMAP command injection @@ -8,8 +7,8 @@ and IMAP command injection. squirrelmail - March 12, 2006 - March 12, 2006: 01 + 2006-03-12 + 2006-03-12: 01 123781 remote @@ -58,23 +57,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.6" + # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.6"

Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

- CVE-2006-0188 - CVE-2006-0195 - CVE-2006-0377 + CVE-2006-0188 + CVE-2006-0195 + CVE-2006-0377 - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-10.xml index 8d84ed7e70..3c71d00a0c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-10.xml @@ -1,6 +1,5 @@ - Cube: Multiple vulnerabilities @@ -9,8 +8,8 @@ execution. cube - March 13, 2006 - March 13, 2006: 01 + 2006-03-13 + 2006-03-13: 01 125289 remote @@ -58,14 +57,14 @@ # emerge --ask --unmerge games-fps/cube - CVE-2006-1100 - CVE-2006-1101 - CVE-2006-1102 + CVE-2006-1100 + CVE-2006-1101 + CVE-2006-1102 - + DerCorny - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-11.xml index 761a0ecdd2..60f0625d88 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-11.xml @@ -1,6 +1,5 @@ - Freeciv: Denial of Service @@ -8,8 +7,8 @@ Denial of Service attack. freeciv - March 16, 2006 - March 16, 2006: 01 + 2006-03-16 + 2006-03-16: 01 125304 remote @@ -51,16 +50,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-strategy/freeciv-2.0.8" + # emerge --ask --oneshot --verbose ">=games-strategy/freeciv-2.0.8" - CVE-2006-0047 + CVE-2006-0047 Original advisory - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-12.xml index f3b2774cd6..ad1e4ff1b7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-12.xml @@ -1,6 +1,5 @@ - zoo: Buffer overflow @@ -8,8 +7,8 @@ creating archives of specially crafted directories and files. zoo - March 16, 2006 - March 16, 2006: 01 + 2006-03-16 + 2006-03-16: 01 125622 local @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/zoo-2.10-r2" + # emerge --ask --oneshot --verbose ">=app-arch/zoo-2.10-r2" RedHat Bug #183426 - CVE-2006-1269 + CVE-2006-1269 - + koon - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-13.xml index d36156cade..3941eaba67 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-13.xml @@ -1,6 +1,5 @@ - PEAR-Auth: Potential authentication bypass @@ -9,8 +8,8 @@ authentication. pear-auth - March 17, 2006 - March 17, 2006: 01 + 2006-03-17 + 2006-03-17: 01 123832 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/PEAR-Auth-1.2.4" + # emerge --ask --oneshot --verbose ">=dev-php/PEAR-Auth-1.2.4" - CVE-2006-0868 + CVE-2006-0868 - + koon - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-14.xml index 5b4b9ae371..3cb729f216 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-14.xml @@ -1,6 +1,5 @@ - Heimdal: rshd privilege escalation @@ -8,8 +7,8 @@ elevate privileges. heimdal - March 17, 2006 - March 17, 2006: 01 + 2006-03-17 + 2006-03-17: 01 121839 remote @@ -46,19 +45,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/heimdal-0.7.2" + # emerge --ask --oneshot --verbose ">=app-crypt/heimdal-0.7.2" - CVE-2006-0582 - Heimdal Advisory 2006-02-06 + CVE-2006-0582 + Heimdal Advisory 2006-02-06 - + koon - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-15.xml index 06bdd9b55c..527a2e31ee 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-15.xml @@ -1,6 +1,5 @@ - Crypt::CBC: Insecure initialization vector @@ -8,8 +7,8 @@ a weaker encryption. crypt-cbc - March 17, 2006 - March 17, 2006: 01 + 2006-03-17 + 2006-03-17: 01 126048 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-perl/crypt-cbc-2.17" + # emerge --ask --oneshot --verbose ">=dev-perl/crypt-cbc-2.17" - CVE-2006-0898 + CVE-2006-0898 - + koon - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-16.xml index 7b0e76a268..81d232e2da 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-16.xml @@ -1,6 +1,5 @@ - Metamail: Buffer overflow @@ -8,8 +7,8 @@ arbitrary code. metamail - March 17, 2006 - March 17, 2006: 01 + 2006-03-17 + 2006-03-17: 01 126052 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/metamail-2.7.45.3-r1" + # emerge --ask --oneshot --verbose ">=net-mail/metamail-2.7.45.3-r1" - CVE-2006-0709 + CVE-2006-0709 - + koon - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-17.xml index 88cbeea2e5..b3430d4581 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-17.xml @@ -1,6 +1,5 @@ - PeerCast: Buffer overflow @@ -8,8 +7,8 @@ of arbitrary code. peercast - March 21, 2006 - March 21, 2006: 01 + 2006-03-21 + 2006-03-21: 01 123432 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1217" + # emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1217" - CVE-2006-1148 + CVE-2006-1148 - + koon - + DerCorny - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-18.xml index 77e9b19bfb..f3f048ec5e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-18.xml @@ -1,6 +1,5 @@ - Pngcrush: Buffer overflow @@ -8,8 +7,8 @@ the execution of arbitrary code. pngcrush - March 21, 2006 - March 21, 2006: 01 + 2006-03-21 + 2006-03-21: 01 123286 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/pngcrush-1.6.2" + # emerge --ask --oneshot --verbose ">=media-gfx/pngcrush-1.6.2" - GLSA 200507-19 - CVE-2005-1849 + GLSA 200507-19 + CVE-2005-1849 - + koon - + koon - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-19.xml index 4d5fff83df..b4e20d34aa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-19.xml @@ -1,6 +1,5 @@ - cURL/libcurl: Buffer overflow in the handling of TFTP URLs @@ -8,8 +7,8 @@ TFTP protocol, which could be exploited to compromise a user's system. curl - March 21, 2006 - March 21, 2006: 01 + 2006-03-21 + 2006-03-21: 01 125766 remote @@ -52,19 +51,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/curl-7.15.1-r1" + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.15.1-r1" - Project cURL Security Advisory, March 20th 2006 - CVE-2006-1061 + Project cURL Security Advisory, March 20th 2006 + CVE-2006-1061 - + koon - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-20.xml index e9ab680c03..dc97c0d81e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-20.xml @@ -1,6 +1,5 @@ - Macromedia Flash Player: Arbitrary code execution @@ -8,8 +7,8 @@ a user's system via the handling of malicious SWF files. Flash - March 21, 2006 - May 28, 2009: 02 + 2006-03-21 + 2009-05-28: 02 102777 remote @@ -50,16 +49,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-7.0.63" + # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-7.0.63" - CVE-2006-0024 + CVE-2006-0024 Macromedia Announcement - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-21.xml index 68e74c36d5..a06f19bc47 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-21.xml @@ -1,6 +1,5 @@ - Sendmail: Race condition in the handling of asynchronous signals @@ -8,8 +7,8 @@ execution of arbitrary code with sendmail privileges. sendmail - March 22, 2006 - March 22, 2006: 01 + 2006-03-22 + 2006-03-22: 01 125623 remote @@ -46,16 +45,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/sendmail-8.13.6" + # emerge --ask --oneshot --verbose ">=mail-mta/sendmail-8.13.6" - CVE-2006-0058 - Sendmail Inc. advisory + CVE-2006-0058 + Sendmail Inc. advisory - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-22.xml index f146d9e698..50492253cb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-22.xml @@ -1,6 +1,5 @@ - PHP: Format string and XSS vulnerabilities @@ -9,8 +8,8 @@ arbitrary code. php - March 22, 2006 - March 22, 2006: 01 + 2006-03-22 + 2006-03-22: 01 125878 remote @@ -63,27 +62,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/php-5.1.2" + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.1.2"

All PHP 4.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/php-4.4.2" + # emerge --ask --oneshot --verbose ">=dev-lang/php-4.4.2" - CVE-2006-0207 - CVE-2006-0208 - Hardened-PHP Advisory 01/2006 - Hardened-PHP Advisory 02/2006 + CVE-2006-0207 + CVE-2006-0208 + Hardened-PHP Advisory 01/2006 + Hardened-PHP Advisory 02/2006 - + koon - + koon - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-23.xml index 2d5c78de52..bcbbd9d7dc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-23.xml @@ -1,6 +1,5 @@ - NetHack, Slash'EM, Falcon's Eye: Local privilege escalation @@ -9,8 +8,8 @@ arbitrary code as other users. nethack slashem falconseye - March 23, 2006 - March 30, 2006: 01 + 2006-03-23 + 2006-03-30: 01 125902 122376 127167 @@ -62,32 +61,32 @@ until further notice.

- # emerge --ask --verbose --unmerge "games-roguelike/nethack" + # emerge --ask --verbose --unmerge "games-roguelike/nethack"

Slash'EM has been masked in Portage pending the resolution of these issues. Vulnerable Slash'EM users are advised to uninstall the package until further notice.

- # emerge --ask --verbose --unmerge "games-roguelike/slashem" + # emerge --ask --verbose --unmerge "games-roguelike/slashem"

Falcon's Eye has been masked in Portage pending the resolution of these issues. Vulnerable Falcon's Eye users are advised to uninstall the package until further notice.

- # emerge --ask --verbose --unmerge "games-roguelike/falconseye" + # emerge --ask --verbose --unmerge "games-roguelike/falconseye" - CVE-2006-1390 + CVE-2006-1390 - + DerCorny - + taviso - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-24.xml index 3d658cfaff..4b72fb3b72 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-24.xml @@ -1,6 +1,5 @@ - RealPlayer: Buffer overflow vulnerability @@ -8,8 +7,8 @@ execution of arbitrary code. RealPlayer - March 26, 2006 - March 26, 2006: 01 + 2006-03-26 + 2006-03-26: 01 127352 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/realplayer-10.0.7" + # emerge --ask --oneshot --verbose ">=media-video/realplayer-10.0.7" - CVE-2006-0323 + CVE-2006-0323 RealNetworks Advisory - + vorlon078 - + formula7 - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-25.xml index bbabbd8e9f..aede63ba33 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-25.xml @@ -1,6 +1,5 @@ - OpenOffice.org: Heap overflow in included libcurl @@ -8,8 +7,8 @@ heap overflow when parsing URLs. openoffice openoffice-bin - March 27, 2006 - March 27, 2006: 01 + 2006-03-27 + 2006-03-27: 01 126433 remote @@ -57,26 +56,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.0.2" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.0.2"

All OpenOffice.org users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.1-r1" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.1-r1" - CVE-2005-4077 - Hardened-PHP Advisory 24/2005 - GLSA 200512-09 + CVE-2005-4077 + Hardened-PHP Advisory 24/2005 + GLSA 200512-09 - + DerCorny - + koon - + adir
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-26.xml index 732fb11c32..843ef457b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200603-26.xml @@ -1,14 +1,13 @@ - bsd-games: Local privilege escalation in tetris-bsd tetris-bsd is prone to local privilege escalation vulnerabilities. bsd-games - March 29, 2006 - May 22, 2006: 02 + 2006-03-29 + 2006-05-22: 02 122399 local @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-misc/bsd-games-2.17-r1" + # emerge --ask --oneshot --verbose ">=games-misc/bsd-games-2.17-r1" - CVE-2006-1539 + CVE-2006-1539 - + jaervosz - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-01.xml index 29c276061f..d62bef575c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-01.xml @@ -1,6 +1,5 @@ - MediaWiki: Cross-site scripting vulnerability @@ -8,8 +7,8 @@ arbitrary JavaScript code execution. mediawiki - April 04, 2006 - April 04, 2006: 01 + 2006-04-04 + 2006-04-04: 01 127971 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.4.15" + # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.4.15" - CVE-2006-1498 - MediaWiki 1.4.15 Release Notes + CVE-2006-1498 + MediaWiki 1.4.15 Release Notes - + koon - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-02.xml index df7eb2b157..1ddcc665f4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-02.xml @@ -1,6 +1,5 @@ - Horde Application Framework: Remote code execution @@ -8,8 +7,8 @@ arbitrary remote code. horde - April 04, 2006 - April 04, 2006: 01 + 2006-04-04 + 2006-04-04: 01 127889 126435 remote @@ -56,20 +55,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-3.1.1" + # emerge --ask --oneshot --verbose ">=www-apps/horde-3.1.1" - CVE-2006-1260 - CVE-2006-1491 - Horde Announcement + CVE-2006-1260 + CVE-2006-1491 + Horde Announcement - + vorlon078 - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-03.xml index 0c1a76248e..ac289f721a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-03.xml @@ -1,6 +1,5 @@ - FreeRADIUS: Authentication bypass in EAP-MSCHAPv2 module @@ -8,8 +7,8 @@ which causes some authentication checks to be bypassed. freeradius - April 04, 2006 - April 04, 2006: 01 + 2006-04-04 + 2006-04-04: 01 127229 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.1.1" + # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.1.1" - CVE-2006-1354 - FreeRADIUS Vulnerability Notifications + CVE-2006-1354 + FreeRADIUS Vulnerability Notifications - + koon - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-04.xml index 7519fd1e29..f01bd4ae09 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-04.xml @@ -1,6 +1,5 @@ - Kaffeine: Buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. kaffeine - April 05, 2006 - April 05, 2006: 01 + 2006-04-05 + 2006-04-05: 01 127326 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/kaffeine-0.7.1-r2" + # emerge --ask --oneshot --verbose ">=media-video/kaffeine-0.7.1-r2" - CVE-2006-0051 - KDE Security Advisory: Kaffeine buffer overflow + CVE-2006-0051 + KDE Security Advisory: Kaffeine buffer overflow - + DerCorny - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-05.xml index 594b35ceb4..c5c9db5bf7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-05.xml @@ -1,6 +1,5 @@ - Doomsday: Format string vulnerability @@ -8,8 +7,8 @@ arbitrary code. doomsday - April 06, 2006 - June 15, 2006: 02 + 2006-04-06 + 2006-06-15: 02 128690 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-fps/doomsday-1.9.0_beta4" + # emerge --ask --oneshot --verbose ">=games-fps/doomsday-1.9.0_beta4" - CVE-2006-1618 + CVE-2006-1618 Original advisory by Luigi Auriemma - + jaervosz - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-06.xml index c18346c228..2fc08104e9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-06.xml @@ -1,6 +1,5 @@ - ClamAV: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code or cause an application crash. clamav - April 07, 2006 - April 07, 2006: 01 + 2006-04-07 + 2006-04-07: 01 128963 remote @@ -51,17 +50,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.1" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.1" - CVE-2006-1614 - CVE-2006-1615 - CVE-2006-1630 + CVE-2006-1614 + CVE-2006-1615 + CVE-2006-1630 - + jaervosz - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-07.xml index 2519553fa0..38f4823baf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-07.xml @@ -1,6 +1,5 @@ - Cacti: Multiple vulnerabilities in included ADOdb @@ -8,8 +7,8 @@ in Cacti, potentially resulting in the execution of arbitrary code. Cacti - April 14, 2006 - April 14, 2006: 01 + 2006-04-14 + 2006-04-14: 01 129284 remote @@ -53,21 +52,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-0.8.6h_p20060108-r2" + # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-0.8.6h_p20060108-r2" - CVE-2006-0146 - CVE-2006-0147 - CVE-2006-0410 - CVE-2006-0806 + CVE-2006-0146 + CVE-2006-0147 + CVE-2006-0410 + CVE-2006-0806 - + jaervosz - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-08.xml index ba9dd6e9d2..4b87ad5331 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-08.xml @@ -1,6 +1,5 @@ - libapreq2: Denial of Service vulnerability @@ -8,8 +7,8 @@ of Service. libapreq2 - April 17, 2006 - April 17, 2006: 01 + 2006-04-17 + 2006-04-17: 01 128610 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apache/libapreq2-2.07" + # emerge --ask --oneshot --verbose ">=www-apache/libapreq2-2.07" - CVE-2006-0042 - libapreq2 Changes + CVE-2006-0042 + libapreq2 Changes - + jaervosz - + koon - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-09.xml index 2d4140449d..45e0c9d3bf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-09.xml @@ -1,6 +1,5 @@ - Cyrus-SASL: DIGEST-MD5 Pre-Authentication Denial of Service @@ -8,8 +7,8 @@ lead to a Denial of Service. cyrus-sasl - April 21, 2006 - April 21, 2006: 01 + 2006-04-21 + 2006-04-21: 01 129523 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/cyrus-sasl-2.1.21-r2" + # emerge --ask --oneshot --verbose ">=dev-libs/cyrus-sasl-2.1.21-r2" - CVE-2006-1721 + CVE-2006-1721 - + koon - + koon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-10.xml index a76b8b1803..0044ea7406 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-10.xml @@ -1,6 +1,5 @@ - zgv, xzgv: Heap overflow @@ -9,8 +8,8 @@ code. xzgv - April 21, 2006 - June 10, 2006: 02 + 2006-04-21 + 2006-06-10: 02 127008 remote @@ -56,25 +55,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/xzgv-0.8-r2" + # emerge --ask --oneshot --verbose ">=media-gfx/xzgv-0.8-r2"

All zgv users should also upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/zgv-5.9" + # emerge --ask --oneshot --verbose ">=media-gfx/zgv-5.9" - CVE-2006-1060 - homepage plus Changelog + CVE-2006-1060 + homepage plus Changelog - + jaervosz - + koon - + taviso
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-11.xml index f6217d58bf..a64b6b2bb1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-11.xml @@ -1,6 +1,5 @@ - Crossfire server: Denial of Service and potential arbitrary code execution @@ -8,8 +7,8 @@ potentially to the execution of arbitrary code. Crossfire - April 22, 2006 - April 22, 2006: 01 + 2006-04-22 + 2006-04-22: 01 126169 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-server/crossfire-server-1.9.0" + # emerge --ask --oneshot --verbose ">=games-server/crossfire-server-1.9.0" - CVE-2006-1010 + CVE-2006-1010 - + DerCorny - + DerCorny - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-12.xml index 78c8281772..07099540ca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-12.xml @@ -1,6 +1,5 @@ - Mozilla Firefox: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of script code with elevated privileges to information leaks. mozilla-firefox - April 23, 2006 - April 23, 2006: 01 + 2006-04-23 + 2006-04-23: 01 129924 remote @@ -55,44 +54,44 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.8" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.0.8"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.8" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.0.8" - CVE-2005-4134 - CVE-2006-0292 - CVE-2006-0296 - CVE-2006-0748 - CVE-2006-0749 - CVE-2006-1727 - CVE-2006-1728 - CVE-2006-1729 - CVE-2006-1730 - CVE-2006-1731 - CVE-2006-1732 - CVE-2006-1733 - CVE-2006-1734 - CVE-2006-1735 - CVE-2006-1736 - CVE-2006-1737 - CVE-2006-1738 - CVE-2006-1739 - CVE-2006-1740 - CVE-2006-1741 - CVE-2006-1742 - CVE-2006-1790 - Mozilla Foundation Security Advisories + CVE-2005-4134 + CVE-2006-0292 + CVE-2006-0296 + CVE-2006-0748 + CVE-2006-0749 + CVE-2006-1727 + CVE-2006-1728 + CVE-2006-1729 + CVE-2006-1730 + CVE-2006-1731 + CVE-2006-1732 + CVE-2006-1733 + CVE-2006-1734 + CVE-2006-1735 + CVE-2006-1736 + CVE-2006-1737 + CVE-2006-1738 + CVE-2006-1739 + CVE-2006-1740 + CVE-2006-1741 + CVE-2006-1742 + CVE-2006-1790 + Mozilla Foundation Security Advisories - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-13.xml index 16cf9d74ad..2c19e27cfa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-13.xml @@ -1,6 +1,5 @@ - fbida: Insecure temporary file creation @@ -8,8 +7,8 @@ to overwrite arbitrary files. fbida - April 23, 2006 - April 23, 2006: 01 + 2006-04-23 + 2006-04-23: 01 129470 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/fbida-2.03-r3" + # emerge --ask --oneshot --verbose ">=media-gfx/fbida-2.03-r3" - CVE-2006-1695 + CVE-2006-1695 - + DerCorny - + koon - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-14.xml index 60a2f69626..9115259237 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-14.xml @@ -1,6 +1,5 @@ - Dia: Arbitrary code execution through XFig import @@ -8,8 +7,8 @@ execute arbitrary code. dia - April 23, 2006 - April 23, 2006: 01 + 2006-04-23 + 2006-04-23: 01 128107 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/dia-0.94-r5" + # emerge --ask --oneshot --verbose ">=app-office/dia-0.94-r5" - CVE-2006-1550 + CVE-2006-1550 - + koon - + koon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-15.xml index a6cde25b70..8fda099f27 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-15.xml @@ -1,6 +1,5 @@ - xine-ui: Format string vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. xine-ui - April 26, 2006 - April 26, 2006: 01 + 2006-04-26 + 2006-04-26: 01 130801 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/xine-ui-0.99.4-r5" + # emerge --ask --oneshot --verbose ">=media-video/xine-ui-0.99.4-r5" - CVE-2006-1905 + CVE-2006-1905 - + koon - + adir - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-16.xml index 107af43217..61331ef592 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-16.xml @@ -1,6 +1,5 @@ - xine-lib: Buffer overflow vulnerability @@ -8,8 +7,8 @@ execution of arbitrary code. xine-lib - April 26, 2006 - April 26, 2006: 01 + 2006-04-26 + 2006-04-26: 01 128838 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2_pre20060328-r1" + # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2_pre20060328-r1" - CVE-2006-1664 + CVE-2006-1664 - + koon - + adir - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-17.xml index 8cf94c2d59..a94cd090b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-17.xml @@ -1,6 +1,5 @@ - Ethereal: Multiple vulnerabilities in protocol dissectors @@ -8,8 +7,8 @@ in the execution of arbitrary code. Ethereal - April 27, 2006 - April 27, 2006: 01 + 2006-04-27 + 2006-04-27: 01 130505 remote @@ -59,24 +58,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.99.0" + # emerge --ask --oneshot --verbose ">=net-analyzer/ethereal-0.99.0" - CVE-2006-1932 - CVE-2006-1933 - CVE-2006-1934 - CVE-2006-1935 - CVE-2006-1936 - CVE-2006-1937 - CVE-2006-1938 - CVE-2006-1939 - CVE-2006-1940 + CVE-2006-1932 + CVE-2006-1933 + CVE-2006-1934 + CVE-2006-1935 + CVE-2006-1936 + CVE-2006-1937 + CVE-2006-1938 + CVE-2006-1939 + CVE-2006-1940 Ethereal enpa-sa-00023 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-18.xml index 266b620df9..44eb4025cf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200604-18.xml @@ -1,6 +1,5 @@ - Mozilla Suite: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution with elevated privileges to information leaks. mozilla - April 28, 2006 - April 28, 2006: 01 + 2006-04-28 + 2006-04-28: 01 130887 remote @@ -55,50 +54,50 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.13" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-1.7.13"

All Mozilla Suite binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.13" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-bin-1.7.13" - CVE-2005-4134 - CVE-2006-0292 - CVE-2006-0293 - CVE-2006-0296 - CVE-2006-0748 - CVE-2006-0749 - CVE-2006-0884 - CVE-2006-1045 - CVE-2006-1727 - CVE-2006-1728 - CVE-2006-1729 - CVE-2006-1730 - CVE-2006-1731 - CVE-2006-1732 - CVE-2006-1733 - CVE-2006-1734 - CVE-2006-1735 - CVE-2006-1736 - CVE-2006-1737 - CVE-2006-1738 - CVE-2006-1739 - CVE-2006-1740 - CVE-2006-1741 - CVE-2006-1742 - CVE-2006-1790 - Mozilla Foundation Security Advisories + CVE-2005-4134 + CVE-2006-0292 + CVE-2006-0293 + CVE-2006-0296 + CVE-2006-0748 + CVE-2006-0749 + CVE-2006-0884 + CVE-2006-1045 + CVE-2006-1727 + CVE-2006-1728 + CVE-2006-1729 + CVE-2006-1730 + CVE-2006-1731 + CVE-2006-1732 + CVE-2006-1733 + CVE-2006-1734 + CVE-2006-1735 + CVE-2006-1736 + CVE-2006-1737 + CVE-2006-1738 + CVE-2006-1739 + CVE-2006-1740 + CVE-2006-1741 + CVE-2006-1742 + CVE-2006-1790 + Mozilla Foundation Security Advisories - + koon - + falco - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-01.xml index 30d1523f0e..f4bfaec1a6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-01.xml @@ -1,6 +1,5 @@ - MPlayer: Heap-based buffer overflow @@ -8,8 +7,8 @@ buffer overflow. mplayer mplayer-bin - May 01, 2006 - June 21, 2006: 02 + 2006-05-01 + 2006-06-21: 02 127969 remote @@ -53,24 +52,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20060415" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20060415"

All MPlayer binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-bin-1.0.20060415" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-bin-1.0.20060415" - CVE-2006-1502 + CVE-2006-1502 - + koon - + adir - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-02.xml index 0435d3cc5c..6276f85c7b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-02.xml @@ -1,6 +1,5 @@ - X.Org: Buffer overflow in XRender extension @@ -8,8 +7,8 @@ user to execute arbitrary code with elevated privileges. X.Org - May 02, 2006 - May 02, 2006: 01 + 2006-05-02 + 2006-05-02: 01 130979 local @@ -46,15 +45,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-base/xorg-x11-6.8.2-r7" + # emerge --ask --oneshot --verbose ">=x11-base/xorg-x11-6.8.2-r7" - CVE-2006-1526 + CVE-2006-1526 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-03.xml index fafb06fe38..b0404cc39a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-03.xml @@ -1,6 +1,5 @@ - ClamAV: Buffer overflow in Freshclam @@ -8,8 +7,8 @@ of arbitrary code. clamav - May 02, 2006 - May 02, 2006: 01 + 2006-05-02 + 2006-05-02: 01 131791 remote @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.2" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.2" - CVE-2006-1989 + CVE-2006-1989 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-04.xml index e3f89cea1c..86afe2bb11 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-04.xml @@ -1,6 +1,5 @@ - phpWebSite: Local file inclusion @@ -8,8 +7,8 @@ arbitrary code. phpwebsite - May 02, 2006 - May 02, 2006: 01 + 2006-05-02 + 2006-05-02: 01 130295 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpwebsite-0.10.2" + # emerge --ask --oneshot --verbose ">=www-apps/phpwebsite-0.10.2" - CVE-2006-1819 + CVE-2006-1819 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-05.xml index 1c0176902f..5440f6639d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-05.xml @@ -1,6 +1,5 @@ - rsync: Potential integer overflow @@ -8,8 +7,8 @@ arbitrary code on an rsync server. rsync - May 06, 2006 - May 06, 2006: 01 + 2006-05-06 + 2006-05-06: 01 131631 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.8" + # emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.8" - CVE-2006-2083 + CVE-2006-2083 - + jaervosz - + koon - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-06.xml index d9b657ea44..ac9abe50ac 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-06.xml @@ -1,6 +1,5 @@ - Mozilla Firefox: Potential remote code execution @@ -9,8 +8,8 @@ arbitrary code. mozilla-firefox - May 06, 2006 - May 06, 2006: 01 + 2006-05-06 + 2006-05-06: 01 131138 remote @@ -60,25 +59,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.3" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.3"

All Mozilla Firefox 1.5 binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.3" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.3" - CVE-2006-1993 + CVE-2006-1993 - + koon - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-07.xml index 67eab2eeb2..19b481f461 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-07.xml @@ -1,6 +1,5 @@ - Nagios: Buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. nagios - May 07, 2006 - May 25, 2006: 03 + 2006-05-07 + 2006-05-25: 03 132159 133487 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-1.4.1" + # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-1.4.1" - CVE-2006-2162 - CVE-2006-2489 + CVE-2006-2162 + CVE-2006-2489 - + koon - + fox2mike - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-08.xml index 0f428a335b..49a8f321fb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-08.xml @@ -1,6 +1,5 @@ - PHP: Multiple vulnerabilities @@ -8,8 +7,8 @@ wordwrap() which may lead to execution of arbitrary code. php - May 08, 2006 - May 15, 2007: 09 + 2006-05-08 + 2007-05-15: 09 127939 128883 131135 @@ -74,18 +73,18 @@ # emerge --ask --oneshot --verbose dev-lang/php - CVE-2006-0996 - CVE-2006-1490 - CVE-2006-1990 - CVE-2006-1991 + CVE-2006-0996 + CVE-2006-1490 + CVE-2006-1990 + CVE-2006-1991 - + koon - + fox2mike - + koon diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-09.xml index 39de7dff1c..7d20d13e90 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-09.xml @@ -1,6 +1,5 @@ - Mozilla Thunderbird: Multiple vulnerabilities @@ -8,8 +7,8 @@ script execution with elevated privileges to information leaks. mozilla-thunderbird - May 08, 2006 - May 08, 2006: 01 + 2006-05-08 + 2006-05-08: 01 130888 remote @@ -55,14 +54,14 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.0.8" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.0.8"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.0.8" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.0.8"

Note: There is no stable fixed version for the ALPHA architecture yet. Users of Mozilla Thunderbird on ALPHA should consider @@ -70,35 +69,35 @@

- CVE-2006-0292 - CVE-2006-0296 - CVE-2006-0748 - CVE-2006-0749 - CVE-2006-0884 - CVE-2006-1045 - CVE-2006-1727 - CVE-2006-1728 - CVE-2006-1730 - CVE-2006-1731 - CVE-2006-1732 - CVE-2006-1733 - CVE-2006-1734 - CVE-2006-1735 - CVE-2006-1737 - CVE-2006-1738 - CVE-2006-1739 - CVE-2006-1741 - CVE-2006-1742 - CVE-2006-1790 - Mozilla Foundation Security Advisories + CVE-2006-0292 + CVE-2006-0296 + CVE-2006-0748 + CVE-2006-0749 + CVE-2006-0884 + CVE-2006-1045 + CVE-2006-1727 + CVE-2006-1728 + CVE-2006-1730 + CVE-2006-1731 + CVE-2006-1732 + CVE-2006-1733 + CVE-2006-1734 + CVE-2006-1735 + CVE-2006-1737 + CVE-2006-1738 + CVE-2006-1739 + CVE-2006-1741 + CVE-2006-1742 + CVE-2006-1790 + Mozilla Foundation Security Advisories - + koon - + falco - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-10.xml index 2d918a1f7d..05dedaeb33 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-10.xml @@ -1,6 +1,5 @@ - pdnsd: Denial of Service and potential arbitrary code execution @@ -8,8 +7,8 @@ execution. pdnsd - May 10, 2006 - May 10, 2006: 01 + 2006-05-10 + 2006-05-10: 01 131341 remote @@ -50,16 +49,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/pdnsd-1.2.4-r1" + # emerge --ask --oneshot --verbose ">=net-dns/pdnsd-1.2.4-r1" - CVE-2006-2076 - CVE-2006-2077 + CVE-2006-2076 + CVE-2006-2077 - + koon - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-11.xml index 4f66a89ffa..b47d2d57cf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-11.xml @@ -1,14 +1,13 @@ - Ruby: Denial of Service Ruby WEBrick and XMLRPC servers are vulnerable to Denial of Service. ruby - May 10, 2006 - May 10, 2006: 01 + 2006-05-10 + 2006-05-10: 01 130657 remote @@ -46,16 +45,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.4-r1" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.4-r1" - CVE-2006-1931 - Ruby release announcement + CVE-2006-1931 + Ruby release announcement - + frilled - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-12.xml index 50ca3902e7..b8553ce99f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-12.xml @@ -1,6 +1,5 @@ - Quake 3 engine based games: Buffer Overflow @@ -8,8 +7,8 @@ arbitrary code. quake - May 10, 2006 - May 10, 2006: 01 + 2006-05-10 + 2006-05-10: 01 132377 remote @@ -56,30 +55,30 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-fps/quake3-bin-1.32c" + # emerge --ask --oneshot --verbose ">=games-fps/quake3-bin-1.32c"

All RTCW users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-fps/rtcw-1.41b" + # emerge --ask --oneshot --verbose ">=games-fps/rtcw-1.41b"

All Enemy Territory users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-fps/enemy-territory-2.60b" + # emerge --ask --oneshot --verbose ">=games-fps/enemy-territory-2.60b" - CVE-2006-2236 + CVE-2006-2236 - + koon - + koon - + fox2mike
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-13.xml index 6a5a63a89b..7c9e318f09 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-13.xml @@ -1,14 +1,13 @@ - MySQL: Information leakage A MySQL server may leak information to unauthorized users. MySQL - May 11, 2006 - May 15, 2006: 04 + 2006-05-11 + 2006-05-15: 04 132146 remote @@ -56,20 +55,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/mysql-4.0.27" + # emerge --ask --oneshot --verbose ">=dev-db/mysql-4.0.27" Original advisory - CVE-2006-1516 - CVE-2006-1517 + CVE-2006-1516 + CVE-2006-1517 - + koon - + frilled - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-14.xml index e9a385c4a1..81086457b2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-14.xml @@ -1,6 +1,5 @@ - libextractor: Two heap-based buffer overflows @@ -8,8 +7,8 @@ lead to the execution of arbitrary code. libextractor - May 21, 2006 - May 21, 2006: 01 + 2006-05-21 + 2006-05-21: 01 133570 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libextractor-0.5.14" + # emerge --ask --oneshot --verbose ">=media-libs/libextractor-0.5.14" - CVE-2006-2458 + CVE-2006-2458 Original advisory - + DerCorny - + DerCorny - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-15.xml index d8f690eaac..f8eb63f9c6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-15.xml @@ -1,6 +1,5 @@ - Quagga Routing Suite: Multiple vulnerabilities @@ -8,8 +7,8 @@ routing information. The BGP daemon is vulnerable to a Denial of Service. quagga - May 21, 2006 - May 21, 2006: 01 + 2006-05-21 + 2006-05-21: 01 132353 remote @@ -55,21 +54,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/quagga-0.98.6-r1" + # emerge --ask --oneshot --verbose ">=net-misc/quagga-0.98.6-r1" - CVE-2006-2223 - CVE-2006-2224 - CVE-2006-2276 + CVE-2006-2223 + CVE-2006-2224 + CVE-2006-2276 Official release information - + jaervosz - + koon - + frilled
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-16.xml index ec8868e8e2..8fa37684c9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-16.xml @@ -1,6 +1,5 @@ - CherryPy: Directory traversal vulnerability @@ -8,8 +7,8 @@ to read arbitrary files. cherrypy - May 30, 2006 - May 30, 2006: 01 + 2006-05-30 + 2006-05-30: 01 134273 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-python/cherrypy-2.1.1" + # emerge --ask --oneshot --verbose ">=dev-python/cherrypy-2.1.1" - CVE-2006-0847 + CVE-2006-0847 - + DerCorny - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-17.xml index 9be437b2b3..33b4034c3a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200605-17.xml @@ -1,6 +1,5 @@ - libTIFF: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code or a Denial of Service. libtiff - May 30, 2006 - May 30, 2006: 01 + 2006-05-30 + 2006-05-30: 01 129675 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.1" + # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.1" - CVE-2006-0405 - CVE-2006-2024 - CVE-2006-2025 - CVE-2006-2026 + CVE-2006-0405 + CVE-2006-2024 + CVE-2006-2025 + CVE-2006-2026 - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-01.xml index 21e987bfb5..c307b9102d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-01.xml @@ -1,6 +1,5 @@ - Opera: Buffer overflow @@ -8,8 +7,8 @@ which may allow a remote attacker to execute arbitrary code. opera - June 07, 2006 - June 07, 2006: 01 + 2006-06-07 + 2006-06-07: 01 129800 remote @@ -51,15 +50,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-8.54" + # emerge --ask --oneshot --verbose ">=www-client/opera-8.54" - CVE-2006-1834 + CVE-2006-1834 - + falco - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-02.xml index c8f25a6a45..6433ac14d7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-02.xml @@ -1,6 +1,5 @@ - shadow: Privilege escalation @@ -8,8 +7,8 @@ with escalated privileges. shadow - June 07, 2006 - June 07, 2006: 01 + 2006-06-07 + 2006-06-07: 01 133615 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.0.15-r2" + # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.0.15-r2" - CVE-2006-1174 + CVE-2006-1174 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-03.xml index d7df00d740..4342182733 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-03.xml @@ -1,6 +1,5 @@ - Dia: Format string vulnerabilities @@ -8,8 +7,8 @@ code. dia - June 07, 2006 - June 07, 2006: 01 + 2006-06-07 + 2006-06-07: 01 133699 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/dia-0.95.1" + # emerge --ask --oneshot --verbose ">=app-office/dia-0.95.1" - CVE-2006-2453 - CVE-2006-2480 + CVE-2006-2453 + CVE-2006-2480 - + DerCorny - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-04.xml index 92a993a747..c373740a37 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-04.xml @@ -1,6 +1,5 @@ - Tor: Several vulnerabilities @@ -8,8 +7,8 @@ information disclosure and information leak. tor - June 07, 2006 - September 05, 2006: 02 + 2006-06-07 + 2006-09-05: 02 134329 remote @@ -55,16 +54,16 @@ # emerge --ask --oneshot --verbose net-misc/tor - CVE-2006-0414 - Tor ChangeLog + CVE-2006-0414 + Tor ChangeLog - + falco - + falco - + falco diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-05.xml index 85082e5799..35e2cec19f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-05.xml @@ -1,6 +1,5 @@ - Pound: HTTP request smuggling @@ -8,8 +7,8 @@ bypass security restrictions or poison web caches. pound - June 07, 2006 - November 24, 2006: 03 + 2006-06-07 + 2006-11-24: 03 118541 remote @@ -55,15 +54,15 @@ # emerge --ask --oneshot --verbose www-servers/pound - CVE-2005-3751 + CVE-2005-3751 - + DerCorny - + koon - + DerCorny diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-06.xml index b37239d479..7a362ab28c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-06.xml @@ -1,6 +1,5 @@ - AWStats: Remote execution of arbitrary code @@ -8,8 +7,8 @@ can lead to the remote execution of arbitrary code. awstats - June 07, 2006 - May 28, 2009: 02 + 2006-06-07 + 2009-05-28: 02 130487 remote @@ -55,19 +54,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-misc/awstats-6.5-r1" + # emerge --ask --oneshot --verbose ">=www-misc/awstats-6.5-r1" - CVE-2006-1945 - CVE-2006-2237 + CVE-2006-1945 + CVE-2006-2237 - + koon - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-07.xml index ec106f47b5..885de7a2cc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-07.xml @@ -1,14 +1,13 @@ - Vixie Cron: Privilege Escalation Vixie Cron allows local users to execute programs as root. vixie-cron - June 09, 2006 - June 09, 2006: 01 + 2006-06-09 + 2006-06-09: 01 134194 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-process/vixie-cron-4.1-r9" + # emerge --ask --oneshot --verbose ">=sys-process/vixie-cron-4.1-r9" - CVE-2006-2607 + CVE-2006-2607 - + jaervosz - + frilled - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-08.xml index c7e60797ed..250245f357 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-08.xml @@ -1,14 +1,13 @@ - WordPress: Arbitrary command execution WordPress fails to sufficiently check the format of cached username data. wordpress - June 09, 2006 - June 10, 2006: 02 + 2006-06-09 + 2006-06-10: 02 134397 remote @@ -47,16 +46,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.3" + # emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.3" - CVE-2006-2667 - CVE-2006-2702 + CVE-2006-2667 + CVE-2006-2702 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-09.xml index 88d5e6608c..6cbf4d0e21 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-09.xml @@ -1,6 +1,5 @@ - SpamAssassin: Execution of arbitrary code @@ -8,8 +7,8 @@ remote attackers to execute arbitrary commands, possibly as the root user. Spamassassin - June 11, 2006 - June 11, 2006: 01 + 2006-06-11 + 2006-06-11: 01 135746 remote @@ -53,15 +52,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-filter/spamassassin-3.1.3" + # emerge --ask --oneshot --verbose ">=mail-filter/spamassassin-3.1.3" - CVE-2006-2447 + CVE-2006-2447 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-10.xml index a0da0eb37a..d6a6e7f3a6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-10.xml @@ -1,6 +1,5 @@ - Cscope: Many buffer overflows @@ -8,8 +7,8 @@ execution of arbitrary code. Cscope - June 11, 2006 - June 11, 2006: 01 + 2006-06-11 + 2006-06-11: 01 133829 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/cscope-15.5-r6" + # emerge --ask --oneshot --verbose ">=dev-util/cscope-15.5-r6" - CVE-2004-2541 + CVE-2004-2541 - + falco - + falco - + dizzutch
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-11.xml index a9a2921fc5..88ec11bbd9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-11.xml @@ -1,14 +1,13 @@ - JPEG library: Denial of Service The JPEG library is vulnerable to a Denial of Service. jpeg - June 11, 2006 - July 29, 2006: 02 + 2006-06-11 + 2006-07-29: 02 130889 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/jpeg-6b-r7" + # emerge --ask --oneshot --verbose ">=media-libs/jpeg-6b-r7" - CVE-2006-3005 + CVE-2006-3005 - + falco - + falco - + daxomatic
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-12.xml index 43b3e1e067..5bf0648b6a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-12.xml @@ -1,6 +1,5 @@ - Mozilla Firefox: Multiple vulnerabilities @@ -9,8 +8,8 @@ possibly the execution of arbitrary code. mozilla-firefox - June 11, 2006 - June 11, 2006: 01 + 2006-06-11 + 2006-06-11: 01 135254 remote @@ -55,14 +54,14 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.4" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.4"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.4" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.4"

Note: There is no stable fixed version for the Alpha architecture yet. Users of Mozilla Firefox on Alpha should consider @@ -70,24 +69,24 @@

- CVE-2006-2775 - CVE-2006-2776 - CVE-2006-2777 - CVE-2006-2778 - CVE-2006-2779 - CVE-2006-2780 - CVE-2006-2782 - CVE-2006-2783 - CVE-2006-2784 - CVE-2006-2785 - CVE-2006-2786 - CVE-2006-2787 - Mozilla Foundation Security Advisories + CVE-2006-2775 + CVE-2006-2776 + CVE-2006-2777 + CVE-2006-2778 + CVE-2006-2779 + CVE-2006-2780 + CVE-2006-2782 + CVE-2006-2783 + CVE-2006-2784 + CVE-2006-2785 + CVE-2006-2786 + CVE-2006-2787 + Mozilla Foundation Security Advisories - + frilled - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-13.xml index 8ba2156fe5..24268e0ebb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-13.xml @@ -1,6 +1,5 @@ - MySQL: SQL Injection @@ -8,8 +7,8 @@ process. MySQL - June 11, 2006 - December 13, 2006: 04 + 2006-06-11 + 2006-12-13: 04 135076 remote @@ -55,18 +54,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/mysql-4.1.20" + # emerge --ask --oneshot --verbose ">=dev-db/mysql-4.1.20" - CVE-2006-2753 + CVE-2006-2753 - + falco - + falco - + daxomatic
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-14.xml index dbf89202e1..510a684ce3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-14.xml @@ -1,6 +1,5 @@ - GDM: Privilege escalation @@ -8,8 +7,8 @@ privileges. gdm - June 12, 2006 - June 19, 2006: 02 + 2006-06-12 + 2006-06-19: 02 135027 local @@ -46,19 +45,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=gnome-base/gdm-2.8.0.8" + # emerge --ask --oneshot --verbose ">=gnome-base/gdm-2.8.0.8" - Gnome Bugzilla entry - CVE-2006-2452 + Gnome Bugzilla entry + CVE-2006-2452 - + falco - + daxomatic - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-15.xml index 79dba3e6f7..b6f8ed35a2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-15.xml @@ -1,6 +1,5 @@ - Asterisk: IAX2 video frame buffer overflow @@ -8,8 +7,8 @@ the remote execution of arbitrary code. asterisk - June 14, 2006 - June 14, 2006: 01 + 2006-06-14 + 2006-06-14: 01 135680 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.0.11_p1" + # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.0.11_p1" - CVE-2006-2898 - Corelabs Asterisk PBX truncated video frame vulnerability advisory + CVE-2006-2898 + Corelabs Asterisk PBX truncated video frame vulnerability advisory - + falco - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-16.xml index 1034751585..889e470a4e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-16.xml @@ -1,6 +1,5 @@ - DokuWiki: PHP code injection @@ -8,8 +7,8 @@ PHP commands, even without proper authentication. DokuWiki - June 14, 2006 - June 14, 2006: 01 + 2006-06-14 + 2006-06-14: 01 135623 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-20060309-r1" + # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-20060309-r1" - Hardened-PHP advisory - CVE-2006-2878 + Hardened-PHP advisory + CVE-2006-2878 - + falco - + frilled - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-17.xml index c4af643527..05211e04f4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-17.xml @@ -1,6 +1,5 @@ - OpenLDAP: Buffer overflow @@ -8,8 +7,8 @@ could result in arbitrary code execution. net-nds/openldap - June 15, 2006 - June 15, 2006: 01 + 2006-06-15 + 2006-06-15: 01 134010 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-nds/openldap-2.3.22" + # emerge --ask --oneshot --verbose ">=net-nds/openldap-2.3.22" - CVE-2006-2754 + CVE-2006-2754 - + falco - + jaervosz - + SeJo
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-18.xml index 43524c844e..ed7974d531 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-18.xml @@ -1,6 +1,5 @@ - PAM-MySQL: Multiple vulnerabilities @@ -8,8 +7,8 @@ impossible to log into a machine. pam_mysql - June 15, 2006 - July 29, 2006: 02 + 2006-06-15 + 2006-07-29: 02 120842 local @@ -49,20 +48,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-auth/pam_mysql-0.7_rc1" + # emerge --ask --oneshot --verbose ">=sys-auth/pam_mysql-0.7_rc1" - Official release information - CVE-2005-4713 - CVE-2006-0056 + Official release information + CVE-2005-4713 + CVE-2006-0056 - + falco - + falco - + frilled
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-19.xml index f16f72e72f..e15d3dec61 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-19.xml @@ -1,6 +1,5 @@ - Sendmail: Denial of Service @@ -8,8 +7,8 @@ crash. sendmail - June 15, 2006 - June 15, 2006: 01 + 2006-06-15 + 2006-06-15: 01 135141 remote @@ -55,19 +54,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/sendmail-8.13.6-r1" + # emerge --ask --oneshot --verbose ">=mail-mta/sendmail-8.13.6-r1" - CVE-2006-1173 + CVE-2006-1173 Sendmail 8.13.7 release information - + jaervosz - + frilled - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-20.xml index 106e157a00..a86fd85096 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-20.xml @@ -1,6 +1,5 @@ - Typespeed: Remote execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. typespeed - June 19, 2006 - June 19, 2006: 01 + 2006-06-19 + 2006-06-19: 01 135071 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-misc/typespeed-0.5.0" + # emerge --ask --oneshot --verbose ">=games-misc/typespeed-0.5.0" - CVE-2006-1515 + CVE-2006-1515 - + falco - + frilled - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-21.xml index d517b9d00b..1282924dc1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-21.xml @@ -1,6 +1,5 @@ - Mozilla Thunderbird: Multiple vulnerabilities @@ -8,8 +7,8 @@ JavaScript privilege escalation and possibly execution of arbitrary code. mozilla-thunderbird - June 19, 2006 - June 19, 2006: 01 + 2006-06-19 + 2006-06-19: 01 135256 remote @@ -53,14 +52,14 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.4" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.4"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.4" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.4"

Note: There is no stable fixed version for the Alpha architecture yet. Users of Mozilla Thunderbird on Alpha should consider unmerging it @@ -68,21 +67,21 @@

- CVE-2006-2775 - CVE-2006-2776 - CVE-2006-2778 - CVE-2006-2779 - CVE-2006-2780 - CVE-2006-2781 - CVE-2006-2783 - CVE-2006-2786 - CVE-2006-2787 - Mozilla Foundation Security Advisories + CVE-2006-2775 + CVE-2006-2776 + CVE-2006-2778 + CVE-2006-2779 + CVE-2006-2780 + CVE-2006-2781 + CVE-2006-2783 + CVE-2006-2786 + CVE-2006-2787 + Mozilla Foundation Security Advisories - + frilled - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-22.xml index fea23a7708..153742e9ee 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-22.xml @@ -1,6 +1,5 @@ - aRts: Privilege escalation @@ -8,8 +7,8 @@ with elevated privileges. aRts - June 22, 2006 - June 22, 2006: 01 + 2006-06-22 + 2006-06-22: 01 135970 local @@ -53,12 +52,12 @@ # emerge --ask --oneshot --verbose kde-base/arts - CVE-2006-2916 + CVE-2006-2916 - + jaervosz - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-23.xml index d1d0df32f0..d56bca9842 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-23.xml @@ -1,6 +1,5 @@ - KDM: Symlink vulnerability @@ -8,8 +7,8 @@ information. kdebase, KDM - June 22, 2006 - June 24, 2006: 02 + 2006-06-22 + 2006-06-24: 02 136201 local @@ -66,13 +65,13 @@ # emerge --ask --oneshot --verbose kde-base/kdm - KDE Security Advisory: KDM symlink attack vulnerability - CVE-2006-2449 + KDE Security Advisory: KDM symlink attack vulnerability + CVE-2006-2449 - + jaervosz - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-24.xml index fb1eab0a78..8f198c051d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-24.xml @@ -1,14 +1,13 @@ - wv2: Integer overflow An integer overflow could allow an attacker to execute arbitrary code. wv2 - June 23, 2006 - June 23, 2006: 01 + 2006-06-23 + 2006-06-23: 01 136759 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/wv2-0.2.3" + # emerge --ask --oneshot --verbose ">=app-text/wv2-0.2.3" - CVE 2006-2197 + CVE 2006-2197 - + DerCorny - + hlieberman - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-25.xml index e2cde2516a..31d60fbd5a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-25.xml @@ -1,6 +1,5 @@ - Hashcash: Possible heap overflow @@ -8,8 +7,8 @@ attacker to execute arbitrary code. hashcash - June 26, 2006 - July 29, 2006: 02 + 2006-06-26 + 2006-07-29: 02 134960 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/hashcash-1.21" + # emerge --ask --oneshot --verbose ">=net-misc/hashcash-1.21" Hashcash ChangeLog - CVE-2006-3251 + CVE-2006-3251 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-26.xml index 1c9bfd7976..412cb66641 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-26.xml @@ -1,6 +1,5 @@ - EnergyMech: Denial of Service @@ -8,8 +7,8 @@ easily exploitable via IRC. emech - June 26, 2006 - July 29, 2006: 02 + 2006-06-26 + 2006-07-29: 02 132749 remote @@ -46,19 +45,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/emech-3.0.2" + # emerge --ask --oneshot --verbose ">=net-irc/emech-3.0.2" EnergyMech Changelog - CVE-2006-3293 + CVE-2006-3293 - + jaervosz - + hlieberman - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-27.xml index 93416ecae5..8f3d273793 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-27.xml @@ -1,6 +1,5 @@ - Mutt: Buffer overflow @@ -8,8 +7,8 @@ execution. mutt - June 28, 2006 - June 28, 2006: 01 + 2006-06-28 + 2006-06-28: 01 138125 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mutt-1.5.11-r2" + # emerge --ask --oneshot --verbose ">=mail-client/mutt-1.5.11-r2" - CVE-2006-3242 + CVE-2006-3242 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-28.xml index b55ba57039..529bef066c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-28.xml @@ -1,6 +1,5 @@ - Horde Web Application Framework: XSS vulnerability @@ -8,8 +7,8 @@ vulnerability. horde - June 29, 2006 - June 29, 2006: 01 + 2006-06-29 + 2006-06-29: 01 136830 remote @@ -49,15 +48,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-3.1.1-r1" + # emerge --ask --oneshot --verbose ">=www-apps/horde-3.1.1-r1" - CVE-2006-2195 + CVE-2006-2195 - + dizzutch - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-29.xml index a877330588..745a7b68d0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-29.xml @@ -1,6 +1,5 @@ - Tikiwiki: SQL injection and multiple XSS vulnerabilities @@ -8,8 +7,8 @@ discovered. tikiwiki - June 29, 2006 - June 29, 2006: 01 + 2006-06-29 + 2006-06-29: 01 136723 134483 remote @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.4" + # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.4" - CVE-2006-3048 - CVE-2006-3047 + CVE-2006-3048 + CVE-2006-3047 - + shellsage - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-30.xml index cea0726d43..ec195a1f48 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200606-30.xml @@ -1,6 +1,5 @@ - Kiax: Arbitrary code execution @@ -8,8 +7,8 @@ execution of arbitrary code by a remote attacker. kiax - June 30, 2006 - June 30, 2006: 01 + 2006-06-30 + 2006-06-30: 01 136099 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/kiax-0.8.5_p1" + # emerge --ask --oneshot --verbose ">=net-misc/kiax-0.8.5_p1" - CVE-2006-2923 + CVE-2006-2923 - + falco - + falco - + dizzutch
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-01.xml index a2e990465d..eb804a0ccb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-01.xml @@ -1,6 +1,5 @@ - mpg123: Heap overflow @@ -8,8 +7,8 @@ execution of arbitrary code. mpg123 - July 03, 2006 - July 29, 2006: 02 + 2006-07-03 + 2006-07-29: 02 133988 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/mpg123-0.59s-r11" + # emerge --ask --oneshot --verbose ">=media-sound/mpg123-0.59s-r11" - CVE-2006-3355 + CVE-2006-3355 - + jaervosz - + hlieberman - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-02.xml index 52bfc6c3b4..fd7d3e7434 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-02.xml @@ -1,6 +1,5 @@ - FreeType: Multiple integer overflows @@ -8,8 +7,8 @@ FreeType, resulting in the execution of arbitrary code. FreeType - July 09, 2006 - September 03, 2006: 02 + 2006-07-09 + 2006-09-03: 02 124828 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.1.10-r2" + # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.1.10-r2" - CVE-2006-1861 + CVE-2006-1861 - + falco - + hlieberman - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-03.xml index 5dd5d186b4..427376828c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-03.xml @@ -1,6 +1,5 @@ - libTIFF: Multiple buffer overflows @@ -8,8 +7,8 @@ execution. tiff - July 09, 2006 - July 09, 2006: 01 + 2006-07-09 + 2006-07-09: 01 135881 remote @@ -48,16 +47,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r1" + # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r1" - CVE-2006-2193 - CVE-2006-2656 + CVE-2006-2193 + CVE-2006-2656 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-04.xml index fb9c91f87c..057de87bb0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-04.xml @@ -1,6 +1,5 @@ - PostgreSQL: SQL injection @@ -8,8 +7,8 @@ SQL statements. postgresql - July 09, 2006 - June 26, 2007: 03 + 2006-07-09 + 2007-06-26: 03 134168 remote @@ -61,17 +60,17 @@

- PostgreSQL technical information - CVE-2006-2313 - CVE-2006-2314 + PostgreSQL technical information + CVE-2006-2313 + CVE-2006-2314 - + falco - + frilled - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-05.xml index 20681066f7..10f3baef9c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-05.xml @@ -1,6 +1,5 @@ - SHOUTcast server: Multiple vulnerabilities @@ -8,8 +7,8 @@ multiple XSS vulnerabilities. shoutcast - July 09, 2006 - July 29, 2006: 03 + 2006-07-09 + 2006-07-29: 03 136721 136221 remote @@ -52,22 +51,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/shoutcast-server-bin-1.9.7" + # emerge --ask --oneshot --verbose ">=media-sound/shoutcast-server-bin-1.9.7" Original advisory - SA20524 - CVE-2006-3007 - CVE-2006-3534 - CVE-2006-3535 + SA20524 + CVE-2006-3007 + CVE-2006-3534 + CVE-2006-3535 - + jaervosz - + daxomatic - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-06.xml index 6db1c7610f..81f482aae4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-06.xml @@ -1,6 +1,5 @@ - libpng: Buffer overflow @@ -8,8 +7,8 @@ the execution of arbitrary code. libpng - July 19, 2006 - July 19, 2006: 01 + 2006-07-19 + 2006-07-19: 01 138433 138672 remote @@ -55,26 +54,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.12" + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.12"

All AMD64 emul-linux-x86-baselibs users should also upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-baselibs-2.5.1" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-baselibs-2.5.1" - libpng Changelog - CVE-2006-3334 + libpng Changelog + CVE-2006-3334 - + falco - + daxomatic - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-07.xml index 5a394049a8..0ec8207fa7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-07.xml @@ -1,6 +1,5 @@ - xine-lib: Buffer overflow @@ -8,8 +7,8 @@ xine-lib, potentially resulting in the execution of arbitrary code. xine-lib - July 20, 2006 - July 20, 2006: 01 + 2006-07-20 + 2006-07-20: 01 139319 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2-r2" + # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2-r2" - CVE-2006-2200 + CVE-2006-2200 - + jaervosz - + daxomatic - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-08.xml index ed8a087469..03bd685509 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-08.xml @@ -1,6 +1,5 @@ - GIMP: Buffer overflow @@ -8,8 +7,8 @@ arbitrary code when loading specially crafted XCF files. gimp - July 23, 2006 - July 24, 2006: 02 + 2006-07-23 + 2006-07-24: 02 139524 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/gimp-2.2.12" + # emerge --ask --oneshot --verbose ">=media-gfx/gimp-2.2.12" - CVE-2006-3404 + CVE-2006-3404 - + jaervosz - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-09.xml index 93b1992155..3f88d98e68 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-09.xml @@ -1,6 +1,5 @@ - Wireshark: Multiple vulnerabilities @@ -9,8 +8,8 @@ attacker. wireshark ethereal - July 25, 2006 - July 25, 2006: 01 + 2006-07-25 + 2006-07-25: 01 140856 remote @@ -53,14 +52,14 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2"

All Ethereal users should migrate to Wireshark:

# emerge --sync # emerge --ask --unmerge net-analyzer/ethereal - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.2"

To keep the [saved] configuration from Ethereal and reuse it with Wireshark: @@ -69,21 +68,21 @@ # mv ~/.ethereal ~/.wireshark - Wireshark wnpa-sec-2006-01 - CVE-2006-3627 - CVE-2006-3628 - CVE-2006-3629 - CVE-2006-3630 - CVE-2006-3631 - CVE-2006-3632 + Wireshark wnpa-sec-2006-01 + CVE-2006-3627 + CVE-2006-3628 + CVE-2006-3629 + CVE-2006-3630 + CVE-2006-3631 + CVE-2006-3632 - + koon - + dizzutch - + jaervosz diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-10.xml index 8bf0b5aff9..9c16decd06 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-10.xml @@ -1,6 +1,5 @@ - Samba: Denial of Service vulnerability @@ -8,8 +7,8 @@ within Samba. samba - July 25, 2006 - July 25, 2006: 01 + 2006-07-25 + 2006-07-25: 01 139369 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.22-r3" + # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.22-r3" - CVE-2006-3403 + CVE-2006-3403 - + koon - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-11.xml index 489e3f3055..f50ea62db4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-11.xml @@ -1,6 +1,5 @@ - TunePimp: Buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. Tunepimp - July 28, 2006 - June 01, 2007: 02 + 2006-07-28 + 2007-06-01: 02 140184 remote @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/tunepimp-0.5." + # emerge --ask --oneshot --verbose ">=media-libs/tunepimp-0.5." - CVE-2006-3600 + CVE-2006-3600 MusicBrainz bug #1764 - + dizzutch - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-12.xml index 407f5074af..02c9a7c7bf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-12.xml @@ -1,6 +1,5 @@ - OpenOffice.org: Multiple vulnerabilities @@ -8,8 +7,8 @@ exploited to allow the execution of arbitrary code by a remote attacker. OpenOffice.org - July 28, 2006 - July 28, 2006: 01 + 2006-07-28 + 2006-07-28: 01 138545 remote @@ -64,18 +63,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.3" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.3" - OpenOffice.org Security Bulletin 2006-06-29 - CVE-2006-2199 - CVE-2006-2198 - CVE-2006-3117 + OpenOffice.org Security Bulletin 2006-06-29 + CVE-2006-2199 + CVE-2006-2198 + CVE-2006-3117 - + dizzutch - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-13.xml index ca6c6ddeb0..df53c617b5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200607-13.xml @@ -1,6 +1,5 @@ - Audacious: Multiple heap and buffer overflows @@ -8,8 +7,8 @@ that could result in the execution of arbitrary code. audacious - July 29, 2006 - July 29, 2006: 01 + 2006-07-29 + 2006-07-29: 01 139957 remote @@ -48,20 +47,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/audacious-1.1.0" + # emerge --ask --oneshot --verbose ">=media-sound/audacious-1.1.0" BugTraq Announcement - CVE-2006-3581 - CVE-2006-3582 + CVE-2006-3581 + CVE-2006-3582 - + jaervosz - + daxomatic - + koon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-01.xml index 171f078a0f..2dc16c92de 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-01.xml @@ -1,6 +1,5 @@ - Apache: Off-by-one flaw in mod_rewrite @@ -8,8 +7,8 @@ of arbitrary code. apache - August 01, 2006 - December 30, 2007: 02 + 2006-08-01 + 2007-12-30: 02 141986 remote @@ -55,17 +54,17 @@ # emerge --ask --oneshot --verbose www-servers/apache - CVE-2006-3747 - Apache HTTP Server 2.0 Announcement - Apache HTTP Server 1.3 Announcement + CVE-2006-3747 + Apache HTTP Server 2.0 Announcement + Apache HTTP Server 1.3 Announcement - + vorlon078 - + vorlon078 - + vorlon078 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-02.xml index 41fe3ae0ba..2698876670 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-02.xml @@ -1,6 +1,5 @@ - Mozilla SeaMonkey: Multiple vulnerabilities @@ -8,8 +7,8 @@ related to Mozilla SeaMonkey. SeaMonkey - August 03, 2006 - August 03, 2006: 01 + 2006-08-03 + 2006-08-03: 01 141842 remote @@ -99,31 +98,31 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.0.3" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.0.3" - CVE-2006-3113 - CVE-2006-3677 - CVE-2006-3801 - CVE-2006-3802 - CVE-2006-3803 - CVE-2006-3804 - CVE-2006-3805 - CVE-2006-3806 - CVE-2006-3807 - CVE-2006-3808 - CVE-2006-3809 - CVE-2006-3810 - CVE-2006-3811 - CVE-2006-3812 + CVE-2006-3113 + CVE-2006-3677 + CVE-2006-3801 + CVE-2006-3802 + CVE-2006-3803 + CVE-2006-3804 + CVE-2006-3805 + CVE-2006-3806 + CVE-2006-3807 + CVE-2006-3808 + CVE-2006-3809 + CVE-2006-3810 + CVE-2006-3811 + CVE-2006-3812 - + DerCorny - + dizzutch - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-03.xml index b551ff20a9..2269e2a5ff 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-03.xml @@ -1,6 +1,5 @@ - Mozilla Firefox: Multiple vulnerabilities @@ -8,8 +7,8 @@ related to Mozilla Firefox. Firefox - August 03, 2006 - August 03, 2006: 01 + 2006-08-03 + 2006-08-03: 01 141842 remote @@ -101,33 +100,33 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.5" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.5"

Users of the binary package should upgrade as well:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.5" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.5" - CVE-2006-3113 - CVE-2006-3677 - CVE-2006-3801 - CVE-2006-3802 - CVE-2006-3803 - CVE-2006-3805 - CVE-2006-3806 - CVE-2006-3807 - CVE-2006-3808 - CVE-2006-3809 - CVE-2006-3810 - CVE-2006-3811 - CVE-2006-3812 + CVE-2006-3113 + CVE-2006-3677 + CVE-2006-3801 + CVE-2006-3802 + CVE-2006-3803 + CVE-2006-3805 + CVE-2006-3806 + CVE-2006-3807 + CVE-2006-3808 + CVE-2006-3809 + CVE-2006-3810 + CVE-2006-3811 + CVE-2006-3812 - + dizzutch - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-04.xml index 0e405f7d3d..0ff603d7de 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-04.xml @@ -1,6 +1,5 @@ - Mozilla Thunderbird: Multiple vulnerabilities @@ -8,8 +7,8 @@ related to Mozilla Thunderbird. Thunderbird - August 03, 2006 - August 03, 2006: 01 + 2006-08-03 + 2006-08-03: 01 141842 remote @@ -92,35 +91,35 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.5" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.5"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.5" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.5" - CVE-2006-3113 - CVE-2006-3802 - CVE-2006-3803 - CVE-2006-3804 - CVE-2006-3805 - CVE-2006-3806 - CVE-2006-3807 - CVE-2006-3809 - CVE-2006-3810 - CVE-2006-3811 - CVE-2006-3812 + CVE-2006-3113 + CVE-2006-3802 + CVE-2006-3803 + CVE-2006-3804 + CVE-2006-3805 + CVE-2006-3806 + CVE-2006-3807 + CVE-2006-3809 + CVE-2006-3810 + CVE-2006-3811 + CVE-2006-3812 - + DerCorny - + dizzutch - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-05.xml index 1f4a8436d2..1330cc4a00 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-05.xml @@ -1,6 +1,5 @@ - LibVNCServer: Authentication bypass @@ -9,8 +8,8 @@ server. libvncserver - August 04, 2006 - August 04, 2006: 01 + 2006-08-04 + 2006-08-04: 01 136916 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/libvncserver-0.8.2" + # emerge --ask --oneshot --verbose ">=net-libs/libvncserver-0.8.2" - CVE-2006-2450 + CVE-2006-2450 - + vorlon078 - + vorlon078 - + hlieberman
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-06.xml index 51f1c4e9a4..7f2d9feafb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-06.xml @@ -1,6 +1,5 @@ - Courier MTA: Denial of Service vulnerability @@ -8,8 +7,8 @@ character. Courier - August 04, 2006 - August 04, 2006: 01 + 2006-08-04 + 2006-08-04: 01 135005 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/courier-0.53.2" + # emerge --ask --oneshot --verbose ">=mail-mta/courier-0.53.2" - CVE-2006-2659 + CVE-2006-2659 - + koon - + koon - + dizzutch
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-07.xml index 0662daaa76..3659b2569e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-07.xml @@ -1,6 +1,5 @@ - libTIFF: Multiple vulnerabilities @@ -8,8 +7,8 @@ code execution. tiff - August 04, 2006 - August 04, 2006: 01 + 2006-08-04 + 2006-08-04: 01 142383 remote @@ -49,21 +48,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r2" + # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r2" - CVE-2006-3459 - CVE-2006-3460 - CVE-2006-3461 - CVE-2006-3462 - CVE-2006-3463 - CVE-2006-3464 - CVE-2006-3465 + CVE-2006-3459 + CVE-2006-3460 + CVE-2006-3461 + CVE-2006-3462 + CVE-2006-3463 + CVE-2006-3464 + CVE-2006-3465 - + falco - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-08.xml index 03090349b9..ae93f5a44a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-08.xml @@ -1,6 +1,5 @@ - GnuPG: Integer overflow vulnerability @@ -8,8 +7,8 @@ of arbitrary code. gnupg - August 05, 2006 - August 08, 2006: 02 + 2006-08-05 + 2006-08-08: 02 142248 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose "=app-crypt/gnupg-1.4*" + # emerge --ask --oneshot --verbose "=app-crypt/gnupg-1.4*" - CVE-2006-3746 + CVE-2006-3746 - + koon - + dizzutch - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-09.xml index 753f527709..c4dcd6c45c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-09.xml @@ -1,6 +1,5 @@ - MySQL: Denial of Service @@ -8,8 +7,8 @@ date_format function. mysql - August 06, 2006 - August 07, 2006: 02 + 2006-08-06 + 2006-08-07: 02 142429 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --verbose --oneshot ">=dev-db/mysql-4.1.21" + # emerge --ask --verbose --oneshot ">=dev-db/mysql-4.1.21" - CVE-2006-3469 + CVE-2006-3469 - + koon - + koon - + hlieberman
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-10.xml index d766b2a358..9def5bac20 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-10.xml @@ -1,6 +1,5 @@ - pike: SQL injection vulnerability @@ -8,8 +7,8 @@ statements in the underlying PostgreSQL database. pike - August 06, 2006 - December 13, 2006: 02 + 2006-08-06 + 2006-12-13: 02 136065 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/pike-7.6.86" + # emerge --ask --oneshot --verbose ">=dev-lang/pike-7.6.86" - Secunia Advisory SA20494 - CVE-2006-4041 + Secunia Advisory SA20494 + CVE-2006-4041 - + koon - + koon - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-11.xml index 45cb3d2de6..54d14393cb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-11.xml @@ -1,6 +1,5 @@ - Webmin, Usermin: File Disclosure @@ -8,8 +7,8 @@ specially crafted URL. webmin/usermin - August 06, 2006 - August 06, 2006: 01 + 2006-08-06 + 2006-08-06: 01 138552 remote @@ -53,23 +52,23 @@

# emerge --sync - # emerge --ask --verbose --oneshot ">=app-admin/webmin-1.290" + # emerge --ask --verbose --oneshot ">=app-admin/webmin-1.290"

All Usermin users should update to the latest stable version:

# emerge --sync - # emerge --ask --verbose --oneshot ">=app-admin/usermin-1.220" + # emerge --ask --verbose --oneshot ">=app-admin/usermin-1.220" - CVE-2006-3392 + CVE-2006-3392 - + koon - + hlieberman
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-12.xml index 22f8bb68df..94059ca9f8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-12.xml @@ -1,6 +1,5 @@ - x11vnc: Authentication bypass in included LibVNCServer code @@ -9,8 +8,8 @@ access to the server. x11vnc - August 07, 2006 - August 07, 2006: 01 + 2006-08-07 + 2006-08-07: 01 142559 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-misc/x11vnc-0.8.1" + # emerge --ask --oneshot --verbose ">=x11-misc/x11vnc-0.8.1" - CVE-2006-2450 - GLSA-200608-05 + CVE-2006-2450 + GLSA-200608-05 - + jaervosz - + koon - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-13.xml index 1556aa6827..b190702202 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-13.xml @@ -1,6 +1,5 @@ - ClamAV: Heap buffer overflow @@ -8,8 +7,8 @@ of Service and potentially remote execution of arbitrary code. clamav - August 08, 2006 - August 08, 2006: 02 + 2006-08-08 + 2006-08-08: 02 143093 remote @@ -50,16 +49,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.4" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.4" - ClamAV security advisory - CVE-2006-4018 + ClamAV security advisory + CVE-2006-4018 - + falco - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-14.xml index 806ab3eff6..5951151b52 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-14.xml @@ -1,6 +1,5 @@ - DUMB: Heap buffer overflow @@ -8,8 +7,8 @@ arbitrary code. dumb - August 08, 2006 - August 08, 2006: 01 + 2006-08-08 + 2006-08-08: 01 142387 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/dumb-0.9.3-r1" + # emerge --ask --oneshot --verbose ">=media-libs/dumb-0.9.3-r1" - CVE-2006-3668 + CVE-2006-3668 - + koon - + falco - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-15.xml index b22e412979..fb37c135a1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-15.xml @@ -1,6 +1,5 @@ - MIT Kerberos 5: Multiple local privilege escalation vulnerabilities @@ -8,8 +7,8 @@ privilege escalation. MIT Kerberos 5 - August 10, 2006 - August 10, 2006: 01 + 2006-08-10 + 2006-08-10: 01 143240 local @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.4.3-r3" + # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.4.3-r3" - CVE-2006-3083 - CVE-2006-3084 + CVE-2006-3083 + CVE-2006-3084 - + jaervosz - + daxomatic - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-16.xml index c8b11f5ac8..9ea872ddac 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-16.xml @@ -1,6 +1,5 @@ - Warzone 2100 Resurrection: Multiple buffer overflows @@ -8,8 +7,8 @@ buffer overflows, potentially allowing remote code execution. warzone2100 - August 10, 2006 - September 04, 2006: 02 + 2006-08-10 + 2006-09-04: 02 142389 remote @@ -56,18 +55,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-strategy/warzone2100-2.0.4" + # emerge --ask --oneshot --verbose ">=games-strategy/warzone2100-2.0.4" - CVE-2006-3849 + CVE-2006-3849 - + jaervosz - + jaervosz - + dizzutch
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-17.xml index ba5244f2c4..b3ae32b6bf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-17.xml @@ -1,6 +1,5 @@ - libwmf: Buffer overflow vulnerability @@ -8,8 +7,8 @@ execution of arbitrary code. libwmf - August 10, 2006 - August 10, 2006: 01 + 2006-08-10 + 2006-08-10: 01 139325 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libwmf-0.2.8.4" + # emerge --ask --oneshot --verbose ">=media-libs/libwmf-0.2.8.4" - CVE-2006-3376 + CVE-2006-3376 - + falco - + dizzutch - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-18.xml index 738c3ab74b..8e2f529343 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-18.xml @@ -1,6 +1,5 @@ - Net::Server: Format string vulnerability @@ -8,8 +7,8 @@ exploited to cause a Denial of Service. net-server - August 10, 2006 - August 10, 2006: 01 + 2006-08-10 + 2006-08-10: 01 142386 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-perl/net-server-0.88" + # emerge --ask --oneshot --verbose ">=dev-perl/net-server-0.88" - CVE-2005-1127 + CVE-2005-1127 - + falco - + dizzutch - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-19.xml index 6bba056522..ed6af07e65 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-19.xml @@ -1,6 +1,5 @@ - WordPress: Privilege escalation @@ -8,8 +7,8 @@ privileges. wordpress - August 10, 2006 - December 13, 2006: 02 + 2006-08-10 + 2006-12-13: 02 142142 remote @@ -48,20 +47,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.4" + # emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.4" - CVE-2006-3389 - CVE-2006-3390 - CVE-2006-4028 + CVE-2006-3389 + CVE-2006-3390 + CVE-2006-4028 - + jaervosz - + dizzutch - + frilled
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-20.xml index 251733a201..33a92fa5f8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-20.xml @@ -1,6 +1,5 @@ - Ruby on Rails: Several vulnerabilities @@ -8,8 +7,8 @@ and maybe the remote execution of arbitrary Ruby scripts. rails - August 14, 2006 - December 13, 2006: 02 + 2006-08-14 + 2006-12-13: 02 143369 remote @@ -51,21 +50,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-ruby/rails-1.1.6" + # emerge --ask --oneshot --verbose ">=dev-ruby/rails-1.1.6" Ruby on Rails original advisory (1.1.5) Ruby on Rails update (1.1.6) - CVE-2006-4111 - CVE-2006-4112 + CVE-2006-4111 + CVE-2006-4112 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-21.xml index 3f2016b054..f3c87d99e2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-21.xml @@ -1,6 +1,5 @@ - Heimdal: Multiple local privilege escalation vulnerabilities @@ -8,8 +7,8 @@ privilege escalation. Heimdal - August 23, 2006 - August 23, 2006: 01 + 2006-08-23 + 2006-08-23: 01 143371 local @@ -46,20 +45,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/heimdal-0.7.2-r3" + # emerge --ask --oneshot --verbose ">=app-crypt/heimdal-0.7.2-r3" - Official advisory - CVE-2006-3083 - CVE-2006-3084 + Official advisory + CVE-2006-3083 + CVE-2006-3084 - + koon - + daxomatic - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-22.xml index 01edfe6e5a..2f9b5885e6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-22.xml @@ -1,14 +1,13 @@ - fbida: Arbitrary command execution The fbgs script provided by fbida allows the execution of arbitrary code. fbida - August 23, 2006 - August 23, 2006: 01 + 2006-08-23 + 2006-08-23: 01 141684 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/fbida-2.03-r4" + # emerge --ask --oneshot --verbose ">=media-gfx/fbida-2.03-r4" - CVE-2006-3119 + CVE-2006-3119 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-23.xml index 5e60c7384e..831691e916 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-23.xml @@ -1,6 +1,5 @@ - Heartbeat: Denial of Service @@ -8,8 +7,8 @@ remote attacker without authentication. heartbeat - August 24, 2006 - September 22, 2006: 02 + 2006-08-24 + 2006-09-22: 02 141894 remote @@ -56,16 +55,16 @@ # emerge --ask --oneshot --verbose sys-cluster/heartbeat - CVE-2006-3121 - CVE-2006-3815 + CVE-2006-3121 + CVE-2006-3815 - + jaervosz - + falco - + falco diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-24.xml index a3dbc4031f..cb2edc9218 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-24.xml @@ -1,6 +1,5 @@ - AlsaPlayer: Multiple buffer overflows @@ -8,8 +7,8 @@ the execution of arbitrary code. AlsaPlayer - August 26, 2006 - August 26, 2006: 01 + 2006-08-26 + 2006-08-26: 01 143402 remote @@ -49,18 +48,18 @@ further notice:

- # emerge --ask --unmerge "media-sound/alsaplayer" + # emerge --ask --unmerge "media-sound/alsaplayer" - CVE-2006-4089 + CVE-2006-4089 - + falco - + hlieberman - + hlieberman
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-25.xml index d8d3046343..e6f55b023c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-25.xml @@ -1,6 +1,5 @@ - X.org and some X.org libraries: Local privilege escalations @@ -8,8 +7,8 @@ to local privilege escalations because of unchecked setuid() calls. xorg-x11,xorg-server,xtrans,xload,xinit,xterm,xf86dga,xdm,libX11 - August 28, 2006 - December 13, 2006: 02 + 2006-08-28 + 2006-12-13: 02 135974 local @@ -85,62 +84,62 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-apps/xdm-1.0.4-r1" + # emerge --ask --oneshot --verbose ">=x11-apps/xdm-1.0.4-r1"

All X.Org xinit users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-apps/xinit-1.0.2-r6" + # emerge --ask --oneshot --verbose ">=x11-apps/xinit-1.0.2-r6"

All X.Org xload users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-apps/xload-1.0.1-r1" + # emerge --ask --oneshot --verbose ">=x11-apps/xload-1.0.1-r1"

All X.Org xf86dga users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-apps/xf86dga-1.0.1-r1" + # emerge --ask --oneshot --verbose ">=x11-apps/xf86dga-1.0.1-r1"

All X.Org users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-base/xorg-x11-6.9.0-r2" + # emerge --ask --oneshot --verbose ">=x11-base/xorg-x11-6.9.0-r2"

All X.Org X servers users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.1.0-r1" + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.1.0-r1"

All X.Org X11 library users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/libx11-1.0.1-r1" + # emerge --ask --oneshot --verbose ">=x11-libs/libx11-1.0.1-r1"

All X.Org xtrans library users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/xtrans-1.0.1-r1" + # emerge --ask --oneshot --verbose ">=x11-libs/xtrans-1.0.1-r1"

All xterm users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/xterm-215" + # emerge --ask --oneshot --verbose ">=x11-terms/xterm-215"

All users of the X11R6 libraries for emulation of 32bit x86 on amd64 should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-xlibs-7.0-r2" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-xlibs-7.0-r2"

Please note that the fixed packages have been available for most architectures since June 30th but the GLSA release was held up waiting @@ -148,16 +147,16 @@

- X.Org security advisory - CVE-2006-4447 + X.Org security advisory + CVE-2006-4447 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-26.xml index 2aa95f855a..1cfa393cc7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-26.xml @@ -1,6 +1,5 @@ - Wireshark: Multiple vulnerabilities @@ -8,8 +7,8 @@ Denial of Service and/or the execution of arbitrary code. wireshark - August 29, 2006 - August 29, 2006: 01 + 2006-08-29 + 2006-08-29: 01 144946 remote @@ -45,7 +44,7 @@

Disable the SCSI and Q.2931 dissectors with the "Analyse" and "Enabled protocols" menus. Make sure the ESP decryption is disabled, with the - "Edit -> Preferences -> Protocols -> ESP" menu. + "Edit -> Preferences -> Protocols -> ESP" menu.

@@ -54,22 +53,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.3" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.3"
- CVE-2006-4330 - CVE-2006-4331 - CVE-2006-4332 - CVE-2006-4333 - Wireshark official advisory + CVE-2006-4330 + CVE-2006-4331 + CVE-2006-4332 + CVE-2006-4333 + Wireshark official advisory - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-27.xml index b726542b51..aef7172841 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-27.xml @@ -1,6 +1,5 @@ - Motor: Execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary code. motor - August 29, 2006 - August 29, 2006: 01 + 2006-08-29 + 2006-08-29: 01 135020 remote @@ -51,24 +50,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/motor-3.3.0-r1" + # emerge --ask --oneshot --verbose ">=dev-util/motor-3.3.0-r1"

All motor 3.4.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/motor-3.4.0-r1" + # emerge --ask --oneshot --verbose ">=dev-util/motor-3.4.0-r1" - CVE-2005-3863 + CVE-2005-3863 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-28.xml index feaa26fa53..9eb1d58c2d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200608-28.xml @@ -1,6 +1,5 @@ - PHP: Arbitary code execution @@ -8,8 +7,8 @@ execute arbitrary code. php - August 29, 2006 - March 29, 2008: 05 + 2006-08-29 + 2008-03-29: 05 143126 remote @@ -55,24 +54,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/php-4.4.3-r1" + # emerge --ask --oneshot --verbose ">=dev-lang/php-4.4.3-r1"

All PHP 5.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/php-5.1.4-r6" + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.1.4-r6" - CVE-2006-4020 + CVE-2006-4020 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-01.xml index a1f391be0e..4d0a585dfb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-01.xml @@ -1,6 +1,5 @@ - Streamripper: Multiple remote buffer overflows @@ -8,8 +7,8 @@ the execution of arbitrary code. streamripper - September 06, 2006 - September 06, 2006: 01 + 2006-09-06 + 2006-09-06: 01 144861 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/streamripper-1.61.26" + # emerge --ask --oneshot --verbose ">=media-sound/streamripper-1.61.26" - CVE-2006-3124 + CVE-2006-3124 - + jaervosz - + daxomatic - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-02.xml index 7056fa0f74..e69a2c50c5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-02.xml @@ -1,6 +1,5 @@ - GTetrinet: Remote code execution @@ -8,8 +7,8 @@ arbitrary code execution. GTetrinet - September 06, 2006 - September 07, 2006: 02 + 2006-09-06 + 2006-09-07: 02 144867 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-puzzle/gtetrinet-0.7.10" + # emerge --ask --oneshot --verbose ">=games-puzzle/gtetrinet-0.7.10" - CVE-2006-3125 + CVE-2006-3125 - + jaervosz - + daxomatic - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-03.xml index 0ee6aa614c..ada2fa4780 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-03.xml @@ -1,14 +1,13 @@ - OpenTTD: Remote Denial of Service The OpenTTD server is vulnerable to a remote Denial of Service. openttd - September 06, 2006 - September 06, 2006: 01 + 2006-09-06 + 2006-09-06: 01 131010 remote @@ -45,19 +44,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-simulation/openttd-0.4.8" + # emerge --ask --oneshot --verbose ">=games-simulation/openttd-0.4.8" - CVE-2006-1998 - CVE-2006-1999 + CVE-2006-1998 + CVE-2006-1999 - + jaervosz - + daxomatic - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-04.xml index cae9937b73..973e327fdd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-04.xml @@ -1,6 +1,5 @@ - LibXfont: Multiple integer overflows @@ -8,8 +7,8 @@ resulting in the execution of arbitrary code. LibXfont - September 06, 2006 - September 06, 2006: 01 + 2006-09-06 + 2006-09-06: 01 144092 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/libXfont-1.2.0-r1" + # emerge --ask --oneshot --verbose ">=x11-libs/libXfont-1.2.0-r1" - CVE-2006-3467 + CVE-2006-3467 - + falco - + daxomatic - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-05.xml index e67dcc6cfc..53029814d3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-05.xml @@ -1,14 +1,13 @@ - OpenSSL, AMD64 x86 emulation base libraries: RSA signature forgery OpenSSL fails to properly validate PKCS #1 v1.5 signatures. openssl - September 07, 2006 - September 08, 2006: 02 + 2006-09-07 + 2006-09-08: 02 146375 146438 remote @@ -53,25 +52,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.7k" + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.7k"

All AMD64 x86 emulation base libraries users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-baselibs-2.5.2" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-baselibs-2.5.2" - CVE-2006-4339 + CVE-2006-4339 - + jaervosz - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-06.xml index a7ef860294..f6da06612e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-06.xml @@ -1,14 +1,13 @@ - AdPlug: Multiple vulnerabilities Multiple heap and buffer overflows exist in AdPlug. adplug - September 12, 2006 - September 12, 2006: 01 + 2006-09-12 + 2006-09-12: 01 139593 local @@ -46,20 +45,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/adplug-2.0.1" + # emerge --ask --oneshot --verbose ">=media-libs/adplug-2.0.1" BugTraq Announcement - CVE-2006-3581 - CVE-2006-3582 + CVE-2006-3581 + CVE-2006-3582 - + jaervosz - + hlieberman - + hlieberman
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-07.xml index a20b7ac280..ecaa11fb4e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-07.xml @@ -1,6 +1,5 @@ - LibXfont, monolithic X.org: Multiple integer overflows @@ -8,8 +7,8 @@ resulting in the execution of arbitrary code with elevated privileges. libxfont - September 13, 2006 - September 13, 2006: 01 + 2006-09-13 + 2006-09-13: 01 145513 local and remote @@ -54,22 +53,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/libXfont-1.2.1" + # emerge --ask --oneshot --verbose ">=x11-libs/libXfont-1.2.1"

All monolithic X.org users are advised to migrate to modular X.org.

- CVE-2006-3739 - CVE-2006-3740 + CVE-2006-3739 + CVE-2006-3740 - + frilled - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-08.xml index d7894a5bee..8a9e043e45 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-08.xml @@ -1,6 +1,5 @@ - xine-lib: Buffer overflows @@ -8,8 +7,8 @@ to execute arbitrary code. xine-lib - September 13, 2006 - September 13, 2006: 01 + 2006-09-13 + 2006-09-13: 01 133520 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2-r2" + # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2-r2" - CVE-2006-2802 + CVE-2006-2802 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-09.xml index 39e07c3db5..bdf8364b5e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-09.xml @@ -1,6 +1,5 @@ - FFmpeg: Buffer overflows @@ -8,8 +7,8 @@ to execute arbitrary code. ffmpeg - September 13, 2006 - December 13, 2006: 02 + 2006-09-13 + 2006-12-13: 02 133520 remote @@ -47,16 +46,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-0.4.9_p20060530" + # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-0.4.9_p20060530" - CVE-2006-4799 - CVE-2006-4800 + CVE-2006-4799 + CVE-2006-4800 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-10.xml index cba756ef08..f1f3f82269 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-10.xml @@ -1,6 +1,5 @@ - DokuWiki: Arbitrary command execution @@ -8,8 +7,8 @@ execution. dokuwiki - September 14, 2006 - September 14, 2006: 01 + 2006-09-14 + 2006-09-14: 01 146800 remote @@ -53,17 +52,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-20060309d" + # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-20060309d" - CVE-2006-4674 - CVE-2006-4675 - CVE-2006-4679 + CVE-2006-4674 + CVE-2006-4675 + CVE-2006-4679 - + frilled - + frilled
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-11.xml index b74cb4d18a..ae0f276f1c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-11.xml @@ -1,6 +1,5 @@ - BIND: Denial of Service @@ -8,8 +7,8 @@ certain conditions. bind - September 15, 2006 - September 15, 2006: 01 + 2006-09-15 + 2006-09-15: 01 146486 remote @@ -55,25 +54,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/bind-9.3.2-r4" + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.3.2-r4"

All BIND 9.2 users should update to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/bind-9.2.6-r4" + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.2.6-r4" - CVE-2006-4095 - CVE-2006-4096 + CVE-2006-4095 + CVE-2006-4096 - + falco - + falco - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-12.xml index 096a063bf6..4cd84cebaf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-12.xml @@ -1,6 +1,5 @@ - Mailman: Multiple vulnerabilities @@ -8,8 +7,8 @@ file injection and XSS. mailman - September 19, 2006 - September 19, 2006: 01 + 2006-09-19 + 2006-09-19: 01 139976 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/mailman-2.1.9_rc1" + # emerge --ask --oneshot --verbose ">=net-mail/mailman-2.1.9_rc1" - CVE-2006-2941 - CVE-2006-3636 + CVE-2006-2941 + CVE-2006-3636 - + jaervosz - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-13.xml index 7f9fcb8a94..0b3c073c20 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-13.xml @@ -1,6 +1,5 @@ - gzip: Multiple vulnerabilities @@ -8,8 +7,8 @@ and infinite loops, possibly allowing the execution of arbitrary code. gzip - September 23, 2006 - September 23, 2006: 01 + 2006-09-23 + 2006-09-23: 01 145511 remote @@ -59,19 +58,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r9" + # emerge --ask --oneshot --verbose ">=app-arch/gzip-1.3.5-r9" - CVE-2006-4334 - CVE-2006-4335 - CVE-2006-4336 - CVE-2006-4337 - CVE-2006-4338 + CVE-2006-4334 + CVE-2006-4335 + CVE-2006-4336 + CVE-2006-4337 + CVE-2006-4338 - + taviso - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-14.xml index 5903252a5f..18b4d8e81e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-14.xml @@ -1,6 +1,5 @@ - ImageMagick: Multiple Vulnerabilities @@ -8,8 +7,8 @@ potentially result in the execution of arbitrary code. Imagemagick - September 26, 2006 - September 26, 2006: 01 + 2006-09-26 + 2006-09-26: 01 144091 143533 remote @@ -51,20 +50,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.2.9.5" + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.2.9.5" - CVE-2006-3743 - CVE-2006-3744 - CVE-2006-4144 + CVE-2006-3743 + CVE-2006-3744 + CVE-2006-4144 - + jaervosz - + taviso - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-15.xml index 3616bb7ba5..db3d289fb5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-15.xml @@ -1,6 +1,5 @@ - GnuTLS: RSA Signature Forgery @@ -8,8 +7,8 @@ PKCS #1 v1.5 signature. gnutls - September 26, 2006 - September 26, 2006: 01 + 2006-09-26 + 2006-09-26: 01 147682 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --update --ask --verbose ">=net-libs/gnutls-1.4.4" + # emerge --update --ask --verbose ">=net-libs/gnutls-1.4.4" - CVE-2006-4790 + CVE-2006-4790 - + jaervosz - + hlieberman - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-16.xml index a52abcdf20..844f0afbd5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-16.xml @@ -1,6 +1,5 @@ - Tikiwiki: Arbitrary command execution @@ -8,8 +7,8 @@ second vulnerability which may allow remote execution of arbitrary code. tikiwiki - September 26, 2006 - September 26, 2006: 01 + 2006-09-26 + 2006-09-26: 01 145714 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --oneshot --verbose --ask ">=www-apps/tikiwiki-1.9.5" + # emerge --oneshot --verbose --ask ">=www-apps/tikiwiki-1.9.5" - CVE-2006-4299 - CVE-2006-4602 + CVE-2006-4299 + CVE-2006-4602 - + jaervosz - + hlieberman - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-17.xml index 4c48ecd826..05e909909d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-17.xml @@ -1,6 +1,5 @@ - OpenSSH: Denial of Service @@ -8,8 +7,8 @@ cause a Denial of Service. openssh - September 27, 2006 - September 27, 2006: 02 + 2006-09-27 + 2006-09-27: 02 148228 remote @@ -50,15 +49,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.3_p2-r5" + # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.3_p2-r5" - CVE-2006-4924 + CVE-2006-4924 - + taviso - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-18.xml index e983a81d0d..dcd3f74294 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-18.xml @@ -1,14 +1,13 @@ - Opera: RSA signature forgery Opera fails to correctly verify certain signatures. opera - September 28, 2006 - September 28, 2006: 02 + 2006-09-28 + 2006-09-28: 02 147838 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-9.02" + # emerge --ask --oneshot --verbose ">=www-client/opera-9.02" - Opera Advisory - GLSA 200609-05 + Opera Advisory + GLSA 200609-05 - + jaervosz - + vorlon078 - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-19.xml index cd49eae4ef..eae4a136e8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-19.xml @@ -1,6 +1,5 @@ - Mozilla Firefox: Multiple vulnerabilities @@ -8,8 +7,8 @@ Firefox, including one that may allow execution of arbitrary code. Firefox - September 28, 2006 - September 28, 2006: 01 + 2006-09-28 + 2006-09-28: 01 147652 remote @@ -52,28 +51,28 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.7" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.7"

Users of the binary package should upgrade as well:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.7" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.7" - CVE-2006-4253 - CVE-2006-4340 - CVE-2006-4565 - CVE-2006-4566 - CVE-2006-4567 - CVE-2006-4568 - CVE-2006-4569 - CVE-2006-4571 + CVE-2006-4253 + CVE-2006-4340 + CVE-2006-4565 + CVE-2006-4566 + CVE-2006-4567 + CVE-2006-4568 + CVE-2006-4569 + CVE-2006-4571 - + frilled - + frilled
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-20.xml index d8e8b41470..867de26fb2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200609-20.xml @@ -1,6 +1,5 @@ - DokuWiki: Shell command injection and Denial of Service @@ -8,8 +7,8 @@ attacks when using ImageMagick. dokuwiki - September 28, 2006 - December 13, 2006: 02 + 2006-09-28 + 2006-12-13: 02 149266 remote @@ -48,20 +47,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-20060309e" + # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-20060309e" - DokuWiki Announcement - CVE-2006-5098 - CVE-2006-5099 + DokuWiki Announcement + CVE-2006-5098 + CVE-2006-5099 - + vorlon078 - + vorlon078 - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-01.xml index 58dee86a55..83855adedf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-01.xml @@ -1,6 +1,5 @@ - Mozilla Thunderbird: Multiple vulnerabilities @@ -8,8 +7,8 @@ related to Mozilla Thunderbird. thunderbird - October 04, 2006 - October 04, 2006: 01 + 2006-10-04 + 2006-10-04: 01 147653 remote @@ -53,31 +52,31 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.7" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.7"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.7" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.7" - CVE-2006-4253 - CVE-2006-4340 - CVE-2006-4565 - CVE-2006-4566 - CVE-2006-4567 - CVE-2006-4570 - CVE-2006-4571 + CVE-2006-4253 + CVE-2006-4340 + CVE-2006-4565 + CVE-2006-4566 + CVE-2006-4567 + CVE-2006-4570 + CVE-2006-4571 - + vorlon078 - + vorlon078 - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-02.xml index eff012faba..7a16b9e1c1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-02.xml @@ -1,6 +1,5 @@ - Adobe Flash Player: Arbitrary code execution @@ -9,8 +8,8 @@ files. Flash - October 04, 2006 - May 28, 2009: 02 + 2006-10-04 + 2009-05-28: 02 147421 remote @@ -47,21 +46,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-7.0.68" + # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-7.0.68" - Adobe Security Bulletin - CVE-2006-3311 - CVE-2006-3587 - CVE-2006-3588 + Adobe Security Bulletin + CVE-2006-3311 + CVE-2006-3587 + CVE-2006-3588 - + vorlon078 - + plasmaroo - + plasmaroo
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-03.xml index f64cdbb19d..316a62e8c7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-03.xml @@ -1,6 +1,5 @@ - ncompress: Buffer Underflow @@ -8,8 +7,8 @@ for the execution of arbitrary code. ncompress - October 06, 2006 - October 06, 2006: 01 + 2006-10-06 + 2006-10-06: 01 141728 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/ncompress-4.2.4.1" + # emerge --ask --oneshot --verbose ">=app-arch/ncompress-4.2.4.1" - CVE-2006-1168 + CVE-2006-1168 - + vorlon078 - + taviso - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-04.xml index 39a1fc550f..e4225d496d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-04.xml @@ -1,6 +1,5 @@ - Seamonkey: Multiple vulnerabilities @@ -8,8 +7,8 @@ application. seamonkey - October 16, 2006 - October 16, 2006: 01 + 2006-10-16 + 2006-10-16: 01 147651 remote @@ -49,20 +48,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.0.5" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.0.5" - CVE-2006-4253 - CVE-2006-4565 - CVE-2006-4566 - CVE-2006-4568 - CVE-2006-4570 - CVE-2006-4571 + CVE-2006-4253 + CVE-2006-4565 + CVE-2006-4566 + CVE-2006-4568 + CVE-2006-4570 + CVE-2006-4571 - + frilled - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-05.xml index 157a999540..535fd0f761 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-05.xml @@ -1,14 +1,13 @@ - CAPI4Hylafax fax receiver: Execution of arbitrary code CAPI4Hylafax allows remote attackers to execute arbitrary commands. capi4hylafax - October 17, 2006 - October 17, 2006: 01 + 2006-10-17 + 2006-10-17: 01 145982 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/capi4hylafax-01.03.00.99.300.3-r1" + # emerge --ask --oneshot --verbose ">=net-misc/capi4hylafax-01.03.00.99.300.3-r1" - CVE-2006-3126 + CVE-2006-3126 - + vorlon078 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-06.xml index fdaf5eee6f..b6b18e37d5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-06.xml @@ -1,14 +1,13 @@ - Mozilla Network Security Service (NSS): RSA signature forgery NSS fails to properly validate PKCS #1 v1.5 signatures. nss - October 17, 2006 - October 17, 2006: 01 + 2006-10-17 + 2006-10-17: 01 148283 remote @@ -50,7 +49,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.11.3" + # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.11.3"

Note: As usual after updating a library, you should run 'revdep-rebuild' (from the app-portage/gentoolkit package) to ensure @@ -58,16 +57,16 @@

- CVE-2006-4339 - CVE-2006-4340 + CVE-2006-4339 + CVE-2006-4340 - + frilled - + vorlon078 - + frilled
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-07.xml index 287ef0980f..2b090f8049 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-07.xml @@ -1,6 +1,5 @@ - Python: Buffer Overflow @@ -8,8 +7,8 @@ Denial of Service and potentially allows the execution of arbitrary code. python - October 17, 2006 - February 26, 2007: 03 + 2006-10-17 + 2007-02-26: 03 149065 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.3-r4" + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.3-r4" - CVE-2006-4980 + CVE-2006-4980 - + jaervosz - + DerCorny - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-08.xml index 7b0ac149aa..590dcae490 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-08.xml @@ -1,6 +1,5 @@ - Cscope: Multiple buffer overflows @@ -8,8 +7,8 @@ execution of arbitrary code. cscope - October 20, 2006 - October 20, 2006: 01 + 2006-10-20 + 2006-10-20: 01 144869 remote @@ -47,15 +46,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/cscope-15.5.20060927" + # emerge --ask --oneshot --verbose ">=dev-util/cscope-15.5.20060927" - CVE-2006-4262 + CVE-2006-4262 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-09.xml index 1bc29ae135..39527b9c52 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-09.xml @@ -1,6 +1,5 @@ - libmusicbrainz: Multiple buffer overflows @@ -8,8 +7,8 @@ lead to a Denial of Service or possibly the execution of arbitrary code. libmusicbrainz - October 22, 2006 - October 22, 2006: 01 + 2006-10-22 + 2006-10-22: 01 144089 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/musicbrainz-2.1.4" + # emerge --ask --oneshot --verbose ">=media-libs/musicbrainz-2.1.4" - CVE-2006-4197 + CVE-2006-4197 - + falco - + vorlon078 - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-10.xml index 681ac8df6e..9d8c8d7f1e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-10.xml @@ -1,6 +1,5 @@ - ClamAV: Multiple Vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code and a Denial of Service. clamav - October 24, 2006 - October 24, 2006: 01 + 2006-10-24 + 2006-10-24: 01 151561 remote @@ -50,16 +49,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.5" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.5" - Original commit log - CVE-2006-4182 + Original commit log + CVE-2006-4182 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-11.xml index 47a01d5dca..8f001e3e55 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-11.xml @@ -1,6 +1,5 @@ - OpenSSL: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code. openssl - October 24, 2006 - October 24, 2006: 01 + 2006-10-24 + 2006-10-24: 01 145510 remote @@ -58,27 +57,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8d" + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8d"

All OpenSSL 0.9.7 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.7l" + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.7l" - CVE-2006-2937 - CVE-2006-2940 - CVE-2006-3738 - CVE-2006-4343 + CVE-2006-2937 + CVE-2006-2940 + CVE-2006-3738 + CVE-2006-4343 - + vorlon078 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-12.xml index 621d4711f3..8f89b31d65 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-12.xml @@ -1,6 +1,5 @@ - Apache mod_tcl: Format string vulnerability @@ -8,8 +7,8 @@ lead to the remote execution of arbitrary code. mod_tcl - October 24, 2006 - October 24, 2006: 01 + 2006-10-24 + 2006-10-24: 01 151359 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apache/mod_tcl-1.0.1" + # emerge --ask --oneshot --verbose ">=www-apache/mod_tcl-1.0.1" - CVE-2006-4154 + CVE-2006-4154 - + falco - + falco - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-13.xml index c20b187c33..26d6682a65 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-13.xml @@ -1,6 +1,5 @@ - Cheese Tracker: Buffer Overflow @@ -8,8 +7,8 @@ arbitrary code. cheesetracker - October 26, 2006 - October 26, 2006: 01 + 2006-10-26 + 2006-10-26: 01 142391 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/cheesetracker-0.9.9-r1" + # emerge --ask --oneshot --verbose ">=media-sound/cheesetracker-0.9.9-r1" - CVE-2006-3814 + CVE-2006-3814 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-14.xml index 44f4bea016..7d677577d8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-14.xml @@ -1,6 +1,5 @@ - PHP: Integer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. php - October 30, 2006 - March 29, 2008: 04 + 2006-10-30 + 2008-03-29: 04 150261 remote @@ -52,24 +51,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/php-5.1.6-r6" + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.1.6-r6"

All PHP 4.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/php-4.4.4-r6" + # emerge --ask --oneshot --verbose ">=dev-lang/php-4.4.4-r6" - CVE-2006-4812 + CVE-2006-4812 - + falco - + shellsage - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-15.xml index d4d39ae277..557a116490 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200610-15.xml @@ -1,6 +1,5 @@ - Asterisk: Multiple vulnerabilities @@ -8,8 +7,8 @@ Denial of Service. asterisk - October 30, 2006 - January 30, 2007: 02 + 2006-10-30 + 2007-01-30: 02 144941 151881 remote @@ -62,18 +61,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.13" + # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.13" - CVE-2006-4345 - CVE-2006-4346 - CVE-2006-5444 - CVE-2006-5445 + CVE-2006-4345 + CVE-2006-4346 + CVE-2006-5444 + CVE-2006-5445 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-01.xml index 27f721e4b1..0e37a8e40c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-01.xml @@ -1,6 +1,5 @@ - Screen: UTF-8 character handling vulnerability @@ -9,8 +8,8 @@ arbitrary code. screen - November 03, 2006 - November 03, 2006: 01 + 2006-11-03 + 2006-11-03: 01 152770 remote @@ -51,15 +50,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-misc/screen-4.0.3" + # emerge --ask --oneshot --verbose ">=app-misc/screen-4.0.3" - CVE-2006-4573 + CVE-2006-4573 - + aetius - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-02.xml index 202a582705..682d524e44 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-02.xml @@ -1,6 +1,5 @@ - Qt: Integer overflow @@ -8,8 +7,8 @@ Denial of Service or the remote execution of arbitrary code. qt - November 06, 2006 - January 09, 2009: 03 + 2006-11-06 + 2009-01-09: 03 151838 remote @@ -50,24 +49,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.6-r4" + # emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.6-r4"

All Qt 4.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/qt-4.1.4-r2" + # emerge --ask --oneshot --verbose ">=x11-libs/qt-4.1.4-r2" - CVE-2006-4811 + CVE-2006-4811 - + vorlon078 - + vorlon078 - + vorlon078
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-03.xml index 7a35f9c940..ceb5f254db 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-03.xml @@ -1,6 +1,5 @@ - NVIDIA binary graphics driver: Privilege escalation vulnerability @@ -8,8 +7,8 @@ escalation through an X session. nvidia-drivers - November 07, 2006 - November 10, 2006: 02 + 2006-11-07 + 2006-11-10: 02 151635 remote, local @@ -48,7 +47,7 @@ Disable the accelerated rendering functionality in the Device section of xorg.conf :

- Option "RenderAccel" "false" + Option "RenderAccel" "false"

@@ -57,18 +56,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-1.0.8776" + # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-1.0.8776"
- CVE-2006-5379 + CVE-2006-5379 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-04.xml index 5774591c6d..7a5152db33 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-04.xml @@ -1,6 +1,5 @@ - Bugzilla: Multiple Vulnerabilities @@ -8,8 +7,8 @@ request forgery. bugzilla - November 09, 2006 - November 09, 2006: 01 + 2006-11-09 + 2006-11-09: 01 151563 remote @@ -69,20 +68,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/bugzilla-2.18.6" + # emerge --ask --oneshot --verbose ">=www-apps/bugzilla-2.18.6" - CVE-2006-5453 - CVE-2006-5454 - CVE-2006-5455 + CVE-2006-5453 + CVE-2006-5454 + CVE-2006-5455 - + vorlon078 - + shellsage - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-05.xml index 310889471d..524e60de61 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-05.xml @@ -1,6 +1,5 @@ - Netkit FTP Server: Privilege escalation @@ -8,8 +7,8 @@ directories that would normally be inaccessible. ftpd - November 10, 2006 - December 30, 2007: 02 + 2006-11-10 + 2007-12-30: 02 150292 remote @@ -53,15 +52,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/netkit-ftpd-0.17-r4" + # emerge --ask --oneshot --verbose ">=net-ftp/netkit-ftpd-0.17-r4" - CVE-2006-5778 + CVE-2006-5778 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-06.xml index 32720e8efc..9327200044 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-06.xml @@ -1,14 +1,13 @@ - OpenSSH: Multiple Denial of Service vulnerabilities Several Denial of Service vulnerabilities have been identified in OpenSSH. openssh - November 13, 2006 - November 13, 2006: 01 + 2006-11-13 + 2006-11-13: 01 149502 remote @@ -52,20 +51,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.4_p1-r5" + # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.4_p1-r5" - CVE-2006-5051 - CVE-2006-5052 - OpenSSH Security Advisory + CVE-2006-5051 + CVE-2006-5052 + OpenSSH Security Advisory - + vorlon078 - + vorlon078 - + daxomatic
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-07.xml index 888c49fc42..57ad9c35fe 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-07.xml @@ -1,6 +1,5 @@ - GraphicsMagick: PALM and DCM buffer overflows @@ -8,8 +7,8 @@ resulting in the execution of arbitrary code. graphicsmagick - November 13, 2006 - November 13, 2006: 01 + 2006-11-13 + 2006-11-13: 01 152668 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.1.7-r3" + # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.1.7-r3" - CVE-2006-5456 + CVE-2006-5456 - + vorlon078 - + shellsage - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-08.xml index 7d214d2e0c..0e059de926 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-08.xml @@ -1,6 +1,5 @@ - RPM: Buffer overflow @@ -8,8 +7,8 @@ arbitrary code when opening specially crafted packages. rpm - November 13, 2006 - November 13, 2006: 01 + 2006-11-13 + 2006-11-13: 01 154218 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/rpm-4.4.6-r3" + # emerge --ask --oneshot --verbose ">=app-arch/rpm-4.4.6-r3" - CVE-2006-5466 + CVE-2006-5466 - + falco - + shellsage - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-09.xml index 8b8c315452..3908071ab2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-09.xml @@ -1,6 +1,5 @@ - libpng: Denial of Service @@ -8,8 +7,8 @@ that handle untrusted images. libpng - November 17, 2006 - November 17, 2006: 01 + 2006-11-17 + 2006-11-17: 01 154380 remote @@ -49,15 +48,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.13" + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.13" - CVE-2006-5793 + CVE-2006-5793 - + taviso - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-10.xml index 785cf00163..4f31d6c9f2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-10.xml @@ -1,6 +1,5 @@ - WordPress: Multiple vulnerabilities @@ -8,8 +7,8 @@ metadata and the overwriting of restricted files. wordpress - November 17, 2006 - November 17, 2006: 01 + 2006-11-17 + 2006-11-17: 01 153303 remote @@ -53,17 +52,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.5" + # emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.5" - CVE-2006-5705 - WordPress Ticket 3142 - WordPress Ticket 2591 + CVE-2006-5705 + WordPress Ticket 3142 + WordPress Ticket 2591 - + frilled - + frilled
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-11.xml index 9cd741f888..1e700fa4bd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-11.xml @@ -1,6 +1,5 @@ - TikiWiki: Multiple vulnerabilities @@ -8,8 +7,8 @@ credentials and for cross-site scripting attacks. tikiwiki - November 20, 2006 - November 20, 2006: 01 + 2006-11-20 + 2006-11-20: 01 153820 remote @@ -52,19 +51,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.6" + # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.6" - CVE-2006-5702 - CVE-2006-5703 + CVE-2006-5702 + CVE-2006-5703 - + jaervosz - + shellsage - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-12.xml index a8d53e22c7..d1fe6d22d0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-12.xml @@ -1,14 +1,13 @@ - Ruby: Denial of Service vulnerability The Ruby cgi.rb CGI library is vulnerable to a Denial of Service attack. ruby - November 20, 2006 - June 11, 2009: 02 + 2006-11-20 + 2009-06-11: 02 153497 remote @@ -50,15 +49,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.5-r3" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.5-r3" - CVE-2006-5467 + CVE-2006-5467 - + aetius - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-13.xml index 29b6b175fd..302a5bc7b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-13.xml @@ -1,15 +1,14 @@ - - Avahi: "netlink" message vulnerability + Avahi: "netlink" message vulnerability Avahi fails to verify the origin of netlink messages, which could allow local users to spoof network changes. avahi - November 20, 2006 - November 20, 2006: 01 + 2006-11-20 + 2006-11-20: 01 154322 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/avahi-0.6.15" + # emerge --ask --oneshot --verbose ">=net-dns/avahi-0.6.15" - CVE-2006-5461 + CVE-2006-5461 - + vorlon - + vorlon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-14.xml index f0271113f7..4c48d8de82 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-14.xml @@ -1,6 +1,5 @@ - TORQUE: Insecure temporary file creation @@ -8,8 +7,8 @@ the execution of arbitrary code with elevated privileges. torque - November 20, 2006 - November 24, 2006: 03 + 2006-11-20 + 2006-11-24: 03 152104 local @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-cluster/torque-2.1.6" + # emerge --ask --oneshot --verbose ">=sys-cluster/torque-2.1.6" - CVE-2006-5677 + CVE-2006-5677 - + vorlon - + vorlon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-15.xml index 4d1325a2c1..deb58d8d38 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-15.xml @@ -1,6 +1,5 @@ - qmailAdmin: Buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. qmailadmin - November 21, 2006 - November 21, 2006: 01 + 2006-11-21 + 2006-11-21: 01 153896 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/qmailadmin-1.2.10" + # emerge --ask --oneshot --verbose ">=net-mail/qmailadmin-1.2.10" - CVE-2006-1141 + CVE-2006-1141 - + vorlon - + vorlon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-16.xml index bb1874a3c9..68fbb1089c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-16.xml @@ -1,6 +1,5 @@ - Texinfo: Buffer overflow @@ -8,8 +7,8 @@ of arbitrary code. texinfo - November 21, 2006 - November 21, 2006: 01 + 2006-11-21 + 2006-11-21: 01 154316 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/texinfo-4.8-r5" + # emerge --ask --oneshot --verbose ">=sys-apps/texinfo-4.8-r5" - CVE-2006-4810 + CVE-2006-4810 - + vorlon - + vorlon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-17.xml index c00a28ec7b..cdf7771230 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-17.xml @@ -1,6 +1,5 @@ - fvwm: fvwm-menu-directory fvwm command injection @@ -8,8 +7,8 @@ arbitrary commands with the privileges of another user. fvwm - November 23, 2006 - November 23, 2006: 01 + 2006-11-23 + 2006-11-23: 01 155078 local @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-wm/fvwm-2.5.18-r1" + # emerge --ask --oneshot --verbose ">=x11-wm/fvwm-2.5.18-r1" - CVE-2006-5969 + CVE-2006-5969 - + jaervosz - + jaervosz - + taviso
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-18.xml index 56f2215039..9b335b9557 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-18.xml @@ -1,6 +1,5 @@ - TIN: Multiple buffer overflows @@ -8,8 +7,8 @@ the execution of arbitrary code. tin - November 24, 2006 - November 24, 2006: 01 + 2006-11-24 + 2006-11-24: 01 150229 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-nntp/tin-1.8.2" + # emerge --ask --oneshot --verbose ">=net-nntp/tin-1.8.2" OpenPKG Advisory - CVE-2006-0804 + CVE-2006-0804 - + jaervosz - + jaervosz - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-19.xml index c95db6da8b..e22b7e151f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-19.xml @@ -1,6 +1,5 @@ - ImageMagick: PALM and DCM buffer overflows @@ -8,8 +7,8 @@ in the execution of arbitrary code. imagemagick - November 24, 2006 - November 24, 2006: 01 + 2006-11-24 + 2006-11-24: 01 152672 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.3.0.5" + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.3.0.5" - CVE-2006-5456 + CVE-2006-5456 - + jaervosz - + shellsage - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-20.xml index 4187a07a47..177b571f73 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-20.xml @@ -1,6 +1,5 @@ - GNU gv: Stack overflow @@ -8,8 +7,8 @@ execution of arbitrary code. gv - November 24, 2006 - November 24, 2006: 01 + 2006-11-24 + 2006-11-24: 01 154573 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/gv-3.6.2-r1" + # emerge --ask --oneshot --verbose ">=app-text/gv-3.6.2-r1" - CVE-2006-5864 + CVE-2006-5864 - + jaervosz - + shellsage - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-21.xml index a00511d038..d968f2a7ec 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-21.xml @@ -1,6 +1,5 @@ - Kile: Incorrect backup file permission @@ -8,8 +7,8 @@ information disclosure. kile - November 27, 2006 - November 27, 2006: 01 + 2006-11-27 + 2006-11-27: 01 155613 local @@ -45,15 +44,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/kile-1.9.2-r1" + # emerge --ask --oneshot --verbose ">=app-editors/kile-1.9.2-r1" - CVE-2005-1920 + CVE-2005-1920 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-22.xml index 295933cb4b..fa4a42fdce 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-22.xml @@ -1,6 +1,5 @@ - Ingo H3: Folder name shell command injection @@ -8,8 +7,8 @@ procmail rules. horde-ingo - November 27, 2006 - November 27, 2006: 01 + 2006-11-27 + 2006-11-27: 01 153927 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-ingo-1.1.2" + # emerge --ask --oneshot --verbose ">=www-apps/horde-ingo-1.1.2" - CVE-2006-5449 + CVE-2006-5449 - + jaervosz - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-23.xml index e896c99fad..ec614e53dd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-23.xml @@ -1,6 +1,5 @@ - Mono: Insecure temporary file creation @@ -8,8 +7,8 @@ overwrite arbitrary files. mono - November 28, 2006 - November 28, 2006: 01 + 2006-11-28 + 2006-11-28: 01 150264 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/mono-1.1.13.8.1" + # emerge --ask --oneshot --verbose ">=dev-lang/mono-1.1.13.8.1" - CVE-2006-5072 + CVE-2006-5072 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-24.xml index 5d92272850..e16a421ee6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-24.xml @@ -1,6 +1,5 @@ - LHa: Multiple vulnerabilities @@ -8,8 +7,8 @@ of arbitrary code. lha - November 28, 2006 - November 28, 2006: 01 + 2006-11-28 + 2006-11-28: 01 151252 remote @@ -52,21 +51,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/lha-114i-r6" + # emerge --ask --oneshot --verbose ">=app-arch/lha-114i-r6" - CVE-2006-4335 - CVE-2006-4336 - CVE-2006-4337 - CVE-2006-4338 + CVE-2006-4335 + CVE-2006-4336 + CVE-2006-4337 + CVE-2006-4338 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-25.xml index b827faffa5..d483e8ddb2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-25.xml @@ -1,6 +1,5 @@ - OpenLDAP: Denial of Service vulnerability @@ -8,8 +7,8 @@ Denial of Service. openldap - November 28, 2006 - November 28, 2006: 01 + 2006-11-28 + 2006-11-28: 01 154349 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose "net-nds/openldap" + # emerge --ask --oneshot --verbose "net-nds/openldap" - CVE-2006-5779 + CVE-2006-5779 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-26.xml index d9c9659730..4c65ce0a72 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200611-26.xml @@ -1,6 +1,5 @@ - ProFTPD: Remote execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. proftpd - November 30, 2006 - November 30, 2006: 01 + 2006-11-30 + 2006-11-30: 01 154650 remote @@ -57,20 +56,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.0a" + # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.0a" - CVE-2006-5815 - CVE-2006-6170 - CVE-2006-6171 (disputed) + CVE-2006-5815 + CVE-2006-6170 + CVE-2006-6171 (disputed) - + falco - + aetius - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-01.xml index 23e95184a1..c0e11a0fd7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-01.xml @@ -1,6 +1,5 @@ - wv library: Multiple integer overflows @@ -8,8 +7,8 @@ to the execution of arbitrary code. wv library - December 07, 2006 - December 07, 2006: 01 + 2006-12-07 + 2006-12-07: 01 153800 remote @@ -47,15 +46,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/wv-1.2.3-r1" + # emerge --ask --oneshot --verbose ">=app-text/wv-1.2.3-r1" - CVE-2006-4513 + CVE-2006-4513 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-02.xml index e2fb96321b..731290740d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-02.xml @@ -1,6 +1,5 @@ - xine-lib: Buffer overflow @@ -8,8 +7,8 @@ which could lead to the execution of arbitrary code. xine-lib - December 09, 2006 - December 09, 2006: 01 + 2006-12-09 + 2006-12-09: 01 156645 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2-r3" + # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.2-r3" - CVE-2006-6172 + CVE-2006-6172 - + DerCorny - + vorlon - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-03.xml index bf5721604f..1044fae490 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-03.xml @@ -1,6 +1,5 @@ - GnuPG: Multiple vulnerabilities @@ -8,8 +7,8 @@ dereference that can result in the execution of arbitrary code. gnupg - December 10, 2006 - December 10, 2006: 02 + 2006-12-10 + 2006-12-10: 02 156476 156947 remote @@ -58,19 +57,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose "=app-crypt/gnupg-1.4*" + # emerge --ask --oneshot --verbose "=app-crypt/gnupg-1.4*" - CVE-2006-6169 - CVE-2006-6235 + CVE-2006-6169 + CVE-2006-6235 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-04.xml index 7ce79080ba..60253388ed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-04.xml @@ -1,6 +1,5 @@ - ModPlug: Multiple buffer overflows @@ -8,8 +7,8 @@ overflows resulting in the possible execution of arbitrary code. libmodplug - December 10, 2006 - December 10, 2006: 01 + 2006-12-10 + 2006-12-10: 01 143404 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libmodplug-0.8-r1" + # emerge --ask --oneshot --verbose ">=media-libs/libmodplug-0.8-r1" - CVE-2006-4192 + CVE-2006-4192 - + vorlon - + vorlon - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-05.xml index c4ed171994..a0c406954c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-05.xml @@ -1,6 +1,5 @@ - KOffice shared libraries: Heap corruption @@ -9,8 +8,8 @@ files. koffice-libs - December 10, 2006 - December 10, 2006: 01 + 2006-12-10 + 2006-12-10: 01 155914 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/koffice-libs-1.5.0" + # emerge --ask --oneshot --verbose ">=app-office/koffice-libs-1.5.0" - CVE-2006-6120 + CVE-2006-6120 - + DerCorny - + frilled - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-06.xml index 3102c1f9e9..2e3c641700 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-06.xml @@ -1,14 +1,13 @@ - Mozilla Thunderbird: Multiple vulnerabilities Multiple vulnerabilities have been identified in Mozilla Thunderbird. mozilla-thunderbird - December 10, 2006 - December 10, 2006: 01 + 2006-12-10 + 2006-12-10: 01 154448 remote @@ -65,36 +64,36 @@ display certain messages in some cases.

-

-

All Mozilla Thunderbird users should upgrade to the +
+
All Mozilla Thunderbird users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.8" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.8"

All Mozilla Thunderbird binary release users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.8" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.8" - CVE-2006-5462 - CVE-2006-5463 - CVE-2006-5464 - CVE-2006-5747 - CVE-2006-5748 + CVE-2006-5462 + CVE-2006-5463 + CVE-2006-5464 + CVE-2006-5747 + CVE-2006-5748 Mozilla Thunderbird Email Loss Bug - + jaervosz - + jaervosz - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-07.xml index 0440aba05d..b0fcc3d08e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-07.xml @@ -1,14 +1,13 @@ - Mozilla Firefox: Multiple vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox. mozilla-firefox - December 10, 2006 - December 10, 2006: 01 + 2006-12-10 + 2006-12-10: 01 154434 remote @@ -59,29 +58,29 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.8" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.8"

All Mozilla Firefox binary release users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.8" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.8" - CVE-2006-5462 - CVE-2006-5463 - CVE-2006-5464 - CVE-2006-5747 - CVE-2006-5748 + CVE-2006-5462 + CVE-2006-5463 + CVE-2006-5464 + CVE-2006-5747 + CVE-2006-5748 - + jaervosz - + jaervosz - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-08.xml index bd859b4648..42798f5143 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-08.xml @@ -1,14 +1,13 @@ - SeaMonkey: Multiple vulnerabilities Multiple vulnerabilities have been identified in the SeaMonkey project. seamonkey - December 10, 2006 - December 10, 2006: 01 + 2006-12-10 + 2006-12-10: 01 154449 remote @@ -50,22 +49,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.0.6" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.0.6" - CVE-2006-5462 - CVE-2006-5463 - CVE-2006-5464 - CVE-2006-5747 - CVE-2006-5748 + CVE-2006-5462 + CVE-2006-5463 + CVE-2006-5464 + CVE-2006-5747 + CVE-2006-5748 - + jaervosz - + shellsage - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-09.xml index 5991953c33..58a7b96671 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-09.xml @@ -1,6 +1,5 @@ - MadWifi: Kernel driver buffer overflow @@ -8,8 +7,8 @@ the remote execution of arbitrary code with root privileges. madwifi-ng - December 10, 2006 - December 10, 2006: 01 + 2006-12-10 + 2006-12-10: 01 157449 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.2.1" + # emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.2.1" - CVE-2006-6332 + CVE-2006-6332 - + jaervosz - + falco - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-10.xml index dc3ea0b0f5..990be3b2c6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-10.xml @@ -1,6 +1,5 @@ - Tar: Directory traversal vulnerability @@ -8,8 +7,8 @@ overwriting of arbitrary files. tar - December 11, 2006 - December 11, 2006: 01 + 2006-12-11 + 2006-12-11: 01 155901 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/tar-1.16-r2" + # emerge --ask --oneshot --verbose ">=app-arch/tar-1.16-r2" - CVE-2006-6097 + CVE-2006-6097 - + vorlon - + vorlon - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-11.xml index b0d80e7f3e..dd92fcdf66 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-11.xml @@ -1,6 +1,5 @@ - AMD64 x86 emulation base libraries: OpenSSL multiple vulnerabilities @@ -8,8 +7,8 @@ of remote arbitrary code. emul-linux-x86-baselibs - December 11, 2006 - December 11, 2006: 01 + 2006-12-11 + 2006-12-11: 01 152640 remote @@ -59,18 +58,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-baselibs-2.5.5" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-baselibs-2.5.5" - CVE-2006-2937 - CVE-2006-2940 - CVE-2006-3738 - CVE-2006-4343 + CVE-2006-2937 + CVE-2006-2940 + CVE-2006-3738 + CVE-2006-4343 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-12.xml index 0a8548979c..c63e5eba76 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-12.xml @@ -1,6 +1,5 @@ - F-PROT Antivirus: Multiple vulnerabilities @@ -8,8 +7,8 @@ vulnerabilities, possibly allowing the remote execution of arbitrary code. f-prot - December 12, 2006 - December 12, 2006: 01 + 2006-12-12 + 2006-12-12: 01 157612 remote @@ -49,20 +48,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/f-prot-4.6.7" + # emerge --ask --oneshot --verbose ">=app-antivirus/f-prot-4.6.7" - CVE-2006-6293 - CVE-2006-6294 - CVE-2006-6352 + CVE-2006-6293 + CVE-2006-6294 + CVE-2006-6352 - + jaervosz - + jaervosz - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-13.xml index 968a6e1c38..16b8e8e63a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-13.xml @@ -1,6 +1,5 @@ - libgsf: Buffer overflow @@ -8,8 +7,8 @@ possibly the execution of arbitrary code. libgsf - December 12, 2006 - December 12, 2006: 01 + 2006-12-12 + 2006-12-12: 01 156693 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=gnome-extra/libgsf-1.14.2" + # emerge --ask --oneshot --verbose ">=gnome-extra/libgsf-1.14.2" - CVE-2006-4514 + CVE-2006-4514 - + jaervosz - + vorlon - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-14.xml index 5fa3ea238f..ef449fe4c3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-14.xml @@ -1,6 +1,5 @@ - Trac: Cross-site request forgery @@ -8,8 +7,8 @@ users. trac - December 12, 2006 - December 12, 2006: 01 + 2006-12-12 + 2006-12-12: 01 154574 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/trac-0.10.1" + # emerge --ask --oneshot --verbose ">=www-apps/trac-0.10.1" - CVE-2006-5848 - CVE-2006-5878 + CVE-2006-5848 + CVE-2006-5878 - + jaervosz - + vorlon - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-15.xml index be70a54e36..0c81a77ef2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-15.xml @@ -1,6 +1,5 @@ - McAfee VirusScan: Insecure DT_RPATH @@ -8,8 +7,8 @@ potentially allowing a remote attacker to execute arbitrary code. vlnx - December 14, 2006 - December 14, 2006: 01 + 2006-12-14 + 2006-12-14: 01 156989 remote @@ -54,15 +53,15 @@ of this issue.

- # emerge --ask --verbose --unmerge "app-antivirus/vlnx" + # emerge --ask --verbose --unmerge "app-antivirus/vlnx" - CVE-2006-6474 + CVE-2006-6474 - + taviso - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-16.xml index 3942b68a44..d025708b6f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-16.xml @@ -1,6 +1,5 @@ - Links: Arbitrary Samba command execution @@ -8,8 +7,8 @@ execution of arbitrary Samba commands. links - December 14, 2006 - December 14, 2006: 01 + 2006-12-14 + 2006-12-14: 01 157028 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/links-2.1_pre26" + # emerge --ask --oneshot --verbose ">=www-client/links-2.1_pre26" - CVE-2006-5925 + CVE-2006-5925 - + vorlon - + falco - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-17.xml index 324f147eb4..c3ed1104eb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-17.xml @@ -1,6 +1,5 @@ - GNU Radius: Format string vulnerability @@ -8,8 +7,8 @@ to the remote execution of arbitrary code. gnuradius - December 14, 2006 - December 14, 2006: 01 + 2006-12-14 + 2006-12-14: 01 156376 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dialup/gnuradius-1.4" + # emerge --ask --oneshot --verbose ">=net-dialup/gnuradius-1.4" - CVE-2006-4181 + CVE-2006-4181 - + jaervosz - + jaervosz - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-18.xml index 25c7c37853..1d59280d55 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-18.xml @@ -1,14 +1,13 @@ - ClamAV: Denial of Service ClamAV is vulnerable to Denial of Service. clamav - December 18, 2006 - December 18, 2006: 01 + 2006-12-18 + 2006-12-18: 01 157698 remote @@ -45,15 +44,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.7" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.88.7" - CVE-2006-6481 + CVE-2006-6481 - + jaervosz - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-19.xml index 7410ac1f40..523319126b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-19.xml @@ -1,6 +1,5 @@ - pam_ldap: Authentication bypass vulnerability @@ -8,8 +7,8 @@ locked account to gain unauthorized system access. pam_ldap - December 20, 2006 - December 20, 2006: 01 + 2006-12-20 + 2006-12-20: 01 153916 remote @@ -50,15 +49,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-183" + # emerge --ask --oneshot --verbose ">=sys-auth/pam_ldap-183" - CVE-2006-5170 + CVE-2006-5170 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-20.xml index 2e50b6890b..ca43fdf9e8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-20.xml @@ -1,6 +1,5 @@ - imlib2: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code or a Denial of Service. imlib2 - December 20, 2006 - December 20, 2006: 01 + 2006-12-20 + 2006-12-20: 01 154216 remote @@ -52,21 +51,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/imlib2-1.3.0" + # emerge --ask --oneshot --verbose ">=media-libs/imlib2-1.3.0" - CVE-2006-4806 - CVE-2006-4807 - CVE-2006-4808 - CVE-2006-4809 + CVE-2006-4806 + CVE-2006-4807 + CVE-2006-4808 + CVE-2006-4809 - + jaervosz - + vorlon - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-21.xml index 04fc6dafac..56d596a05c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200612-21.xml @@ -1,14 +1,13 @@ - Ruby: Denial of Service vulnerability The Ruby cgi.rb CGI library is vulnerable to a Denial of Service attack. ruby - December 20, 2006 - December 20, 2006: 01 + 2006-12-20 + 2006-12-20: 01 157048 remote @@ -49,15 +48,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.5_p2" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.5_p2" - CVE-2006-6303 + CVE-2006-6303 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-01.xml index 53a8444fae..f521f99fbe 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-01.xml @@ -1,6 +1,5 @@ - DenyHosts: Denial of Service @@ -8,8 +7,8 @@ remote Denial of Service. denyhosts - January 03, 2007 - January 03, 2007: 01 + 2007-01-03 + 2007-01-03: 01 157163 remote @@ -50,15 +49,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/denyhosts-2.6" + # emerge --ask --oneshot --verbose ">=app-admin/denyhosts-2.6" - CVE-2006-6301 + CVE-2006-6301 - + taviso - + taviso
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-02.xml index 7787acb7a3..e77eb83cea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-02.xml @@ -1,6 +1,5 @@ - Mozilla Firefox: Multiple vulnerabilities @@ -8,8 +7,8 @@ which may allow the remote execution of arbitrary code. mozilla-firefox - January 04, 2007 - January 04, 2007: 01 + 2007-01-04 + 2007-01-04: 01 156023 remote @@ -58,31 +57,31 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.9" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.9"

All Mozilla Firefox binary release users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.9" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.9" - CVE-2006-6497 - CVE-2006-6498 - CVE-2006-6499 - CVE-2006-6500 - CVE-2006-6501 - CVE-2006-6502 - CVE-2006-6503 - CVE-2006-6504 - CVE-2006-6506 - CVE-2006-6507 + CVE-2006-6497 + CVE-2006-6498 + CVE-2006-6499 + CVE-2006-6500 + CVE-2006-6501 + CVE-2006-6502 + CVE-2006-6503 + CVE-2006-6504 + CVE-2006-6506 + CVE-2006-6507 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-03.xml index 24c6bbdd89..eccfceaf51 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-03.xml @@ -1,6 +1,5 @@ - Mozilla Thunderbird: Multiple vulnerabilities @@ -8,8 +7,8 @@ which may allow the remote execution of arbitrary code. mozilla-thunderbird - January 04, 2007 - January 04, 2007: 01 + 2007-01-04 + 2007-01-04: 01 158571 remote @@ -60,27 +59,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.9" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.9"

All Mozilla Thunderbird binary release users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.9" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.9" - CVE-2006-6497 - CVE-2006-6500 - CVE-2006-6501 - CVE-2006-6502 - CVE-2006-6503 - CVE-2006-6505 + CVE-2006-6497 + CVE-2006-6500 + CVE-2006-6501 + CVE-2006-6502 + CVE-2006-6503 + CVE-2006-6505 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-04.xml index e19cfacb34..53c7a2a280 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-04.xml @@ -1,6 +1,5 @@ - SeaMonkey: Multiple vulnerabilities @@ -8,8 +7,8 @@ of which may allow the remote execution of arbitrary code. seamonkey - January 10, 2007 - January 10, 2007: 01 + 2007-01-10 + 2007-01-10: 01 158576 remote @@ -60,23 +59,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.0.7" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.0.7" - CVE-2006-6497 - CVE-2006-6498 - CVE-2006-6499 - CVE-2006-6500 - CVE-2006-6501 - CVE-2006-6502 - CVE-2006-6503 - CVE-2006-6504 - CVE-2006-6505 + CVE-2006-6497 + CVE-2006-6498 + CVE-2006-6499 + CVE-2006-6500 + CVE-2006-6501 + CVE-2006-6502 + CVE-2006-6503 + CVE-2006-6504 + CVE-2006-6505 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-05.xml index a80aabc9dc..ee0047058b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-05.xml @@ -1,6 +1,5 @@ - KDE kfile JPEG info plugin: Denial of Service @@ -8,8 +7,8 @@ leading to a Denial of Service. kdegraphics-kfile-plugins - January 12, 2007 - January 12, 2007: 01 + 2007-01-12 + 2007-01-12: 01 155949 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-kfile-plugins-3.5.5-r1" + # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-kfile-plugins-3.5.5-r1" - CVE-2006-6297 + CVE-2006-6297 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-06.xml index bc4e8bd85d..a9c6b335bc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-06.xml @@ -1,14 +1,13 @@ - w3m: Format string vulnerability w3m does not correctly handle format string specifiers in SSL certificates. w3m - January 12, 2007 - January 12, 2007: 01 + 2007-01-12 + 2007-01-12: 01 159145 remote @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/w3m-0.5.1-r4" + # emerge --ask --oneshot --verbose ">=www-client/w3m-0.5.1-r4" - CVE-2006-6772 + CVE-2006-6772 - + aetius - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-07.xml index 595afc7bea..b4ac7a1f2f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-07.xml @@ -1,6 +1,5 @@ - OpenOffice.org: EMF/WMF file handling vulnerabilities @@ -8,8 +7,8 @@ OpenOffice.org could be exploited to execute arbitrary code. openoffice - January 12, 2007 - January 12, 2007: 01 + 2007-01-12 + 2007-01-12: 01 159951 remote @@ -56,24 +55,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.1.0" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.1.0"

All OpenOffice.org users should update to version 2.0.4 or later:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.4" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.0.4" - CVE-2006-5870 + CVE-2006-5870 - + DerCorny - + DerCorny - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-08.xml index d2d7fa3512..ea77310b75 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-08.xml @@ -1,14 +1,13 @@ - Opera: Two remote code execution vulnerabilities Two vulnerabilities may allow the execution of arbitrary code. opera - January 12, 2007 - January 12, 2007: 01 + 2007-01-12 + 2007-01-12: 01 160369 remote @@ -51,21 +50,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-9.10" + # emerge --ask --oneshot --verbose ">=www-client/opera-9.10" - Opera Advisory (createSVGTransformFromMatrix) - Opera Advisory (JPEG) - CVE-2007-0126 - CVE-2007-0127 + Opera Advisory (createSVGTransformFromMatrix) + Opera Advisory (JPEG) + CVE-2007-0126 + CVE-2007-0127 - + DerCorny - + DerCorny - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-09.xml index c3b12c6960..8d8b0cb07f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-09.xml @@ -1,14 +1,13 @@ - oftpd: Denial of Service An assertion in oftpd could lead to a denial of service vulnerability. oftpd - January 15, 2007 - January 15, 2007: 01 + 2007-01-15 + 2007-01-15: 01 159178 remote @@ -45,15 +44,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/oftpd-0.3.7-r3" + # emerge --ask --oneshot --verbose ">=net-ftp/oftpd-0.3.7-r3" - CVE-2006-6767 + CVE-2006-6767 - + taviso - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-10.xml index e9bec5ebcc..354f12b29f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-10.xml @@ -1,6 +1,5 @@ - WordPress: Multiple vulnerabilities @@ -8,8 +7,8 @@ cross-site scripting attacks. wordpress - January 15, 2007 - January 15, 2007: 01 + 2007-01-15 + 2007-01-15: 01 159229 remote @@ -57,20 +56,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.6" + # emerge --ask --oneshot --verbose ">=www-apps/wordpress-2.0.6" - CVE-2006-6808 - CVE-2007-0107 - CVE-2007-0109 + CVE-2006-6808 + CVE-2007-0107 + CVE-2007-0109 - + vorlon - + shellsage - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-11.xml index 7ac66a40e6..f28a03cd3d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-11.xml @@ -1,6 +1,5 @@ - Kronolith: Local file inclusion @@ -8,8 +7,8 @@ files. horde-kronolith - January 16, 2007 - January 16, 2007: 01 + 2007-01-16 + 2007-01-16: 01 156627 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-kronolith-2.1.4" + # emerge --ask --oneshot --verbose ">=www-apps/horde-kronolith-2.1.4" - CVE-2006-6175 + CVE-2006-6175 - + falco - + falco - + aetius
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-12.xml index 2d884fa7d1..fdc6502dad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-12.xml @@ -1,6 +1,5 @@ - Mono: Information disclosure @@ -8,8 +7,8 @@ disclosure. mono - January 16, 2007 - January 17, 2007: 02 + 2007-01-16 + 2007-01-17: 02 159886 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/mono-1.2.2.1" + # emerge --ask --oneshot --verbose ">=dev-lang/mono-1.2.2.1" - CVE-2006-6104 + CVE-2006-6104 - + jaervosz - + falco - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-13.xml index cefa876c4b..c32954ef75 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-13.xml @@ -1,6 +1,5 @@ - Fetchmail: Denial of Service and password disclosure @@ -8,8 +7,8 @@ Denial of Service and password disclosure. fetchmail - January 22, 2007 - January 22, 2007: 01 + 2007-01-22 + 2007-01-22: 01 160463 remote @@ -53,19 +52,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.3.6" + # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.3.6" - CVE-2006-5867 - CVE-2006-5974 + CVE-2006-5867 + CVE-2006-5974 - + falco - + falco - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-14.xml index b16067e17f..017dd140b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-14.xml @@ -1,6 +1,5 @@ - Mod_auth_kerb: Denial of Service @@ -8,8 +7,8 @@ of Service. mod_auth_kerb - January 22, 2007 - December 30, 2007: 02 + 2007-01-22 + 2007-12-30: 02 155782 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apache/mod_auth_kerb-5.0_rc7-r1" + # emerge --ask --oneshot --verbose ">=www-apache/mod_auth_kerb-5.0_rc7-r1" - CVE-2006-5989 + CVE-2006-5989 - + falco - + falco - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-15.xml index 79cda4f9f1..44f33ea7b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-15.xml @@ -1,6 +1,5 @@ - Sun JDK/JRE: Multiple vulnerabilities @@ -8,8 +7,8 @@ Development Kit (JDK) and Java Runtime Environment (JRE). java - January 22, 2007 - July 16, 2008: 04 + 2007-01-22 + 2008-07-16: 04 158659 remote @@ -70,28 +69,28 @@

# emerge --sync - # emerge --ask --oneshot --verbose "dev-java/sun-jdk" + # emerge --ask --oneshot --verbose "dev-java/sun-jdk"

All Sun Java Runtime Environment users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose "dev-java/sun-jre-bin" + # emerge --ask --oneshot --verbose "dev-java/sun-jre-bin" - CVE-2006-6731 - CVE-2006-6736 - CVE-2006-6737 - CVE-2006-6745 + CVE-2006-6731 + CVE-2006-6736 + CVE-2006-6737 + CVE-2006-6745 - + falco - + falco - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-16.xml index 176c062035..7fff3d344c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-16.xml @@ -1,6 +1,5 @@ - Adobe Acrobat Reader: Multiple vulnerabilities @@ -8,8 +7,8 @@ Service, and cross-site scripting attacks. acroread - January 22, 2007 - January 22, 2007: 01 + 2007-01-22 + 2007-01-22: 01 159874 remote @@ -63,22 +62,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-7.0.9" + # emerge --ask --oneshot --verbose ">=app-text/acroread-7.0.9" - CVE-2006-5857 - CVE-2007-0044 - CVE-2007-0045 - CVE-2007-0046 - CVE-2007-0048 + CVE-2006-5857 + CVE-2007-0044 + CVE-2007-0045 + CVE-2007-0046 + CVE-2007-0048 - + falco - + shellsage - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-17.xml index fde634f0ec..c7ae6740d0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-17.xml @@ -1,6 +1,5 @@ - libgtop: Privilege escalation @@ -8,8 +7,8 @@ of arbitrary code. libgtop - January 23, 2007 - January 23, 2007: 01 + 2007-01-23 + 2007-01-23: 01 162169 local @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=gnome-base/libgtop-2.14.6" + # emerge --ask --oneshot --verbose ">=gnome-base/libgtop-2.14.6" - CVE-2007-0235 + CVE-2007-0235 - + falco - + shellsage - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-18.xml index 6ae5af2aab..e0e50f2136 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-18.xml @@ -1,6 +1,5 @@ - xine-ui: Format string vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code. xine-ui - January 23, 2007 - January 23, 2007: 01 + 2007-01-23 + 2007-01-23: 01 161558 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/xine-ui-0.99.5_pre20060716" + # emerge --ask --oneshot --verbose ">=media-video/xine-ui-0.99.5_pre20060716" - CVE-2007-0254 + CVE-2007-0254 - + falco - + falco - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-19.xml index 2bb074f43f..ad4c79db6a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-19.xml @@ -1,6 +1,5 @@ - OpenLDAP: Insecure usage of /tmp during installation @@ -8,8 +7,8 @@ files in /tmp during the emerge process. openldap - January 23, 2007 - March 11, 2007: 02 + 2007-01-23 + 2007-03-11: 02 159508 local @@ -54,18 +53,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose "net-nds/openldap" + # emerge --ask --oneshot --verbose "net-nds/openldap" - CVE-2007-0476 + CVE-2007-0476 - + falco - + falco - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-20.xml index a5200daa5b..913cffa440 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-20.xml @@ -1,6 +1,5 @@ - Centericq: Remote buffer overflow in LiveJournal handling @@ -8,8 +7,8 @@ service, allowing for the remote execution of arbitrary code. centericq - January 24, 2007 - January 24, 2007: 01 + 2007-01-24 + 2007-01-24: 01 160793 remote @@ -49,18 +48,18 @@ masked in Portage until it is again maintained.

- # emerge --ask --verbose --unmerge "net-im/centericq" + # emerge --ask --verbose --unmerge "net-im/centericq" - CVE-2007-0160 + CVE-2007-0160 - + falco - + falco - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-21.xml index 90290f4f50..43352a711f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-21.xml @@ -1,6 +1,5 @@ - MIT Kerberos 5: Arbitrary Remote Code Execution @@ -8,8 +7,8 @@ execution of arbitrary code. mit-krb5 - January 24, 2007 - January 24, 2007: 01 + 2007-01-24 + 2007-01-24: 01 158810 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.2" + # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.2" - CVE-2006-6143 - CVE-2006-6144 + CVE-2006-6143 + CVE-2006-6144 - + falco - + taviso - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-22.xml index e4a019edfc..3c51d55791 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-22.xml @@ -1,6 +1,5 @@ - Squid: Multiple Denial of Service vulnerabilities @@ -8,8 +7,8 @@ Denial of Service attacks. squid - January 25, 2007 - January 25, 2007: 01 + 2007-01-25 + 2007-01-25: 01 162364 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.6.7" + # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.6.7" - CVE-2007-0247 - CVE-2007-0248 + CVE-2007-0247 + CVE-2007-0248 - + vorlon - + hyakuhei - + hyakuhei
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-23.xml index d072621040..6f9f4c8b4b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-23.xml @@ -1,6 +1,5 @@ - Cacti: Command execution and SQL injection @@ -8,8 +7,8 @@ SQL injection. cacti - January 26, 2007 - January 26, 2007: 01 + 2007-01-26 + 2007-01-26: 01 159278 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-0.8.6i-r1" + # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-0.8.6i-r1" - CVE-2006-6799 + CVE-2006-6799 - + falco - + aetius - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-24.xml index 40e1290149..7c38a55c50 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-24.xml @@ -1,6 +1,5 @@ - VLC media player: Format string vulnerability @@ -8,8 +7,8 @@ execution of arbitrary code. vlc - January 26, 2007 - January 26, 2007: 01 + 2007-01-26 + 2007-01-26: 01 159845 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6-r1" + # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6-r1" - CVE-2007-0017 + CVE-2007-0017 - + falco - + falco - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-25.xml index ea11b69f36..0071767077 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-25.xml @@ -1,6 +1,5 @@ - X.Org X server: Multiple vulnerabilities @@ -8,8 +7,8 @@ DBE and Render extensions. X.Org - January 27, 2007 - February 26, 2007: 02 + 2007-01-27 + 2007-02-26: 02 157421 local @@ -53,17 +52,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.1.1-r4" + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.1.1-r4" - CVE-2006-6101 - CVE-2006-6102 - CVE-2006-6103 + CVE-2006-6101 + CVE-2006-6102 + CVE-2006-6103 - + daxomatic - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-26.xml index 9065e78d01..5478439620 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-26.xml @@ -1,14 +1,13 @@ - KSirc: Denial of Service vulnerability KSirc is vulnerable to a Denial of Service attack. ksirc - January 29, 2007 - January 30, 2007: 01 + 2007-01-29 + 2007-01-30: 01 159658 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/ksirc-3.5.5-r1" + # emerge --ask --oneshot --verbose ">=kde-base/ksirc-3.5.5-r1" - CVE-2006-6811 + CVE-2006-6811 - + vorlon - + vorlon - + hyakuhei
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-27.xml index 952ae298c5..e4ecbad1a8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-27.xml @@ -1,6 +1,5 @@ - ELinks: Arbitrary Samba command execution @@ -8,8 +7,8 @@ the execution of arbitrary Samba commands. elinks - January 30, 2007 - January 30, 2007: 01 + 2007-01-30 + 2007-01-30: 01 155358 remote @@ -51,15 +50,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/elinks-0.11.2" + # emerge --ask --oneshot --verbose ">=www-client/elinks-0.11.2" - CVE-2006-5925 + CVE-2006-5925 - + hyakuhei - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-28.xml index 76ed830ee1..e984df569b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200701-28.xml @@ -1,6 +1,5 @@ - thttpd: Unauthenticated remote file access @@ -9,8 +8,8 @@ baselayout. thttpd - January 31, 2007 - March 11, 2007: 02 + 2007-01-31 + 2007-03-11: 02 142047 remote @@ -56,18 +55,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/thttpd-2.25b-r5" + # emerge --ask --oneshot --verbose ">=www-servers/thttpd-2.25b-r5" - CVE-2007-0664 + CVE-2007-0664 - + shellsage - + aetius - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-01.xml index 10c116ac1a..c187c534f5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-01.xml @@ -1,6 +1,5 @@ - Samba: Multiple vulnerabilities @@ -8,8 +7,8 @@ which could result in the execution of arbitrary code. samba - February 13, 2007 - February 13, 2007: 01 + 2007-02-13 + 2007-02-13: 01 165549 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.24" + # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.24" - CVE-2007-0452 - CVE-2007-0454 + CVE-2007-0452 + CVE-2007-0454 - + falco - + falco - + taviso
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-02.xml index 7761eb2df4..0912b906dc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-02.xml @@ -1,14 +1,13 @@ - ProFTPD: Local privilege escalation A flaw in ProFTPD may allow a local attacker to obtain root privileges. proftpd - February 13, 2007 - February 13, 2007: 01 + 2007-02-13 + 2007-02-13: 01 158122 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.1_rc1" + # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.1_rc1" - CVE-2006-6563 + CVE-2006-6563 - + falco - + falco - + taviso
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-03.xml index 40d0c6b0bc..d6f91c8e5f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-03.xml @@ -1,6 +1,5 @@ - Snort: Denial of Service @@ -8,8 +7,8 @@ result in a Denial of Service. snort - February 13, 2007 - February 13, 2007: 01 + 2007-02-13 + 2007-02-13: 01 161632 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/snort-2.6.1.2" + # emerge --ask --oneshot --verbose ">=net-analyzer/snort-2.6.1.2" - CVE-2006-6931 + CVE-2006-6931 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-04.xml index c72da64f0f..cab68045b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-04.xml @@ -1,6 +1,5 @@ - RAR, UnRAR: Buffer overflow @@ -8,8 +7,8 @@ code. rar, unrar - February 13, 2007 - February 14, 2007: 02 + 2007-02-13 + 2007-02-14: 02 166440 remote @@ -53,24 +52,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/unrar-3.7.3" + # emerge --ask --oneshot --verbose ">=app-arch/unrar-3.7.3"

All RAR users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/rar-3.7.0_beta1" + # emerge --ask --oneshot --verbose ">=app-arch/rar-3.7.0_beta1" - CVE-2007-0855 + CVE-2007-0855 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-05.xml index e290a86cfa..a9602cfbc0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-05.xml @@ -1,6 +1,5 @@ - Fail2ban: Denial of Service @@ -8,8 +7,8 @@ hosts. fail2ban - February 16, 2007 - February 16, 2007: 01 + 2007-02-16 + 2007-02-16: 01 157166 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/fail2ban-0.6.2" + # emerge --ask --oneshot --verbose ">=net-analyzer/fail2ban-0.6.2" - CVE-2006-6302 + CVE-2006-6302 - + falco - + falco - + taviso
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-06.xml index e553c88538..bd540b8978 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-06.xml @@ -1,6 +1,5 @@ - BIND: Denial of Service @@ -8,8 +7,8 @@ certain conditions. bind - February 17, 2007 - February 17, 2007: 01 + 2007-02-17 + 2007-02-17: 01 163692 remote @@ -54,25 +53,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/bind-9.3.4" + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.3.4"

All ISC BIND 9.2 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/bind-9.2.8" + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.2.8" - CVE-2007-0493 - CVE-2007-0494 + CVE-2007-0493 + CVE-2007-0494 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-07.xml index 650f83bfdd..2833264636 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-07.xml @@ -1,6 +1,5 @@ - Sun JDK/JRE: Execution of arbitrary code @@ -9,8 +8,8 @@ potentially leading to the execute of arbitrary code. java - February 17, 2007 - July 16, 2008: 05 + 2007-02-17 + 2008-07-16: 05 162511 remote @@ -68,39 +67,39 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.10" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.10"

All Sun Java Development Kit 1.4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose "=dev-java/sun-jdk-1.4.2*" + # emerge --ask --oneshot --verbose "=dev-java/sun-jdk-1.4.2*"

All Sun Java Runtime Environment 1.5 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.10" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.10"

All Sun Java Runtime Environment 1.4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose "=dev-java/sun-jre-bin-1.4.2*" + # emerge --ask --oneshot --verbose "=dev-java/sun-jre-bin-1.4.2*" - CVE-2007-0243 + CVE-2007-0243 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-08.xml index ae70db05a1..02320aca96 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-08.xml @@ -1,6 +1,5 @@ - AMD64 x86 emulation Sun's J2SE Development Kit: Multiple vulnerabilities @@ -8,8 +7,8 @@ Development Kit (JDK) and Sun Java Runtime Environment (JRE). java - February 17, 2007 - May 28, 2009: 02 + 2007-02-17 + 2009-05-28: 02 159547 remote @@ -60,22 +59,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.5.0.10" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.5.0.10" - CVE-2006-6731 - CVE-2006-6736 - CVE-2006-6737 - CVE-2006-6745 - CVE-2007-0243 + CVE-2006-6731 + CVE-2006-6736 + CVE-2006-6737 + CVE-2006-6745 + CVE-2007-0243 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-09.xml index 85d8ceae8a..dbf7e9207d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-09.xml @@ -1,6 +1,5 @@ - Nexuiz: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code and a Denial of Service. nexuiz - February 25, 2007 - February 25, 2007: 01 + 2007-02-25 + 2007-02-25: 01 166044 remote @@ -52,19 +51,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-fps/nexuiz-2.2.1" + # emerge --ask --oneshot --verbose ">=games-fps/nexuiz-2.2.1" - CVE-2006-6609 - CVE-2006-6610 + CVE-2006-6609 + CVE-2006-6610 - + falco - + falco - + hyakuhei
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-10.xml index 24088f4fa7..bd3707a0a3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-10.xml @@ -1,6 +1,5 @@ - UFO2000: Multiple vulnerabilities @@ -8,8 +7,8 @@ UFO2000 that could result in the remote execution of arbitrary code. ufo2000 - February 25, 2007 - February 25, 2007: 01 + 2007-02-25 + 2007-02-25: 01 142392 remote @@ -58,20 +57,20 @@ # emerge --ask --verbose --unmerge ufo2000 - CVE-2006-3788 - CVE-2006-3789 - CVE-2006-3790 - CVE-2006-3791 - CVE-2006-3792 - GLSA 200608-14 + CVE-2006-3788 + CVE-2006-3789 + CVE-2006-3790 + CVE-2006-3791 + CVE-2006-3792 + GLSA 200608-14 - + falco - + aetius - + falco diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-11.xml index 8a507823e0..48be9669ed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-11.xml @@ -1,6 +1,5 @@ - MPlayer: Buffer overflow @@ -8,8 +7,8 @@ Denial of Service or arbitrary code execution. MPlayer - February 27, 2007 - February 27, 2007: 01 + 2007-02-27 + 2007-02-27: 01 159727 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_rc1-r2" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_rc1-r2" Original Advisory - CVE-2006-6172 + CVE-2006-6172 - + falco - + daxomatic - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-12.xml index eb0cf915c8..577026d4d8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200702-12.xml @@ -1,6 +1,5 @@ - CHMlib: User-assisted remote execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. CHMlib - February 27, 2007 - May 20, 2008: 02 + 2007-02-27 + 2008-05-20: 02 163989 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/chmlib-0.39" + # emerge --ask --oneshot --verbose ">=dev-libs/chmlib-0.39" Original Advisory - CVE-2007-0619 + CVE-2007-0619 - + falco - + falco - + daxomatic
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-01.xml index 259fa6a3b2..716db10048 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-01.xml @@ -1,6 +1,5 @@ - Snort: Remote execution of arbitrary code @@ -8,8 +7,8 @@ in the remote execution of arbitrary code. snort - February 23, 2007 - March 02, 2007: 02 + 2007-02-23 + 2007-03-02: 02 167730 remote @@ -50,15 +49,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/snort-2.6.1.3" + # emerge --ask --oneshot --verbose ">=net-analyzer/snort-2.6.1.3" - CVE-2006-5276 + CVE-2006-5276 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-02.xml index e16ab46c00..4cc3b9da30 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-02.xml @@ -1,14 +1,13 @@ - SpamAssassin: Long URI Denial of Service SpamAssassin is vulnerable to a Denial of Service attack. spamassassin - March 02, 2007 - March 02, 2007: 01 + 2007-03-02 + 2007-03-02: 01 166969 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-filter/spamassassin-3.1.8" + # emerge --ask --oneshot --verbose ">=mail-filter/spamassassin-3.1.8" - CVE-2007-0451 + CVE-2007-0451 - + vorlon - + vorlon - + DerCorny
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-03.xml index 6a0931c2c3..f28cd464af 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-03.xml @@ -1,14 +1,13 @@ - ClamAV: Denial of Service ClamAV contains two vulnerabilities allowing a Denial of Service. clamav - March 02, 2007 - March 02, 2007: 01 + 2007-03-02 + 2007-03-02: 01 167201 remote @@ -52,19 +51,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.90" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.90" - CVE-2007-0897 - CVE-2007-0898 + CVE-2007-0897 + CVE-2007-0898 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-04.xml index 5648cd1994..886397187f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-04.xml @@ -1,6 +1,5 @@ - Mozilla Firefox: Multiple vulnerabilities @@ -8,8 +7,8 @@ which may allow user-assisted arbitrary remote code execution. mozilla-firefox - March 02, 2007 - March 02, 2007: 01 + 2007-03-02 + 2007-03-02: 01 165555 remote @@ -70,49 +69,49 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.10" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-1.5.0.10"

All Mozilla Firefox 1.5 binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.10" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-1.5.0.10"

All Mozilla Firefox 2.0 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.2" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.2"

All Mozilla Firefox 2.0 binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.2" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.2" - CVE-2006-6077 - CVE-2007-0775 - CVE-2007-0776 - CVE-2007-0777 - CVE-2007-0778 - CVE-2007-0779 - CVE-2007-0780 - CVE-2007-0800 - CVE-2007-0801 - CVE-2007-0981 - CVE-2007-0995 + CVE-2006-6077 + CVE-2007-0775 + CVE-2007-0776 + CVE-2007-0777 + CVE-2007-0778 + CVE-2007-0779 + CVE-2007-0780 + CVE-2007-0800 + CVE-2007-0801 + CVE-2007-0981 + CVE-2007-0995 Mozilla password loss bug - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-05.xml index 893ee2a452..4a8f4aa90e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-05.xml @@ -1,6 +1,5 @@ - Mozilla Suite: Multiple vulnerabilities @@ -8,8 +7,8 @@ supported by the Mozilla project. mozilla - March 03, 2007 - March 03, 2007: 01 + 2007-03-03 + 2007-03-03: 01 135257 remote @@ -58,20 +57,20 @@

- # emerge --unmerge "www-client/mozilla" + # emerge --unmerge "www-client/mozilla" - # emerge --unmerge "www-client/mozilla-bin" + # emerge --unmerge "www-client/mozilla-bin" - Official Advisory + Official Advisory - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-06.xml index acc9602105..f3bc5dd928 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-06.xml @@ -1,6 +1,5 @@ - AMD64 x86 emulation Qt library: Integer overflow @@ -9,8 +8,8 @@ code. emul-linux-x86-qtlibs - March 04, 2007 - March 04, 2007: 01 + 2007-03-04 + 2007-03-04: 01 153704 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-qtlibs-10.0" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-qtlibs-10.0" - GLSA 200611-02 - CVE-2006-4811 + GLSA 200611-02 + CVE-2006-4811 - + falco - + falco - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-07.xml index 8c4865b81f..4be5fbfdaa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-07.xml @@ -1,6 +1,5 @@ - STLport: Possible remote execution of arbitrary code @@ -8,8 +7,8 @@ the remote execution of arbitrary code. STLport - March 06, 2007 - March 06, 2007: 01 + 2007-03-06 + 2007-03-06: 01 165837 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/STLport-5.0.3" + # emerge --ask --oneshot --verbose ">=dev-libs/STLport-5.0.3" - CVE-2007-0803 + CVE-2007-0803 - + falco - + falco - + aetius
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-08.xml index 31246a8f75..2ad5cd13c7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-08.xml @@ -1,6 +1,5 @@ - SeaMonkey: Multiple vulnerabilities @@ -8,8 +7,8 @@ allow user-assisted arbitrary remote code execution. seamonkey - March 09, 2007 - March 09, 2007: 01 + 2007-03-09 + 2007-03-09: 01 165555 remote @@ -73,32 +72,32 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.1" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.1"

All SeaMonkey binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.1" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.1" - CVE-2006-6077 - CVE-2007-0775 - CVE-2007-0776 - CVE-2007-0777 - CVE-2007-0778 - CVE-2007-0779 - CVE-2007-0780 - CVE-2007-0800 - CVE-2007-0801 - CVE-2007-0981 - CVE-2007-0995 + CVE-2006-6077 + CVE-2007-0775 + CVE-2007-0776 + CVE-2007-0777 + CVE-2007-0778 + CVE-2007-0779 + CVE-2007-0780 + CVE-2007-0800 + CVE-2007-0801 + CVE-2007-0981 + CVE-2007-0995 Mozilla Password Loss Bug - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-09.xml index 8fcb7547d0..aa51e1a3be 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-09.xml @@ -1,14 +1,13 @@ - Smb4K: Multiple vulnerabilities Multiple vulnerabilities have been identified in Smb4K. smb4k - March 09, 2007 - March 09, 2007: 01 + 2007-03-09 + 2007-03-09: 01 156152 local @@ -62,21 +61,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/smb4k-0.6.10a" + # emerge --ask --oneshot --verbose ">=net-misc/smb4k-0.6.10a" - CVE-2007-0472 - CVE-2007-0473 - CVE-2007-0474 - CVE-2007-0475 + CVE-2007-0472 + CVE-2007-0473 + CVE-2007-0474 + CVE-2007-0475 - + falco - + falco - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-10.xml index 8dbeedea8a..16cccd0bc3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-10.xml @@ -1,6 +1,5 @@ - KHTML: Cross-site scripting (XSS) vulnerability @@ -8,8 +7,8 @@ scripting (XSS) vulnerability. kdelibs - March 10, 2007 - March 10, 2007: 01 + 2007-03-10 + 2007-03-10: 01 165606 remote @@ -51,16 +50,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdelibs-3.5.5-r8" + # emerge --ask --oneshot --verbose ">=kde-base/kdelibs-3.5.5-r8" - CVE-2007-0537 - CVE-2007-0478 + CVE-2007-0537 + CVE-2007-0478 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-11.xml index 3d44e40c78..546265714a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-11.xml @@ -1,6 +1,5 @@ - Amarok: User-assisted remote execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary shell code from a malicious Magnatune server. amarok - March 13, 2007 - March 13, 2007: 01 + 2007-03-13 + 2007-03-13: 01 166901 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/amarok-1.4.5-r1" + # emerge --ask --oneshot --verbose ">=media-sound/amarok-1.4.5-r1" - SA24159 + SA24159 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-12.xml index 570e7bd02a..74d14bbf38 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-12.xml @@ -1,14 +1,13 @@ - SILC Server: Denial of Service SILC Server is affected by a Denial of Service vulnerability. silc-server - March 14, 2007 - March 14, 2007: 01 + 2007-03-14 + 2007-03-14: 01 169599 remote @@ -47,16 +46,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/silc-server-1.0.2-r1" + # emerge --ask --oneshot --verbose ">=net-im/silc-server-1.0.2-r1" - + DerCorny - + vorlon - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-13.xml index 3258a26307..c384ed34f4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-13.xml @@ -1,6 +1,5 @@ - SSH Communications Security's Secure Shell Server: SFTP privilege escalation @@ -8,8 +7,8 @@ escalation. net-misc/ssh - March 14, 2007 - March 14, 2007: 01 + 2007-03-14 + 2007-03-14: 01 168584 remote @@ -55,15 +54,15 @@ # emerge --ask --verbose --unmerge net-misc/ssh - CVE-2006-0705 + CVE-2006-0705 - + vorlon - + vorlon - + aetius diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-14.xml index 6a97a515a3..2f5003cb54 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-14.xml @@ -1,14 +1,13 @@ - Asterisk: SIP Denial of Service Asterisk is vulnerable to Denial of Service in the SIP channel. asterisk - March 16, 2007 - March 16, 2007: 01 + 2007-03-16 + 2007-03-16: 01 169616 remote @@ -55,13 +54,13 @@

- CVE-2007-1306 + CVE-2007-1306 MU-200703-01 - + jaervosz - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-15.xml index cdd51706ad..10fb39664c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-15.xml @@ -1,6 +1,5 @@ - PostgreSQL: Multiple vulnerabilities @@ -8,8 +7,8 @@ Service or unauthorized access to certain information. postgresql - March 16, 2007 - May 28, 2009: 04 + 2007-03-16 + 2009-05-28: 04 165482 remote @@ -55,19 +54,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose "dev-db/postgresql" + # emerge --ask --oneshot --verbose "dev-db/postgresql" - CVE-2007-0555 - CVE-2007-0556 + CVE-2007-0555 + CVE-2007-0556 - + falco - + vorlon - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-16.xml index 7a49706bf5..90f127121f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-16.xml @@ -1,6 +1,5 @@ - Apache JK Tomcat Connector: Remote execution of arbitrary code @@ -8,8 +7,8 @@ vulnerability that could result in the remote execution of arbitrary code. mod_jk - March 16, 2007 - March 16, 2007: 01 + 2007-03-16 + 2007-03-16: 01 169433 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apache/mod_jk-1.2.21-r1" + # emerge --ask --oneshot --verbose ">=www-apache/mod_jk-1.2.21-r1" - CVE-2007-0774 + CVE-2007-0774 - + DerCorny - + falco - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-17.xml index 0b8725c8c3..ee75cc87d5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-17.xml @@ -1,6 +1,5 @@ - ulogd: Remote execution of arbitrary code @@ -8,8 +7,8 @@ remote execution of arbitrary code. ulogd - March 18, 2007 - March 18, 2007: 01 + 2007-03-18 + 2007-03-18: 01 161882 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/ulogd-1.23-r1" + # emerge --ask --oneshot --verbose ">=app-admin/ulogd-1.23-r1" - CVE-2007-0460 + CVE-2007-0460 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-18.xml index b3019faaae..bbf45760d6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-18.xml @@ -1,6 +1,5 @@ - Mozilla Thunderbird: Multiple vulnerabilities @@ -8,8 +7,8 @@ which may allow user-assisted arbitrary remote code execution. mozilla-thunderbird - March 18, 2007 - March 18, 2007: 01 + 2007-03-18 + 2007-03-18: 01 165555 remote @@ -60,27 +59,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.10" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-1.5.0.10"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.10" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-1.5.0.10" - CVE-2007-0008 - CVE-2007-0009 - CVE-2007-0775 - CVE-2007-0776 - CVE-2007-0777 - CVE-2007-1282 + CVE-2007-0008 + CVE-2007-0009 + CVE-2007-0775 + CVE-2007-0776 + CVE-2007-0777 + CVE-2007-1282 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-19.xml index 9a20d039b9..085b8f738d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-19.xml @@ -1,6 +1,5 @@ - LTSP: Authentication bypass in included LibVNCServer code @@ -8,8 +7,8 @@ authentication bypass. ltsp - March 18, 2007 - March 18, 2007: 01 + 2007-03-18 + 2007-03-18: 01 142661 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/ltsp-4.2-r1" + # emerge --ask --oneshot --verbose ">=net-misc/ltsp-4.2-r1" - CVE-2006-2450 - GLSA 200608-05 + CVE-2006-2450 + GLSA 200608-05 - + falco - + falco - + aetius
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-20.xml index 9687dba3be..c6524b8049 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-20.xml @@ -1,6 +1,5 @@ - LSAT: Insecure temporary file creation @@ -8,8 +7,8 @@ allowing a local user to overwrite arbitrary files. lsat - March 18, 2007 - May 11, 2007: 02 + 2007-03-18 + 2007-05-11: 02 159542 local @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/lsat-0.9.5" + # emerge --ask --oneshot --verbose ">=app-admin/lsat-0.9.5" - CVE-2007-1500 + CVE-2007-1500 - + falco - + falco - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-21.xml index 3c705e5998..1606a448ff 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-21.xml @@ -1,6 +1,5 @@ - PHP: Multiple vulnerabilities @@ -9,8 +8,8 @@ conditions. php - March 20, 2007 - March 29, 2008: 03 + 2007-03-20 + 2008-03-29: 03 153911 remote @@ -60,32 +59,32 @@

# emerge --sync - # emerge --ask --oneshot --verbose "dev-lang/php" + # emerge --ask --oneshot --verbose "dev-lang/php" - CVE-2006-5465 - CVE-2007-0906 - CVE-2007-0907 - CVE-2007-0908 - CVE-2007-0909 - CVE-2007-0910 - CVE-2007-0911 - CVE-2007-0988 - CVE-2007-1286 - CVE-2007-1375 - CVE-2007-1376 - CVE-2007-1380 - CVE-2007-1383 - PHP 4.4.5 Release Announcement - PHP 5.2.1 Release Announcement + CVE-2006-5465 + CVE-2007-0906 + CVE-2007-0907 + CVE-2007-0908 + CVE-2007-0909 + CVE-2007-0910 + CVE-2007-0911 + CVE-2007-0988 + CVE-2007-1286 + CVE-2007-1375 + CVE-2007-1376 + CVE-2007-1380 + CVE-2007-1383 + PHP 4.4.5 Release Announcement + PHP 5.2.1 Release Announcement - + falco - + falco - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-22.xml index c3f02afe4d..4ce282f037 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-22.xml @@ -1,6 +1,5 @@ - Mozilla Network Security Service: Remote execution of arbitrary code @@ -9,8 +8,8 @@ code. nss - March 20, 2007 - March 20, 2007: 01 + 2007-03-20 + 2007-03-20: 01 165555 remote @@ -54,16 +53,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.11.5" + # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.11.5" - CVE-2007-0008 - CVE-2007-0009 + CVE-2007-0008 + CVE-2007-0009 - + falco - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-23.xml index a2c87f487b..652fa154c0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-23.xml @@ -1,6 +1,5 @@ - WordPress: Multiple vulnerabilities @@ -8,8 +7,8 @@ and information leak vulnerabilities. wordpress - March 20, 2007 - March 20, 2007: 01 + 2007-03-20 + 2007-03-20: 01 168529 remote @@ -69,22 +68,22 @@

- # emerge --unmerge "www-apps/wordpress" + # emerge --unmerge "www-apps/wordpress" - CVE-2007-1049 - CVE-2007-1230 - CVE-2007-1244 - CVE-2007-1409 - SA 24430 + CVE-2007-1049 + CVE-2007-1230 + CVE-2007-1244 + CVE-2007-1409 + SA 24430 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-24.xml index 45be71876e..5f7ebd9cca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-24.xml @@ -1,6 +1,5 @@ - mgv: Stack overflow in included gv code @@ -8,8 +7,8 @@ execution of arbitrary code. mgv - March 26, 2007 - March 26, 2007: 01 + 2007-03-26 + 2007-03-26: 01 154645 remote @@ -49,19 +48,19 @@ GSview, and unmerge mgv:

- # emerge --unmerge "app-text/mgv" + # emerge --unmerge "app-text/mgv" - CVE-2006-5864 - GLSA 200611-20 + CVE-2006-5864 + GLSA 200611-20 - + jaervosz - + aetius - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-25.xml index c11ec4f421..c19079e897 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-25.xml @@ -1,6 +1,5 @@ - Ekiga: Format string vulnerability @@ -8,8 +7,8 @@ arbitrary code. ekiga - March 29, 2007 - May 28, 2009: 02 + 2007-03-29 + 2009-05-28: 02 167643 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-voip/ekiga-2.0.7" + # emerge --ask --oneshot --verbose ">=net-voip/ekiga-2.0.7" - CVE-2007-1006 + CVE-2007-1006 - + DerCorny - + DerCorny - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-26.xml index 7802a51d6a..64ef7c6c23 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-26.xml @@ -1,6 +1,5 @@ - file: Integer underflow @@ -8,8 +7,8 @@ user-assisted execution of arbitrary code. file - March 30, 2007 - March 30, 2007: 01 + 2007-03-30 + 2007-03-30: 01 171452 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/file-4.20" + # emerge --ask --oneshot --verbose ">=sys-apps/file-4.20" - CVE-2007-1536 + CVE-2007-1536 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-27.xml index 8094a4d453..29a63ba586 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-27.xml @@ -1,14 +1,13 @@ - Squid: Denial of Service Squid is affected by a Denial of Service vulnerability. squid - March 31, 2007 - March 31, 2007: 01 + 2007-03-31 + 2007-03-31: 01 171681 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.6.12" + # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.6.12" - CVE-2007-1560 + CVE-2007-1560 - + aetius - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-28.xml index 81ad4ccbb7..294e479ce7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200703-28.xml @@ -1,6 +1,5 @@ - CUPS: Denial of Service @@ -8,8 +7,8 @@ a Denial of Service. cups - March 31, 2007 - March 31, 2007: 01 + 2007-03-31 + 2007-03-31: 01 170881 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/cups-1.2.9" + # emerge --ask --oneshot --verbose ">=net-print/cups-1.2.9" - CVE-2007-0720 + CVE-2007-0720 - + jaervosz - + shellsage - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-01.xml index 3ed1c2e995..dc760c76bb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-01.xml @@ -1,14 +1,13 @@ - Asterisk: Two SIP Denial of Service vulnerabilities Asterisk is vulnerable to two Denial of Service issues in the SIP channel. asterisk - April 02, 2007 - April 02, 2007: 01 + 2007-04-02 + 2007-04-02: 01 171467 remote @@ -58,13 +57,13 @@

- CVE-2007-1561 - CVE-2007-1594 + CVE-2007-1561 + CVE-2007-1594 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-02.xml index 7d69bad39d..0b70272bed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-02.xml @@ -1,6 +1,5 @@ - MIT Kerberos 5: Arbitrary remote code execution @@ -8,8 +7,8 @@ unauthenticated remote root code execution. mit-krb5 - April 03, 2007 - April 03, 2007: 01 + 2007-04-03 + 2007-04-03: 01 171889 remote @@ -54,17 +53,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.2-r1" + # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.2-r1" - CVE-2007-0956 - CVE-2007-0957 - CVE-2007-1216 + CVE-2007-0956 + CVE-2007-0957 + CVE-2007-1216 - + jaervosz - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-03.xml index e99a64faee..3e9c544425 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-03.xml @@ -1,6 +1,5 @@ - OpenAFS: Privilege escalation @@ -8,8 +7,8 @@ on the client. openafs - April 03, 2007 - April 03, 2007: 01 + 2007-04-03 + 2007-04-03: 01 171662 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/openafs-1.4.4" + # emerge --ask --oneshot --verbose ">=net-fs/openafs-1.4.4" - CVE-2007-1507 + CVE-2007-1507 - + jaervosz - + aetius - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-04.xml index e11a4743ff..09b4e9750a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-04.xml @@ -1,6 +1,5 @@ - OpenPBS: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code or a Denial of Service. openpbs - April 03, 2007 - April 03, 2007: 01 + 2007-04-03 + 2007-04-03: 01 153495 remote, local @@ -53,15 +52,15 @@ # emerge --ask --verbose sys-cluster/torque - CVE-2006-5616 + CVE-2006-5616 - + falco - + falco - + falco diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-05.xml index b9a5b6398b..669d550866 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-05.xml @@ -1,6 +1,5 @@ - zziplib: Buffer Overflow @@ -8,8 +7,8 @@ lead to user-assisted remote execution of arbitrary code. zziplib - April 03, 2007 - April 03, 2007: 01 + 2007-04-03 + 2007-04-03: 01 171441 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/zziplib-0.13.49" + # emerge --ask --oneshot --verbose ">=dev-libs/zziplib-0.13.49" - CVE-2007-1614 + CVE-2007-1614 - + aetius - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-06.xml index 7cd4c11b51..7bcd0c98f1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-06.xml @@ -1,6 +1,5 @@ - Evince: Stack overflow in included gv code @@ -8,8 +7,8 @@ execution of arbitrary code. evince - April 06, 2007 - April 06, 2007: 01 + 2007-04-06 + 2007-04-06: 01 156573 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/evince-0.6.1-r3" + # emerge --ask --oneshot --verbose ">=app-text/evince-0.6.1-r3" - CVE-2006-5864 - GLSA-200611-20 + CVE-2006-5864 + GLSA-200611-20 - + jaervosz - + aetius - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-07.xml index d56d7cc547..7158351f30 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-07.xml @@ -1,14 +1,13 @@ - libwpd: Multiple vulnerabilities libwpd is vulnerable to several heap overflows and an integer overflow. libwpd - April 06, 2007 - April 06, 2007: 01 + 2007-04-06 + 2007-04-06: 01 169675 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/libwpd-0.8.9" + # emerge --ask --oneshot --verbose ">=app-text/libwpd-0.8.9" - CVE-2007-0002 - CVE-2007-1466 + CVE-2007-0002 + CVE-2007-1466 - + falco - + aetius - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-08.xml index b1529e8d3a..7bac7e3291 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-08.xml @@ -1,14 +1,13 @@ - DokuWiki: Cross-site scripting vulnerability DokuWiki is vulnerable to a cross-site scripting attack. dokuwiki - April 12, 2007 - April 12, 2007: 01 + 2007-04-12 + 2007-04-12: 01 163781 remote @@ -53,18 +52,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-20061106" + # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-20061106" - CVE-2006-6965 + CVE-2006-6965 - + falco - + aetius - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-09.xml index 7b20bb4485..5dd4f55861 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-09.xml @@ -1,14 +1,13 @@ - xine-lib: Heap-based buffer overflow xine-lib is vulnerable to a heap-based buffer overflow. xine-lib - April 14, 2007 - April 14, 2007: 01 + 2007-04-14 + 2007-04-14: 01 170208 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.4-r2" + # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.4-r2" - CVE-2007-1246 + CVE-2007-1246 - + jaervosz - + aetius - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-10.xml index ba29b29854..3cde7d7e15 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-10.xml @@ -1,6 +1,5 @@ - Inkscape: Two format string vulnerabilities @@ -8,8 +7,8 @@ allowing for user-assisted execution of arbitrary code. Inkscape - April 16, 2007 - April 16, 2007: 01 + 2007-04-16 + 2007-04-16: 01 171799 remote @@ -50,16 +49,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/inkscape-0.45.1" + # emerge --ask --oneshot --verbose ">=media-gfx/inkscape-0.45.1" - CVE-2007-1463 - CVE-2007-1464 + CVE-2007-1463 + CVE-2007-1464 - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-11.xml index 65fc90ec54..04041cbcf5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-11.xml @@ -1,6 +1,5 @@ - Vixie Cron: Denial of Service @@ -8,8 +7,8 @@ Service. vixie-cron - April 16, 2007 - April 16, 2007: 01 + 2007-04-16 + 2007-04-16: 01 164466 local @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-process/vixie-cron-4.1-r10" + # emerge --ask --oneshot --verbose ">=sys-process/vixie-cron-4.1-r10" - CVE-2007-1856 + CVE-2007-1856 - + jaervosz - + falco - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-12.xml index 0648355ad9..ef0765161b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-12.xml @@ -1,6 +1,5 @@ - OpenOffice.org: Multiple vulnerabilities @@ -8,8 +7,8 @@ for remote execution of arbitrary code. OpenOffice.org - April 16, 2007 - April 16, 2007: 01 + 2007-04-16 + 2007-04-16: 01 170828 remote @@ -56,27 +55,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.1.0-r1" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.1.0-r1"

All OpenOffice.org binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.2.0" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.2.0" - CVE-2007-0002 - CVE-2007-0238 - CVE-2007-0239 - GLSA-200704-07 + CVE-2007-0002 + CVE-2007-0238 + CVE-2007-0239 + GLSA-200704-07 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-13.xml index 22e6e3dcaf..4e5ed22fe8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-13.xml @@ -1,6 +1,5 @@ - File: Denial of Service @@ -8,8 +7,8 @@ service. file - April 17, 2007 - September 17, 2007: 02 + 2007-04-17 + 2007-09-17: 02 174217 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/file-4.20-r1" + # emerge --ask --oneshot --verbose ">=sys-apps/file-4.20-r1" - CVE-2007-2026 + CVE-2007-2026 - + aetius - + vorlon - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-14.xml index 065e771a52..7f7df84634 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-14.xml @@ -1,6 +1,5 @@ - FreeRADIUS: Denial of Service @@ -8,8 +7,8 @@ Denial of Service. FreeRADIUS - April 17, 2007 - April 17, 2007: 01 + 2007-04-17 + 2007-04-17: 01 174292 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.1.6" + # emerge --ask --oneshot --verbose ">=net-dialup/freeradius-1.1.6" - CVE-2007-2028 + CVE-2007-2028 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-15.xml index 5e278eb325..0e52756750 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-15.xml @@ -1,6 +1,5 @@ - MadWifi: Multiple vulnerabilities @@ -8,8 +7,8 @@ possibly leading to a Denial of Service and information disclosure. Madwifi-ng - April 17, 2007 - April 21, 2007: 02 + 2007-04-17 + 2007-04-21: 02 173434 remote @@ -54,17 +53,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.3" + # emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.3" - CVE-2006-7178 - CVE-2006-7179 - CVE-2006-7180 + CVE-2006-7178 + CVE-2006-7179 + CVE-2006-7180 - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-16.xml index 1362a8fbc8..182829abfc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-16.xml @@ -1,6 +1,5 @@ - Aircrack-ng: Remote execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code with root privileges. aircrack-ng - April 22, 2007 - April 22, 2007: 01 + 2007-04-22 + 2007-04-22: 01 174340 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-wireless/aircrack-ng-0.7-r2" + # emerge --ask --oneshot --verbose ">=net-wireless/aircrack-ng-0.7-r2" - CVE-2007-2057 + CVE-2007-2057 - + shellsage - + shellsage - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-17.xml index 633590d8d3..5325bef716 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-17.xml @@ -1,6 +1,5 @@ - 3proxy: Buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. 3proxy - April 22, 2007 - April 22, 2007: 01 + 2007-04-22 + 2007-04-22: 01 174429 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/3proxy-0.5.3h" + # emerge --ask --oneshot --verbose ">=net-proxy/3proxy-0.5.3h" - CVE-2007-2031 + CVE-2007-2031 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-18.xml index b4c4752892..b202998063 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-18.xml @@ -1,6 +1,5 @@ - Courier-IMAP: Remote execution of arbitrary code @@ -8,8 +7,8 @@ code execution with root privileges. courier-imap - April 22, 2007 - April 23, 2007: 02 + 2007-04-22 + 2007-04-23: 02 168196 remote @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/courier-imap-4.0.6-r2" + # emerge --ask --oneshot --verbose ">=net-mail/courier-imap-4.0.6-r2" - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-19.xml index b3d2176e54..fcbed73523 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-19.xml @@ -1,6 +1,5 @@ - Blender: User-assisted remote execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code execution. Blender - April 23, 2007 - April 23, 2007: 01 + 2007-04-23 + 2007-04-23: 01 168907 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/blender-2.43" + # emerge --ask --oneshot --verbose ">=media-gfx/blender-2.43" - CVE-2007-1253 + CVE-2007-1253 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-20.xml index 8f2a03f887..13279a7d41 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-20.xml @@ -1,6 +1,5 @@ - NAS: Multiple vulnerabilities @@ -8,8 +7,8 @@ result in the execution of arbitrary code with root privileges. NAS - April 23, 2007 - April 23, 2007: 01 + 2007-04-23 + 2007-04-23: 01 171428 remote @@ -51,22 +50,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/nas-1.8b" + # emerge --ask --oneshot --verbose ">=media-libs/nas-1.8b" - CVE-2007-1543 - CVE-2007-1544 - CVE-2007-1545 - CVE-2007-1546 - CVE-2007-1547 + CVE-2007-1543 + CVE-2007-1544 + CVE-2007-1545 + CVE-2007-1546 + CVE-2007-1547 - + p-y - + p-y - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-21.xml index afaf34227f..d9f785f1e9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-21.xml @@ -1,6 +1,5 @@ - ClamAV: Multiple vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code. ClamAV - April 24, 2007 - April 24, 2007: 01 + 2007-04-24 + 2007-04-24: 01 174375 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.90.2" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.90.2" - CVE-2007-1745 - CVE-2007-1997 + CVE-2007-1745 + CVE-2007-1997 - + falco - + p-y - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-22.xml index 582453011d..e3aed7f841 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-22.xml @@ -1,6 +1,5 @@ - BEAST: Denial of Service @@ -8,8 +7,8 @@ Service. BEAST - April 27, 2007 - April 27, 2007: 01 + 2007-04-27 + 2007-04-27: 01 163146 local @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/beast-0.7.1" + # emerge --ask --oneshot --verbose ">=media-sound/beast-0.7.1" - CVE-2006-2916 - CVE-2006-4447 + CVE-2006-2916 + CVE-2006-4447 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-23.xml index 028faebf85..ab3d35bc7e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200704-23.xml @@ -1,14 +1,13 @@ - capi4k-utils: Buffer overflow capi4k-utils is vulnerable to a buffer overflow in the bufprint() function. capi4k-utils - April 27, 2007 - April 27, 2007: 01 + 2007-04-27 + 2007-04-27: 01 170870 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dialup/capi4k-utils-20050718-r3" + # emerge --ask --oneshot --verbose ">=net-dialup/capi4k-utils-20050718-r3" - CVE-2007-1217 + CVE-2007-1217 - + jaervosz - + aetius - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-01.xml index 505a74f250..4d6e1fa907 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-01.xml @@ -1,6 +1,5 @@ - Ktorrent: Multiple vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code and a Denial of Service. ktorrent - May 01, 2007 - May 01, 2007: 01 + 2007-05-01 + 2007-05-01: 01 170303 remote @@ -48,20 +47,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-p2p/ktorrent-2.1.3" + # emerge --ask --oneshot --verbose ">=net-p2p/ktorrent-2.1.3" - CVE-2007-1384 - CVE-2007-1385 - CVE-2007-1799 + CVE-2007-1384 + CVE-2007-1385 + CVE-2007-1799 - + aetius - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-02.xml index 26e18a7282..3b7a3b62e7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-02.xml @@ -1,6 +1,5 @@ - FreeType: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ remote execution of arbitrary code. freetype - May 01, 2007 - May 27, 2007: 02 + 2007-05-01 + 2007-05-27: 02 172577 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.1.10-r3" + # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.1.10-r3" - CVE-2007-1351 + CVE-2007-1351 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-03.xml index ecfa4d488f..27cbc5974a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-03.xml @@ -1,6 +1,5 @@ - Tomcat: Information disclosure @@ -8,8 +7,8 @@ disclosure of sensitive information. tomcat - May 01, 2007 - May 01, 2007: 01 + 2007-05-01 + 2007-05-01: 01 173122 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/tomcat-5.5.22" + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-5.5.22" - CVE-2007-0450 + CVE-2007-0450 - + aetius - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-04.xml index 87719c907a..b8b56d0386 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-04.xml @@ -1,6 +1,5 @@ - Apache mod_perl: Denial of Service @@ -8,8 +7,8 @@ processing regular expressions. mod_perl - May 02, 2007 - May 02, 2007: 02 + 2007-05-02 + 2007-05-02: 02 172676 remote @@ -49,24 +48,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apache/mod_perl-1.30" + # emerge --ask --oneshot --verbose ">=www-apache/mod_perl-1.30"

All mod_perl 2.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apache/mod_perl-2.0.3-r1" + # emerge --ask --oneshot --verbose ">=www-apache/mod_perl-2.0.3-r1" - CVE-2007-1349 + CVE-2007-1349 - + falco - + vorlon - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-05.xml index 2cc1029b64..da10f99470 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-05.xml @@ -1,6 +1,5 @@ - Quagga: Denial of Service @@ -8,8 +7,8 @@ Service. quagga - May 02, 2007 - May 02, 2007: 01 + 2007-05-02 + 2007-05-02: 01 174206 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/quagga-0.98.6-r2" + # emerge --ask --oneshot --verbose ">=net-misc/quagga-0.98.6-r2" - CVE-2007-1995 + CVE-2007-1995 - + falco - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-06.xml index 9e8c17cfec..c9a5ac4831 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-06.xml @@ -1,6 +1,5 @@ - X.Org X11 library: Multiple integer overflows @@ -8,8 +7,8 @@ to the execution of arbitrary code. libx11 - May 05, 2007 - May 05, 2007: 01 + 2007-05-05 + 2007-05-05: 01 172752 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/libX11-1.0.3-r2" + # emerge --ask --oneshot --verbose ">=x11-libs/libX11-1.0.3-r2" - CVE-2007-1667 + CVE-2007-1667 - + jaervosz - + dizzutch - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-07.xml index 19cc0eac88..399f7bbfb6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-07.xml @@ -1,6 +1,5 @@ - Lighttpd: Two Denials of Service @@ -8,8 +7,8 @@ Denial of Service. lighttpd - May 07, 2007 - May 07, 2007: 01 + 2007-05-07 + 2007-05-07: 01 174043 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.14" + # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.14" - CVE-2007-1869 - CVE-2007-1870 + CVE-2007-1869 + CVE-2007-1870 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-08.xml index 88ca280604..8ded2ad6ab 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-08.xml @@ -1,6 +1,5 @@ - GIMP: Buffer overflow @@ -8,8 +7,8 @@ arbitrary code. gimp - May 07, 2007 - May 07, 2007: 01 + 2007-05-07 + 2007-05-07: 01 176226 remote @@ -47,15 +46,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/gimp-2.2.14" + # emerge --ask --oneshot --verbose ">=media-gfx/gimp-2.2.14" - CVE-2007-2356 + CVE-2007-2356 - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-09.xml index 9b1b25afe6..1326aeb3d7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-09.xml @@ -1,6 +1,5 @@ - IPsec-Tools: Denial of Service @@ -8,8 +7,8 @@ the IPsec tunnel. ipsec-tools - May 08, 2007 - May 08, 2007: 01 + 2007-05-08 + 2007-05-08: 01 173219 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-firewall/ipsec-tools-0.6.7" + # emerge --ask --oneshot --verbose ">=net-firewall/ipsec-tools-0.6.7" - CVE-2007-1841 + CVE-2007-1841 - + jaervosz - + falco - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-10.xml index a118298eed..00af732aaf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-10.xml @@ -1,6 +1,5 @@ - LibXfont, TightVNC: Multiple vulnerabilities @@ -8,8 +7,8 @@ allowing for the execution of arbitrary code with root privileges. tightvnc, libxfont - May 08, 2007 - May 08, 2007: 01 + 2007-05-08 + 2007-05-08: 01 172575 174200 local @@ -53,26 +52,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/libXfont-1.2.7-r1" + # emerge --ask --oneshot --verbose ">=x11-libs/libXfont-1.2.7-r1"

All TightVNC users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/tightvnc-1.2.9-r4" + # emerge --ask --oneshot --verbose ">=net-misc/tightvnc-1.2.9-r4" - CVE-2007-1003 - CVE-2007-1351 - CVE-2007-1352 + CVE-2007-1003 + CVE-2007-1351 + CVE-2007-1352 - + jaervosz - + vorlon - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-11.xml index f91e303190..d033d533b6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-11.xml @@ -1,14 +1,13 @@ - MySQL: Two Denial of Service vulnerabilities Two Denial of Service vulnerabilities have been discovered in MySQL. MySQL - May 08, 2007 - May 08, 2007: 01 + 2007-05-08 + 2007-05-08: 01 170126 171934 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.0.38" + # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.0.38" - Original Report - CVE-2007-1420 + Original Report + CVE-2007-1420 - + aetius - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-12.xml index 9b52fb263c..52569e61a1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-12.xml @@ -1,6 +1,5 @@ - PostgreSQL: Privilege escalation @@ -8,8 +7,8 @@ escalation. postgresql - May 10, 2007 - May 28, 2009: 02 + 2007-05-10 + 2009-05-28: 02 175791 remote @@ -52,24 +51,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose "dev-db/postgresql" + # emerge --ask --oneshot --verbose "dev-db/postgresql"

In order to fix the SECURITY DEFINER functions, PostgreSQL users are - advised to refer to the PostgreSQL documentation: http://www.postgresql + advised to refer to the PostgreSQL documentation: http://www.postgresql .org/docs/techdocs.77

- CVE-2007-2138 + CVE-2007-2138 - + aetius - + falco - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-13.xml index 4e1e32ecea..fbfc8bdebb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-13.xml @@ -1,6 +1,5 @@ - ImageMagick: Multiple buffer overflows @@ -8,8 +7,8 @@ the execution of arbitrary code. imagemagick - May 10, 2007 - June 07, 2007: 02 + 2007-05-10 + 2007-06-07: 02 152672 159567 173186 @@ -54,18 +53,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.3.3" + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.3.3" - CVE-2007-1797 + CVE-2007-1797 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-14.xml index 0362ccb775..21c942576d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-14.xml @@ -1,6 +1,5 @@ - XScreenSaver: Privilege escalation @@ -8,8 +7,8 @@ configurations. xscreensaver - May 13, 2007 - May 13, 2007: 01 + 2007-05-13 + 2007-05-13: 01 176584 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-misc/xscreensaver-5.02" + # emerge --ask --oneshot --verbose ">=x11-misc/xscreensaver-5.02" - CVE-2007-1859 + CVE-2007-1859 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-15.xml index aaf4900c2b..28d1c44c21 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-15.xml @@ -1,6 +1,5 @@ - Samba: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code with root privileges. samba - May 15, 2007 - May 15, 2007: 01 + 2007-05-15 + 2007-05-15: 01 177029 remote @@ -49,17 +48,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.24-r2" + # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.24-r2" - CVE-2007-2444 - CVE-2007-2446 - CVE-2007-2447 + CVE-2007-2444 + CVE-2007-2446 + CVE-2007-2447 - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-16.xml index 31baecc392..e8a82aefad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-16.xml @@ -1,6 +1,5 @@ - PhpWiki: Remote execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. phpwiki - May 17, 2007 - May 17, 2007: 01 + 2007-05-17 + 2007-05-17: 01 174451 remote @@ -47,19 +46,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpwiki-1.3.10-r3" + # emerge --ask --oneshot --verbose ">=www-apps/phpwiki-1.3.10-r3" - CVE-2007-2024 - CVE-2007-2025 + CVE-2007-2024 + CVE-2007-2025 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-17.xml index 70ead57a21..82c7b4b664 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-17.xml @@ -1,6 +1,5 @@ - Apache mod_security: Rule bypass @@ -8,8 +7,8 @@ attacker to bypass rules. mod_security - May 17, 2007 - December 30, 2007: 02 + 2007-05-17 + 2007-12-30: 02 169778 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apache/mod_security-2.1.1" + # emerge --ask --oneshot --verbose ">=www-apache/mod_security-2.1.1" - CVE-2007-1359 + CVE-2007-1359 - + shellsage - + shellsage - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-18.xml index 93d2918fde..8b7b4547db 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-18.xml @@ -1,6 +1,5 @@ - PPTPD: Denial of Service attack @@ -8,8 +7,8 @@ Service. pptpd - May 20, 2007 - May 20, 2007: 01 + 2007-05-20 + 2007-05-20: 01 176936 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dialup/pptpd-1.3.4" + # emerge --ask --oneshot --verbose ">=net-dialup/pptpd-1.3.4" - CVE-2007-0244 + CVE-2007-0244 - + jaervosz - + jaervosz - + dizzutch
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-19.xml index 78004619b9..9ff9f0d80b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-19.xml @@ -1,6 +1,5 @@ - PHP: Multiple vulnerabilities @@ -9,8 +8,8 @@ arbitrary code. php - May 26, 2007 - March 29, 2008: 02 + 2007-05-26 + 2008-03-29: 02 169372 remote @@ -64,39 +63,39 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/php-5.2.2" + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.2.2"

All PHP 4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/php-4.4.7" + # emerge --ask --oneshot --verbose ">=dev-lang/php-4.4.7" - CVE-2007-1001 - CVE-2007-1285 - CVE-2007-1286 - CVE-2007-1484 - CVE-2007-1521 - CVE-2007-1583 - CVE-2007-1700 - CVE-2007-1701 - CVE-2007-1711 - CVE-2007-1717 - CVE-2007-1718 - CVE-2007-1864 - CVE-2007-1900 - CVE-2007-2509 - CVE-2007-2510 - CVE-2007-2511 + CVE-2007-1001 + CVE-2007-1285 + CVE-2007-1286 + CVE-2007-1484 + CVE-2007-1521 + CVE-2007-1583 + CVE-2007-1700 + CVE-2007-1701 + CVE-2007-1711 + CVE-2007-1717 + CVE-2007-1718 + CVE-2007-1864 + CVE-2007-1900 + CVE-2007-2509 + CVE-2007-2510 + CVE-2007-2511 - + jaervosz - + jaervosz - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-20.xml index f110feef7f..5a391a0b31 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-20.xml @@ -1,6 +1,5 @@ - Blackdown Java: Applet privilege escalation @@ -8,8 +7,8 @@ unspecified vulnerabilities that already affected the Sun JDK and JRE. blackdown-jdk,blackdown-jre - May 26, 2007 - May 26, 2007: 01 + 2007-05-26 + 2007-05-26: 01 161835 remote @@ -67,22 +66,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose "dev-java/blackdown-jdk" - # emerge --ask --oneshot --verbose "dev-java/blackdown-jre" + # emerge --ask --oneshot --verbose "dev-java/blackdown-jdk" + # emerge --ask --oneshot --verbose "dev-java/blackdown-jre" - CVE-2006-6731 - CVE-2006-6736 - CVE-2006-6737 - CVE-2006-6745 + CVE-2006-6731 + CVE-2006-6736 + CVE-2006-6737 + CVE-2006-6745 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-21.xml index 8e0e469740..b80e792f61 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-21.xml @@ -1,6 +1,5 @@ - MPlayer: Two buffer overflows @@ -8,8 +7,8 @@ the execution of arbitrary code. mplayer - May 30, 2007 - October 12, 2007: 02 + 2007-05-30 + 2007-10-12: 02 168917 remote @@ -51,20 +50,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20070321" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20070321" - CVE-2007-1246 - CVE-2007-1387 - GLSA 200704-09 + CVE-2007-1246 + CVE-2007-1387 + GLSA 200704-09 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-22.xml index c8c4379119..5c387b6d33 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-22.xml @@ -1,6 +1,5 @@ - FreeType: Buffer overflow @@ -8,8 +7,8 @@ of arbitrary code. freetype - May 30, 2007 - May 30, 2007: 01 + 2007-05-30 + 2007-05-30: 01 179161 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.3.4-r2" + # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.3.4-r2" - CVE-2007-2754 + CVE-2007-2754 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-23.xml index 5c9b2489fa..f55e3cecad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-23.xml @@ -1,6 +1,5 @@ - Sun JDK/JRE: Multiple vulnerabilities @@ -8,8 +7,8 @@ (JDK) and Java Runtime Environment (JRE). sun-jdk,sun-jre-bin - May 31, 2007 - May 28, 2009: 05 + 2007-05-31 + 2009-05-28: 05 176675 178851 remote @@ -74,27 +73,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose "dev-java/sun-jdk" + # emerge --ask --oneshot --verbose "dev-java/sun-jdk"

All Sun Java Runtime Environment users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose "dev-java/sun-jre-bin" + # emerge --ask --oneshot --verbose "dev-java/sun-jre-bin" - CVE-2007-2435 - CVE-2007-2788 - CVE-2007-2789 + CVE-2007-2435 + CVE-2007-2788 + CVE-2007-2789 - + jaervosz - + falco - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-24.xml index 31923a1854..e3fb4a02b3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-24.xml @@ -1,6 +1,5 @@ - libpng: Denial of Service @@ -8,8 +7,8 @@ that handle untrusted images. libpng - May 31, 2007 - May 31, 2007: 01 + 2007-05-31 + 2007-05-31: 01 178004 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.18" + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.18" - CVE-2007-2445 + CVE-2007-2445 - + jaervosz - + falco - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-25.xml index 242c4fd926..aff71cbc19 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200705-25.xml @@ -1,6 +1,5 @@ - file: Integer overflow @@ -8,8 +7,8 @@ the user-assisted execution of arbitrary code. file - May 31, 2007 - June 01, 2007: 02 + 2007-05-31 + 2007-06-01: 02 179583 remote @@ -50,15 +49,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/file-4.21" + # emerge --ask --oneshot --verbose ">=sys-apps/file-4.21" - CVE-2007-2799 + CVE-2007-2799 - + falco - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-01.xml index 2c6e6ba53e..74a7a19128 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-01.xml @@ -1,6 +1,5 @@ - libexif: Integer overflow vulnerability @@ -8,8 +7,8 @@ it vulnerable to an integer overflow. libexif - June 05, 2007 - June 05, 2007: 01 + 2007-06-05 + 2007-06-05: 01 178081 remote @@ -51,16 +50,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libexif-0.6.15" + # emerge --ask --oneshot --verbose ">=media-libs/libexif-0.6.15" # revdep-rebuild --library=/usr/lib/libexif.so - CVE-2007-2645 + CVE-2007-2645 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-02.xml index ef7931865b..7a3d987d61 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-02.xml @@ -1,6 +1,5 @@ - Evolution: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary code. evolution - June 06, 2007 - June 06, 2007: 01 + 2007-06-06 + 2007-06-06: 01 170879 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/evolution-2.8.3-r2" + # emerge --ask --oneshot --verbose ">=mail-client/evolution-2.8.3-r2" - CVE-2007-1002 + CVE-2007-1002 - + jaervosz - + p-y - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-03.xml index 64f182ce4a..f9bbf03429 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-03.xml @@ -1,6 +1,5 @@ - ELinks: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ user-assisted execution of arbitrary code. elinks - June 06, 2007 - June 06, 2007: 01 + 2007-06-06 + 2007-06-06: 01 177512 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/elinks-0.11.2-r1" + # emerge --ask --oneshot --verbose ">=www-client/elinks-0.11.2-r1" - CVE-2007-2027 + CVE-2007-2027 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-04.xml index 1194d4fc86..d24dae8507 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-04.xml @@ -1,6 +1,5 @@ - MadWifi: Multiple vulnerabilities @@ -8,8 +7,8 @@ for the execution of arbitrary code or a Denial of Service. madwifi-ng - June 11, 2007 - June 11, 2007: 01 + 2007-06-11 + 2007-06-11: 01 179532 remote @@ -53,20 +52,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.3.1" + # emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.3.1" - CVE-2007-2829 - CVE-2007-2830 - CVE-2007-2831 + CVE-2007-2829 + CVE-2007-2830 + CVE-2007-2831 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-05.xml index a993d464d7..acfab327ce 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-05.xml @@ -1,14 +1,13 @@ - ClamAV: Multiple Denials of Service ClamAV contains several vulnerabilities leading to a Denial of Service. clamav - June 15, 2007 - June 15, 2007: 01 + 2007-06-15 + 2007-06-15: 01 178082 remote, local @@ -62,22 +61,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.90.3" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.90.3" - CVE-2007-2650 - CVE-2007-3023 - CVE-2007-3024 - CVE-2007-3122 - CVE-2007-3123 + CVE-2007-2650 + CVE-2007-3023 + CVE-2007-3024 + CVE-2007-3122 + CVE-2007-3123 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-06.xml index 4856d5cf72..331852103c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-06.xml @@ -1,6 +1,5 @@ - Mozilla products: Multiple vulnerabilities @@ -9,8 +8,8 @@ arbitrary remote code execution. mozilla-firefox,mozilla-thunderbird,mozilla-firefox-bin,mozilla-thunderbird-bin,seamonkey,seamonkey-bin,xulrunner - June 19, 2007 - June 19, 2007: 01 + 2007-06-19 + 2007-06-19: 01 180436 remote @@ -87,61 +86,61 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.4" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.4"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.4" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.4"

All Mozilla Thunderbird users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-2.0.0.4" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-2.0.0.4"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-2.0.0.4" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-2.0.0.4"

All SeaMonkey users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.2" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.2"

All SeaMonkey binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.2" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.2"

All XULRunner users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-1.8.1.4" + # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-1.8.1.4" - CVE-2007-1362 - CVE-2007-1558 - CVE-2007-2867 - CVE-2007-2868 - CVE-2007-2869 - CVE-2007-2870 - CVE-2007-2871 + CVE-2007-1362 + CVE-2007-1558 + CVE-2007-2867 + CVE-2007-2868 + CVE-2007-2869 + CVE-2007-2870 + CVE-2007-2871 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-07.xml index ddd3169885..7612d41998 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-07.xml @@ -1,6 +1,5 @@ - PHProjekt: Multiple vulnerabilities @@ -9,8 +8,8 @@ attacks. phprojekt - June 19, 2007 - June 19, 2007: 01 + 2007-06-19 + 2007-06-19: 01 170905 remote @@ -53,21 +52,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phprojekt-5.2.1" + # emerge --ask --oneshot --verbose ">=www-apps/phprojekt-5.2.1" - CVE-2007-1575 - CVE-2007-1576 - CVE-2007-1638 - CVE-2007-1639 + CVE-2007-1575 + CVE-2007-1576 + CVE-2007-1638 + CVE-2007-1639 - + falco - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-08.xml index 36c79d8190..b7e916ba53 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-08.xml @@ -1,6 +1,5 @@ - emul-linux-x86-java: Multiple vulnerabilities @@ -9,8 +8,8 @@ Service. emul-linux-x86-java - June 26, 2007 - May 28, 2009: 03 + 2007-06-26 + 2009-05-28: 03 178962 remote @@ -57,20 +56,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.5.0.11" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.5.0.11" - CVE-2007-2435 - CVE-2007-2788 - CVE-2007-2789 + CVE-2007-2435 + CVE-2007-2788 + CVE-2007-2789 - + falco - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-09.xml index a0d8edab5e..13d5ad9270 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200706-09.xml @@ -1,6 +1,5 @@ - libexif: Buffer overflow @@ -8,8 +7,8 @@ for the execution of arbitrary code. libexif - June 26, 2007 - June 26, 2007: 01 + 2007-06-26 + 2007-06-26: 01 181922 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libexif-0.6.16" + # emerge --ask --oneshot --verbose ">=media-libs/libexif-0.6.16" - CVE-2006-4168 + CVE-2006-4168 - + jaervosz - + jaervosz - + shellsage
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-01.xml index 6a51b00a34..3238443f5f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-01.xml @@ -1,6 +1,5 @@ - Firebird: Buffer overflow @@ -8,8 +7,8 @@ of arbitrary code. firebird - July 01, 2007 - July 01, 2007: 01 + 2007-07-01 + 2007-07-01: 01 181811 remote @@ -49,15 +48,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/firebird-2.0.1" + # emerge --ask --oneshot --verbose ">=dev-db/firebird-2.0.1" - CVE-2007-3181 + CVE-2007-3181 - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-02.xml index 72c2891bf2..6b01d8fc4f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-02.xml @@ -1,6 +1,5 @@ - OpenOffice.org: Two buffer overflows @@ -8,8 +7,8 @@ for the remote execution of arbitrary code. openoffice - July 02, 2007 - July 02, 2007: 01 + 2007-07-02 + 2007-07-02: 01 181773 remote @@ -58,23 +57,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.2.1" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.2.1"

All OpenOffice.org binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.2.1" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.2.1" - CVE-2007-0245 - CVE-2007-2754 - GLSA 200705-22 + CVE-2007-0245 + CVE-2007-2754 + GLSA 200705-22 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-03.xml index 25b77dbc95..ac115842f0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-03.xml @@ -1,6 +1,5 @@ - Evolution: User-assisted remote execution of arbitrary code @@ -8,8 +7,8 @@ to the execution of arbitrary code. evolution-data-server - July 02, 2007 - July 02, 2007: 01 + 2007-07-02 + 2007-07-02: 01 182011 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose "gnome-extra/evolution-data-server" + # emerge --ask --oneshot --verbose "gnome-extra/evolution-data-server" - CVE-2007-3257 + CVE-2007-3257 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-04.xml index 0c76351cd4..15fe45bb33 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-04.xml @@ -1,6 +1,5 @@ - GNU C Library: Integer overflow @@ -8,8 +7,8 @@ execution of arbitrary code with escalated privileges. glibc - July 03, 2007 - July 03, 2007: 01 + 2007-07-03 + 2007-07-03: 01 183844 local @@ -55,15 +54,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.5-r4" + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.5-r4" - CVE-2007-3508 + CVE-2007-3508 - + taviso - + taviso
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-05.xml index a2e6f8c5e4..49cb6cb776 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-05.xml @@ -1,6 +1,5 @@ - Webmin, Usermin: Cross-site scripting vulnerabilities @@ -8,8 +7,8 @@ (XSS). webmin/usermin - July 05, 2007 - July 05, 2007: 01 + 2007-07-05 + 2007-07-05: 01 181385 remote @@ -55,21 +54,21 @@

# emerge --sync - # emerge --ask --verbose --oneshot ">=app-admin/webmin-1.350" + # emerge --ask --verbose --oneshot ">=app-admin/webmin-1.350"

All Usermin users should update to the latest stable version:

# emerge --sync - # emerge --ask --verbose --oneshot ">=app-admin/usermin-1.280" + # emerge --ask --verbose --oneshot ">=app-admin/usermin-1.280" - CVE-2007-3156 + CVE-2007-3156 - + falco - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-06.xml index fbdae35e58..6d719a370e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-06.xml @@ -1,6 +1,5 @@ - XnView: Stack-based buffer overflow @@ -8,8 +7,8 @@ code execution when handling XPM image files. xnview - July 11, 2007 - July 11, 2007: 01 + 2007-07-11 + 2007-07-11: 01 175670 remote @@ -53,15 +52,15 @@ # emerge --unmerge xnview - CVE-2007-2194 + CVE-2007-2194 - + jaervosz - + aetius - + DerCorny diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-07.xml index 73bd64821e..57e12748cf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-07.xml @@ -1,6 +1,5 @@ - MPlayer: Multiple buffer overflows @@ -8,8 +7,8 @@ for the remote execution of arbitrary code. mplayer - July 24, 2007 - October 12, 2007: 03 + 2007-07-24 + 2007-10-12: 03 181097 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20070622" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0.20070622" - CVE-2007-2948 + CVE-2007-2948 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-08.xml index 5919862047..ac2f8bf23b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-08.xml @@ -1,6 +1,5 @@ - NVClock: Insecure file usage @@ -8,8 +7,8 @@ of arbitrary code. nvclock - July 24, 2007 - July 24, 2007: 01 + 2007-07-24 + 2007-07-24: 01 184071 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/nvclock-0.7-r2" + # emerge --ask --oneshot --verbose ">=media-video/nvclock-0.7-r2" - CVE-2007-3531 + CVE-2007-3531 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-09.xml index 9cba5cae06..b443d7641f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-09.xml @@ -1,6 +1,5 @@ - GIMP: Multiple integer overflows @@ -8,8 +7,8 @@ remote execution of arbitrary code. gimp - July 25, 2007 - July 25, 2007: 01 + 2007-07-25 + 2007-07-25: 01 182047 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/gimp-2.2.16" + # emerge --ask --oneshot --verbose ">=media-gfx/gimp-2.2.16" - CVE-2006-4519 - CVE-2007-2949 + CVE-2006-4519 + CVE-2007-2949 - + DerCorny - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-10.xml index c9cfb54254..ea61a987d5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-10.xml @@ -1,6 +1,5 @@ - Festival: Privilege elevation @@ -8,8 +7,8 @@ privilege escalation. festival - July 25, 2007 - July 25, 2007: 01 + 2007-07-25 + 2007-07-25: 01 170477 local @@ -48,13 +47,13 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-accessibility/festival-1.95_beta-r4" + # emerge --ask --oneshot --verbose ">=app-accessibility/festival-1.95_beta-r4" - + p-y - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-11.xml index 58f053283c..b14c184793 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-11.xml @@ -1,6 +1,5 @@ - MIT Kerberos 5: Arbitrary remote code execution @@ -8,8 +7,8 @@ remote code execution with root privileges by unauthenticated users. mit-krb5 - July 25, 2007 - July 25, 2007: 01 + 2007-07-25 + 2007-07-25: 01 183338 remote @@ -50,20 +49,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.2-r3" + # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.2-r3" - CVE-2007-2442 - CVE-2007-2443 - CVE-2007-2798 + CVE-2007-2442 + CVE-2007-2443 + CVE-2007-2798 - + jaervosz - + jaervosz - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-12.xml index 06a6468f46..2addc1b559 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-12.xml @@ -1,6 +1,5 @@ - VLC media player: Format string vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code. vlc - July 28, 2007 - July 28, 2007: 01 + 2007-07-28 + 2007-07-28: 01 182389 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6c" + # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6c" - CVE-2007-3316 + CVE-2007-3316 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-13.xml index 2d631659c1..1b15653e1e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-13.xml @@ -1,14 +1,13 @@ - Fail2ban: Denial of Service Fail2ban is vulnerable to a Denial of Service attack. fail2ban - July 28, 2007 - January 09, 2008: 02 + 2007-07-28 + 2008-01-09: 02 181214 remote @@ -46,19 +45,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/fail2ban-0.8.0-r1" + # emerge --ask --oneshot --verbose ">=net-analyzer/fail2ban-0.8.0-r1" - CVE-2007-4321 + CVE-2007-4321 Original advisory - + aetius - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-14.xml index 6532648376..f016916f30 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200707-14.xml @@ -1,6 +1,5 @@ - tcpdump: Integer overflow @@ -8,8 +7,8 @@ of arbitrary code, possibly with root privileges. tcpdump - July 28, 2007 - July 28, 2007: 01 + 2007-07-28 + 2007-07-28: 01 184815 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/tcpdump-3.9.5-r3" + # emerge --ask --oneshot --verbose ">=net-analyzer/tcpdump-3.9.5-r3" - CVE-2007-3798 + CVE-2007-3798 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-01.xml index 940b1fc621..9851391f1a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-01.xml @@ -1,6 +1,5 @@ - Macromedia Flash Player: Remote arbitrary code execution @@ -8,8 +7,8 @@ allowing for the remote execution of arbitrary code. adobe-flash - August 08, 2007 - May 28, 2009: 02 + 2007-08-08 + 2009-05-28: 02 185141 remote @@ -53,20 +52,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-9.0.48.0" + # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-9.0.48.0" - CVE-2007-2022 - CVE-2007-3456 - CVE-2007-3457 + CVE-2007-2022 + CVE-2007-3456 + CVE-2007-3457 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-02.xml index 6ee5a85673..7223f81320 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-02.xml @@ -1,6 +1,5 @@ - Xvid: Array indexing vulnerabilities @@ -8,8 +7,8 @@ allowing for the remote execution of arbitrary code. xvid - August 08, 2007 - August 08, 2007: 01 + 2007-08-08 + 2007-08-08: 01 183145 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/xvid-1.1.3" + # emerge --ask --oneshot --verbose ">=media-libs/xvid-1.1.3" - CVE-2007-3329 + CVE-2007-3329 - + p-y - + DerCorny - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-03.xml index 9ba6d63108..e30733ef5d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-03.xml @@ -1,6 +1,5 @@ - libarchive (formerly named as bsdtar): Multiple PaX Extension Header Vulnerabilities @@ -9,8 +8,8 @@ or a Denial of Service. libarchive - August 08, 2007 - August 08, 2007: 02 + 2007-08-08 + 2007-08-08: 02 184984 remote @@ -53,20 +52,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/libarchive-2.2.4" + # emerge --ask --oneshot --verbose ">=app-arch/libarchive-2.2.4" - CVE-2007-3641 - CVE-2007-3644 - CVE-2007-3645 + CVE-2007-3641 + CVE-2007-3644 + CVE-2007-3645 - + jaervosz - + DerCorny - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-04.xml index ba0f3aeb17..1a8af2e719 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-04.xml @@ -1,6 +1,5 @@ - ClamAV: Denial of Service @@ -8,8 +7,8 @@ Service. clamav - August 09, 2007 - August 09, 2007: 01 + 2007-08-09 + 2007-08-09: 01 185013 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.91" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.91" - CVE-2007-3725 + CVE-2007-3725 - + falco - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-05.xml index d8372757f1..90fd6adbe5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-05.xml @@ -1,6 +1,5 @@ - GD: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code. gd - August 09, 2007 - August 09, 2007: 01 + 2007-08-09 + 2007-08-09: 01 179154 remote @@ -58,25 +57,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/gd-2.0.35" + # emerge --ask --oneshot --verbose ">=media-libs/gd-2.0.35" - CVE-2007-2756 - CVE-2007-3472 - CVE-2007-3473 - CVE-2007-3474 - CVE-2007-3475 - CVE-2007-3476 - CVE-2007-3477 - CVE-2007-3478 + CVE-2007-2756 + CVE-2007-3472 + CVE-2007-3473 + CVE-2007-3474 + CVE-2007-3475 + CVE-2007-3476 + CVE-2007-3477 + CVE-2007-3478 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-06.xml index 5b5d6a0152..bd72653043 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-06.xml @@ -1,6 +1,5 @@ - Net::DNS: Multiple vulnerabilities @@ -8,8 +7,8 @@ allowing for a Denial of Service and a cache poisoning attack. net-dns - August 11, 2007 - August 11, 2007: 01 + 2007-08-11 + 2007-08-11: 01 184029 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-perl/Net-DNS-0.60" + # emerge --ask --oneshot --verbose ">=dev-perl/Net-DNS-0.60" - CVE-2007-3377 - CVE-2007-3409 + CVE-2007-3377 + CVE-2007-3409 - + aetius - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-07.xml index 5c8d5176dc..a41391f4a5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-07.xml @@ -1,6 +1,5 @@ - Xfce Terminal: Remote arbitrary code execution @@ -8,8 +7,8 @@ for the remote execution of arbitrary code. terminal - August 11, 2007 - July 12, 2008: 02 + 2007-08-11 + 2008-07-12: 02 184886 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/terminal-0.2.6_p25931" + # emerge --ask --oneshot --verbose ">=x11-terms/terminal-0.2.6_p25931" - CVE-2007-3770 + CVE-2007-3770 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-08.xml index 510d608242..c61e3f3540 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-08.xml @@ -1,6 +1,5 @@ - SquirrelMail G/PGP plugin: Arbitrary code execution @@ -8,8 +7,8 @@ the remote execution of arbitrary code. squirrelmail - August 11, 2007 - August 11, 2007: 01 + 2007-08-11 + 2007-08-11: 01 185010 remote @@ -55,19 +54,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.10a-r2" + # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.10a-r2" - CVE-2005-1924 - CVE-2006-4169 + CVE-2005-1924 + CVE-2006-4169 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-09.xml index 34b4ff8876..1d6587f586 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-09.xml @@ -1,6 +1,5 @@ - Mozilla products: Multiple vulnerabilities @@ -9,8 +8,8 @@ arbitrary remote code execution. mozilla-firefox,mozilla-firefox-bin,seamonkey,seamonkey-bin,mozilla-thunderbird,mozilla-thunderbird-bin,xulrunner - August 14, 2007 - August 14, 2007: 01 + 2007-08-14 + 2007-08-14: 01 185737 187205 remote @@ -90,62 +89,62 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.6" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.6"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.6" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.6"

All Mozilla Thunderbird users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-2.0.0.6" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-2.0.0.6"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-2.0.0.6" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-2.0.0.6"

All SeaMonkey users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.4" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.4"

All SeaMonkey binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.4" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.4"

All XULRunner users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-1.8.1.6" + # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-1.8.1.6" - CVE-2007-3089 - CVE-2007-3656 - CVE-2007-3734 - CVE-2007-3735 - CVE-2007-3736 - CVE-2007-3737 - CVE-2007-3738 - CVE-2007-3844 + CVE-2007-3089 + CVE-2007-3656 + CVE-2007-3734 + CVE-2007-3735 + CVE-2007-3736 + CVE-2007-3737 + CVE-2007-3738 + CVE-2007-3844 - + aetius - + aetius - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-10.xml index 568dbdc1ff..cae5aac23b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-10.xml @@ -1,6 +1,5 @@ - MySQL: Denial of Service and information leakage @@ -8,8 +7,8 @@ vulnerability were found in MySQL. mysql - August 16, 2007 - August 16, 2007: 01 + 2007-08-16 + 2007-08-16: 01 185333 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.0.44" + # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.0.44" - CVE-2007-3780 - CVE-2007-3781 + CVE-2007-3780 + CVE-2007-3781 - + falco - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-11.xml index 13fab843a4..d20f4a3fed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-11.xml @@ -1,6 +1,5 @@ - Lighttpd: Multiple vulnerabilities @@ -8,8 +7,8 @@ Denial of Service and potentially the remote execution of arbitrary code. lighttpd - August 16, 2007 - August 16, 2007: 01 + 2007-08-16 + 2007-08-16: 01 185442 remote @@ -51,22 +50,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.16" + # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.16" - CVE-2007-3946 - CVE-2007-3947 - CVE-2007-3948 - CVE-2007-3949 - CVE-2007-3950 + CVE-2007-3946 + CVE-2007-3947 + CVE-2007-3948 + CVE-2007-3949 + CVE-2007-3950 - + jaervosz - + falco - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-12.xml index 8a64e4ef53..173f5ec012 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-12.xml @@ -1,6 +1,5 @@ - Wireshark: Multiple vulnerabilities @@ -8,8 +7,8 @@ the remote execution of arbitrary code and a Denial of Service. wireshark - August 16, 2007 - August 16, 2007: 01 + 2007-08-16 + 2007-08-16: 01 183520 remote @@ -53,22 +52,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.6" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.6" - CVE-2007-3389 - CVE-2007-3390 - CVE-2007-3391 - CVE-2007-3392 - CVE-2007-3393 + CVE-2007-3389 + CVE-2007-3390 + CVE-2007-3391 + CVE-2007-3392 + CVE-2007-3393 - + aetius - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-13.xml index 5913cd8805..200dd821ca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-13.xml @@ -1,6 +1,5 @@ - BIND: Weak random number generation @@ -8,8 +7,8 @@ easier to guess the next query ID and perform a DNS cache poisoning attack. bind - August 18, 2007 - August 18, 2007: 01 + 2007-08-18 + 2007-08-18: 01 186556 remote @@ -61,19 +60,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.1_p1" + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.1_p1" - CVE-2007-2925 - CVE-2007-2926 + CVE-2007-2925 + CVE-2007-2926 - + aetius - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-14.xml index 7ebda5a115..642ce2cea7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-14.xml @@ -1,6 +1,5 @@ - NVIDIA drivers: Denial of Service @@ -8,8 +7,8 @@ for a Denial of Service. nvidia-drivers - August 19, 2007 - October 11, 2007: 03 + 2007-08-19 + 2007-10-11: 03 183567 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose "x11-drivers/nvidia-drivers" + # emerge --ask --oneshot --verbose "x11-drivers/nvidia-drivers" - CVE-2007-3532 + CVE-2007-3532 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-15.xml index 9a1c34b007..2cde52f347 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-15.xml @@ -1,14 +1,13 @@ - Apache mod_jk: Directory traversal A directory traversal vulnerability has been discovered in Apache mod_jk. mod_jk - August 19, 2007 - August 19, 2007: 01 + 2007-08-19 + 2007-08-19: 01 186218 remote @@ -45,18 +44,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apache/mod_jk-1.2.23" + # emerge --ask --oneshot --verbose ">=www-apache/mod_jk-1.2.23" - CVE-2007-1860 + CVE-2007-1860 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-16.xml index 9034265a48..97b6013a58 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-16.xml @@ -1,6 +1,5 @@ - Qt: Multiple format string vulnerabilities @@ -8,8 +7,8 @@ arbitrary code in some Qt applications. qt - August 22, 2007 - August 22, 2007: 01 + 2007-08-22 + 2007-08-22: 01 185446 remote, local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose "=x11-libs/qt-3*" + # emerge --ask --oneshot --verbose "=x11-libs/qt-3*" - CVE-2007-3388 + CVE-2007-3388 - + jaervosz - + jaervosz - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-17.xml index ae88c4c043..d277f10695 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200708-17.xml @@ -1,6 +1,5 @@ - Opera: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code. opera - August 22, 2007 - August 22, 2007: 01 + 2007-08-22 + 2007-08-22: 01 185497 188987 remote @@ -59,22 +58,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-9.23" + # emerge --ask --oneshot --verbose ">=www-client/opera-9.23" - CVE-2007-3142 - CVE-2007-3819 - CVE-2007-3929 - CVE-2007-4367 - Opera Advisory 861 + CVE-2007-3142 + CVE-2007-3819 + CVE-2007-3929 + CVE-2007-4367 + Opera Advisory 861 - + jaervosz - + jaervosz - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-01.xml index 3508fc0085..e0c1481803 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-01.xml @@ -1,6 +1,5 @@ - MIT Kerberos 5: Multiple vulnerabilities @@ -8,8 +7,8 @@ remote unauthenticated user to execute arbitrary code with root privileges. mit-krb5 - September 11, 2007 - September 11, 2007: 01 + 2007-09-11 + 2007-09-11: 01 191301 remote @@ -54,19 +53,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.3-r1" + # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.5.3-r1" - CVE-2007-3999 - CVE-2007-4000 + CVE-2007-3999 + CVE-2007-4000 - + p-y - + jaervosz - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-02.xml index 9225bf7286..298877802c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-02.xml @@ -1,6 +1,5 @@ - KVIrc: Remote arbitrary code execution @@ -8,8 +7,8 @@ execution of arbitrary code. kvirc - September 13, 2007 - September 13, 2007: 01 + 2007-09-13 + 2007-09-13: 01 183174 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/kvirc-3.2.6_pre20070714" + # emerge --ask --oneshot --verbose ">=net-irc/kvirc-3.2.6_pre20070714" - CVE-2007-2951 + CVE-2007-2951 - + p-y - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-03.xml index 4cc73a9988..a5c627d9ed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-03.xml @@ -1,6 +1,5 @@ - Streamripper: Buffer overflow @@ -8,8 +7,8 @@ allowing for user-assisted execution of arbitrary code. streamripper - September 13, 2007 - September 13, 2007: 01 + 2007-09-13 + 2007-09-13: 01 188698 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/streamripper-1.62.2" + # emerge --ask --oneshot --verbose ">=media-sound/streamripper-1.62.2" - CVE-2007-4337 + CVE-2007-4337 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-04.xml index 788b657edb..7d7725a17f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-04.xml @@ -1,14 +1,13 @@ - po4a: Insecure temporary file creation A vulnerability has been discovered in po4a, allowing for a symlink attack. po4a - September 13, 2007 - September 13, 2007: 01 + 2007-09-13 + 2007-09-13: 01 189440 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/po4a-0.32-r1" + # emerge --ask --oneshot --verbose ">=app-text/po4a-0.32-r1" - CVE-2007-4462 + CVE-2007-4462 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-05.xml index 606a7fa71c..a43e61c73a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-05.xml @@ -1,6 +1,5 @@ - RealPlayer: Buffer overflow @@ -8,8 +7,8 @@ arbitrary code. realplayer - September 14, 2007 - September 14, 2007: 01 + 2007-09-14 + 2007-09-14: 01 183421 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/realplayer-10.0.9" + # emerge --ask --oneshot --verbose ">=media-video/realplayer-10.0.9" - CVE-2007-3410 + CVE-2007-3410 - + p-y - + p-y - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-06.xml index b7aa98b62f..0d1afd51ec 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-06.xml @@ -1,6 +1,5 @@ - flac123: Buffer overflow @@ -8,8 +7,8 @@ for the execution of arbitrary code. flac123 - September 14, 2007 - September 14, 2007: 01 + 2007-09-14 + 2007-09-14: 01 186220 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/flac123-0.0.11" + # emerge --ask --oneshot --verbose ">=media-sound/flac123-0.0.11" - CVE-2007-3507 + CVE-2007-3507 - + p-y - + p-y - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-07.xml index 253ff53139..20582a6df7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-07.xml @@ -1,14 +1,13 @@ - Eggdrop: Buffer overflow A remote stack-based buffer overflow has been discovered in Eggdrop. eggdrop - September 15, 2007 - September 26, 2007: 02 + 2007-09-15 + 2007-09-26: 02 179354 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/eggdrop-1.6.18-r3" + # emerge --ask --oneshot --verbose ">=net-irc/eggdrop-1.6.18-r3" - CVE-2007-2807 + CVE-2007-2807 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-08.xml index 430cacc1ac..bdb954f17b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-08.xml @@ -1,6 +1,5 @@ - id3lib: Insecure temporary file creation @@ -8,8 +7,8 @@ overwrite arbitrary files via a symlink attack. id3lib - September 15, 2007 - September 15, 2007: 01 + 2007-09-15 + 2007-09-15: 01 189610 local @@ -47,15 +46,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/id3lib-3.8.3-r6" + # emerge --ask --oneshot --verbose ">=media-libs/id3lib-3.8.3-r6" - CVE-2007-4460 + CVE-2007-4460 - + mfleming - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-09.xml index 9f89f86f2a..8c6732c78d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-09.xml @@ -1,14 +1,13 @@ - GNU Tar: Directory traversal vulnerability A directory traversal vulnerability has been discovered in GNU Tar. tar - September 15, 2007 - September 15, 2007: 01 + 2007-09-15 + 2007-09-15: 01 189682 remote @@ -47,15 +46,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/tar-1.18-r2" + # emerge --ask --oneshot --verbose ">=app-arch/tar-1.18-r2" - CVE-2007-4131 + CVE-2007-4131 - + mfleming - + mfleming
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-10.xml index aa63a1052e..e89ed3ee58 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-10.xml @@ -1,14 +1,13 @@ - PhpWiki: Authentication bypass A vulnerability has been discovered in PhpWiki authentication mechanism. phpwiki - September 18, 2007 - September 18, 2007: 01 + 2007-09-18 + 2007-09-18: 01 181692 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/phpwiki-1.3.14" + # emerge --ask --oneshot --verbose ">=www-apps/phpwiki-1.3.14" - CVE-2007-3193 + CVE-2007-3193 - + aetius - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-11.xml index ac74f0b155..dfd7650301 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-11.xml @@ -1,6 +1,5 @@ - GDM: Local Denial of Service @@ -8,8 +7,8 @@ displays. gdm - September 18, 2007 - September 18, 2007: 01 + 2007-09-18 + 2007-09-18: 01 187919 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose "gnome-base/gdm" + # emerge --ask --oneshot --verbose "gnome-base/gdm" - CVE-2007-3381 + CVE-2007-3381 - + jaervosz - + jaervosz - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-12.xml index 0bd9deb5b4..867b4a2c7a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-12.xml @@ -1,14 +1,13 @@ - Poppler: Two buffer overflow vulnerabilities Poppler is vulnerable to an integer overflow and a stack overflow. poppler - September 19, 2007 - September 19, 2007: 01 + 2007-09-19 + 2007-09-19: 01 188863 remote @@ -53,18 +52,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/poppler-0.5.4-r2" + # emerge --ask --oneshot --verbose ">=app-text/poppler-0.5.4-r2" - CVE-2007-3387 + CVE-2007-3387 - + p-y - + p-y - + aetius
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-13.xml index c7a6f18277..c7a04a379d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-13.xml @@ -1,6 +1,5 @@ - rsync: Two buffer overflows @@ -8,8 +7,8 @@ rsync. rsync - September 20, 2007 - September 20, 2007: 01 + 2007-09-20 + 2007-09-20: 01 189132 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.9-r3" + # emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.9-r3" - CVE-2007-4091 + CVE-2007-4091 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-14.xml index 1b15c0e8ba..0c3cd426cd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-14.xml @@ -1,6 +1,5 @@ - ClamAV: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code and Denial of Service attacks. clamav - September 20, 2007 - September 20, 2007: 01 + 2007-09-20 + 2007-09-20: 01 189912 remote @@ -58,16 +57,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.91.2" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.91.2" - CVE-2007-4510 - CVE-2007-4560 + CVE-2007-4510 + CVE-2007-4560 - + mfleming - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-15.xml index b05d860d0a..c4cb541cd4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-15.xml @@ -1,6 +1,5 @@ - BEA JRockit: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code. jrockit-jdk-bin - September 23, 2007 - September 23, 2007: 01 + 2007-09-23 + 2007-09-23: 01 190686 remote @@ -58,23 +57,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/jrockit-jdk-bin-1.5.0.11_p1" + # emerge --ask --oneshot --verbose ">=dev-java/jrockit-jdk-bin-1.5.0.11_p1" - CVE-2007-2788 - CVE-2007-2789 - CVE-2007-3004 - CVE-2007-3005 - CVE-2007-3503 - CVE-2007-3698 - CVE-2007-3716 - CVE-2007-3922 - CVE-2007-4381 + CVE-2007-2788 + CVE-2007-2789 + CVE-2007-3004 + CVE-2007-3005 + CVE-2007-3503 + CVE-2007-3698 + CVE-2007-3716 + CVE-2007-3922 + CVE-2007-4381 - + mfleming - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-16.xml index 34ceeeff5e..18755bc09b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-16.xml @@ -1,14 +1,13 @@ - Lighttpd: Buffer overflow Lighttpd is vulnerable to the remote execution of arbitrary code. lighttpd - September 27, 2007 - September 27, 2007: 01 + 2007-09-27 + 2007-09-27: 01 191912 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.18" + # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.18" - CVE-2007-4727 + CVE-2007-4727 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-17.xml index a6f48818d4..4a5cc13f28 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-17.xml @@ -1,6 +1,5 @@ - teTeX: Multiple buffer overflows @@ -8,8 +7,8 @@ user-assisted execution of arbitrary code. tetex - September 27, 2007 - September 27, 2007: 01 + 2007-09-27 + 2007-09-27: 01 170861 182055 188172 @@ -53,20 +52,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/tetex-3.0_p1-r4" + # emerge --ask --oneshot --verbose ">=app-text/tetex-3.0_p1-r4" - CVE-2007-0650 - CVE-2007-3387 - GLSA-200708-05 + CVE-2007-0650 + CVE-2007-3387 + GLSA-200708-05 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-18.xml index d37eb46a8e..3817c89f6e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200709-18.xml @@ -1,6 +1,5 @@ - Bugzilla: Multiple vulnerabilities @@ -8,8 +7,8 @@ the remote execution of arbitrary code. bugzilla - September 30, 2007 - May 28, 2009: 03 + 2007-09-30 + 2009-05-28: 03 190112 remote @@ -67,17 +66,17 @@ # emerge --ask --oneshot --verbose www-apps/bugzilla - CVE-2007-4538 - CVE-2007-4539 - CVE-2007-4543 + CVE-2007-4538 + CVE-2007-4539 + CVE-2007-4543 - + p-y - + falco - + falco diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-01.xml index 4c65f822fa..c646111cdc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-01.xml @@ -1,14 +1,13 @@ - RPCSEC_GSS library: Buffer overflow A buffer overflow vulnerability has been discovered in librpcsecgss. librcpsecgss - October 04, 2007 - October 04, 2007: 01 + 2007-10-04 + 2007-10-04: 01 191479 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/librpcsecgss-0.16" + # emerge --ask --oneshot --verbose ">=net-libs/librpcsecgss-0.16" - CVE-2007-3999 - GLSA-200709-01 + CVE-2007-3999 + GLSA-200709-01 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-02.xml index d434b93e2a..78050bdd1c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-02.xml @@ -1,6 +1,5 @@ - PHP: Multiple vulnerabilities @@ -8,8 +7,8 @@ which could lead to the remote execution of arbitrary code. php - October 07, 2007 - October 07, 2007: 01 + 2007-10-07 + 2007-10-07: 01 179158 180556 191034 @@ -108,45 +107,45 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/php-5.2.4_p20070914-r2" + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.2.4_p20070914-r2" - CVE-2007-1883 - CVE-2007-1887 - CVE-2007-1900 - CVE-2007-2756 - CVE-2007-2872 - CVE-2007-3007 - CVE-2007-3378 - CVE-2007-3806 - CVE-2007-3996 - CVE-2007-3997 - CVE-2007-3998 - CVE-2007-4652 - CVE-2007-4657 - CVE-2007-4658 - CVE-2007-4659 - CVE-2007-4660 - CVE-2007-4661 - CVE-2007-4662 - CVE-2007-4663 - CVE-2007-4670 - CVE-2007-4727 - CVE-2007-4782 - CVE-2007-4783 - CVE-2007-4784 - CVE-2007-4825 - CVE-2007-4840 - CVE-2007-4887 - GLSA 200705-19 + CVE-2007-1883 + CVE-2007-1887 + CVE-2007-1900 + CVE-2007-2756 + CVE-2007-2872 + CVE-2007-3007 + CVE-2007-3378 + CVE-2007-3806 + CVE-2007-3996 + CVE-2007-3997 + CVE-2007-3998 + CVE-2007-4652 + CVE-2007-4657 + CVE-2007-4658 + CVE-2007-4659 + CVE-2007-4660 + CVE-2007-4661 + CVE-2007-4662 + CVE-2007-4663 + CVE-2007-4670 + CVE-2007-4727 + CVE-2007-4782 + CVE-2007-4783 + CVE-2007-4784 + CVE-2007-4825 + CVE-2007-4840 + CVE-2007-4887 + GLSA 200705-19 - + jaervosz - + jaervosz - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-03.xml index c19c7d3ad7..3f1bf7160a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-03.xml @@ -1,6 +1,5 @@ - libvorbis: Multiple vulnerabilities @@ -8,8 +7,8 @@ discovered in libvorbis. libvorbis - October 07, 2007 - October 07, 2007: 01 + 2007-10-07 + 2007-10-07: 01 186716 remote @@ -55,21 +54,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libvorbis-1.2.0" + # emerge --ask --oneshot --verbose ">=media-libs/libvorbis-1.2.0" - CVE-2007-3106 - CVE-2007-4029 - CVE-2007-4065 - CVE-2007-4066 + CVE-2007-3106 + CVE-2007-4029 + CVE-2007-4065 + CVE-2007-4066 - + aetius - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-04.xml index 003dd4d914..0453780a62 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-04.xml @@ -1,14 +1,13 @@ - libsndfile: Buffer overflow A buffer overflow vulnerability has been discovered in libsndfile. libsndfile - October 07, 2007 - October 07, 2007: 01 + 2007-10-07 + 2007-10-07: 01 192834 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.17-r1" + # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.17-r1" - CVE-2007-4974 + CVE-2007-4974 - + p-y - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-05.xml index 6b41b0b309..5b064f1fed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-05.xml @@ -1,6 +1,5 @@ - QGit: Insecure temporary file creation @@ -9,8 +8,8 @@ rights. qgit - October 07, 2007 - October 07, 2007: 01 + 2007-10-07 + 2007-10-07: 01 190697 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/qgit-1.5.7" + # emerge --ask --oneshot --verbose ">=dev-util/qgit-1.5.7" - CVE-2007-4631 + CVE-2007-4631 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-06.xml index c2b9a089eb..5e7089f3a3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-06.xml @@ -1,6 +1,5 @@ - OpenSSL: Multiple vulnerabilities @@ -8,8 +7,8 @@ vulnerability have been discovered in OpenSSL. openssl - October 07, 2007 - October 07, 2007: 01 + 2007-10-07 + 2007-10-07: 01 188799 194039 local, remote @@ -53,20 +52,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8e-r3" + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8e-r3" - CVE-2006-3738 - CVE-2007-3108 - CVE-2007-5135 + CVE-2006-3738 + CVE-2007-3108 + CVE-2007-5135 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-07.xml index dbbab17b53..e56484f84c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-07.xml @@ -1,14 +1,13 @@ - Tk: Buffer overflow A buffer overflow vulnerability has been discovered in Tk. tk - October 07, 2007 - October 07, 2007: 01 + 2007-10-07 + 2007-10-07: 01 192539 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/tk-8.4.15-r1" + # emerge --ask --oneshot --verbose ">=dev-lang/tk-8.4.15-r1" - CVE-2007-4851 + CVE-2007-4851 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-08.xml index 068cb65f10..9e4ebc3fd7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-08.xml @@ -1,6 +1,5 @@ - KOffice, KWord, KPDF, KDE Graphics Libraries: Stack-based buffer overflow @@ -8,8 +7,8 @@ overflow. koffice, kword, kdegraphics, kpdf - October 09, 2007 - October 09, 2007: 01 + 2007-10-09 + 2007-10-09: 01 187139 remote @@ -63,36 +62,36 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/koffice-1.6.3-r1" + # emerge --ask --oneshot --verbose ">=app-office/koffice-1.6.3-r1"

All KWord users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/kword-1.6.3-r1" + # emerge --ask --oneshot --verbose ">=app-office/kword-1.6.3-r1"

All KDE Graphics Libraries users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.5.7-r1" + # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.5.7-r1"

All KPDF users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.5.7-r1" + # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.5.7-r1" - CVE-2007-3387 + CVE-2007-3387 - + p-y - + p-y - + aetius
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-09.xml index 2b8fa94252..4f586ba1c9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-09.xml @@ -1,6 +1,5 @@ - NX 2.1: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ overflow vulnerability. nx, nxnode - October 09, 2007 - October 09, 2007: 01 + 2007-10-09 + 2007-10-09: 01 192712 remote @@ -56,25 +55,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/nx-3.0.0" + # emerge --ask --oneshot --verbose ">=net-misc/nx-3.0.0"

All NX Node users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/nxnode-3.0.0-r3" + # emerge --ask --oneshot --verbose ">=net-misc/nxnode-3.0.0-r3" - CVE-2006-1861 - GLSA 200607-02 + CVE-2006-1861 + GLSA 200607-02 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-10.xml index a2786c2858..ab94373e8e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-10.xml @@ -1,14 +1,13 @@ - SKK Tools: Insecure temporary file creation SKK insecurely creates temporary files. skktools - October 12, 2007 - October 12, 2007: 01 + 2007-10-12 + 2007-10-12: 01 193121 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-i18n/skktools-1.2-r1" + # emerge --ask --oneshot --verbose ">=app-i18n/skktools-1.2-r1" - CVE-2007-3916 + CVE-2007-3916 - + p-y - + p-y - + aetius
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-11.xml index 59aad364bf..f90d7fc615 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-11.xml @@ -1,6 +1,5 @@ - X Font Server: Multiple Vulnerabilities @@ -8,8 +7,8 @@ allowing local attackers to gain elevated privileges. xfs - October 12, 2007 - October 12, 2007: 01 + 2007-10-12 + 2007-10-12: 01 185660 194606 local @@ -58,20 +57,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-apps/xfs-1.0.5" + # emerge --ask --oneshot --verbose ">=x11-apps/xfs-1.0.5" - CVE-2007-3103 - CVE-2007-4568 - CVE-2007-4990 + CVE-2007-3103 + CVE-2007-4568 + CVE-2007-4990 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-12.xml index e20176743b..7b6de0940d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-12.xml @@ -1,6 +1,5 @@ - T1Lib: Buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. t1lib - October 12, 2007 - October 12, 2007: 01 + 2007-10-12 + 2007-10-12: 01 193437 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/t1lib-5.0.2-r1" + # emerge --ask --oneshot --verbose ">=media-libs/t1lib-5.0.2-r1" - CVE-2007-4033 + CVE-2007-4033 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-13.xml index 85faa280aa..c963a9adc1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-13.xml @@ -1,6 +1,5 @@ - Ampache: Multiple vulnerabilities @@ -8,8 +7,8 @@ discovered in Ampache. ampache - October 13, 2007 - October 13, 2007: 01 + 2007-10-13 + 2007-10-13: 01 189607 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/ampache-3.3.3.5" + # emerge --ask --oneshot --verbose ">=www-apps/ampache-3.3.3.5" - CVE-2007-4437 - CVE-2007-4438 + CVE-2007-4437 + CVE-2007-4438 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-14.xml index 4061335005..5d8e8b51a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-14.xml @@ -1,6 +1,5 @@ - DenyHosts: Denial of Service @@ -8,8 +7,8 @@ remote Denial of Service. denyhosts - October 13, 2007 - October 13, 2007: 01 + 2007-10-13 + 2007-10-13: 01 181213 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/denyhosts-2.6-r1" + # emerge --ask --oneshot --verbose ">=app-admin/denyhosts-2.6-r1" - CVE-2007-4323 + CVE-2007-4323 - + p-y - + p-y - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-15.xml index cb190168c7..ced0e1c0f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-15.xml @@ -1,6 +1,5 @@ - KDM: Local privilege escalation @@ -8,8 +7,8 @@ local user to gain elevated privileges. KDM - October 14, 2007 - October 14, 2007: 01 + 2007-10-14 + 2007-10-14: 01 192373 local @@ -53,24 +52,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdm-3.5.7-r2" + # emerge --ask --oneshot --verbose ">=kde-base/kdm-3.5.7-r2"

All kdebase users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdebase-3.5.7-r4" + # emerge --ask --oneshot --verbose ">=kde-base/kdebase-3.5.7-r4" - CVE-2007-4569 + CVE-2007-4569 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-16.xml index 7cfd9b1fea..1697772274 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-16.xml @@ -1,6 +1,5 @@ - X.Org X server: Composite local privilege escalation @@ -8,8 +7,8 @@ X server, allowing for a local privilege escalation. X.Org - October 14, 2007 - October 14, 2007: 01 + 2007-10-14 + 2007-10-14: 01 191964 local @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.3.0.0-r1" + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.3.0.0-r1" - CVE-2007-4730 + CVE-2007-4730 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-17.xml index 30300ea6c2..c57635af64 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-17.xml @@ -1,6 +1,5 @@ - Balsa: Buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. balsa - October 16, 2007 - October 16, 2007: 01 + 2007-10-16 + 2007-10-16: 01 193179 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/balsa-2.3.20" + # emerge --ask --oneshot --verbose ">=mail-client/balsa-2.3.20" - CVE-2007-5007 + CVE-2007-5007 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-18.xml index c7c13af63f..3680908eb0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-18.xml @@ -1,6 +1,5 @@ - util-linux: Local privilege escalation @@ -8,8 +7,8 @@ privileges. util-linux - October 18, 2007 - October 18, 2007: 01 + 2007-10-18 + 2007-10-18: 01 195390 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/util-linux-2.12r-r8" + # emerge --ask --oneshot --verbose ">=sys-apps/util-linux-2.12r-r8" - CVE-2007-5191 + CVE-2007-5191 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-19.xml index e8a01d92d4..9230e126c7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-19.xml @@ -1,6 +1,5 @@ - The Sleuth Kit: Integer underflow @@ -8,8 +7,8 @@ allowing for the user-assisted execution of arbitrary code. sleuthkit - October 18, 2007 - October 18, 2007: 01 + 2007-10-18 + 2007-10-18: 01 181977 remote @@ -53,21 +52,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-forensics/sleuthkit-2.0.9" + # emerge --ask --oneshot --verbose ">=app-forensics/sleuthkit-2.0.9" - CVE-2007-1536 - CVE-2007-2799 - GLSA 200703-26 - GLSA 200705-25 + CVE-2007-1536 + CVE-2007-2799 + GLSA 200703-26 + GLSA 200705-25 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-20.xml index 4f0d565e46..9dbe48f0f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-20.xml @@ -1,6 +1,5 @@ - PDFKit, ImageKits: Buffer overflow @@ -8,8 +7,8 @@ overflow allowing for the user-assisted execution of arbitrary code. pdfkit imagekits - October 18, 2007 - October 18, 2007: 01 + 2007-10-18 + 2007-10-18: 01 188185 remote @@ -63,16 +62,16 @@

- CVE-2007-3387 - GLSA 200709-12 + CVE-2007-3387 + GLSA 200709-12 - + falco - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-21.xml index f287bb4934..3101f1bdcd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-21.xml @@ -1,6 +1,5 @@ - TikiWiki: Arbitrary command execution @@ -8,8 +7,8 @@ execution of arbitrary code. tikiwiki - October 20, 2007 - October 20, 2007: 01 + 2007-10-20 + 2007-10-20: 01 195503 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.8.1" + # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.8.1" - CVE-2007-5423 + CVE-2007-5423 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-22.xml index e0939e113a..b669a0bbd6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-22.xml @@ -1,14 +1,13 @@ - TRAMP: Insecure temporary file creation The TRAMP package for GNU Emacs insecurely creates temporary files. tramp - October 20, 2007 - December 30, 2007: 02 + 2007-10-20 + 2007-12-30: 02 194713 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emacs/tramp-2.1.10-r2" + # emerge --ask --oneshot --verbose ">=app-emacs/tramp-2.1.10-r2" - CVE-2007-5377 + CVE-2007-5377 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-23.xml index 7632b869e9..6bf8cd24dd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-23.xml @@ -1,14 +1,13 @@ - Star: Directory traversal vulnerability A directory traversal vulnerability has been discovered in Star. star - October 22, 2007 - October 22, 2007: 01 + 2007-10-22 + 2007-10-22: 01 189690 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/star-1.5_alpha84" + # emerge --ask --oneshot --verbose ">=app-arch/star-1.5_alpha84" - CVE-2007-4134 + CVE-2007-4134 - + aetius - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-24.xml index 4ff60d52a4..d9e0115dd1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-24.xml @@ -1,6 +1,5 @@ - OpenOffice.org: Heap-based buffer overflow @@ -8,8 +7,8 @@ OpenOffice.org, allowing for the remote execution of arbitrary code. openoffice - October 23, 2007 - October 23, 2007: 01 + 2007-10-23 + 2007-10-23: 01 192818 remote @@ -54,24 +53,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.3.0" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.3.0"

All OpenOffice.org binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.3.0" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.3.0" - CVE-2007-2834 + CVE-2007-2834 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-25.xml index 30c88b350f..b0ea948e75 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-25.xml @@ -1,6 +1,5 @@ - MLDonkey: Privilege escalation @@ -8,8 +7,8 @@ shell and no password. mldonkey - October 24, 2007 - November 07, 2007: 02 + 2007-10-24 + 2007-11-07: 02 189412 remote @@ -59,15 +58,15 @@

- CVE-2007-5714 + CVE-2007-5714 - + jaervosz - + aetius - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-26.xml index 272f09a787..52bf650036 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-26.xml @@ -1,6 +1,5 @@ - HPLIP: Privilege escalation @@ -8,8 +7,8 @@ with root privileges. hplip - October 24, 2007 - October 24, 2007: 01 + 2007-10-24 + 2007-10-24: 01 195565 local @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose "net-print/hplip" + # emerge --ask --oneshot --verbose "net-print/hplip" - CVE-2007-5208 + CVE-2007-5208 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-27.xml index a515c2f5f7..6f145e37fc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-27.xml @@ -1,6 +1,5 @@ - ImageMagick: Multiple vulnerabilities @@ -8,8 +7,8 @@ resulting in arbitrary code execution or a Denial of Service. imagemagick - October 24, 2007 - October 24, 2007: 01 + 2007-10-24 + 2007-10-24: 01 186030 remote @@ -52,21 +51,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.3.5.10" + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.3.5.10" - CVE-2007-4985 - CVE-2007-4986 - CVE-2007-4987 - CVE-2007-4988 + CVE-2007-4985 + CVE-2007-4986 + CVE-2007-4987 + CVE-2007-4988 - + rbu - + p-y - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-28.xml index 9cc0ac4d47..60ed75fa58 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-28.xml @@ -1,6 +1,5 @@ - Qt: Buffer overflow @@ -8,8 +7,8 @@ in the execution of arbitrary code. qt - October 25, 2007 - October 25, 2007: 01 + 2007-10-25 + 2007-10-25: 01 192472 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.8-r4" + # emerge --ask --oneshot --verbose ">=x11-libs/qt-3.3.8-r4" - CVE-2007-4137 + CVE-2007-4137 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-29.xml index 89604d68b5..e79ef52121 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-29.xml @@ -1,6 +1,5 @@ - Sylpheed, Claws Mail: User-assisted remote execution of arbitrary code @@ -8,8 +7,8 @@ potentially leading to the remote execution of arbitrary code. sylpheed claws-mail - October 25, 2007 - October 25, 2007: 01 + 2007-10-25 + 2007-10-25: 01 190104 remote @@ -52,24 +51,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-2.4.5" + # emerge --ask --oneshot --verbose ">=mail-client/sylpheed-2.4.5"

All Claws Mail users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/claws-mail-3.0.0" + # emerge --ask --oneshot --verbose ">=mail-client/claws-mail-3.0.0" - CVE-2007-2958 + CVE-2007-2958 - + rbu - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-30.xml index cdd5b3289e..4b2092e0e5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-30.xml @@ -1,6 +1,5 @@ - OpenSSL: Remote execution of arbitrary code @@ -8,8 +7,8 @@ Denial of Service. openssl - October 27, 2007 - October 30, 2007: 03 + 2007-10-27 + 2007-10-30: 03 195634 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8f" + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8f" - CVE-2007-4995 + CVE-2007-4995 - + rbu - + rbu - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-31.xml index 274b6086a0..497e9755b6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200710-31.xml @@ -1,6 +1,5 @@ - Opera: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. opera - October 30, 2007 - October 30, 2007: 01 + 2007-10-30 + 2007-10-30: 01 196164 remote @@ -54,16 +53,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-9.24" + # emerge --ask --oneshot --verbose ">=www-client/opera-9.24" - CVE-2007-5540 - CVE-2007-5541 + CVE-2007-5540 + CVE-2007-5541 - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-01.xml index f3bb9f393a..dcbcb1f89b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-01.xml @@ -1,6 +1,5 @@ - gFTP: Multiple vulnerabilities @@ -8,8 +7,8 @@ used in gFTP. gftp - November 01, 2007 - November 01, 2007: 01 + 2007-11-01 + 2007-11-01: 01 188252 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/gftp-2.0.18-r6" + # emerge --ask --oneshot --verbose ">=net-ftp/gftp-2.0.18-r6" - CVE-2007-3961 - CVE-2007-3962 + CVE-2007-3961 + CVE-2007-3962 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-02.xml index 448eeee551..708892c06c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-02.xml @@ -1,6 +1,5 @@ - OpenSSH: Security bypass @@ -8,8 +7,8 @@ bypass security restrictions. openssh - November 01, 2007 - November 01, 2007: 01 + 2007-11-01 + 2007-11-01: 01 191321 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.7" + # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.7" - CVE-2007-4752 + CVE-2007-4752 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-03.xml index d77a53fd50..751ba2ec58 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-03.xml @@ -1,6 +1,5 @@ - Gallery: Multiple vulnerabilities @@ -8,8 +7,8 @@ vulnerabilities. gallery - November 01, 2007 - November 11, 2007: 02 + 2007-11-01 + 2007-11-11: 02 191587 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/gallery-2.2.3" + # emerge --ask --oneshot --verbose ">=www-apps/gallery-2.2.3" - CVE-2007-4650 + CVE-2007-4650 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-04.xml index 82135bc39f..493f62ff36 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-04.xml @@ -1,6 +1,5 @@ - Evolution: User-assisted remote execution of arbitrary code @@ -8,8 +7,8 @@ to the execution of arbitrary code. evolution-data-server - November 06, 2007 - November 06, 2007: 01 + 2007-11-06 + 2007-11-06: 01 190861 remote @@ -53,19 +52,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=gnome-extra/evolution-data-server-1.10.3.1" + # emerge --ask --oneshot --verbose ">=gnome-extra/evolution-data-server-1.10.3.1" - GLSA 200707-03 - CVE-2007-3257 + GLSA 200707-03 + CVE-2007-3257 - + p-y - + p-y - + aetius
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-05.xml index 90a79c2721..15e05638b5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-05.xml @@ -1,6 +1,5 @@ - SiteBar: Multiple issues @@ -8,8 +7,8 @@ of arbitrary code and arbitrary file disclosure. sitebar - November 06, 2007 - November 06, 2007: 01 + 2007-11-06 + 2007-11-06: 01 195810 remote @@ -59,20 +58,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/sitebar-3.3.9" + # emerge --ask --oneshot --verbose ">=www-apps/sitebar-3.3.9" - CVE-2007-5491 - CVE-2007-5492 - CVE-2007-5692 - CVE-2007-5693 - CVE-2007-5694 - CVE-2007-5695 + CVE-2007-5491 + CVE-2007-5492 + CVE-2007-5692 + CVE-2007-5693 + CVE-2007-5694 + CVE-2007-5695 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-06.xml index e934ddb3c1..44391d2eed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-06.xml @@ -1,6 +1,5 @@ - Apache: Multiple vulnerabilities @@ -8,8 +7,8 @@ in a Denial of Service or the disclosure of sensitive information. apache - November 07, 2007 - November 07, 2007: 01 + 2007-11-07 + 2007-11-07: 01 186219 remote @@ -55,23 +54,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.59-r5" + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.0.59-r5" - CVE-2006-5752 - CVE-2007-1862 - CVE-2007-1863 - CVE-2007-3304 - CVE-2007-3847 - CVE-2007-4465 + CVE-2006-5752 + CVE-2007-1862 + CVE-2007-1863 + CVE-2007-3304 + CVE-2007-3847 + CVE-2007-4465 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-07.xml index f50183aea1..b27acc47f0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-07.xml @@ -1,6 +1,5 @@ - Python: User-assisted execution of arbitrary code @@ -9,8 +8,8 @@ Service. python - November 07, 2007 - November 07, 2007: 01 + 2007-11-07 + 2007-11-07: 01 192876 remote @@ -54,24 +53,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/python-2.3.6-r3" + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.3.6-r3"

All Python 2.4.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.4-r6" + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.4-r6" - CVE-2007-4965 + CVE-2007-4965 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-08.xml index 1f4738b9ae..40402dc158 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-08.xml @@ -1,6 +1,5 @@ - libpng: Multiple Denials of Service @@ -8,8 +7,8 @@ applications that handle untrusted images. libpng - November 07, 2007 - November 07, 2007: 01 + 2007-11-07 + 2007-11-07: 01 195261 remote @@ -52,20 +51,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.21-r3" + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.21-r3" - CVE-2007-5266 - CVE-2007-5268 - CVE-2007-5269 + CVE-2007-5266 + CVE-2007-5268 + CVE-2007-5269 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-09.xml index b229a58a3e..32d7cd6631 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-09.xml @@ -1,6 +1,5 @@ - MadWifi: Denial of Service @@ -8,8 +7,8 @@ remotely triggered Denial of Service. madwifi-ng - November 07, 2007 - November 07, 2007: 01 + 2007-11-07 + 2007-11-07: 01 195705 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.3.3" + # emerge --ask --oneshot --verbose ">=net-wireless/madwifi-ng-0.9.3.3" - CVE-2007-5448 + CVE-2007-5448 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-10.xml index cdfb4ff169..a524257564 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-10.xml @@ -1,6 +1,5 @@ - Mono: Buffer overflow @@ -8,8 +7,8 @@ that might lead to the execution of arbitrary code. mono - November 07, 2007 - November 07, 2007: 01 + 2007-11-07 + 2007-11-07: 01 197067 remote @@ -51,15 +50,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/mono-1.2.5.1-r1" + # emerge --ask --oneshot --verbose ">=dev-lang/mono-1.2.5.1-r1" - CVE-2007-5197 + CVE-2007-5197 - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-11.xml index c8c6c9dd37..3f5c86e291 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-11.xml @@ -1,6 +1,5 @@ - Nagios Plugins: Two buffer overflows @@ -8,8 +7,8 @@ remote execution of arbitrary code. nagios-plugins - November 08, 2007 - November 08, 2007: 01 + 2007-11-08 + 2007-11-08: 01 196308 194178 remote @@ -57,19 +56,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-plugins-1.4.10-r1" + # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-plugins-1.4.10-r1" - CVE-2007-5198 - CVE-2007-5623 + CVE-2007-5198 + CVE-2007-5623 - + rbu - + rbu - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-12.xml index 3b46e4fa29..b59d548e5f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-12.xml @@ -1,6 +1,5 @@ - Tomboy: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ a local attacker to execute arbitrary code. tomboy - November 08, 2007 - November 08, 2007: 01 + 2007-11-08 + 2007-11-08: 01 189249 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-misc/tomboy-0.8.1-r1" + # emerge --ask --oneshot --verbose ">=app-misc/tomboy-0.8.1-r1" - CVE-2005-4790 + CVE-2005-4790 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-13.xml index 4f09a9c540..8775276a9e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-13.xml @@ -1,6 +1,5 @@ - 3proxy: Denial of Service @@ -8,8 +7,8 @@ Denial of Service. 3proxy - November 08, 2007 - November 08, 2007: 01 + 2007-11-08 + 2007-11-08: 01 196772 remote @@ -27,8 +26,8 @@

3proxy contains a double free vulnerability in the ftpprchild() - function, which frees param->hostname and calls the parsehostname() - function, which in turn attempts to free param->hostname again. + function, which frees param->hostname and calls the parsehostname() + function, which in turn attempts to free param->hostname again.

@@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/3proxy-0.5.3j" + # emerge --ask --oneshot --verbose ">=net-proxy/3proxy-0.5.3j" - CVE-2007-5622 + CVE-2007-5622 - + p-y - + keytoaster - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-14.xml index af18f6bf94..e14ec86757 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-14.xml @@ -1,6 +1,5 @@ - Mozilla Firefox, SeaMonkey, XULRunner: Multiple vulnerabilities @@ -8,8 +7,8 @@ and XULRunner, potentially allowing to compromise a user's system. firefox seamonkey xulrunner - November 12, 2007 - November 12, 2007: 01 + 2007-11-12 + 2007-11-12: 01 196480 remote @@ -77,49 +76,49 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.9" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.9"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.9" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.9"

All SeaMonkey users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.6" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.6"

All SeaMonkey binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.6" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.6"

All XULRunner users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-1.8.1.9" + # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-1.8.1.9" - CVE-2007-1095 - CVE-2007-2292 - CVE-2007-5334 - CVE-2007-5335 - CVE-2007-5337 - CVE-2007-5338 - CVE-2007-5339 - CVE-2007-5340 + CVE-2007-1095 + CVE-2007-2292 + CVE-2007-5334 + CVE-2007-5335 + CVE-2007-5337 + CVE-2007-5338 + CVE-2007-5339 + CVE-2007-5340 - + rbu - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-15.xml index 493bdcf19a..1ea49e530d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-15.xml @@ -1,6 +1,5 @@ - FLAC: Buffer overflow @@ -8,8 +7,8 @@ allowing for the execution of arbitrary code. flac - November 12, 2007 - November 12, 2007: 01 + 2007-11-12 + 2007-11-12: 01 195700 remote @@ -51,7 +50,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/flac-1.2.1-r1" + # emerge --ask --oneshot --verbose ">=media-libs/flac-1.2.1-r1"

You should also run revdep-rebuild to rebuild any packages that depend on older versions of FLAC: @@ -60,15 +59,15 @@ # revdep-rebuild --library=libFLAC.* - CVE-2007-4619 + CVE-2007-4619 - + rbu - + rbu - + rbu diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-16.xml index cad29aee52..2a31004739 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-16.xml @@ -1,6 +1,5 @@ - CUPS: Memory corruption @@ -8,8 +7,8 @@ arbitrary code. cups - November 12, 2007 - November 12, 2007: 01 + 2007-11-12 + 2007-11-12: 01 196736 remote @@ -55,15 +54,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r2" + # emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r2" - CVE-2007-4351 + CVE-2007-4351 - + rbu - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-17.xml index b312cfb143..966522c8a1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-17.xml @@ -1,6 +1,5 @@ - Ruby on Rails: Multiple vulnerabilities @@ -8,8 +7,8 @@ disclosure and theft of user credentials. rails - November 14, 2007 - November 14, 2007: 01 + 2007-11-14 + 2007-11-14: 01 195315 182223 remote @@ -56,20 +55,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-ruby/rails-1.2.5" + # emerge --ask --oneshot --verbose ">=dev-ruby/rails-1.2.5" - CVE-2007-3227 - CVE-2007-5379 - CVE-2007-5380 + CVE-2007-3227 + CVE-2007-5379 + CVE-2007-5380 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-18.xml index 8caa907597..11385fb40c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-18.xml @@ -1,6 +1,5 @@ - Cpio: Buffer overflow @@ -8,8 +7,8 @@ Denial of Service. cpio - November 14, 2007 - November 14, 2007: 01 + 2007-11-14 + 2007-11-14: 01 196978 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/cpio-2.9-r1" + # emerge --ask --oneshot --verbose ">=app-arch/cpio-2.9-r1" - CVE-2007-4476 + CVE-2007-4476 - + p-y - + p-y - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-19.xml index 2bc7e0089b..684f4bc42f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-19.xml @@ -1,6 +1,5 @@ - TikiWiki: Multiple vulnerabilities @@ -8,8 +7,8 @@ resulting in the remote execution of arbitrary code. tikiwiki - November 14, 2007 - November 14, 2007: 01 + 2007-11-14 + 2007-11-14: 01 195503 remote @@ -48,20 +47,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.8.3" + # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.8.3" - GLSA 200710-21 - CVE-2007-5423 - CVE-2007-5682 + GLSA 200710-21 + CVE-2007-5423 + CVE-2007-5682 - + rbu - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-20.xml index d1f00e3a06..372ad78f26 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-20.xml @@ -1,14 +1,13 @@ - Pioneers: Multiple Denials of Service Two Denial of Service vulnerabilities were discovered in Pioneers. pioneers - November 14, 2007 - November 29, 2007: 04 + 2007-11-14 + 2007-11-29: 04 198807 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-board/pioneers-0.11.3-r1" + # emerge --ask --oneshot --verbose ">=games-board/pioneers-0.11.3-r1" - CVE-2007-5933 - CVE-2007-6010 + CVE-2007-5933 + CVE-2007-6010 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-21.xml index feeca8ab0f..a5c7fe4f3a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-21.xml @@ -1,6 +1,5 @@ - Bochs: Multiple vulnerabilities @@ -8,8 +7,8 @@ for the execution of arbitrary code or a Denial of Service. bochs - November 17, 2007 - November 17, 2007: 01 + 2007-11-17 + 2007-11-17: 01 188148 local @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/bochs-2.3" + # emerge --ask --oneshot --verbose ">=app-emulation/bochs-2.3" - CVE-2007-2893 - CVE-2007-2894 + CVE-2007-2893 + CVE-2007-2894 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-22.xml index c186fa325a..c75f42fa00 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-22.xml @@ -1,6 +1,5 @@ - Poppler, KDE: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ management issues possibly resulting in the execution of arbitrary code. poppler koffice kword kdegraphics kpdf - November 18, 2007 - November 18, 2007: 01 + 2007-11-18 + 2007-11-18: 01 196735 198409 remote @@ -78,41 +77,41 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/poppler-0.6.1-r1" + # emerge --ask --oneshot --verbose ">=app-text/poppler-0.6.1-r1"

All KPDF users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.5.7-r3" + # emerge --ask --oneshot --verbose ">=kde-base/kpdf-3.5.7-r3"

All KDE Graphics Libraries users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.5.7-r3" + # emerge --ask --oneshot --verbose ">=kde-base/kdegraphics-3.5.7-r3"

All KWord users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/kword-1.6.3-r2" + # emerge --ask --oneshot --verbose ">=app-office/kword-1.6.3-r2"

All KOffice users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/koffice-1.6.3-r2" + # emerge --ask --oneshot --verbose ">=app-office/koffice-1.6.3-r2" - CVE-2007-4352 - CVE-2007-5392 - CVE-2007-5393 + CVE-2007-4352 + CVE-2007-5392 + CVE-2007-5393 - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-23.xml index 63fcb9c2e6..9317f246ef 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-23.xml @@ -1,6 +1,5 @@ - VMware Workstation and Player: Multiple vulnerabilities @@ -8,8 +7,8 @@ elevated privileges on the host operating system through multiple flaws. vmware-workstation vmware-player - November 18, 2007 - April 16, 2008: 03 + 2007-11-18 + 2008-04-16: 03 193196 remote @@ -71,40 +70,40 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/vmware-workstation-5.5.5.56455" + # emerge --ask --oneshot --verbose ">=app-emulation/vmware-workstation-5.5.5.56455"

All VMware Player users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/vmware-player-1.0.5.56455" + # emerge --ask --oneshot --verbose ">=app-emulation/vmware-player-1.0.5.56455" - CVE-2004-0813 - CVE-2006-3619 - CVE-2006-4146 - CVE-2006-4600 - CVE-2007-0061 - CVE-2007-0062 - CVE-2007-0063 - CVE-2007-1716 - CVE-2007-4496 - CVE-2007-4497 - CVE-2007-5617 - GLSA-200606-02 - GLSA-200702-06 - GLSA-200704-11 - GLSA-200705-15 - GLSA-200707-11 - VMSA-2007-0006 + CVE-2004-0813 + CVE-2006-3619 + CVE-2006-4146 + CVE-2006-4600 + CVE-2007-0061 + CVE-2007-0062 + CVE-2007-0063 + CVE-2007-1716 + CVE-2007-4496 + CVE-2007-4497 + CVE-2007-5617 + GLSA-200606-02 + GLSA-200702-06 + GLSA-200704-11 + GLSA-200705-15 + GLSA-200707-11 + VMSA-2007-0006 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-24.xml index ee209ec369..e426cb2534 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-24.xml @@ -1,6 +1,5 @@ - Mozilla Thunderbird: Multiple vulnerabilities @@ -8,8 +7,8 @@ may allow user-assisted arbitrary remote code execution. mozilla-thunderbird mozilla-thunderbird-bin - November 18, 2007 - November 18, 2007: 01 + 2007-11-18 + 2007-11-18: 01 196481 remote @@ -54,27 +53,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-2.0.0.9" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-2.0.0.9"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-2.0.0.9" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-2.0.0.9" - CVE-2007-5339 - CVE-2007-5340 - GLSA 200711-14 + CVE-2007-5339 + CVE-2007-5340 + GLSA 200711-14 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-25.xml index e0a570c385..e7784034cb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-25.xml @@ -1,14 +1,13 @@ - MySQL: Denial of Service A Denial of Service vulnerability was found in MySQL. mysql - November 18, 2007 - November 18, 2007: 01 + 2007-11-18 + 2007-11-18: 01 198988 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.0.44-r2" + # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.0.44-r2" - CVE-2007-5925 + CVE-2007-5925 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-26.xml index 675d71ad7a..b16e125c64 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-26.xml @@ -1,6 +1,5 @@ - teTeX: Multiple vulnerabilities @@ -8,8 +7,8 @@ to execute arbitrary code or overwrite arbitrary files. tetex - November 18, 2007 - November 18, 2007: 01 + 2007-11-18 + 2007-11-18: 01 198238 remote @@ -57,19 +56,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/tetex-3.0_p1-r6" + # emerge --ask --oneshot --verbose ">=app-text/tetex-3.0_p1-r6" - CVE-2007-5935 - CVE-2007-5936 - CVE-2007-5937 - GLSA 200710-12 - GLSA 200711-22 + CVE-2007-5935 + CVE-2007-5936 + CVE-2007-5937 + GLSA 200710-12 + GLSA 200711-22 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-27.xml index d33d290782..6e90d53e52 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-27.xml @@ -1,14 +1,13 @@ - Link Grammar: User-assisted execution of arbitrary code A buffer overflow vulnerability has been discovered in Link Grammar. link-grammar - November 18, 2007 - November 18, 2007: 01 + 2007-11-18 + 2007-11-18: 01 196803 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/link-grammar-4.2.4-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/link-grammar-4.2.4-r1" - CVE-2007-5395 + CVE-2007-5395 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-28.xml index 1a5db8b717..4644c748db 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-28.xml @@ -1,6 +1,5 @@ - Perl: Buffer overflow @@ -8,8 +7,8 @@ for the execution of arbitrary code. perl - November 19, 2007 - November 19, 2007: 01 + 2007-11-19 + 2007-11-19: 01 198196 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/perl-5.8.8-r4" + # emerge --ask --oneshot --verbose ">=dev-lang/perl-5.8.8-r4" - CVE-2007-5116 + CVE-2007-5116 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-29.xml index 7c0b86eee6..4f918b802e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-29.xml @@ -1,6 +1,5 @@ - Samba: Execution of arbitrary code @@ -8,8 +7,8 @@ the execution of arbitrary code. samba - November 20, 2007 - December 05, 2007: 03 + 2007-11-20 + 2007-12-05: 03 197519 remote @@ -59,20 +58,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.27a" + # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.27a"

The first vulnerability (CVE-2007-5398) was already fixed in Samba 3.0.26a-r2.

- CVE-2007-4572 - CVE-2007-5398 + CVE-2007-4572 + CVE-2007-5398 - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-30.xml index 9d2ba08289..5a39d34d1a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-30.xml @@ -1,6 +1,5 @@ - PCRE: Multiple vulnerabilities @@ -8,8 +7,8 @@ vulnerabilities, possibly leading to the execution of arbitrary code. libpcre - November 20, 2007 - November 20, 2007: 01 + 2007-11-20 + 2007-11-20: 01 198198 remote @@ -74,27 +73,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libpcre-7.3-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/libpcre-7.3-r1" - CVE-2006-7227 - CVE-2006-7228 - CVE-2006-7230 - CVE-2007-1659 - CVE-2007-1660 - CVE-2007-1661 - CVE-2007-1662 - CVE-2007-4766 - CVE-2007-4767 - CVE-2007-4768 + CVE-2006-7227 + CVE-2006-7228 + CVE-2006-7230 + CVE-2007-1659 + CVE-2007-1660 + CVE-2007-1661 + CVE-2007-1662 + CVE-2007-4766 + CVE-2007-4767 + CVE-2007-4768 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-31.xml index 415f98ff86..4560283156 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-31.xml @@ -1,6 +1,5 @@ - Net-SNMP: Denial of Service @@ -8,8 +7,8 @@ processing GETBULK requests. net-snmp - November 20, 2007 - November 20, 2007: 01 + 2007-11-20 + 2007-11-20: 01 198346 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.1-r1" + # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.1-r1" - CVE-2007-5846 + CVE-2007-5846 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-32.xml index cf680c8389..2bd8971631 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-32.xml @@ -1,6 +1,5 @@ - Feynmf: Insecure temporary file creation @@ -8,8 +7,8 @@ overwrite arbitrary files via a symlink attack. feynmf - November 20, 2007 - November 20, 2007: 01 + 2007-11-20 + 2007-11-20: 01 198231 local @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-tex/feynmf-1.08-r2" + # emerge --ask --oneshot --verbose ">=dev-tex/feynmf-1.08-r2" - CVE-2007-5940 + CVE-2007-5940 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-33.xml index a3d5aa28ee..beacfb3eef 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-33.xml @@ -1,6 +1,5 @@ - nss_ldap: Information disclosure @@ -8,8 +7,8 @@ disclosure in services using nss_ldap. nss_ldap - November 25, 2007 - November 25, 2007: 01 + 2007-11-25 + 2007-11-25: 01 198390 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-auth/nss_ldap-258" + # emerge --ask --oneshot --verbose ">=sys-auth/nss_ldap-258" - CVE-2007-5794 + CVE-2007-5794 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-34.xml index 6703b4611f..9eaec70c2d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200711-34.xml @@ -1,6 +1,5 @@ - CSTeX: Multiple vulnerabilities @@ -8,8 +7,8 @@ execute arbitrary code or overwrite arbitrary files. cstetex - November 25, 2007 - November 25, 2007: 01 + 2007-11-25 + 2007-11-25: 01 196673 remote @@ -56,17 +55,17 @@

- GLSA 200708-05 - GLSA 200709-12 - GLSA 200709-17 - GLSA 200710-12 - GLSA 200711-22 - GLSA 200711-26 + GLSA 200708-05 + GLSA 200709-12 + GLSA 200709-17 + GLSA 200710-12 + GLSA 200711-22 + GLSA 200711-26 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-01.xml index db52f0f786..2ba28a2fd3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-01.xml @@ -1,6 +1,5 @@ - Hugin: Insecure temporary file creation @@ -8,8 +7,8 @@ Denial of Service. hugin - December 05, 2007 - December 05, 2007: 01 + 2007-12-05 + 2007-12-05: 01 195996 local @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/hugin-0.6.1-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/hugin-0.6.1-r1" - CVE-2007-5200 + CVE-2007-5200 - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-02.xml index c9d53ae859..ea93f2c6ee 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-02.xml @@ -1,14 +1,13 @@ - Cacti: SQL injection An SQL injection vulnerability has been discovered in Cacti. cacti - December 05, 2007 - December 05, 2007: 02 + 2007-12-05 + 2007-12-05: 02 199509 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-0.8.6j-r7" + # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-0.8.6j-r7" - CVE-2007-6035 + CVE-2007-6035 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-03.xml index d0b0835b34..931dca8a42 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-03.xml @@ -1,6 +1,5 @@ - GNU Emacs: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code. emacs - December 09, 2007 - December 09, 2007: 01 + 2007-12-09 + 2007-12-09: 01 197958 200297 remote @@ -59,19 +58,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/emacs-22.1-r3" + # emerge --ask --oneshot --verbose ">=app-editors/emacs-22.1-r3" - CVE-2007-5795 - CVE-2007-6109 + CVE-2007-5795 + CVE-2007-6109 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-04.xml index ada35c085f..21b6e7793a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-04.xml @@ -1,6 +1,5 @@ - Cairo: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ the execution of arbitrary code. cairo - December 09, 2007 - December 09, 2007: 01 + 2007-12-09 + 2007-12-09: 01 200350 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/cairo-1.4.12" + # emerge --ask --oneshot --verbose ">=x11-libs/cairo-1.4.12" - CVE-2007-5503 + CVE-2007-5503 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-05.xml index b5c582d5a4..83366ba329 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-05.xml @@ -1,6 +1,5 @@ - PEAR::MDB2: Information disclosure @@ -8,8 +7,8 @@ attackers to obtain sensitive information. PEAR-MDB2 - December 09, 2007 - December 09, 2007: 01 + 2007-12-09 + 2007-12-09: 01 198446 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/PEAR-MDB2-2.5.0_alpha1" + # emerge --ask --oneshot --verbose ">=dev-php/PEAR-MDB2-2.5.0_alpha1" - CVE-2007-5934 + CVE-2007-5934 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-06.xml index b33f311ba3..b9f40514eb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-06.xml @@ -1,14 +1,13 @@ - Firebird: Multiple buffer overflows Multiple stack-based buffer overflows were discovered in Firebird. firebird - December 09, 2007 - December 09, 2007: 01 + 2007-12-09 + 2007-12-09: 01 195569 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/firebird-2.0.3.12981.0-r2" + # emerge --ask --oneshot --verbose ">=dev-db/firebird-2.0.3.12981.0-r2" - CVE-2007-4992 - CVE-2007-5246 + CVE-2007-4992 + CVE-2007-5246 - + rbu - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-07.xml index 2aa7dee42c..4e6c6fd857 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-07.xml @@ -1,6 +1,5 @@ - Lookup: Insecure temporary file creation @@ -8,8 +7,8 @@ attack. lookup - December 09, 2007 - December 09, 2007: 01 + 2007-12-09 + 2007-12-09: 01 197306 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emacs/lookup-1.4.1" + # emerge --ask --oneshot --verbose ">=app-emacs/lookup-1.4.1" - CVE-2007-0237 + CVE-2007-0237 - + p-y - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-08.xml index 6206cd3f05..b062d045c6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-08.xml @@ -1,6 +1,5 @@ - AMD64 x86 emulation Qt library: Multiple vulnerabilities @@ -8,8 +7,8 @@ the remote execution of arbitrary code in Qt applications. emul-linux-x86-qtlibs - December 09, 2007 - December 09, 2007: 01 + 2007-12-09 + 2007-12-09: 01 189536 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-qtlibs-20071114-r2" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-qtlibs-20071114-r2" - GLSA 200708-16 - GLSA 200710-28 + GLSA 200708-16 + GLSA 200710-28 - + rbu - + welp - + welp
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-09.xml index 4d28d095c7..947a7c1c24 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-09.xml @@ -1,6 +1,5 @@ - Ruby-GNOME2: Format string error @@ -8,8 +7,8 @@ to the execution of arbitrary code. ruby-gtk2 - December 09, 2007 - December 09, 2007: 01 + 2007-12-09 + 2007-12-09: 01 200623 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-ruby/ruby-gtk2-0.16.0-r2" + # emerge --ask --oneshot --verbose ">=dev-ruby/ruby-gtk2-0.16.0-r2" - CVE-2007-6183 + CVE-2007-6183 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-10.xml index 3143629af0..9d27f172ec 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-10.xml @@ -1,6 +1,5 @@ - Samba: Execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. samba - December 10, 2007 - December 10, 2007: 01 + 2007-12-10 + 2007-12-10: 01 200773 remote @@ -51,15 +50,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.28" + # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.28" - CVE-2007-6015 + CVE-2007-6015 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-11.xml index 0406eca4ba..e5a9f5a204 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-11.xml @@ -1,6 +1,5 @@ - Portage: Information disclosure @@ -8,8 +7,8 @@ files. portage - December 13, 2007 - December 13, 2007: 01 + 2007-12-13 + 2007-12-13: 01 193589 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/portage-2.1.3.11" + # emerge --ask --oneshot --verbose ">=sys-apps/portage-2.1.3.11" - CVE-2007-6249 + CVE-2007-6249 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-12.xml index 6bef732829..479c4d4257 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-12.xml @@ -1,14 +1,13 @@ - IRC Services: Denial of Service A Denial of Service vulnerability has been reported in IRC Services. ircservices - December 13, 2007 - December 13, 2007: 01 + 2007-12-13 + 2007-12-13: 01 199897 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/ircservices-5.0.63" + # emerge --ask --oneshot --verbose ">=net-irc/ircservices-5.0.63" - CVE-2007-6122 + CVE-2007-6122 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-13.xml index b442aaf2ec..99b1328af5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-13.xml @@ -1,6 +1,5 @@ - E2fsprogs: Multiple buffer overflows @@ -8,8 +7,8 @@ execution of arbitrary code. e2fsprogs - December 18, 2007 - December 18, 2007: 01 + 2007-12-18 + 2007-12-18: 01 201546 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-fs/e2fsprogs-1.40.3" + # emerge --ask --oneshot --verbose ">=sys-fs/e2fsprogs-1.40.3" - CVE-2007-5497 + CVE-2007-5497 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-14.xml index 6003adeff5..7f8e612d06 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-14.xml @@ -1,6 +1,5 @@ - CUPS: Multiple vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code and a Denial of Service. cups - December 18, 2007 - December 18, 2007: 01 + 2007-12-18 + 2007-12-18: 01 199195 201042 201570 @@ -70,21 +69,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r4" + # emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r4" - CVE-2007-4045 - CVE-2007-5849 - CVE-2007-6358 - GLSA 200703-28 + CVE-2007-4045 + CVE-2007-5849 + CVE-2007-6358 + GLSA 200703-28 - + p-y - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-15.xml index 027ab8fdb2..79c4b4e451 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-15.xml @@ -1,6 +1,5 @@ - libexif: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code or a Denial of Service. libexif - December 29, 2007 - December 29, 2007: 01 + 2007-12-29 + 2007-12-29: 01 202350 remote @@ -52,19 +51,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libexif-0.6.16-r1" + # emerge --ask --oneshot --verbose ">=media-libs/libexif-0.6.16-r1" - CVE-2007-6351 - CVE-2007-6352 + CVE-2007-6351 + CVE-2007-6352 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-16.xml index fc1f54564b..ca0087aaa1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-16.xml @@ -1,6 +1,5 @@ - Exiv2: Integer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. exiv2 - December 29, 2007 - December 29, 2007: 01 + 2007-12-29 + 2007-12-29: 01 202351 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/exiv2-0.13-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/exiv2-0.13-r1" - CVE-2007-6353 + CVE-2007-6353 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-17.xml index a9bd3aebda..567c336768 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-17.xml @@ -1,6 +1,5 @@ - exiftags: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code or a Denial of Service. exiftags - December 29, 2007 - December 29, 2007: 01 + 2007-12-29 + 2007-12-29: 01 202354 remote @@ -55,20 +54,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/exiftags-1.01" + # emerge --ask --oneshot --verbose ">=media-gfx/exiftags-1.01" - CVE-2007-6354 - CVE-2007-6355 - CVE-2007-6356 + CVE-2007-6354 + CVE-2007-6355 + CVE-2007-6356 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-18.xml index 846e16c9bf..148579fb31 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-18.xml @@ -1,6 +1,5 @@ - Multi-Threaded DAAP Daemon: Multiple vulnerabilities @@ -8,8 +7,8 @@ Daemon may lead to the remote execution of arbitrary code. mt-daapd - December 29, 2007 - December 29, 2007: 01 + 2007-12-29 + 2007-12-29: 01 200110 remote @@ -56,19 +55,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/mt-daapd-0.2.4.1" + # emerge --ask --oneshot --verbose ">=media-sound/mt-daapd-0.2.4.1" - CVE-2007-5824 - CVE-2007-5825 + CVE-2007-5824 + CVE-2007-5825 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-19.xml index aa22f6b5f7..b41e8f7974 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-19.xml @@ -1,14 +1,13 @@ - Syslog-ng: Denial of Service A Denial of Service vulnerability has been discovered in Syslog-ng. syslog-ng - December 29, 2007 - December 29, 2007: 01 + 2007-12-29 + 2007-12-29: 01 202718 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-2.0.6" + # emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-2.0.6" - CVE-2007-6437 + CVE-2007-6437 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-20.xml index 7b5a9cfc11..e9c72125e8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-20.xml @@ -1,6 +1,5 @@ - ClamAV: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code and Denial of Service attacks. clamav - December 29, 2007 - December 29, 2007: 01 + 2007-12-29 + 2007-12-29: 01 202762 remote @@ -54,17 +53,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.91.2-r1" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.91.2-r1" - CVE-2007-6335 - CVE-2007-6336 - CVE-2007-6337 + CVE-2007-6335 + CVE-2007-6336 + CVE-2007-6337 - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-21.xml index a7155b16c4..2385f2bbd1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-21.xml @@ -1,6 +1,5 @@ - Mozilla Firefox, SeaMonkey: Multiple vulnerabilities @@ -8,8 +7,8 @@ Mozilla Seamonkey. firefox seamonkey - December 29, 2007 - December 29, 2007: 01 + 2007-12-29 + 2007-12-29: 01 198965 200909 remote @@ -65,38 +64,38 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.11" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.11"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.11" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.11"

All SeaMonkey users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.7" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.7"

All SeaMonkey binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.7" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.7" - CVE-2007-5947 - CVE-2007-5959 - CVE-2007-5960 + CVE-2007-5947 + CVE-2007-5959 + CVE-2007-5960 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-22.xml index b16c748713..095edc0b21 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-22.xml @@ -1,6 +1,5 @@ - Opera: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code and cross domain scripting. opera - December 30, 2007 - December 30, 2007: 01 + 2007-12-30 + 2007-12-30: 01 202770 remote @@ -49,21 +48,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-9.25" + # emerge --ask --oneshot --verbose ">=www-client/opera-9.25" - CVE-2007-6520 - CVE-2007-6521 - CVE-2007-6522 - CVE-2007-6524 + CVE-2007-6520 + CVE-2007-6521 + CVE-2007-6522 + CVE-2007-6524 - + keytoaster - + keytoaster - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-23.xml index 5f4507f80c..5b80997ed4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-23.xml @@ -1,6 +1,5 @@ - Wireshark: Multiple vulnerabilities @@ -8,8 +7,8 @@ the remote execution of arbitrary code and a Denial of Service. wireshark - December 30, 2007 - December 30, 2007: 01 + 2007-12-30 + 2007-12-30: 01 199958 remote @@ -58,33 +57,33 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.7" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.7" - CVE-2007-6111 - CVE-2007-6112 - CVE-2007-6113 - CVE-2007-6114 - CVE-2007-6115 - CVE-2007-6116 - CVE-2007-6117 - CVE-2007-6118 - CVE-2007-6119 - CVE-2007-6120 - CVE-2007-6121 - CVE-2007-6438 - CVE-2007-6439 - CVE-2007-6441 - CVE-2007-6450 - CVE-2007-6451 + CVE-2007-6111 + CVE-2007-6112 + CVE-2007-6113 + CVE-2007-6114 + CVE-2007-6115 + CVE-2007-6116 + CVE-2007-6117 + CVE-2007-6118 + CVE-2007-6119 + CVE-2007-6120 + CVE-2007-6121 + CVE-2007-6438 + CVE-2007-6439 + CVE-2007-6441 + CVE-2007-6450 + CVE-2007-6451 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-24.xml index c6cc13e4a1..cb656f3576 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-24.xml @@ -1,6 +1,5 @@ - AMD64 x86 emulation GTK+ library: User-assisted execution of arbitrary code @@ -9,8 +8,8 @@ using Cairo. emul-linux-x86-gtklibs - December 30, 2007 - December 30, 2007: 01 + 2007-12-30 + 2007-12-30: 01 201860 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-gtklibs-20071214" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-gtklibs-20071214" - GLSA 200712-04 + GLSA 200712-04 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-25.xml index c2bfd4b948..3895f32004 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200712-25.xml @@ -1,6 +1,5 @@ - OpenOffice.org: User-assisted arbitrary code execution @@ -8,8 +7,8 @@ allowing for the execution of arbitrary code. openoffice openoffice-bin hsqldb - December 30, 2007 - December 30, 2007: 01 + 2007-12-30 + 2007-12-30: 01 200771 201799 remote @@ -58,30 +57,30 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.3.1" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.3.1"

All OpenOffice.org binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.3.1" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.3.1"

All HSQLDB users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/hsqldb-1.8.0.9" + # emerge --ask --oneshot --verbose ">=dev-db/hsqldb-1.8.0.9" - CVE-2007-4575 + CVE-2007-4575 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-01.xml index 5823d0ea37..a152e89fd0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-01.xml @@ -1,14 +1,13 @@ - unp: Arbitrary command execution unp allows execution of arbitrary code via malicious file names. remote - January 09, 2008 - January 09, 2008: 01 + 2008-01-09 + 2008-01-09: 01 203106 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/unp-1.0.14" + # emerge --ask --oneshot --verbose ">=app-arch/unp-1.0.14" - CVE-2007-6610 + CVE-2007-6610 - + rbu - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-02.xml index a3004f0b4c..ffbe0c7073 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-02.xml @@ -1,6 +1,5 @@ - R: Multiple vulnerabilities @@ -8,8 +7,8 @@ code. R - January 09, 2008 - January 09, 2008: 02 + 2008-01-09 + 2008-01-09: 02 198976 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/R-2.2.1-r1" + # emerge --ask --oneshot --verbose ">=dev-lang/R-2.2.1-r1" - GLSA 200711-30 + GLSA 200711-30 - + rbu - + rbu - + py2
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-03.xml index 591c70a417..e3ccde8cbe 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-03.xml @@ -1,6 +1,5 @@ - Claws Mail: Insecure temporary file creation @@ -8,8 +7,8 @@ symlink attack. claws-mail - January 09, 2008 - January 09, 2008: 01 + 2008-01-09 + 2008-01-09: 01 201244 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/claws-mail-3.0.2-r1" + # emerge --ask --oneshot --verbose ">=mail-client/claws-mail-3.0.2-r1" - CVE-2007-6208 + CVE-2007-6208 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-04.xml index e92999a74c..057c050ffd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-04.xml @@ -1,14 +1,13 @@ - OpenAFS: Denial of Service A Denial of Service vulnerability has been discovered in OpenAFS. openafs - January 09, 2008 - January 09, 2008: 01 + 2008-01-09 + 2008-01-09: 01 203573 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/openafs-1.4.6" + # emerge --ask --oneshot --verbose ">=net-fs/openafs-1.4.6" - CVE-2007-6599 + CVE-2007-6599 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-05.xml index 57cb207420..e770143b9b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-05.xml @@ -1,14 +1,13 @@ - Squid: Denial of Service A Denial of Service vulnerability has been reported in Squid. squid - January 09, 2008 - January 09, 2008: 01 + 2008-01-09 + 2008-01-09: 01 201209 remote @@ -45,18 +44,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.6.17" + # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.6.17" - CVE-2007-6239 + CVE-2007-6239 - + p-y - + p-y - + py2
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-06.xml index 140156b289..ffa9709278 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-06.xml @@ -1,6 +1,5 @@ - Xfce: Multiple vulnerabilities @@ -8,8 +7,8 @@ execute arbitrary code. xfce4-panel libxfcegui4 - January 09, 2008 - January 10, 2008: 03 + 2008-01-09 + 2008-01-10: 03 201292 201293 remote @@ -58,25 +57,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=xfce-base/xfce4-panel-4.4.2" + # emerge --ask --oneshot --verbose ">=xfce-base/xfce4-panel-4.4.2"

All libxfcegui4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=xfce-base/libxfcegui4-4.4.2" + # emerge --ask --oneshot --verbose ">=xfce-base/libxfcegui4-4.4.2" - CVE-2007-6531 - CVE-2007-6532 + CVE-2007-6531 + CVE-2007-6532 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-07.xml index fdf22396be..c3512754a7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-07.xml @@ -1,6 +1,5 @@ - Adobe Flash Player: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code execution on a user's system via a malicious Flash file. adobe-flash - January 20, 2008 - May 28, 2009: 03 + 2008-01-20 + 2009-05-28: 03 193519 remote @@ -70,7 +69,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-9.0.115.0" + # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-9.0.115.0"

Please be advised that unaffected packages of the Adobe Flash Player have known problems when used from within the Konqueror and Opera @@ -78,23 +77,23 @@

- CVE-2007-4324 - CVE-2007-4768 - CVE-2007-5275 - CVE-2007-6242 - CVE-2007-6243 - CVE-2007-6244 - CVE-2007-6245 - CVE-2007-6246 - GLSA 200711-30 + CVE-2007-4324 + CVE-2007-4768 + CVE-2007-5275 + CVE-2007-6242 + CVE-2007-6243 + CVE-2007-6244 + CVE-2007-6245 + CVE-2007-6246 + GLSA 200711-30 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-08.xml index d495abe5c3..fc8650c0b5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-08.xml @@ -1,14 +1,13 @@ - libcdio: User-assisted execution of arbitrary code A buffer overflow vulnerability has been discovered in libcdio. libcdio - January 20, 2008 - January 20, 2008: 01 + 2008-01-20 + 2008-01-20: 01 203777 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libcdio-0.78.2-r4" + # emerge --ask --oneshot --verbose ">=dev-libs/libcdio-0.78.2-r4" - CVE-2007-6613 + CVE-2007-6613 - + rbu - + p-y - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-09.xml index 607731b3a9..a0a2e795eb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-09.xml @@ -1,6 +1,5 @@ - X.Org X server and Xfont library: Multiple vulnerabilities @@ -9,8 +8,8 @@ execution. xorg-server libXfont - January 20, 2008 - March 05, 2008: 03 + 2008-01-20 + 2008-03-05: 03 204362 208343 remote, local @@ -78,27 +77,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.3.0.0-r5" + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.3.0.0-r5"

All X.Org Xfont library users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/libXfont-1.3.1-r1" + # emerge --ask --oneshot --verbose ">=x11-libs/libXfont-1.3.1-r1" - CVE-2007-5760 - CVE-2007-5958 - CVE-2007-6427 - CVE-2007-6428 - CVE-2007-6429 - CVE-2008-0006 - X.Org security advisory + CVE-2007-5760 + CVE-2007-5958 + CVE-2007-6427 + CVE-2007-6428 + CVE-2007-6429 + CVE-2008-0006 + X.Org security advisory - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-10.xml index 36dfca6a3e..7357795d15 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-10.xml @@ -1,6 +1,5 @@ - TikiWiki: Multiple vulnerabilities @@ -8,8 +7,8 @@ having unknown impact. tikiwiki - January 23, 2008 - January 23, 2008: 01 + 2008-01-23 + 2008-01-23: 01 203265 remote @@ -60,20 +59,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.9" + # emerge --ask --oneshot --verbose ">=www-apps/tikiwiki-1.9.9" - CVE-2007-6526 - CVE-2007-6528 - CVE-2007-6529 + CVE-2007-6526 + CVE-2007-6528 + CVE-2007-6529 - + jaervosz - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-11.xml index bafa715a6d..a838466294 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-11.xml @@ -1,6 +1,5 @@ - CherryPy: Directory traversal vulnerability @@ -8,8 +7,8 @@ to read and write arbitrary files. cherrypy - January 27, 2008 - January 27, 2008: 01 + 2008-01-27 + 2008-01-27: 01 204829 remote @@ -51,24 +50,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-python/cherrypy-2.2.1-r2" + # emerge --ask --oneshot --verbose ">=dev-python/cherrypy-2.2.1-r2"

All CherryPy 3.0 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-python/cherrypy-3.0.2-r1" + # emerge --ask --oneshot --verbose ">=dev-python/cherrypy-3.0.2-r1" - CVE-2008-0252 + CVE-2008-0252 - + rbu - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-12.xml index 2dc7876689..534acea733 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-12.xml @@ -1,6 +1,5 @@ - xine-lib: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ processing RTSP streams. xine-lib - January 27, 2008 - January 27, 2008: 01 + 2008-01-27 + 2008-01-27: 01 205197 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.9.1" + # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.9.1" - CVE-2008-0225 - CVE-2008-0238 + CVE-2008-0225 + CVE-2008-0238 - + jaervosz - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-13.xml index 31a95b20e1..d5c7141028 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-13.xml @@ -1,6 +1,5 @@ - ngIRCd: Denial of Service @@ -8,8 +7,8 @@ Denial of Service. ngircd - January 27, 2008 - January 27, 2008: 02 + 2008-01-27 + 2008-01-27: 02 204834 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/ngircd-0.10.4" + # emerge --ask --oneshot --verbose ">=net-irc/ngircd-0.10.4" - CVE-2008-0285 + CVE-2008-0285 - + jaervosz - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-14.xml index 4a12d03edd..43fd9a3ff6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-14.xml @@ -1,6 +1,5 @@ - Blam: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ local attacker to execute arbitrary code. blam - January 27, 2008 - January 27, 2008: 01 + 2008-01-27 + 2008-01-27: 01 199841 local @@ -50,15 +49,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-news/blam-1.8.4" + # emerge --ask --oneshot --verbose ">=net-news/blam-1.8.4" - CVE-2005-4790 + CVE-2005-4790 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-15.xml index bc2c31abba..d19d05499b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-15.xml @@ -1,6 +1,5 @@ - PostgreSQL: Multiple vulnerabilities @@ -8,8 +7,8 @@ escalation or a Denial of Service. postgresql - January 29, 2008 - January 29, 2008: 01 + 2008-01-29 + 2008-01-29: 01 204760 remote @@ -60,23 +59,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose "dev-db/postgresql" + # emerge --ask --oneshot --verbose "dev-db/postgresql" - CVE-2007-3278 - CVE-2007-4769 - CVE-2007-4772 - CVE-2007-6067 - CVE-2007-6600 - CVE-2007-6601 + CVE-2007-3278 + CVE-2007-4769 + CVE-2007-4772 + CVE-2007-6067 + CVE-2007-6600 + CVE-2007-6601 - + rbu - + rbu - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-16.xml index 75f2cd232a..64ff82cbba 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-16.xml @@ -1,6 +1,5 @@ - MaraDNS: CNAME Denial of Service @@ -8,8 +7,8 @@ resolution. maradns - January 29, 2008 - January 29, 2008: 01 + 2008-01-29 + 2008-01-29: 01 204351 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/maradns-1.2.12.09" + # emerge --ask --oneshot --verbose ">=net-dns/maradns-1.2.12.09" - CVE-2008-0061 + CVE-2008-0061 - + rbu - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-17.xml index b32c4a3d63..817f863599 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-17.xml @@ -1,14 +1,13 @@ - Netkit FTP Server: Denial of Service Netkit FTP Server contains a Denial of Service vulnerability. netkit-ftpd - January 29, 2008 - January 29, 2008: 01 + 2008-01-29 + 2008-01-29: 01 199206 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/netkit-ftpd-0.17-r7" + # emerge --ask --oneshot --verbose ">=net-ftp/netkit-ftpd-0.17-r7" - CVE-2007-6263 + CVE-2007-6263 - + rbu - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-18.xml index cb08d8d00e..e15eca31b7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-18.xml @@ -1,6 +1,5 @@ - Kazehakase: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. kazehakase - January 30, 2008 - January 30, 2008: 01 + 2008-01-30 + 2008-01-30: 01 198983 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/kazehakase-0.5.0" + # emerge --ask --oneshot --verbose ">=www-client/kazehakase-0.5.0" - GLSA-200711-30 + GLSA-200711-30 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-19.xml index 077ea6d462..e60d50c02c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-19.xml @@ -1,6 +1,5 @@ - GOffice: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. goffice - January 30, 2008 - January 30, 2008: 01 + 2008-01-30 + 2008-01-30: 01 198385 remote @@ -49,24 +48,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/goffice-0.4.3" + # emerge --ask --oneshot --verbose ">=x11-libs/goffice-0.4.3"

All GOffice 0.6.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/goffice-0.6.1" + # emerge --ask --oneshot --verbose ">=x11-libs/goffice-0.6.1" - GLSA-200711-30 + GLSA-200711-30 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-20.xml index 2c8fd240cd..c70a2ab084 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-20.xml @@ -1,14 +1,13 @@ - libxml2: Denial of Service A Denial of Service vulnerability has been reported in libxml2. libxml2 - January 30, 2008 - January 30, 2008: 01 + 2008-01-30 + 2008-01-30: 01 202628 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.6.30-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.6.30-r1" - CVE-2007-6284 + CVE-2007-6284 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-21.xml index 1325319f7d..8642730a70 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-21.xml @@ -1,6 +1,5 @@ - Xdg-Utils: Arbitrary command execution @@ -8,8 +7,8 @@ execution of arbitrary commands. xdg-utils - January 30, 2008 - January 30, 2008: 01 + 2008-01-30 + 2008-01-30: 01 207331 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-misc/xdg-utils-1.0.2-r1" + # emerge --ask --oneshot --verbose ">=x11-misc/xdg-utils-1.0.2-r1" - CVE-2008-0386 + CVE-2008-0386 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-22.xml index 948fb6b10e..ec8b595d12 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200801-22.xml @@ -1,14 +1,13 @@ - PeerCast: Buffer overflow A buffer overflow vulnerability has been discovered in PeerCast. peercast - January 30, 2008 - January 30, 2008: 02 + 2008-01-30 + 2008-01-30: 02 202747 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1218" + # emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1218" - CVE-2007-6454 + CVE-2007-6454 - + p-y - + p-y - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-01.xml index c66baec258..8d23519f27 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-01.xml @@ -1,6 +1,5 @@ - SDL_image: Two buffer overflow vulnerabilities @@ -9,8 +8,8 @@ the library. sdl-image - February 06, 2008 - February 06, 2008: 01 + 2008-02-06 + 2008-02-06: 01 207933 remote @@ -54,17 +53,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/sdl-image-1.2.6-r1" + # emerge --ask --oneshot --verbose ">=media-libs/sdl-image-1.2.6-r1" - SA28640 - CVE-2007-6697 - CVE-2008-0544 + SA28640 + CVE-2007-6697 + CVE-2008-0544 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-02.xml index c309b3c62d..936a472dab 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-02.xml @@ -1,6 +1,5 @@ - Doomsday: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code or a Denial of Service. doomsday - February 06, 2008 - February 10, 2008: 02 + 2008-02-06 + 2008-02-10: 02 190835 remote @@ -59,17 +58,17 @@ # emerge --unmerge games-fps/doomsday - CVE-2007-4642 - CVE-2007-4643 - CVE-2007-4644 + CVE-2007-4642 + CVE-2007-4643 + CVE-2007-4644 - + rbu - + rbu - + rbu diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-03.xml index da27243e02..ed501e5bfd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-03.xml @@ -1,6 +1,5 @@ - Horde IMP: Security bypass @@ -8,8 +7,8 @@ restrictions. horde-imp - February 11, 2008 - February 11, 2008: 01 + 2008-02-11 + 2008-02-11: 01 205377 remote @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-imp-4.1.6" + # emerge --ask --oneshot --verbose ">=www-apps/horde-imp-4.1.6" - CVE-2007-6018 + CVE-2007-6018 - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-04.xml index ce679800f9..2ca7229961 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-04.xml @@ -1,14 +1,13 @@ - Gallery: Multiple vulnerabilities Multiple vulnerabilities were discovered in Gallery. gallery - February 11, 2008 - February 11, 2008: 01 + 2008-02-11 + 2008-02-11: 01 203217 remote @@ -50,26 +49,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/gallery-2.2.4" + # emerge --ask --oneshot --verbose ">=www-apps/gallery-2.2.4" - CVE-2007-6685 - CVE-2007-6686 - CVE-2007-6687 - CVE-2007-6688 - CVE-2007-6689 - CVE-2007-6690 - CVE-2007-6691 - CVE-2007-6692 - CVE-2007-6693 + CVE-2007-6685 + CVE-2007-6686 + CVE-2007-6687 + CVE-2007-6688 + CVE-2007-6689 + CVE-2007-6690 + CVE-2007-6691 + CVE-2007-6692 + CVE-2007-6693 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-05.xml index fb22a1dc25..064dfc64ba 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-05.xml @@ -1,6 +1,5 @@ - Gnumeric: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ possibly resulting in user-assisted execution of arbitrary code. gnumeric - February 12, 2008 - February 12, 2008: 01 + 2008-02-12 + 2008-02-12: 01 208356 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/gnumeric-1.8.1" + # emerge --ask --oneshot --verbose ">=app-office/gnumeric-1.8.1" - CVE-2008-0668 + CVE-2008-0668 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-06.xml index e6001dbcd3..39e78bf186 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-06.xml @@ -1,6 +1,5 @@ - scponly: Multiple vulnerabilities @@ -8,8 +7,8 @@ security restrictions. scponly - February 12, 2008 - February 13, 2008: 02 + 2008-02-12 + 2008-02-13: 02 201726 203099 local @@ -50,7 +49,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/scponly-4.8" + # emerge --ask --oneshot --verbose ">=net-misc/scponly-4.8"

Due to the design of scponly's Subversion support, security restrictions can still be circumvented. Please read carefully the @@ -58,16 +57,16 @@

- CVE-2007-6350 - CVE-2007-6415 + CVE-2007-6350 + CVE-2007-6415 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-07.xml index a26a244bd1..b9739c9fa4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-07.xml @@ -1,6 +1,5 @@ - Pulseaudio: Privilege escalation @@ -8,8 +7,8 @@ with escalated privileges. pulseaudio - February 13, 2008 - February 13, 2008: 01 + 2008-02-13 + 2008-02-13: 01 207214 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/pulseaudio-0.9.9" + # emerge --ask --oneshot --verbose ">=media-sound/pulseaudio-0.9.9" - CVE-2008-0008 + CVE-2008-0008 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-08.xml index fa0766cb21..90b70c4c02 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-08.xml @@ -1,6 +1,5 @@ - Boost: Denial of Service @@ -8,8 +7,8 @@ resulting in a Denial of Service. boost - February 14, 2008 - February 14, 2008: 01 + 2008-02-14 + 2008-02-14: 01 205955 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/boost-1.34.1-r2" + # emerge --ask --oneshot --verbose ">=dev-libs/boost-1.34.1-r2" - CVE-2008-0171 - CVE-2008-0172 + CVE-2008-0171 + CVE-2008-0172 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-09.xml index 51ea7f651a..363ea4c7c5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-09.xml @@ -1,6 +1,5 @@ - ClamAV: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. clamav - February 21, 2008 - February 21, 2008: 01 + 2008-02-21 + 2008-02-21: 01 209915 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.92.1" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.92.1" - CVE-2008-0318 - CVE-2008-0728 + CVE-2008-0318 + CVE-2008-0728 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-10.xml index c1739da284..8a45fb51ab 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-10.xml @@ -1,6 +1,5 @@ - Python: PCRE Integer overflow @@ -8,8 +7,8 @@ arbitrary code. python - February 23, 2008 - February 23, 2008: 01 + 2008-02-23 + 2008-02-23: 01 198373 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/python-2.3.6-r4" + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.3.6-r4" - CVE-2006-7228 - GLSA 200711-30 + CVE-2006-7228 + GLSA 200711-30 - + rbu - + jaervosz - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-11.xml index 905d66fd35..fe793017cd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-11.xml @@ -1,14 +1,13 @@ - Asterisk: Multiple vulnerabilities Multiple vulnerabilities have been found in Asterisk. asterisk - February 26, 2008 - February 26, 2008: 01 + 2008-02-26 + 2008-02-26: 01 185713 remote @@ -65,21 +64,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.17-r1" + # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.17-r1" - CVE-2007-3762 - CVE-2007-3763 - CVE-2007-3764 - CVE-2007-4103 + CVE-2007-3762 + CVE-2007-3763 + CVE-2007-3764 + CVE-2007-4103 - + jaervosz - + keytoaster - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-12.xml index 382733708e..640f80a96e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200802-12.xml @@ -1,6 +1,5 @@ - xine-lib: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ and ASF streams. xine-lib - February 26, 2008 - March 03, 2008: 02 + 2008-02-26 + 2008-03-03: 02 209106 208100 remote @@ -52,20 +51,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.10.1" + # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.10.1" - CVE-2006-1664 - CVE-2008-0486 - CVE-2008-1110 + CVE-2006-1664 + CVE-2008-0486 + CVE-2008-1110 - + jaervosz - + jaervosz - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-01.xml index c5e2ffa6e0..2d2bae4ceb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-01.xml @@ -1,6 +1,5 @@ - Adobe Acrobat Reader: Multiple vulnerabilities @@ -8,8 +7,8 @@ Service, and cross-site request forgery attacks. acroread - March 02, 2008 - March 05, 2008: 05 + 2008-03-02 + 2008-03-05: 05 170177 remote @@ -64,24 +63,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.2" + # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.2" - CVE-2007-1199 - CVE-2007-5659 - CVE-2007-5663 - CVE-2007-5666 - CVE-2008-0655 - CVE-2008-0667 - CVE-2008-0726 + CVE-2007-1199 + CVE-2007-5659 + CVE-2007-5663 + CVE-2007-5666 + CVE-2008-0655 + CVE-2008-0667 + CVE-2008-0726 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-02.xml index c40bee1bd1..42429c040a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-02.xml @@ -1,6 +1,5 @@ - Firebird: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. firebird - March 02, 2008 - March 02, 2008: 01 + 2008-03-02 + 2008-03-02: 01 208034 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/firebird-2.0.3.12981.0-r5" + # emerge --ask --oneshot --verbose ">=dev-db/firebird-2.0.3.12981.0-r5" - CVE-2008-0387 - CVE-2008-0467 + CVE-2008-0387 + CVE-2008-0467 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-03.xml index 0887865d5a..370cc92e5e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-03.xml @@ -1,6 +1,5 @@ - Audacity: Insecure temporary file creation @@ -8,8 +7,8 @@ attack. audacity - March 02, 2008 - March 02, 2008: 01 + 2008-03-02 + 2008-03-02: 01 199751 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/audacity-1.3.4-r1" + # emerge --ask --oneshot --verbose ">=media-sound/audacity-1.3.4-r1" - CVE-2007-6061 + CVE-2007-6061 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-04.xml index 54af5d2c32..78c85e14b3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-04.xml @@ -1,6 +1,5 @@ - Mantis: Cross-Site Scripting @@ -8,8 +7,8 @@ Mantis. mantis - March 03, 2008 - March 03, 2008: 01 + 2008-03-03 + 2008-03-03: 01 203791 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-1.0.8-r1" + # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-1.0.8-r1" - CVE-2007-6611 + CVE-2007-6611 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-05.xml index e43f12605a..0797e68e52 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-05.xml @@ -1,6 +1,5 @@ - SplitVT: Privilege escalation @@ -8,8 +7,8 @@ privileges. splitvt - March 03, 2008 - March 03, 2008: 01 + 2008-03-03 + 2008-03-03: 01 211240 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-misc/splitvt-1.6.6-r1" + # emerge --ask --oneshot --verbose ">=app-misc/splitvt-1.6.6-r1" - CVE-2008-0162 + CVE-2008-0162 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-06.xml index 35c4c73057..1882e8e0e4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-06.xml @@ -1,14 +1,13 @@ - SWORD: Shell command injection Insufficient input checking in SWORD may allow shell command injection. sword - March 03, 2008 - March 03, 2008: 01 + 2008-03-03 + 2008-03-03: 01 210754 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/sword-1.5.8-r2" + # emerge --ask --oneshot --verbose ">=app-text/sword-1.5.8-r2" - CVE-2008-0932 + CVE-2008-0932 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-07.xml index bcb1ffd911..a223e721ca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-07.xml @@ -1,6 +1,5 @@ - Paramiko: Information disclosure @@ -8,8 +7,8 @@ information. paramiko - March 03, 2008 - March 03, 2008: 01 + 2008-03-03 + 2008-03-03: 01 205777 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-python/paramiko-1.7.2" + # emerge --ask --oneshot --verbose ">=dev-python/paramiko-1.7.2" - CVE-2008-0299 + CVE-2008-0299 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-08.xml index cc8a870cb9..3ff7539107 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-08.xml @@ -1,6 +1,5 @@ - Win32 binary codecs: Multiple vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code. win32codecs - March 04, 2008 - March 04, 2008: 01 + 2008-03-04 + 2008-03-04: 01 150288 remote @@ -48,7 +47,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/win32codecs-20071007-r2" + # emerge --ask --oneshot --verbose ">=media-libs/win32codecs-20071007-r2"

Note: Since no updated binary versions have been released, the Quicktime libraries have been removed from the package. Please use the @@ -57,22 +56,22 @@

- CVE-2006-4382 - CVE-2006-4384 - CVE-2006-4385 - CVE-2006-4386 - CVE-2006-4388 - CVE-2006-4389 - CVE-2007-4674 - CVE-2007-6166 + CVE-2006-4382 + CVE-2006-4384 + CVE-2006-4385 + CVE-2006-4386 + CVE-2006-4388 + CVE-2006-4389 + CVE-2007-4674 + CVE-2007-6166 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-09.xml index d599f3141a..624d95bb4a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-09.xml @@ -1,6 +1,5 @@ - Opera: Multiple vulnerabilities @@ -8,8 +7,8 @@ disclosure, privilege escalation and Cross-Site scripting. opera - March 04, 2008 - March 04, 2008: 01 + 2008-03-04 + 2008-03-04: 01 210260 remote @@ -53,20 +52,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-9.26" + # emerge --ask --oneshot --verbose ">=www-client/opera-9.26" - CVE-2008-1080 - CVE-2008-1081 - CVE-2008-1082 + CVE-2008-1080 + CVE-2008-1081 + CVE-2008-1082 - + jaervosz - + jaervosz - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-10.xml index 53d0508858..4052ba4077 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-10.xml @@ -1,14 +1,13 @@ - lighttpd: Multiple vulnerabilities Multiple vulnerabilities have been discovered in lighttpd. lighttpd - March 05, 2008 - March 05, 2008: 01 + 2008-03-05 + 2008-03-05: 01 211230 211956 remote @@ -48,19 +47,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.18-r2" + # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.18-r2" - CVE-2008-0983 - CVE-2008-1111 + CVE-2008-0983 + CVE-2008-1111 - + rbu - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-11.xml index 604e619a04..efcd9210b5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-11.xml @@ -1,6 +1,5 @@ - Vobcopy: Insecure temporary file creation @@ -8,8 +7,8 @@ attack. vobcopy - March 05, 2008 - March 05, 2008: 01 + 2008-03-05 + 2008-03-05: 01 197578 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/vobcopy-1.1.0" + # emerge --ask --oneshot --verbose ">=media-video/vobcopy-1.1.0" - CVE-2007-5718 + CVE-2007-5718 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-12.xml index b69d90902f..247efb8637 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-12.xml @@ -1,6 +1,5 @@ - Evolution: Format string vulnerability @@ -8,8 +7,8 @@ in the execution of arbitrary code. evolution - March 05, 2008 - March 05, 2008: 01 + 2008-03-05 + 2008-03-05: 01 212272 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/evolution-2.12.3-r1" + # emerge --ask --oneshot --verbose ">=mail-client/evolution-2.12.3-r1" - CVE-2008-0072 + CVE-2008-0072 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-13.xml index b56be22664..747ef86a5a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-13.xml @@ -1,6 +1,5 @@ - VLC: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code and Denial of Service. vlc - March 07, 2008 - March 07, 2008: 01 + 2008-03-07 + 2008-03-07: 01 203345 211575 205299 @@ -78,21 +77,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6e" + # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6e" - CVE-2007-6681 - CVE-2007-6682 - CVE-2007-6683 - CVE-2007-6684 - CVE-2008-0295 - CVE-2008-0296 - CVE-2008-0984 + CVE-2007-6681 + CVE-2007-6682 + CVE-2007-6683 + CVE-2007-6684 + CVE-2008-0295 + CVE-2008-0296 + CVE-2008-0984 - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-14.xml index d4d298076e..c8da6d5caa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-14.xml @@ -1,6 +1,5 @@ - Ghostscript: Buffer overflow @@ -8,8 +7,8 @@ arbitrary code execution. ghostscript - March 08, 2008 - March 08, 2008: 01 + 2008-03-08 + 2008-03-08: 01 208999 remote @@ -58,30 +57,30 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/ghostscript-esp-8.15.4-r1" + # emerge --ask --oneshot --verbose ">=app-text/ghostscript-esp-8.15.4-r1"

All Ghostscript GPL users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gpl-8.61-r3" + # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gpl-8.61-r3"

All Ghostscript GNU users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gnu-8.60.0-r2" + # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gnu-8.60.0-r2" - CVE-2008-0411 + CVE-2008-0411 - + jaervosz - + jaervosz - + psychoschlumpf
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-15.xml index 03da9bc585..221c815a5c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-15.xml @@ -1,14 +1,13 @@ - phpMyAdmin: SQL injection vulnerability A SQL injection vulnerability has been discovered in phpMyAdmin. phpmyadmin - March 09, 2008 - March 09, 2008: 01 + 2008-03-09 + 2008-03-09: 01 212000 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.11.5" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.11.5" - CVE-2008-1149 + CVE-2008-1149 - + rbu - + psychoschlumpf - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-16.xml index c047d78046..e10529b99e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-16.xml @@ -1,6 +1,5 @@ - MPlayer: Multiple buffer overflows @@ -8,8 +7,8 @@ for the remote execution of arbitrary code. mplayer - March 10, 2008 - March 10, 2008: 01 + 2008-03-10 + 2008-03-10: 01 208566 remote @@ -61,21 +60,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_rc2_p25993" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_rc2_p25993" - CVE-2008-0485 - CVE-2008-0486 - CVE-2008-0629 - CVE-2008-0630 + CVE-2008-0485 + CVE-2008-0486 + CVE-2008-0629 + CVE-2008-0630 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-17.xml index f4a421d7a5..aefdbe7834 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-17.xml @@ -1,14 +1,13 @@ - PDFlib: Multiple buffer overflows Multiple stack-based buffer overflows have been reported in PDFlib. pdflib - March 10, 2008 - March 10, 2008: 01 + 2008-03-10 + 2008-03-10: 01 203287 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/pdflib-7.0.2_p8" + # emerge --ask --oneshot --verbose ">=media-libs/pdflib-7.0.2_p8" - CVE-2007-6561 + CVE-2007-6561 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-18.xml index e9a08c9bcb..4bbd01636a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-18.xml @@ -1,14 +1,13 @@ - Cacti: Multiple vulnerabilities Multiple vulnerabilities were discovered in Cacti. cacti - March 10, 2008 - May 28, 2009: 02 + 2008-03-10 + 2009-05-28: 02 209918 remote @@ -59,21 +58,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-0.8.7b" + # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-0.8.7b" - CVE-2008-0783 - CVE-2008-0784 - CVE-2008-0785 - CVE-2008-0786 + CVE-2008-0783 + CVE-2008-0784 + CVE-2008-0785 + CVE-2008-0786 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-19.xml index 5abd6290a4..e046c309cd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-19.xml @@ -1,14 +1,13 @@ - Apache: Multiple vulnerabilities Multiple vulnerabilities have been discovered in Apache. apache - March 11, 2008 - March 12, 2008: 02 + 2008-03-11 + 2008-03-12: 02 201163 204410 205195 @@ -57,22 +56,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.8" + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.8" - CVE-2007-6203 - CVE-2007-6422 - CVE-2008-0005 - CVE-2008-0455 - CVE-2008-0456 + CVE-2007-6203 + CVE-2007-6422 + CVE-2008-0005 + CVE-2008-0455 + CVE-2008-0456 - + jaervosz - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-20.xml index fa47995ef7..0e561379d9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-20.xml @@ -1,6 +1,5 @@ - International Components for Unicode: Multiple vulnerabilities @@ -9,8 +8,8 @@ or a Denial of Service. icu - March 11, 2008 - May 28, 2009: 03 + 2008-03-11 + 2009-05-28: 03 208001 remote @@ -56,19 +55,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/icu-3.8.1-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/icu-3.8.1-r1" - CVE-2007-4770 - CVE-2007-4771 + CVE-2007-4770 + CVE-2007-4771 - + jaervosz - + jaervosz - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-21.xml index 22f48c76e8..b1c18b59ca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-21.xml @@ -1,6 +1,5 @@ - Sarg: Remote execution of arbitrary code @@ -8,8 +7,8 @@ untrusted input files. sarg - March 12, 2008 - March 12, 2008: 01 + 2008-03-12 + 2008-03-12: 01 212208 212731 remote @@ -52,19 +51,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/sarg-2.2.5" + # emerge --ask --oneshot --verbose ">=net-analyzer/sarg-2.2.5" - CVE-2008-1167 - CVE-2008-1168 + CVE-2008-1167 + CVE-2008-1168 - + rbu - + falco - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-22.xml index 39fc2a7671..00cdd46c15 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-22.xml @@ -1,6 +1,5 @@ - LIVE555 Media Server: Denial of Service @@ -8,8 +7,8 @@ Server. live - March 13, 2008 - March 13, 2008: 01 + 2008-03-13 + 2008-03-13: 01 204065 remote @@ -46,22 +45,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-plugins/live-2008.02.08" + # emerge --ask --oneshot --verbose ">=media-plugins/live-2008.02.08"

Note: Due to ABI changes, applications built against LIVE555 Media Server such as VLC or MPlayer should also be rebuilt.

- CVE-2007-6036 + CVE-2007-6036 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-23.xml index 8cd9f4dcb2..ae9908ba05 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-23.xml @@ -1,6 +1,5 @@ - Website META Language: Insecure temporary file usage @@ -8,8 +7,8 @@ the Website META Language. wml - March 15, 2008 - March 15, 2008: 01 + 2008-03-15 + 2008-03-15: 01 209927 local @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/wml-2.0.11-r3" + # emerge --ask --oneshot --verbose ">=dev-lang/wml-2.0.11-r3" - CVE-2008-0665 - CVE-2008-0666 + CVE-2008-0665 + CVE-2008-0666 - + p-y - + p-y - + mfleming
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-24.xml index 8758b5aac1..d2b86276d4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-24.xml @@ -1,6 +1,5 @@ - PCRE: Buffer overflow @@ -8,8 +7,8 @@ the execution of arbitrary code and Denial of Service. libpcre glib - March 17, 2008 - March 17, 2008: 02 + 2008-03-17 + 2008-03-17: 02 209067 209293 remote @@ -56,24 +55,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libpcre-7.6-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/libpcre-7.6-r1"

All GLib users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.14.6" + # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.14.6" - CVE-2008-0674 + CVE-2008-0674 - + jaervosz - + jaervosz - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-25.xml index c659206592..1e0b0e9f7b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-25.xml @@ -1,6 +1,5 @@ - Dovecot: Multiple vulnerabilities @@ -8,8 +7,8 @@ argument injection. dovecot - March 18, 2008 - March 18, 2008: 01 + 2008-03-18 + 2008-03-18: 01 212336 213030 remote @@ -60,23 +59,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/dovecot-1.0.13-r1" + # emerge --ask --oneshot --verbose ">=net-mail/dovecot-1.0.13-r1"

This version removes the "mail_extra_groups" option and introduces a "mail_privileged_group" setting which is handled safely.

- CVE-2008-1199 - CVE-2008-1218 + CVE-2008-1199 + CVE-2008-1218 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-26.xml index 0b6dcc3bbb..73196c89e4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-26.xml @@ -1,6 +1,5 @@ - Adobe Acrobat Reader: Insecure temporary file creation @@ -8,8 +7,8 @@ Adobe Acrobat Reader. acroread - March 18, 2008 - March 18, 2008: 01 + 2008-03-18 + 2008-03-18: 01 212367 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.2-r1" + # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.2-r1" - CVE-2008-0883 + CVE-2008-0883 - + mfleming - + mfleming - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-27.xml index bea788162d..850d7b698c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-27.xml @@ -1,14 +1,13 @@ - MoinMoin: Multiple vulnerabilities Several vulnerabilities have been reported in MoinMoin Wiki Engine. moinmoin - March 18, 2008 - March 18, 2008: 01 + 2008-03-18 + 2008-03-18: 01 209133 remote @@ -67,22 +66,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/moinmoin-1.6.1" + # emerge --ask --oneshot --verbose ">=www-apps/moinmoin-1.6.1" - CVE-2008-0780 - CVE-2008-0781 - CVE-2008-0782 - CVE-2008-1098 - CVE-2008-1099 + CVE-2008-0780 + CVE-2008-0781 + CVE-2008-0782 + CVE-2008-1098 + CVE-2008-1099 - + p-y - + p-y - + mfleming
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-28.xml index 3b8a80b158..d2224a291d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-28.xml @@ -1,14 +1,13 @@ - OpenLDAP: Denial of Service vulnerabilities Multiple Denial of Service vulnerabilities have been reported in OpenLDAP. openldap - March 19, 2008 - March 19, 2008: 01 + 2008-03-19 + 2008-03-19: 01 197446 209677 remote @@ -61,17 +60,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-nds/openldap-2.3.41" + # emerge --ask --oneshot --verbose ">=net-nds/openldap-2.3.41" - CVE-2007-5707 - CVE-2007-5708 - CVE-2008-0658 + CVE-2007-5707 + CVE-2007-5708 + CVE-2008-0658 - + mfleming - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-29.xml index e133e33f79..5f8c741bb0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-29.xml @@ -1,6 +1,5 @@ - ViewVC: Multiple vulnerabilities @@ -8,8 +7,8 @@ exploited by malicious people to bypass certain security restrictions. viewvc - March 19, 2008 - April 01, 2009: 02 + 2008-03-19 + 2009-04-01: 02 212288 remote @@ -49,20 +48,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/viewvc-1.0.5" + # emerge --ask --oneshot --verbose ">=www-apps/viewvc-1.0.5" - CVE-2008-1290 - CVE-2008-1291 - CVE-2008-1292 + CVE-2008-1290 + CVE-2008-1291 + CVE-2008-1292 - + p-y - + p-y - + mfleming
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-30.xml index f1802c8fc2..c8ba068e88 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-30.xml @@ -1,6 +1,5 @@ - ssl-cert eclass: Certificate disclosure @@ -8,8 +7,8 @@ allow for disclosure of generated SSL private keys. ssl-cert.eclass - March 20, 2008 - March 20, 2008: 01 + 2008-03-20 + 2008-03-20: 01 174759 remote @@ -94,75 +93,75 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/conserver-8.1.16" + # emerge --ask --oneshot --verbose ">=app-admin/conserver-8.1.16"

All Postfix 2.4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.4.6-r2" + # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.4.6-r2"

All Postfix 2.3 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.3.8-r1" + # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.3.8-r1"

All Postfix 2.2 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.2.11-r1" + # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.2.11-r1"

All Netkit FTP Server users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/netkit-ftpd-0.17-r7" + # emerge --ask --oneshot --verbose ">=net-ftp/netkit-ftpd-0.17-r7"

All ejabberd users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/ejabberd-1.1.3" + # emerge --ask --oneshot --verbose ">=net-im/ejabberd-1.1.3"

All UnrealIRCd users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/unrealircd-3.2.7-r2" + # emerge --ask --oneshot --verbose ">=net-irc/unrealircd-3.2.7-r2"

All Cyrus IMAP Server users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/cyrus-imapd-2.3.9-r1" + # emerge --ask --oneshot --verbose ">=net-mail/cyrus-imapd-2.3.9-r1"

All Dovecot users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/dovecot-1.0.10" + # emerge --ask --oneshot --verbose ">=net-mail/dovecot-1.0.10"

All stunnel 4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/stunnel-4.21" + # emerge --ask --oneshot --verbose ">=net-misc/stunnel-4.21"

All InterNetNews users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-nntp/inn-2.4.3-r1" + # emerge --ask --oneshot --verbose ">=net-nntp/inn-2.4.3-r1" - CVE-2008-1383 + CVE-2008-1383 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-31.xml index 5f50a1490d..858924eb09 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-31.xml @@ -1,6 +1,5 @@ - MIT Kerberos 5: Multiple vulnerabilities @@ -9,8 +8,8 @@ privileges. mit-krb5 - March 24, 2008 - March 24, 2008: 01 + 2008-03-24 + 2008-03-24: 01 199205 212363 remote @@ -79,22 +78,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.6.3-r1" + # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.6.3-r1" - CVE-2007-5901 - CVE-2007-5971 - CVE-2008-0062 - CVE-2008-0063 - CVE-2008-0947 + CVE-2007-5901 + CVE-2007-5971 + CVE-2008-0062 + CVE-2008-0063 + CVE-2008-0947 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-32.xml index 4c2e28e137..2bf7296cbb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200803-32.xml @@ -1,6 +1,5 @@ - Wireshark: Denial of Service @@ -8,8 +7,8 @@ Wireshark. wireshark - March 24, 2008 - March 24, 2008: 01 + 2008-03-24 + 2008-03-24: 01 212149 remote @@ -46,20 +45,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.8" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-0.99.8" - CVE-2008-1070 - CVE-2008-1071 - CVE-2008-1072 + CVE-2008-1070 + CVE-2008-1071 + CVE-2008-1072 - + rbu - + mfleming - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-01.xml index 1a6f838048..e0685d2ce6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-01.xml @@ -1,6 +1,5 @@ - CUPS: Multiple vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code and a Denial of Service. cups - April 01, 2008 - April 01, 2008: 01 + 2008-04-01 + 2008-04-01: 01 211449 212364 214068 @@ -67,21 +66,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r7" + # emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r7" - CVE-2008-0047 - CVE-2008-0053 - CVE-2008-0882 - CVE-2008-1373 + CVE-2008-0047 + CVE-2008-0053 + CVE-2008-0882 + CVE-2008-1373 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-02.xml index 571559b148..b907f97115 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-02.xml @@ -1,14 +1,13 @@ - bzip2: Denial of Service A buffer overread vulnerability has been discovered in Bzip2. bzip2 - April 02, 2008 - April 02, 2008: 01 + 2008-04-02 + 2008-04-02: 01 213820 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/bzip2-1.0.5" + # emerge --ask --oneshot --verbose ">=app-arch/bzip2-1.0.5" - CVE-2008-1372 + CVE-2008-1372 - + rbu - + mfleming - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-03.xml index d8f3291cbc..00dad43b17 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-03.xml @@ -1,6 +1,5 @@ - OpenSSH: Privilege escalation @@ -8,8 +7,8 @@ to escalate their privileges. openssh - April 05, 2008 - April 05, 2008: 01 + 2008-04-05 + 2008-04-05: 01 214985 215702 local @@ -61,19 +60,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.7_p1-r6" + # emerge --ask --oneshot --verbose ">=net-misc/openssh-4.7_p1-r6" - CVE-2008-1483 - CVE-2008-1657 + CVE-2008-1483 + CVE-2008-1657 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-04.xml index a59853638e..a8b94b8f7d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-04.xml @@ -1,6 +1,5 @@ - MySQL: Multiple vulnerabilities @@ -8,8 +7,8 @@ Denial of Service. mysql - April 06, 2008 - April 06, 2008: 01 + 2008-04-06 + 2008-04-06: 01 201669 remote @@ -60,20 +59,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.0.54" + # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.0.54" - CVE-2007-5969 - CVE-2007-6303 - CVE-2007-6304 + CVE-2007-5969 + CVE-2007-6303 + CVE-2007-6304 - + jaervosz - + jaervosz - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-05.xml index 75157ab55d..4fbf48d3d3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-05.xml @@ -1,6 +1,5 @@ - NX: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ vulnerabilities. nx, nxnode - April 06, 2008 - April 06, 2008: 02 + 2008-04-06 + 2008-04-06: 02 210317 remote @@ -55,24 +54,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/nxnode-3.1.0-r2" + # emerge --ask --oneshot --verbose ">=net-misc/nxnode-3.1.0-r2"

All NX users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/nx-3.1.0-r1" + # emerge --ask --oneshot --verbose ">=net-misc/nx-3.1.0-r1" - GLSA 200801-09 + GLSA 200801-09 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-06.xml index 213731be2e..5b0f24cc46 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-06.xml @@ -1,6 +1,5 @@ - UnZip: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary code. unzip - April 06, 2008 - April 06, 2008: 01 + 2008-04-06 + 2008-04-06: 01 213761 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-arch/unzip-5.52-r2" + # emerge --ask --oneshot --verbose ">=app-arch/unzip-5.52-r2" - CVE-2008-0888 + CVE-2008-0888 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-07.xml index 0df9ad4c36..414799fbdc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-07.xml @@ -1,6 +1,5 @@ - PECL APC: Buffer Overflow @@ -8,8 +7,8 @@ execution of arbitrary code. pecl-apc - April 09, 2008 - April 09, 2008: 01 + 2008-04-09 + 2008-04-09: 01 214576 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php5/pecl-apc-3.0.16-r1" + # emerge --ask --oneshot --verbose ">=dev-php5/pecl-apc-3.0.16-r1" - CVE-2008-1488 + CVE-2008-1488 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-08.xml index 4253efbe0c..cb9dbf0f32 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-08.xml @@ -1,6 +1,5 @@ - lighttpd: Multiple vulnerabilities @@ -8,8 +7,8 @@ a Denial of Service. lighttpd - April 10, 2008 - April 10, 2008: 01 + 2008-04-10 + 2008-04-10: 01 212930 214892 remote @@ -54,19 +53,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.19-r2" + # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.19-r2" - CVE-2008-1270 - CVE-2008-1531 + CVE-2008-1270 + CVE-2008-1531 - + keytoaster - + rbu - + mfleming
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-09.xml index 1a50d844a7..9c48b0e275 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-09.xml @@ -1,6 +1,5 @@ - am-utils: Insecure temporary file creation @@ -8,8 +7,8 @@ overwrite arbitrary files via a symlink attack. am-utils - April 10, 2008 - April 10, 2008: 01 + 2008-04-10 + 2008-04-10: 01 210158 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/am-utils-6.1.5" + # emerge --ask --oneshot --verbose ">=net-fs/am-utils-6.1.5" - CVE-2008-1078 + CVE-2008-1078 - + p-y - + mfleming - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-10.xml index 38d1378b7f..8d189d4264 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-10.xml @@ -1,6 +1,5 @@ - Tomcat: Multiple vulnerabilities @@ -8,8 +7,8 @@ session hijacking or information disclosure. tomcat - April 10, 2008 - May 28, 2009: 02 + 2008-04-10 + 2009-05-28: 02 196066 203169 local, remote @@ -81,28 +80,28 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/tomcat-5.5.26" + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-5.5.26"

All Tomcat 6.0.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/tomcat-6.0.16" + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-6.0.16" - CVE-2007-5333 - CVE-2007-5342 - CVE-2007-5461 - CVE-2007-6286 - CVE-2008-0002 + CVE-2007-5333 + CVE-2007-5342 + CVE-2007-5461 + CVE-2007-6286 + CVE-2008-0002 - + rbu - + mfleming - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-11.xml index b7d4db3817..ae38051376 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-11.xml @@ -1,6 +1,5 @@ - policyd-weight: Insecure temporary file creation @@ -8,8 +7,8 @@ symlink attack. policyd-weight - April 11, 2008 - April 11, 2008: 01 + 2008-04-11 + 2008-04-11: 01 214403 local @@ -48,7 +47,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-filter/policyd-weight-0.1.14.17" + # emerge --ask --oneshot --verbose ">=mail-filter/policyd-weight-0.1.14.17"

This version changes the default path for sockets to "/var/run/policyd-weight", which is only writable by a privileged user. @@ -57,15 +56,15 @@

- CVE-2008-1569 + CVE-2008-1569 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-12.xml index 22f036edf5..7d81cc39f5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-12.xml @@ -1,6 +1,5 @@ - gnome-screensaver: Privilege escalation @@ -8,8 +7,8 @@ configurations. gnome-screensaver - April 11, 2008 - April 11, 2008: 01 + 2008-04-11 + 2008-04-11: 01 213940 local @@ -49,16 +48,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=gnome-extra/gnome-screensaver-2.20.0-r3" + # emerge --ask --oneshot --verbose ">=gnome-extra/gnome-screensaver-2.20.0-r3" - CVE-2008-0887 - GLSA 200705-14 + CVE-2008-0887 + GLSA 200705-14 - + falco - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-13.xml index 721ebba5e2..ba529ccdaa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-13.xml @@ -1,6 +1,5 @@ - Asterisk: Multiple vulnerabilities @@ -8,8 +7,8 @@ injection, session hijacking and unauthorized usage. asterisk - April 14, 2008 - April 14, 2008: 01 + 2008-04-14 + 2008-04-14: 01 200792 202733 213883 @@ -62,20 +61,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.27" + # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.27" - CVE-2007-6170 - CVE-2007-6430 - CVE-2008-1332 + CVE-2007-6170 + CVE-2007-6430 + CVE-2008-1332 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-14.xml index 80491b0e5d..d01b4419a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-14.xml @@ -1,6 +1,5 @@ - Opera: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code. opera - April 14, 2008 - April 14, 2008: 01 + 2008-04-14 + 2008-04-14: 01 216022 remote @@ -50,17 +49,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-9.27" + # emerge --ask --oneshot --verbose ">=www-client/opera-9.27" - CVE-2008-1761 - CVE-2008-1762 - CVE-2008-1764 + CVE-2008-1761 + CVE-2008-1762 + CVE-2008-1764 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-15.xml index e845d01dba..cd90ca7bb8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-15.xml @@ -1,6 +1,5 @@ - libpng: Execution of arbitrary code @@ -8,8 +7,8 @@ certain applications that handle untrusted images. libpng - April 15, 2008 - April 15, 2008: 01 + 2008-04-15 + 2008-04-15: 01 217047 remote @@ -53,18 +52,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.26-r1" + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.26-r1" - CVE-2008-1382 + CVE-2008-1382 - + rbu - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-16.xml index e71f3231bb..321336210e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-16.xml @@ -1,6 +1,5 @@ - rsync: Execution of arbitrary code @@ -8,8 +7,8 @@ code when extended attributes are being used. rsync - April 17, 2008 - April 17, 2008: 01 + 2008-04-17 + 2008-04-17: 01 216887 remote @@ -59,18 +58,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.9-r6" + # emerge --ask --oneshot --verbose ">=net-misc/rsync-2.6.9-r6" - CVE-2008-1720 + CVE-2008-1720 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-17.xml index f456bdbd21..d4a120717b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-17.xml @@ -1,6 +1,5 @@ - Speex: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ vulnerabilities in multiple player applications. speex - April 17, 2008 - April 17, 2008: 01 + 2008-04-17 + 2008-04-17: 01 217715 remote @@ -53,18 +52,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/speex-1.2_beta3_p2" + # emerge --ask --oneshot --verbose ">=media-libs/speex-1.2_beta3_p2" - CVE-2008-1686 + CVE-2008-1686 - + vorlon - + vorlon - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-18.xml index 07c5e7ee53..ea5b95d9ca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-18.xml @@ -1,6 +1,5 @@ - Poppler: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. poppler - April 17, 2008 - April 17, 2008: 02 + 2008-04-17 + 2008-04-17: 02 216850 remote @@ -51,15 +50,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/poppler-0.6.3" + # emerge --ask --oneshot --verbose ">=app-text/poppler-0.6.3" - CVE-2008-1693 + CVE-2008-1693 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-19.xml index 77addfb124..12787d2e08 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-19.xml @@ -1,6 +1,5 @@ - PHP Toolkit: Data disclosure and Denial of Service @@ -8,8 +7,8 @@ disclosure on Apache, and a Denial of Service. php-toolkit - April 17, 2008 - April 17, 2008: 01 + 2008-04-17 + 2008-04-17: 01 209535 local @@ -53,18 +52,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/php-toolkit-1.0.1" + # emerge --ask --oneshot --verbose ">=app-admin/php-toolkit-1.0.1" - CVE-2008-1734 + CVE-2008-1734 - + rbu - + vorlon - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-20.xml index 43b8a0e301..bc24b53efb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-20.xml @@ -1,6 +1,5 @@ - Sun JDK/JRE: Multiple vulnerabilities @@ -8,8 +7,8 @@ (JDK) and Java Runtime Environment (JRE). sun-jdk, sun-jre-bin, emul-linux-x86-java - April 17, 2008 - March 05, 2010: 06 + 2008-04-17 + 2010-03-05: 06 178851 178962 183580 @@ -140,93 +139,93 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.6.0.05" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.6.0.05"

All Sun JRE 1.5 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.15" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.15"

All Sun JRE 1.4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.17" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.4.2.17"

All Sun JDK 1.6 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.6.0.05" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.6.0.05"

All Sun JDK 1.5 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.15" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.15"

All Sun JDK 1.4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.17" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.4.2.17"

All emul-linux-x86-java 1.6 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.6.0.05" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.6.0.05"

All emul-linux-x86-java 1.5 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.5.0.15" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.5.0.15"

All emul-linux-x86-java 1.4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.4.2.17" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.4.2.17" - CVE-2007-2435 - CVE-2007-2788 - CVE-2007-2789 - CVE-2007-3655 - CVE-2007-5232 - CVE-2007-5237 - CVE-2007-5238 - CVE-2007-5239 - CVE-2007-5240 - CVE-2007-5273 - CVE-2007-5274 - CVE-2007-5689 - CVE-2008-0628 - CVE-2008-0657 - CVE-2008-1185 - CVE-2008-1186 - CVE-2008-1187 - CVE-2008-1188 - CVE-2008-1189 - CVE-2008-1190 - CVE-2008-1191 - CVE-2008-1192 - CVE-2008-1193 - CVE-2008-1194 - CVE-2008-1195 - CVE-2008-1196 - GLSA 200705-23 - GLSA 200706-08 + CVE-2007-2435 + CVE-2007-2788 + CVE-2007-2789 + CVE-2007-3655 + CVE-2007-5232 + CVE-2007-5237 + CVE-2007-5238 + CVE-2007-5239 + CVE-2007-5240 + CVE-2007-5273 + CVE-2007-5274 + CVE-2007-5689 + CVE-2008-0628 + CVE-2008-0657 + CVE-2008-1185 + CVE-2008-1186 + CVE-2008-1187 + CVE-2008-1188 + CVE-2008-1189 + CVE-2008-1190 + CVE-2008-1191 + CVE-2008-1192 + CVE-2008-1193 + CVE-2008-1194 + CVE-2008-1195 + CVE-2008-1196 + GLSA 200705-23 + GLSA 200706-08 - + jaervosz - + jaervosz - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-21.xml index ed0ba6eb9c..099749af90 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-21.xml @@ -1,6 +1,5 @@ - Adobe Flash Player: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code execution on a user's system via a malicious Flash file. adobe-flash - April 18, 2008 - May 28, 2009: 02 + 2008-04-18 + 2009-05-28: 02 204344 remote @@ -81,24 +80,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-9.0.124.0" + # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-9.0.124.0" - CVE-2007-0071 - CVE-2007-5275 - CVE-2007-6019 - CVE-2007-6243 - CVE-2007-6637 - CVE-2008-1654 - CVE-2008-1655 + CVE-2007-0071 + CVE-2007-5275 + CVE-2007-6019 + CVE-2007-6243 + CVE-2007-6637 + CVE-2008-1654 + CVE-2008-1655 - + vorlon - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-22.xml index 800269af57..8f2768de8e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-22.xml @@ -1,6 +1,5 @@ - PowerDNS Recursor: DNS Cache Poisoning @@ -8,8 +7,8 @@ poisoning. pdns-recursor - April 18, 2008 - August 21, 2008: 03 + 2008-04-18 + 2008-08-21: 03 215567 231335 remote @@ -52,19 +51,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/pdns-recursor-3.1.6" + # emerge --ask --oneshot --verbose ">=net-dns/pdns-recursor-3.1.6" - CVE-2008-1637 - CVE-2008-3217 + CVE-2008-1637 + CVE-2008-3217 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-23.xml index 2e0da0520c..716074fdb8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-23.xml @@ -1,6 +1,5 @@ - CUPS: Integer overflow vulnerability @@ -8,8 +7,8 @@ a Denial of Service. cups - April 18, 2008 - April 18, 2008: 01 + 2008-04-18 + 2008-04-18: 01 217232 remote, local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r8" + # emerge --ask --oneshot --verbose ">=net-print/cups-1.2.12-r8" - CVE-2008-1722 + CVE-2008-1722 - + vorlon - + vorlon - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-24.xml index a2e31366f5..29332c779d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-24.xml @@ -1,6 +1,5 @@ - DBmail: Data disclosure @@ -8,8 +7,8 @@ under certain configurations. dbmail - April 18, 2008 - April 18, 2008: 01 + 2008-04-18 + 2008-04-18: 01 218154 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/dbmail-2.2.9" + # emerge --ask --oneshot --verbose ">=net-mail/dbmail-2.2.9" - CVE-2007-6714 + CVE-2007-6714 - + vorlon - + vorlon - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-25.xml index bc8f268b25..8381df565a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-25.xml @@ -1,6 +1,5 @@ - VLC: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. vlc - April 23, 2008 - April 23, 2008: 01 + 2008-04-23 + 2008-04-23: 01 214277 214627 remote @@ -70,24 +69,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6f" + # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6f" - CVE-2007-6681 - CVE-2008-0073 - CVE-2008-1489 - CVE-2008-1768 - CVE-2008-1769 - CVE-2008-1881 - GLSA 200803-13 + CVE-2007-6681 + CVE-2008-0073 + CVE-2008-1489 + CVE-2008-1768 + CVE-2008-1769 + CVE-2008-1881 + GLSA 200803-13 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-26.xml index 5f74dd9a36..43bb781f37 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-26.xml @@ -1,14 +1,13 @@ - Openfire: Denial of Service A design error in Openfire might lead to a Denial of Service. openfire - April 23, 2008 - April 23, 2008: 01 + 2008-04-23 + 2008-04-23: 01 217234 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/openfire-3.5.0" + # emerge --ask --oneshot --verbose ">=net-im/openfire-3.5.0" - CVE-2008-1728 + CVE-2008-1728 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-27.xml index 812d39c3bc..2c84171459 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-27.xml @@ -1,6 +1,5 @@ - SILC: Multiple vulnerabilities @@ -8,8 +7,8 @@ allowing for Denial of Service and execution of arbitrary code. silc-toolkit silc-client silc-server - April 24, 2008 - April 24, 2008: 01 + 2008-04-24 + 2008-04-24: 01 212362 214116 214812 @@ -71,32 +70,32 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/silc-toolkit-1.1.7" + # emerge --ask --oneshot --verbose ">=net-im/silc-toolkit-1.1.7"

All SILC Client users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/silc-client-1.1.4" + # emerge --ask --oneshot --verbose ">=net-im/silc-client-1.1.4"

All SILC Server users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/silc-server-1.1.2" + # emerge --ask --oneshot --verbose ">=net-im/silc-server-1.1.2" - CVE-2008-1227 - CVE-2008-1429 - CVE-2008-1552 + CVE-2008-1227 + CVE-2008-1429 + CVE-2008-1552 - + rbu - + rbu - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-28.xml index 777fd55baf..61f9749136 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-28.xml @@ -1,14 +1,13 @@ - JRockit: Multiple vulnerabilities Multiple vulnerabilities have been identified in BEA JRockit. jrockit-jdk-bin - April 24, 2008 - April 24, 2008: 01 + 2008-04-24 + 2008-04-24: 01 218226 remote @@ -52,24 +51,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/jrockit-jdk-bin-1.4.2.16" + # emerge --ask --oneshot --verbose ">=dev-java/jrockit-jdk-bin-1.4.2.16"

All JRockit 1.5 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/jrockit-jdk-bin-1.5.0.14" + # emerge --ask --oneshot --verbose ">=dev-java/jrockit-jdk-bin-1.5.0.14" - GLSA 200804-20 + GLSA 200804-20 - + rbu - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-29.xml index 1c4df7d97d..f8bf390888 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-29.xml @@ -1,6 +1,5 @@ - Comix: Multiple vulnerabilities @@ -8,8 +7,8 @@ commands and a Denial of Service. comix - April 25, 2008 - April 25, 2008: 01 + 2008-04-25 + 2008-04-25: 01 215694 local, remote @@ -52,19 +51,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/comix-3.6.4-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/comix-3.6.4-r1" - CVE-2008-1568 - CVE-2008-1796 + CVE-2008-1568 + CVE-2008-1796 - + keytoaster - + mfleming - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-30.xml index 5cde3bb17b..0035c1564f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200804-30.xml @@ -1,6 +1,5 @@ - KDE start_kdeinit: Multiple vulnerabilities @@ -8,8 +7,8 @@ attacker to execute arbitrary code with root privileges. kdelibs - April 29, 2008 - April 08, 2009: 02 + 2008-04-29 + 2009-04-08: 02 218933 local @@ -52,15 +51,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=kde-base/kdelibs-3.5.8-r4" + # emerge --ask --oneshot --verbose ">=kde-base/kdelibs-3.5.8-r4" - CVE-2008-1671 + CVE-2008-1671 - + vorlon - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-01.xml index 3c482acfee..c5da8ee8a3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-01.xml @@ -1,6 +1,5 @@ - Horde Application Framework: Multiple vulnerabilities @@ -9,8 +8,8 @@ attacker to bypass security restrictions. horde - May 05, 2008 - May 05, 2008: 01 + 2008-05-05 + 2008-05-05: 01 212635 213493 remote @@ -82,48 +81,48 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-3.1.7" + # emerge --ask --oneshot --verbose ">=www-apps/horde-3.1.7"

All horde-groupware users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-groupware-1.0.5" + # emerge --ask --oneshot --verbose ">=www-apps/horde-groupware-1.0.5"

All horde-kronolith users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-kronolith-2.1.7" + # emerge --ask --oneshot --verbose ">=www-apps/horde-kronolith-2.1.7"

All horde-mnemo users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-mnemo-2.1.2" + # emerge --ask --oneshot --verbose ">=www-apps/horde-mnemo-2.1.2"

All horde-nag users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-nag-2.1.4" + # emerge --ask --oneshot --verbose ">=www-apps/horde-nag-2.1.4"

All horde-webmail users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-webmail-1.0.6" + # emerge --ask --oneshot --verbose ">=www-apps/horde-webmail-1.0.6" - CVE-2008-1284 + CVE-2008-1284 - + keytoaster - + rbu - + mfleming
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-02.xml index 1cba8f54a3..63262ae626 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-02.xml @@ -1,14 +1,13 @@ - phpMyAdmin: Information disclosure A vulnerability in phpMyAdmin may lead to information disclosure. phpmyadmin - May 05, 2008 - May 05, 2008: 01 + 2008-05-05 + 2008-05-05: 01 219005 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.11.5.2" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.11.5.2" - CVE-2008-1924 + CVE-2008-1924 - + vorlon - + vorlon - + mfleming
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-03.xml index a441b82bca..9edc2f16b8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-03.xml @@ -1,6 +1,5 @@ - Multiple X11 terminals: Local privilege escalation @@ -8,8 +7,8 @@ rxvt-unicode, and wterm, allowing for local privilege escalation. aterm eterm rxvt mrxvt multi-aterm wterm rxvt-unicode - May 07, 2008 - May 10, 2008: 02 + 2008-05-07 + 2008-05-10: 02 216833 217819 219746 @@ -80,55 +79,55 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/aterm-1.0.1-r1" + # emerge --ask --oneshot --verbose ">=x11-terms/aterm-1.0.1-r1"

All Eterm users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/eterm-0.9.4-r1" + # emerge --ask --oneshot --verbose ">=x11-terms/eterm-0.9.4-r1"

All Mrxvt users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/mrxvt-0.5.3-r2" + # emerge --ask --oneshot --verbose ">=x11-terms/mrxvt-0.5.3-r2"

All multi-aterm users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/multi-aterm-0.2.1-r1" + # emerge --ask --oneshot --verbose ">=x11-terms/multi-aterm-0.2.1-r1"

All RXVT users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/rxvt-2.7.10-r4" + # emerge --ask --oneshot --verbose ">=x11-terms/rxvt-2.7.10-r4"

All rxvt-unicode users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/rxvt-unicode-9.02-r1" + # emerge --ask --oneshot --verbose ">=x11-terms/rxvt-unicode-9.02-r1"

All wterm users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/wterm-6.2.9-r3" + # emerge --ask --oneshot --verbose ">=x11-terms/wterm-6.2.9-r3" - CVE-2008-1142 - CVE-2008-1692 + CVE-2008-1142 + CVE-2008-1692 - + keytoaster - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-04.xml index d6fe062b78..d91a2213a9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-04.xml @@ -1,6 +1,5 @@ - eGroupWare: Multiple vulnerabilities @@ -9,8 +8,8 @@ attacks. egroupware - May 07, 2008 - May 07, 2008: 01 + 2008-05-07 + 2008-05-07: 01 214212 218625 remote @@ -57,19 +56,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/egroupware-1.4.004" + # emerge --ask --oneshot --verbose ">=www-apps/egroupware-1.4.004" - CVE-2008-1502 - CVE-2008-2041 + CVE-2008-1502 + CVE-2008-2041 - + keytoaster - + mfleming - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-05.xml index c0ac395094..10ba84cf98 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-05.xml @@ -1,6 +1,5 @@ - Wireshark: Denial of Service @@ -8,8 +7,8 @@ Wireshark. wireshark - May 07, 2008 - May 07, 2008: 01 + 2008-05-07 + 2008-05-07: 01 215276 remote @@ -58,20 +57,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.0.0" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.0.0" - CVE-2008-1561 - CVE-2008-1562 - CVE-2008-1563 + CVE-2008-1561 + CVE-2008-1562 + CVE-2008-1563 - + vorlon - + vorlon - + mfleming
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-06.xml index cd76dbd605..f3e5697226 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-06.xml @@ -1,6 +1,5 @@ - Firebird: Data disclosure @@ -8,8 +7,8 @@ verifying credentials. firebird - May 09, 2008 - May 09, 2008: 01 + 2008-05-09 + 2008-05-09: 01 216158 remote @@ -49,7 +48,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/firebird-2.0.3.12981.0-r6" + # emerge --ask --oneshot --verbose ">=dev-db/firebird-2.0.3.12981.0-r6"

Note: /etc/conf.d is protected by Portage as a configuration directory. Do not forget to use "etc-update" or "dispatch-conf" to @@ -57,12 +56,12 @@

- CVE-2008-1880 + CVE-2008-1880 - + rbu - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-07.xml index 4618e4777e..3dc2a47371 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-07.xml @@ -1,6 +1,5 @@ - Linux Terminal Server Project: Multiple vulnerabilities @@ -8,8 +7,8 @@ LTSP which allow remote attackers to compromise terminal clients. ltsp - May 09, 2008 - May 09, 2008: 01 + 2008-05-09 + 2008-05-09: 01 215699 remote @@ -63,24 +62,24 @@

- GLSA 200705-02 - GLSA 200705-06 - GLSA 200705-22 - GLSA 200705-24 - GLSA 200710-06 - GLSA 200710-16 - GLSA 200710-30 - GLSA 200711-08 - GLSA 200801-09 + GLSA 200705-02 + GLSA 200705-06 + GLSA 200705-22 + GLSA 200705-24 + GLSA 200710-06 + GLSA 200710-16 + GLSA 200710-30 + GLSA 200711-08 + GLSA 200801-09 Gentoo bug 177580: Port LTSP 5 to Gentoo - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-08.xml index 8ec2763b06..89054dd522 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-08.xml @@ -1,6 +1,5 @@ - InspIRCd: Denial of Service @@ -8,8 +7,8 @@ Service. inspircd - May 09, 2008 - May 09, 2008: 01 + 2008-05-09 + 2008-05-09: 01 215704 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/inspircd-1.1.19" + # emerge --ask --oneshot --verbose ">=net-irc/inspircd-1.1.19" - CVE-2008-1925 + CVE-2008-1925 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-09.xml index ed7ccc0404..17d63ae9cf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-09.xml @@ -1,6 +1,5 @@ - MoinMoin: Privilege escalation @@ -8,8 +7,8 @@ privileges. moinmoin - May 11, 2008 - May 11, 2008: 01 + 2008-05-11 + 2008-05-11: 01 218752 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/moinmoin-1.6.3" + # emerge --ask --oneshot --verbose ">=www-apps/moinmoin-1.6.3" - CVE-2008-1937 + CVE-2008-1937 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-10.xml index 9be35dc1f4..2893e0f211 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-10.xml @@ -1,6 +1,5 @@ - Pngcrush: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. pngcrush - May 11, 2008 - May 11, 2008: 01 + 2008-05-11 + 2008-05-11: 01 219033 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/pngcrush-1.6.4-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/pngcrush-1.6.4-r1" - CVE-2008-1382 - GLSA 200804-15 + CVE-2008-1382 + GLSA 200804-15 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-11.xml index f572178f25..9b97568284 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-11.xml @@ -1,6 +1,5 @@ - Chicken: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. chicken - May 12, 2008 - May 12, 2008: 01 + 2008-05-12 + 2008-05-12: 01 198979 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-scheme/chicken-3.1.0" + # emerge --ask --oneshot --verbose ">=dev-scheme/chicken-3.1.0" - GLSA 200711-30 + GLSA 200711-30 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-12.xml index 10389ad552..f20673c4ab 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-12.xml @@ -1,6 +1,5 @@ - Blender: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. blender - May 12, 2008 - May 12, 2008: 01 + 2008-05-12 + 2008-05-12: 01 219008 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/blender-2.43-r2" + # emerge --ask --oneshot --verbose ">=media-gfx/blender-2.43-r2" - CVE-2008-1102 - CVE-2008-1103 + CVE-2008-1102 + CVE-2008-1103 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-13.xml index 8f954deff8..f594088163 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-13.xml @@ -1,6 +1,5 @@ - PTeX: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code or overwriting arbitrary files. ptex - May 12, 2008 - May 12, 2008: 01 + 2008-05-12 + 2008-05-12: 01 196673 remote @@ -51,23 +50,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/ptex-3.1.10_p20071203" + # emerge --ask --oneshot --verbose ">=app-text/ptex-3.1.10_p20071203" - GLSA 200708-05 - GLSA 200709-12 - GLSA 200709-17 - GLSA 200710-12 - GLSA 200711-22 - GLSA 200711-26 + GLSA 200708-05 + GLSA 200709-12 + GLSA 200709-17 + GLSA 200710-12 + GLSA 200711-22 + GLSA 200711-26 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-14.xml index 2a6c5d7526..f04b58f26f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-14.xml @@ -1,6 +1,5 @@ - Common Data Format library: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ Format library. cdf - May 13, 2008 - May 13, 2008: 01 + 2008-05-13 + 2008-05-13: 01 220391 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sci-libs/cdf-3.2.1" + # emerge --ask --oneshot --verbose ">=sci-libs/cdf-3.2.1" - CVE-2008-2080 + CVE-2008-2080 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-15.xml index 022befa527..78a4feb6bb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-15.xml @@ -1,14 +1,13 @@ - libid3tag: Denial of Service A Denial of Service vulnerability was found in libid3tag. libid3tag - May 14, 2008 - May 14, 2008: 01 + 2008-05-14 + 2008-05-14: 01 210564 remote @@ -45,18 +44,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libid3tag-0.15.1b-r2" + # emerge --ask --oneshot --verbose ">=media-libs/libid3tag-0.15.1b-r2" - CVE-2008-2109 + CVE-2008-2109 - + p-y - + p-y - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-16.xml index f9ef6db7ed..082257f56b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-16.xml @@ -1,6 +1,5 @@ - OpenOffice.org: Multiple vulnerabilities @@ -8,8 +7,8 @@ allowing for user-assisted execution of arbitrary code. openoffice openoffice-bin - May 14, 2008 - May 14, 2008: 02 + 2008-05-14 + 2008-05-14: 02 218080 remote @@ -79,30 +78,30 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.4.0" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.4.0"

All OpenOffice.org binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.4.0" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.4.0" - CVE-2007-4770 - CVE-2007-4771 - CVE-2007-5745 - CVE-2007-5746 - CVE-2007-5747 - CVE-2008-0320 - GLSA 200803-20 + CVE-2007-4770 + CVE-2007-4771 + CVE-2007-5745 + CVE-2007-5746 + CVE-2007-5747 + CVE-2008-0320 + GLSA 200803-20 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-17.xml index 1565ba3711..82877877f1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-17.xml @@ -1,6 +1,5 @@ - Perl: Execution of arbitrary code @@ -8,8 +7,8 @@ the execution of arbitrary code and a Denial of Service. perl libperl - May 20, 2008 - May 20, 2008: 01 + 2008-05-20 + 2008-05-20: 01 219203 remote @@ -51,24 +50,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/perl-5.8.8-r5" + # emerge --ask --oneshot --verbose ">=dev-lang/perl-5.8.8-r5"

All libperl users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-devel/libperl-5.8.8-r2" + # emerge --ask --oneshot --verbose ">=sys-devel/libperl-5.8.8-r2" - CVE-2008-1927 + CVE-2008-1927 - + p-y - + p-y - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-18.xml index a6f62b3195..0a086c92ec 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-18.xml @@ -1,6 +1,5 @@ - Mozilla products: Multiple vulnerabilities @@ -9,8 +8,8 @@ execution of arbitrary code. mozilla-firefox mozilla-firefox-bin seamonkey seamonkey-bin mozilla-thunderbird mozilla-thunderbird-bin xulrunner - May 20, 2008 - May 20, 2008: 01 + 2008-05-20 + 2008-05-20: 01 208128 214816 218065 @@ -199,44 +198,44 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.14" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.14"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.14" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.14"

All Mozilla Thunderbird users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-2.0.0.14" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-2.0.0.14"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-2.0.0.14" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-2.0.0.14"

All SeaMonkey users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.9-r1" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.9-r1"

All SeaMonkey binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.9" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.9"

All XULRunner users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-1.8.1.14" + # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-1.8.1.14"

NOTE: The crash vulnerability (CVE-2008-1380) is currently unfixed in the SeaMonkey binary ebuild, as no precompiled packages have been @@ -246,35 +245,35 @@

- CVE-2007-4879 - CVE-2008-0304 - CVE-2008-0412 - CVE-2008-0413 - CVE-2008-0414 - CVE-2008-0415 - CVE-2008-0416 - CVE-2008-0417 - CVE-2008-0418 - CVE-2008-0419 - CVE-2008-0420 - CVE-2008-0591 - CVE-2008-0592 - CVE-2008-0593 - CVE-2008-0594 - CVE-2008-1233 - CVE-2008-1234 - CVE-2008-1235 - CVE-2008-1236 - CVE-2008-1237 - CVE-2008-1238 - CVE-2008-1240 - CVE-2008-1241 - CVE-2008-1380 + CVE-2007-4879 + CVE-2008-0304 + CVE-2008-0412 + CVE-2008-0413 + CVE-2008-0414 + CVE-2008-0415 + CVE-2008-0416 + CVE-2008-0417 + CVE-2008-0418 + CVE-2008-0419 + CVE-2008-0420 + CVE-2008-0591 + CVE-2008-0592 + CVE-2008-0593 + CVE-2008-0594 + CVE-2008-1233 + CVE-2008-1234 + CVE-2008-1235 + CVE-2008-1236 + CVE-2008-1237 + CVE-2008-1238 + CVE-2008-1240 + CVE-2008-1241 + CVE-2008-1380 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-19.xml index 601f657578..ddca127c32 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-19.xml @@ -1,6 +1,5 @@ - ClamAV: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. clamav - May 20, 2008 - May 20, 2008: 01 + 2008-05-20 + 2008-05-20: 01 213762 remote @@ -80,21 +79,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.93" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.93" - CVE-2008-0314 - CVE-2008-1100 - CVE-2008-1387 - CVE-2008-1833 - CVE-2008-1835 - CVE-2008-1836 - CVE-2008-1837 + CVE-2008-0314 + CVE-2008-1100 + CVE-2008-1387 + CVE-2008-1833 + CVE-2008-1835 + CVE-2008-1836 + CVE-2008-1837 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-20.xml index d7647ce28f..be55b851b0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-20.xml @@ -1,6 +1,5 @@ - GnuTLS: Execution of arbitrary code @@ -8,8 +7,8 @@ daemons using GnuTLS. gnutls - May 21, 2008 - May 21, 2008: 01 + 2008-05-21 + 2008-05-21: 01 222823 remote @@ -64,17 +63,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/gnutls-2.2.5" + # emerge --ask --oneshot --verbose ">=net-libs/gnutls-2.2.5" - CVE-2008-1948 - CVE-2008-1949 - CVE-2008-1950 + CVE-2008-1948 + CVE-2008-1949 + CVE-2008-1950 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-21.xml index 0f3123beff..028870835a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-21.xml @@ -1,14 +1,13 @@ - Roundup: Permission bypass A vulnerability in Roundup allows for bypassing permission restrictions. roundup - May 27, 2008 - May 27, 2008: 01 + 2008-05-27 + 2008-05-27: 01 212488 214666 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/roundup-1.4.4-r1" + # emerge --ask --oneshot --verbose ">=www-apps/roundup-1.4.4-r1" - CVE-2008-1474 - CVE-2008-1475 + CVE-2008-1474 + CVE-2008-1475 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-22.xml index ecabb22694..23c38fcf64 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-22.xml @@ -1,6 +1,5 @@ - MPlayer: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. mplayer - May 29, 2008 - May 29, 2008: 01 + 2008-05-29 + 2008-05-29: 01 215006 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_rc2_p26753" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_rc2_p26753" - CVE-2008-1558 + CVE-2008-1558 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-23.xml index 599cddbb7c..2baafe4c03 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200805-23.xml @@ -1,6 +1,5 @@ - Samba: Heap-based buffer overflow @@ -8,8 +7,8 @@ the execution of arbitrary code. samba - May 29, 2008 - May 29, 2008: 01 + 2008-05-29 + 2008-05-29: 01 222299 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.28a-r1" + # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.28a-r1" - CVE-2008-1105 + CVE-2008-1105 - + vorlon - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-01.xml index f2b4b6eda0..9a7ad511b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-01.xml @@ -1,6 +1,5 @@ - mtr: Stack-based buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. mtr - June 03, 2008 - June 03, 2008: 01 + 2008-06-03 + 2008-06-03: 01 223017 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/mtr-0.73-r1" + # emerge --ask --oneshot --verbose ">=net-analyzer/mtr-0.73-r1" - CVE-2008-2357 + CVE-2008-2357 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-02.xml index 29f0e7ffaa..7704825da7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-02.xml @@ -1,6 +1,5 @@ - libxslt: Execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary code and Denial of Service. libxslt - June 03, 2008 - June 03, 2008: 01 + 2008-06-03 + 2008-06-03: 01 222499 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libxslt-1.1.24" + # emerge --ask --oneshot --verbose ">=dev-libs/libxslt-1.1.24" - CVE-2008-1767 + CVE-2008-1767 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-03.xml index 6c45037094..fb690f6cd2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-03.xml @@ -1,6 +1,5 @@ - Imlib 2: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ code. imlib2 - June 08, 2008 - June 08, 2008: 01 + 2008-06-08 + 2008-06-08: 01 223965 remote @@ -55,18 +54,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/imlib2-1.4.0-r1" + # emerge --ask --oneshot --verbose ">=media-libs/imlib2-1.4.0-r1" - CVE-2008-2426 + CVE-2008-2426 - + rbu - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-04.xml index b1427f2e0a..03f028e732 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-04.xml @@ -1,6 +1,5 @@ - rdesktop: Multiple vulnerabilities @@ -8,8 +7,8 @@ code or a Denial of Service. rdesktop - June 14, 2008 - June 14, 2008: 01 + 2008-06-14 + 2008-06-14: 01 220911 remote @@ -61,20 +60,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/rdesktop-1.6.0" + # emerge --ask --oneshot --verbose ">=net-misc/rdesktop-1.6.0" - CVE-2008-1801 - CVE-2008-1802 - CVE-2008-1803 + CVE-2008-1801 + CVE-2008-1802 + CVE-2008-1803 - + keytoaster - + vorlon - + mfleming
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-05.xml index 002d2f2e40..21c9e9b654 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-05.xml @@ -1,6 +1,5 @@ - cbrPager: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. cbrpager - June 16, 2008 - June 16, 2008: 01 + 2008-06-16 + 2008-06-16: 01 223657 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-misc/cbrpager-0.9.17" + # emerge --ask --oneshot --verbose ">=app-misc/cbrpager-0.9.17" - CVE-2008-2575 + CVE-2008-2575 - + keytoaster - + vorlon - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-06.xml index 9bb574cb59..d91967ec2c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-06.xml @@ -1,6 +1,5 @@ - Evolution: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary code. evolution - June 16, 2008 - June 16, 2008: 01 + 2008-06-16 + 2008-06-16: 01 223963 remote @@ -57,19 +56,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/evolution-2.12.3-r2" + # emerge --ask --oneshot --verbose ">=mail-client/evolution-2.12.3-r2" - CVE-2008-1108 - CVE-2008-1109 + CVE-2008-1108 + CVE-2008-1109 - + vorlon - + vorlon - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-07.xml index 3bb7ff825a..a2aba493dc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-07.xml @@ -1,6 +1,5 @@ - X.Org X server: Multiple vulnerabilities @@ -9,8 +8,8 @@ privileges. xorg-server - June 19, 2008 - June 19, 2008: 01 + 2008-06-19 + 2008-06-19: 01 225419 remote, local @@ -63,14 +62,14 @@ places:

- Section "Extensions" - Option "MIT-SHM" "disable" - Option "RENDER" "disable" - Option "SECURITY" "disable" + Section "Extensions" + Option "MIT-SHM" "disable" + Option "RENDER" "disable" + Option "SECURITY" "disable" EndSection - Section "Module" - Disable "record" + Section "Module" + Disable "record" EndSection @@ -79,19 +78,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.3.0.0-r6" + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.3.0.0-r6"
- CVE-2008-1377 - CVE-2008-1379 - CVE-2008-2360 - CVE-2008-2361 - CVE-2008-2362 + CVE-2008-1377 + CVE-2008-1379 + CVE-2008-2360 + CVE-2008-2361 + CVE-2008-2362 - + vorlon - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-08.xml index ef630c7f59..b347bf8d34 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-08.xml @@ -1,6 +1,5 @@ - OpenSSL: Denial of Service @@ -8,8 +7,8 @@ OpenSSL. openssl - June 23, 2008 - June 23, 2008: 01 + 2008-06-23 + 2008-06-23: 01 223429 remote @@ -59,19 +58,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8g-r2" + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8g-r2" - CVE-2008-0891 - CVE-2008-1672 + CVE-2008-0891 + CVE-2008-1672 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-09.xml index fbb4cfdcfe..2a118102c3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-09.xml @@ -1,6 +1,5 @@ - libvorbis: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. libvorbis - June 23, 2008 - June 23, 2008: 02 + 2008-06-23 + 2008-06-23: 02 222085 remote @@ -67,20 +66,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libvorbis-1.2.1_rc1" + # emerge --ask --oneshot --verbose ">=media-libs/libvorbis-1.2.1_rc1" - CVE-2008-1419 - CVE-2008-1420 - CVE-2008-1423 + CVE-2008-1419 + CVE-2008-1420 + CVE-2008-1423 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-10.xml index 0028bb0ce2..7c6fbbe8e2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-10.xml @@ -1,6 +1,5 @@ - FreeType: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. freetype - June 23, 2008 - May 28, 2009: 03 + 2008-06-23 + 2009-05-28: 03 225851 remote @@ -64,20 +63,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.3.6" + # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.3.6" - CVE-2008-1806 - CVE-2008-1807 - CVE-2008-1808 + CVE-2008-1806 + CVE-2008-1807 + CVE-2008-1808 - + vorlon - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-11.xml index d91929319a..50e013ef7a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200806-11.xml @@ -1,6 +1,5 @@ - IBM JDK/JRE: Multiple vulnerabilities @@ -9,8 +8,8 @@ code. ibm-jdk-bin ibm-jre-bin - June 25, 2008 - June 25, 2008: 01 + 2008-06-25 + 2008-06-25: 01 186277 198644 216112 @@ -62,36 +61,36 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/ibm-jdk-bin-1.5.0.7" + # emerge --ask --oneshot --verbose ">=dev-java/ibm-jdk-bin-1.5.0.7"

All IBM JDK 1.4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/ibm-jdk-bin-1.4.2.11" + # emerge --ask --oneshot --verbose ">=dev-java/ibm-jdk-bin-1.4.2.11"

All IBM JRE 1.5 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/ibm-jre-bin-1.5.0.7" + # emerge --ask --oneshot --verbose ">=dev-java/ibm-jre-bin-1.5.0.7"

All IBM JRE 1.4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/ibm-jre-bin-1.4.2.11" + # emerge --ask --oneshot --verbose ">=dev-java/ibm-jre-bin-1.4.2.11" - GLSA 200804-20 + GLSA 200804-20 - + rbu - + keytoaster - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-01.xml index 02d4da4d79..ca3e11c0d8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-01.xml @@ -1,14 +1,13 @@ - Python: Multiple integer overflows Multiple integer overflows may allow for Denial of Service. python - July 01, 2008 - July 01, 2008: 01 + 2008-07-01 + 2008-07-01: 01 216673 217221 remote @@ -65,23 +64,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/python-2.3.6-r6" + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.3.6-r6"

All Python 2.4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.4-r13" + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.4-r13" - CVE-2008-1679 - CVE-2008-1721 - CVE-2008-1887 + CVE-2008-1679 + CVE-2008-1721 + CVE-2008-1887 - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-02.xml index 58d97db5cc..36fc1ee5a7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-02.xml @@ -1,6 +1,5 @@ - Motion: Execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. motion - July 01, 2008 - July 01, 2008: 01 + 2008-07-01 + 2008-07-01: 01 227053 remote @@ -53,18 +52,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/motion-3.2.10.1" + # emerge --ask --oneshot --verbose ">=media-video/motion-3.2.10.1" - CVE-2008-2654 + CVE-2008-2654 - + rbu - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-03.xml index 6e490c0926..bdc430ee69 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-03.xml @@ -1,6 +1,5 @@ - PCRE: Buffer overflow @@ -8,8 +7,8 @@ the execution of arbitrary code and a Denial of Service. libpcre glib - July 07, 2008 - July 07, 2008: 01 + 2008-07-07 + 2008-07-07: 01 228091 230039 remote @@ -56,21 +55,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libpcre-7.7-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/libpcre-7.7-r1"

All GLib users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.16.3-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.16.3-r1" - CVE-2008-2371 + CVE-2008-2371 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-04.xml index b6701e0569..37656e32c9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-04.xml @@ -1,6 +1,5 @@ - Poppler: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. poppler - July 08, 2008 - July 08, 2008: 01 + 2008-07-08 + 2008-07-08: 01 229931 remote @@ -49,15 +48,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/poppler-0.6.3-r1" + # emerge --ask --oneshot --verbose ">=app-text/poppler-0.6.3-r1" - CVE-2008-2950 + CVE-2008-2950 - + vorlon - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-05.xml index 80459b53ec..adb9dd0ecc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-05.xml @@ -1,14 +1,13 @@ - OpenOffice.org: User-assisted execution of arbitrary code An integer overflow vulnerability has been reported in OpenOffice.org. openoffice openoffice-bin - July 09, 2008 - July 09, 2008: 01 + 2008-07-09 + 2008-07-09: 01 225723 remote @@ -53,24 +52,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.4.1" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-2.4.1"

All OpenOffice.org binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.4.1" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-2.4.1" - CVE-2008-2152 + CVE-2008-2152 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-06.xml index 245f79bdb1..7113b0c64c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-06.xml @@ -1,14 +1,13 @@ - Apache: Denial of Service Multiple vulnerabilities in Apache might lead to a Denial of Service. apache - July 09, 2008 - July 09, 2008: 01 + 2008-07-09 + 2008-07-09: 01 222643 227111 remote @@ -65,20 +64,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.9" + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.9" - CVE-2007-6420 - CVE-2008-1678 - CVE-2008-2364 + CVE-2007-6420 + CVE-2008-1678 + CVE-2008-2364 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-07.xml index eb132e99ad..4da2d92e89 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-07.xml @@ -1,6 +1,5 @@ - NX: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ vulnerabilities. nx, nxnode - July 09, 2008 - July 09, 2008: 01 + 2008-07-09 + 2008-07-09: 01 230147 remote @@ -55,21 +54,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/nxnode-3.2.0-r3" + # emerge --ask --oneshot --verbose ">=net-misc/nxnode-3.2.0-r3"

All NX users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/nx-3.2.0-r2" + # emerge --ask --oneshot --verbose ">=net-misc/nx-3.2.0-r2" - GLSA 200806-07 + GLSA 200806-07 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-08.xml index bb76d7c59f..4c2f321543 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-08.xml @@ -1,6 +1,5 @@ - BIND: Cache poisoning @@ -8,8 +7,8 @@ poisoning on recursive resolvers. bind - July 11, 2008 - July 11, 2008: 01 + 2008-07-11 + 2008-07-11: 01 231201 remote @@ -49,7 +48,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.2_p1" + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.2_p1"

Note: In order to utilize the query port randomization to mitigate the weakness, you need to make sure that your network setup allows the DNS @@ -59,15 +58,15 @@

- CVE-2008-1447 + CVE-2008-1447 - + vorlon - + vorlon - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-09.xml index c5e720cbb6..ae7898da12 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-09.xml @@ -1,6 +1,5 @@ - Mercurial: Directory traversal @@ -8,8 +7,8 @@ arbitrary files. mercurial - July 15, 2008 - July 15, 2008: 01 + 2008-07-15 + 2008-07-15: 01 230193 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/mercurial-1.0.1-r2" + # emerge --ask --oneshot --verbose ">=dev-util/mercurial-1.0.1-r2" - CVE-2008-2942 + CVE-2008-2942 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-10.xml index e1b7c96786..110adca0a7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-10.xml @@ -1,6 +1,5 @@ - Bacula: Information disclosure @@ -8,8 +7,8 @@ information. bacula - July 21, 2008 - July 21, 2008: 01 + 2008-07-21 + 2008-07-21: 01 196834 local @@ -52,15 +51,15 @@

- CVE-2007-5626 + CVE-2007-5626 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-11.xml index 59ec71b456..778311a3c1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-11.xml @@ -1,6 +1,5 @@ - PeerCast: Buffer overflow @@ -8,8 +7,8 @@ execution of arbitrary code. peercast - July 21, 2008 - July 21, 2008: 01 + 2008-07-21 + 2008-07-21: 01 220281 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1218-r1" + # emerge --ask --oneshot --verbose ">=media-sound/peercast-0.1218-r1" - CVE-2008-2040 + CVE-2008-2040 - + rbu - + vorlon - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-12.xml index 3e152a5f7b..9e2336e4f6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-12.xml @@ -1,6 +1,5 @@ - BitchX: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code or symlink attacks. bitchx - July 21, 2008 - July 21, 2008: 01 + 2008-07-21 + 2008-07-21: 01 190667 remote @@ -49,19 +48,19 @@ the vulnerable package and switch to another IRC client:

- # emerge --unmerge "net-irc/bitchx" + # emerge --unmerge "net-irc/bitchx" - CVE-2007-4584 - CVE-2007-5839 + CVE-2007-4584 + CVE-2007-5839 - + vorlon - + vorlon - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-13.xml index 681d231ee3..8b9fa00918 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-13.xml @@ -1,6 +1,5 @@ - VLC: Multiple vulnerabilities @@ -8,8 +7,8 @@ code. vlc - July 31, 2008 - July 31, 2008: 01 + 2008-07-31 + 2008-07-31: 01 221959 230692 local, remote @@ -52,19 +51,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6i" + # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6i" - CVE-2008-2147 - CVE-2008-2430 + CVE-2008-2147 + CVE-2008-2430 - + keytoaster - + vorlon - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-14.xml index b4500667a0..fd3e521d3a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-14.xml @@ -1,6 +1,5 @@ - Linux Audit: Buffer overflow @@ -8,8 +7,8 @@ execute arbitrary code. audit - July 31, 2008 - July 31, 2008: 01 + 2008-07-31 + 2008-07-31: 01 215705 local @@ -49,15 +48,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-process/audit-1.7.3" + # emerge --ask --oneshot --verbose ">=sys-process/audit-1.7.3" - CVE-2008-1628 + CVE-2008-1628 - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-15.xml index 204adbf181..673b3e80e6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-15.xml @@ -1,6 +1,5 @@ - Pan: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. pan - July 31, 2008 - July 31, 2008: 01 + 2008-07-31 + 2008-07-31: 01 224051 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-nntp/pan-0.132-r3" + # emerge --ask --oneshot --verbose ">=net-nntp/pan-0.132-r3" - CVE-2008-2363 + CVE-2008-2363 - + rbu - + vorlon - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-16.xml index cb9cae48f6..3149b0ac7c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200807-16.xml @@ -1,6 +1,5 @@ - Python: Multiple vulnerabilities @@ -8,8 +7,8 @@ code. python - July 31, 2008 - July 19, 2009: 02 + 2008-07-31 + 2009-07-19: 02 230640 232137 remote @@ -78,13 +77,13 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.4-r14" + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.4-r14"

All Python 2.5 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/python-2.5.2-r6" + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.5.2-r6"

Please note that Python 2.3 is masked since June 24, and we will not be releasing updates to it. It will be removed from the tree in the near @@ -92,16 +91,16 @@

- CVE-2008-2315 - CVE-2008-2316 - CVE-2008-3142 - CVE-2008-3143 - CVE-2008-3144 + CVE-2008-2315 + CVE-2008-2316 + CVE-2008-3142 + CVE-2008-3143 + CVE-2008-3144 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-01.xml index 4d8a4b0c4a..9c5b823b47 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-01.xml @@ -1,6 +1,5 @@ - xine-lib: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ streams. xine-lib - August 06, 2008 - August 06, 2008: 01 + 2008-08-06 + 2008-08-06: 01 213039 214270 218059 @@ -68,20 +67,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.13" + # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.13" - CVE-2008-0073 - CVE-2008-1482 - CVE-2008-1878 + CVE-2008-0073 + CVE-2008-1482 + CVE-2008-1878 - + rbu - + vorlon - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-02.xml index d136e8886f..bd4c9453e8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-02.xml @@ -1,6 +1,5 @@ - Net-SNMP: Multiple vulnerabilities @@ -8,8 +7,8 @@ snmpd and execution of arbitrary code in Perl applications using Net-SMNP. net-snmp - August 06, 2008 - August 06, 2008: 01 + 2008-08-06 + 2008-08-06: 01 222265 225105 remote @@ -56,19 +55,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.1.1" + # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.1.1" - CVE-2008-0960 - CVE-2008-2292 + CVE-2008-0960 + CVE-2008-2292 - + keytoaster - + vorlon - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-03.xml index a3e3f8822a..e3b9a50298 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-03.xml @@ -1,6 +1,5 @@ - Mozilla products: Multiple vulnerabilities @@ -9,8 +8,8 @@ execution of arbitrary code. mozilla-firefox mozilla-firefox-bin mozilla-thunderbird mozilla-thunderbird-bin seamonkey seamonkey-bin xulrunner xulrunner-bin - August 06, 2008 - August 06, 2008: 01 + 2008-08-06 + 2008-08-06: 01 204337 218065 230567 @@ -172,76 +171,76 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.16" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-2.0.0.16"

All Mozilla Firefox binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.16" + # emerge --ask --oneshot --verbose ">=www-client/mozilla-firefox-bin-2.0.0.16"

All Mozilla Thunderbird users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-2.0.0.16" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-2.0.0.16"

All Mozilla Thunderbird binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-2.0.0.16" + # emerge --ask --oneshot --verbose ">=mail-client/mozilla-thunderbird-bin-2.0.0.16"

All Seamonkey users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.11" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-1.1.11"

All Seamonkey binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.11" + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-bin-1.1.11"

All XULRunner users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-1.8.1.16" + # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-1.8.1.16"

All XULRunner binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-bin-1.8.1.16" + # emerge --ask --oneshot --verbose ">=net-libs/xulrunner-bin-1.8.1.16" - CVE-2008-1380 - CVE-2008-2785 - CVE-2008-2798 - CVE-2008-2799 - CVE-2008-2800 - CVE-2008-2801 - CVE-2008-2802 - CVE-2008-2803 - CVE-2008-2805 - CVE-2008-2807 - CVE-2008-2808 - CVE-2008-2809 - CVE-2008-2810 - CVE-2008-2811 - CVE-2008-2933 - GLSA 200805-18 + CVE-2008-1380 + CVE-2008-2785 + CVE-2008-2798 + CVE-2008-2799 + CVE-2008-2800 + CVE-2008-2801 + CVE-2008-2802 + CVE-2008-2803 + CVE-2008-2805 + CVE-2008-2807 + CVE-2008-2808 + CVE-2008-2809 + CVE-2008-2810 + CVE-2008-2811 + CVE-2008-2933 + GLSA 200805-18 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-04.xml index ebd0a7740c..2df5b260f9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-04.xml @@ -1,6 +1,5 @@ - Wireshark: Denial of Service @@ -8,8 +7,8 @@ Wireshark. wireshark - August 06, 2008 - August 06, 2008: 01 + 2008-08-06 + 2008-08-06: 01 230411 231587 remote @@ -52,23 +51,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.0.2" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.0.2" - CVE-2008-3137 - CVE-2008-3138 - CVE-2008-3139 - CVE-2008-3140 - CVE-2008-3141 - CVE-2008-3145 + CVE-2008-3137 + CVE-2008-3138 + CVE-2008-3139 + CVE-2008-3140 + CVE-2008-3141 + CVE-2008-3145 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-05.xml index 3fb9416499..d8b3ccb7ca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-05.xml @@ -1,14 +1,13 @@ - ISC DHCP: Denial of Service A Denial of Service vulnerability was discovered in ISC DHCP. dhcp - August 06, 2008 - August 06, 2008: 01 + 2008-08-06 + 2008-08-06: 01 227135 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/dhcp-3.1.1" + # emerge --ask --oneshot --verbose ">=net-misc/dhcp-3.1.1" - CVE-2007-0062 + CVE-2007-0062 - + rbu - + vorlon - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-06.xml index 6c53293b7e..0ace84d743 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-06.xml @@ -1,6 +1,5 @@ - libxslt: Execution of arbitrary code @@ -8,8 +7,8 @@ the execution of arbitrary code. libxslt - August 06, 2008 - August 06, 2008: 01 + 2008-08-06 + 2008-08-06: 01 232172 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libxslt-1.1.24-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/libxslt-1.1.24-r1" - CVE-2008-2935 + CVE-2008-2935 - + rbu - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-07.xml index d6bb0eb057..e8fb844974 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-07.xml @@ -1,14 +1,13 @@ - ClamAV: Multiple Denials of Service Multiple vulnerabilities in ClamAV may result in a Denial of Service. clamav - August 08, 2008 - August 08, 2008: 01 + 2008-08-08 + 2008-08-08: 01 204340 227351 remote @@ -53,20 +52,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.93.3" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.93.3" - CVE-2007-6595 - CVE-2008-2713 - CVE-2008-3215 + CVE-2007-6595 + CVE-2008-2713 + CVE-2008-3215 - + rbu - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-08.xml index 267e276674..99b5f68a70 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-08.xml @@ -1,6 +1,5 @@ - stunnel: Security bypass @@ -8,8 +7,8 @@ certificate which would be published by OCSP. stunnel - August 08, 2008 - August 09, 2009: 02 + 2008-08-08 + 2009-08-09: 02 222805 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/stunnel-4.24" + # emerge --ask --oneshot --verbose ">=net-misc/stunnel-4.24" - CVE-2008-2420 + CVE-2008-2420 - + rbu - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-09.xml index 5ca22245f8..8daef47edd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-09.xml @@ -1,6 +1,5 @@ - OpenLDAP: Denial of Service vulnerability @@ -8,8 +7,8 @@ Denial of Service. openldap - August 08, 2008 - August 08, 2008: 01 + 2008-08-08 + 2008-08-08: 01 230269 remote @@ -49,15 +48,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-nds/openldap-2.3.43" + # emerge --ask --oneshot --verbose ">=net-nds/openldap-2.3.43" - CVE-2008-2952 + CVE-2008-2952 - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-10.xml index dfc6049068..c3ec1739b0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-10.xml @@ -1,6 +1,5 @@ - Adobe Reader: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ PDF. acroread - August 09, 2008 - August 09, 2008: 01 + 2008-08-09 + 2008-08-09: 01 233383 remote @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.2-r3" + # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.2-r3" - CVE-2008-2641 + CVE-2008-2641 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-11.xml index 05c441f4f5..4a3d222248 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-11.xml @@ -1,6 +1,5 @@ - UUDeview: Insecure temporary file creation @@ -8,8 +7,8 @@ attacks. nzbget uudeview - August 11, 2008 - August 11, 2008: 01 + 2008-08-11 + 2008-08-11: 01 222275 224193 local @@ -53,24 +52,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/uudeview-0.5.20-r1" + # emerge --ask --oneshot --verbose ">=app-text/uudeview-0.5.20-r1"

All NZBget users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=news-nntp/nzbget-0.4.0" + # emerge --ask --oneshot --verbose ">=news-nntp/nzbget-0.4.0" - CVE-2008-2266 + CVE-2008-2266 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-12.xml index d6214d7811..598453bf16 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200808-12.xml @@ -1,6 +1,5 @@ - Postfix: Local privilege escalation vulnerability @@ -9,8 +8,8 @@ root privileges. postfix - August 14, 2008 - October 23, 2008: 02 + 2008-08-14 + 2008-10-23: 02 232642 local @@ -108,17 +107,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.5.3-r1" + # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.5.3-r1" - CVE-2008-2936 - CVE-2008-2937 - Official Advisory + CVE-2008-2936 + CVE-2008-2937 + Official Advisory - + falco - + falco
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-01.xml index 0ef8bf3e5d..aee91aad71 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-01.xml @@ -1,6 +1,5 @@ - yelp: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ opening a URI, for example through Firefox. yelp - September 04, 2008 - September 04, 2008: 01 + 2008-09-04 + 2008-09-04: 01 234079 remote @@ -48,24 +47,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=gnome-extra/yelp-2.22.1-r2" + # emerge --ask --oneshot --verbose ">=gnome-extra/yelp-2.22.1-r2"

All yelp users running GNOME 2.20 should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=gnome-extra/yelp-2.20.0-r1" + # emerge --ask --oneshot --verbose ">=gnome-extra/yelp-2.20.0-r1" - CVE-2008-3533 + CVE-2008-3533 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-02.xml index d38a3f16fe..d3391f0050 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-02.xml @@ -1,6 +1,5 @@ - dnsmasq: Denial of Service and DNS spoofing @@ -8,8 +7,8 @@ spoofing of DNS replies. dnsmasq - September 04, 2008 - September 04, 2008: 01 + 2008-09-04 + 2008-09-04: 01 231282 232523 remote @@ -59,19 +58,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.45" + # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.45" - CVE-2008-3350 - CVE-2008-1447 + CVE-2008-3350 + CVE-2008-1447 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-03.xml index ce9e8be495..f3b11638a2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-03.xml @@ -1,6 +1,5 @@ - RealPlayer: Buffer overflow @@ -8,8 +7,8 @@ arbitrary code. realplayer - September 04, 2008 - September 04, 2008: 01 + 2008-09-04 + 2008-09-04: 01 232997 remote @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/realplayer-11.0.0.4028-r1" + # emerge --ask --oneshot --verbose ">=media-video/realplayer-11.0.0.4028-r1" - CVE-2007-5400 + CVE-2007-5400 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-04.xml index 8b12fefb1e..79f3c371d1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-04.xml @@ -1,6 +1,5 @@ - MySQL: Privilege bypass @@ -8,8 +7,8 @@ access to other databases. mysql - September 04, 2008 - September 04, 2008: 01 + 2008-09-04 + 2008-09-04: 01 220399 remote @@ -49,15 +48,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.0.60-r1" + # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.0.60-r1" - CVE-2008-2079 + CVE-2008-2079 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-05.xml index c4e95694e4..cf0d6b3768 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-05.xml @@ -1,6 +1,5 @@ - Courier Authentication Library: SQL injection vulnerability @@ -8,8 +7,8 @@ Authentication Library. courier-authlib - September 05, 2008 - September 05, 2008: 01 + 2008-09-05 + 2008-09-05: 01 225407 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/courier-authlib-0.60.6" + # emerge --ask --oneshot --verbose ">=net-libs/courier-authlib-0.60.6" - CVE-2008-2667 + CVE-2008-2667 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-06.xml index bd1813c398..4f6675d09c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-06.xml @@ -1,6 +1,5 @@ - VLC: Multiple vulnerabilities @@ -8,8 +7,8 @@ code. vlc - September 07, 2008 - September 07, 2008: 01 + 2008-09-07 + 2008-09-07: 01 235238 235589 remote @@ -54,19 +53,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6i-r2" + # emerge --ask --oneshot --verbose ">=media-video/vlc-0.8.6i-r2" - CVE-2008-3732 - CVE-2008-3794 + CVE-2008-3732 + CVE-2008-3794 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-07.xml index e3d499a094..7b8d32046b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-07.xml @@ -1,6 +1,5 @@ - libTIFF: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ remote execution of arbitrary code. tiff - September 08, 2008 - September 08, 2008: 01 + 2008-09-08 + 2008-09-08: 01 234080 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r4" + # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r4" - CVE-2008-2327 + CVE-2008-2327 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-08.xml index 080a5db434..6506ef699a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-08.xml @@ -1,6 +1,5 @@ - Amarok: Insecure temporary file creation @@ -8,8 +7,8 @@ attack. amarok - September 08, 2008 - September 08, 2008: 01 + 2008-09-08 + 2008-09-08: 01 234689 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/amarok-1.4.10" + # emerge --ask --oneshot --verbose ">=media-sound/amarok-1.4.10" - CVE-2008-3699 + CVE-2008-3699 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-09.xml index 3dc53098e9..84fbff72e2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-09.xml @@ -1,6 +1,5 @@ - Postfix: Denial of Service @@ -8,8 +7,8 @@ Service. postfix - September 19, 2008 - September 19, 2008: 01 + 2008-09-19 + 2008-09-19: 01 236453 local @@ -53,24 +52,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.4.9" + # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.4.9"

All Postfix 2.5 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.5.5" + # emerge --ask --oneshot --verbose ">=mail-mta/postfix-2.5.5" - CVE-2008-3889 + CVE-2008-3889 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-10.xml index 9fab704e1e..b5cbca64ce 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-10.xml @@ -1,14 +1,13 @@ - Mantis: Multiple vulnerabilities Multiple vulnerabilities have been reported in Mantis. mantisbt - September 21, 2008 - November 26, 2008: 02 + 2008-09-21 + 2008-11-26: 02 222649 233336 remote @@ -52,21 +51,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-1.1.2" + # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-1.1.2" - CVE-2008-2276 - CVE-2008-3331 - CVE-2008-3332 - CVE-2008-3333 + CVE-2008-2276 + CVE-2008-3331 + CVE-2008-3332 + CVE-2008-3333 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-11.xml index dfd4bb4086..f275ea57f1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-11.xml @@ -1,14 +1,13 @@ - HAVP: Denial of Service A Denial of Service vulnerability has been reported in HAVP. havp - September 21, 2008 - September 21, 2008: 01 + 2008-09-21 + 2008-09-21: 01 234715 remote @@ -45,18 +44,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/havp-0.89" + # emerge --ask --oneshot --verbose ">=net-proxy/havp-0.89" - CVE-2008-3688 + CVE-2008-3688 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-12.xml index 1003920b0a..e415d54bc1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-12.xml @@ -1,6 +1,5 @@ - Newsbeuter: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ execute arbitrary shell commands. newsbeuter - September 22, 2008 - September 22, 2008: 01 + 2008-09-22 + 2008-09-22: 01 236506 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-news/newsbeuter-1.2" + # emerge --ask --oneshot --verbose ">=net-news/newsbeuter-1.2" - CVE-2008-3907 + CVE-2008-3907 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-13.xml index 04852252d3..945ccdae46 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-13.xml @@ -1,6 +1,5 @@ - R: Insecure temporary file creation @@ -8,8 +7,8 @@ files. R - September 22, 2008 - September 22, 2008: 01 + 2008-09-22 + 2008-09-22: 01 235822 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/R-2.7.1" + # emerge --ask --oneshot --verbose ">=dev-lang/R-2.7.1" - CVE-2008-3931 + CVE-2008-3931 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-14.xml index 0e1becfd05..5c3e7093b9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-14.xml @@ -1,6 +1,5 @@ - BitlBee: Security bypass @@ -8,8 +7,8 @@ restrictions and hijack accounts. bitlbee - September 23, 2008 - September 23, 2008: 01 + 2008-09-23 + 2008-09-23: 01 236160 remote @@ -46,19 +45,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/bitlbee-1.2.3" + # emerge --ask --oneshot --verbose ">=net-im/bitlbee-1.2.3" - CVE-2008-3920 - CVE-2008-3969 + CVE-2008-3920 + CVE-2008-3969 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-15.xml index 5214bf2e44..a8f07ca64f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-15.xml @@ -1,6 +1,5 @@ - GNU ed: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. ed - September 23, 2008 - September 23, 2008: 01 + 2008-09-23 + 2008-09-23: 01 236521 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/ed-1.0" + # emerge --ask --oneshot --verbose ">=sys-apps/ed-1.0" - CVE-2008-3916 + CVE-2008-3916 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-16.xml index 65a1dc0bbe..4dfd21d306 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-16.xml @@ -1,14 +1,13 @@ - Git: User-assisted execution of arbitrary code Multiple buffer overflow vulnerabilities have been discovered in Git. git - September 25, 2008 - September 25, 2008: 01 + 2008-09-25 + 2008-09-25: 01 234075 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/git-1.5.6.4" + # emerge --ask --oneshot --verbose ">=dev-util/git-1.5.6.4" - CVE-2008-3546 + CVE-2008-3546 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-17.xml index bade36fba5..3851276e51 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-17.xml @@ -1,6 +1,5 @@ - Wireshark: Multiple Denials of Service @@ -8,8 +7,8 @@ Wireshark. wireshark - September 25, 2008 - September 25, 2008: 01 + 2008-09-25 + 2008-09-25: 01 236515 remote @@ -62,21 +61,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.0.3" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.0.3" - CVE-2008-3146 - CVE-2008-3932 - CVE-2008-3933 - CVE-2008-3934 + CVE-2008-3146 + CVE-2008-3932 + CVE-2008-3933 + CVE-2008-3934 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-18.xml index 8b28de0299..8e14c429a7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200809-18.xml @@ -1,14 +1,13 @@ - ClamAV: Multiple Denials of Service Multiple vulnerabilities in ClamAV may result in a Denial of Service. clamav - September 25, 2008 - September 25, 2008: 01 + 2008-09-25 + 2008-09-25: 01 236665 remote @@ -52,21 +51,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.94" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.94" - CVE-2008-1389 - CVE-2008-3912 - CVE-2008-3913 - CVE-2008-3914 + CVE-2008-1389 + CVE-2008-3912 + CVE-2008-3913 + CVE-2008-3914 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-01.xml index c9fedd0b40..7fff8aa748 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-01.xml @@ -1,6 +1,5 @@ - WordNet: Execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. wordnet - October 07, 2008 - October 07, 2008: 01 + 2008-10-07 + 2008-10-07: 01 211491 local, remote @@ -74,19 +73,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-dicts/wordnet-3.0-r2" + # emerge --ask --oneshot --verbose ">=app-dicts/wordnet-3.0-r2" - CVE-2008-2149 - CVE-2008-3908 + CVE-2008-2149 + CVE-2008-3908 - + p-y - + p-y - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-02.xml index 176027ca43..45a6f87397 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-02.xml @@ -1,6 +1,5 @@ - Portage: Untrusted search path local root vulnerability @@ -9,8 +8,8 @@ directories. portage - October 09, 2008 - October 09, 2008: 01 + 2008-10-09 + 2008-10-09: 01 239560 local @@ -55,19 +54,19 @@ # cd /root # emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/portage-2.1.4.5" + # emerge --ask --oneshot --verbose ">=sys-apps/portage-2.1.4.5"

NOTE: To upgrade to Portage 2.1.4.5 using 2.1.4.4 or prior, you must run emerge from a trusted working directory, such as "/root".

- CVE-2008-4394 + CVE-2008-4394 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-03.xml index 15bb6cebe6..c5aa40ab51 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200810-03.xml @@ -1,6 +1,5 @@ - libspf2: DNS response buffer overflow @@ -8,8 +7,8 @@ arbitrary code. libspf2 - October 30, 2008 - October 30, 2008: 01 + 2008-10-30 + 2008-10-30: 01 242254 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-filter/libspf2-1.2.8" + # emerge --ask --oneshot --verbose ">=mail-filter/libspf2-1.2.8" - CVE-2008-2469 + CVE-2008-2469 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-01.xml index 5c2ae1d0fc..aeb07e92a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-01.xml @@ -1,6 +1,5 @@ - Opera: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code. opera - November 03, 2008 - November 03, 2008: 01 + 2008-11-03 + 2008-11-03: 01 235298 240500 243060 @@ -100,28 +99,28 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-9.62" + # emerge --ask --oneshot --verbose ">=www-client/opera-9.62" - CVE-2008-4195 - CVE-2008-4196 - CVE-2008-4197 - CVE-2008-4198 - CVE-2008-4199 - CVE-2008-4200 - CVE-2008-4292 - CVE-2008-4694 - CVE-2008-4695 - CVE-2008-4696 - CVE-2008-4697 - CVE-2008-4698 - CVE-2008-4794 - CVE-2008-4795 + CVE-2008-4195 + CVE-2008-4196 + CVE-2008-4197 + CVE-2008-4198 + CVE-2008-4199 + CVE-2008-4200 + CVE-2008-4292 + CVE-2008-4694 + CVE-2008-4695 + CVE-2008-4696 + CVE-2008-4697 + CVE-2008-4698 + CVE-2008-4794 + CVE-2008-4795 - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-02.xml index 9a1ee4c285..ddf5f92249 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-02.xml @@ -1,6 +1,5 @@ - Gallery: Multiple vulnerabilities @@ -8,8 +7,8 @@ code, disclosure of local files or theft of user's credentials. gallery - November 09, 2008 - May 28, 2009: 02 + 2008-11-09 + 2009-05-28: 02 234137 238113 remote @@ -70,27 +69,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/gallery-2.2.6" + # emerge --ask --oneshot --verbose ">=www-apps/gallery-2.2.6"

All Gallery 1 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/gallery-1.5.9" + # emerge --ask --oneshot --verbose ">=www-apps/gallery-1.5.9" - CVE-2008-3600 - CVE-2008-3662 - CVE-2008-4129 - CVE-2008-4130 + CVE-2008-3600 + CVE-2008-3662 + CVE-2008-4129 + CVE-2008-4130 - + keytoaster - + keytoaster - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-03.xml index dd10f43210..142080d31d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-03.xml @@ -1,6 +1,5 @@ - FAAD2: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code via an MP4 file. faad2 - November 09, 2008 - November 09, 2008: 01 + 2008-11-09 + 2008-11-09: 01 238445 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/faad2-2.6.1-r2" + # emerge --ask --oneshot --verbose ">=media-libs/faad2-2.6.1-r2" - CVE-2008-4201 + CVE-2008-4201 - + keytoaster - + keytoaster - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-04.xml index 8e30847017..1933c9219a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-04.xml @@ -1,6 +1,5 @@ - Graphviz: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code via a DOT file. graphviz - November 09, 2008 - November 09, 2008: 01 + 2008-11-09 + 2008-11-09: 01 240636 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/graphviz-2.20.3" + # emerge --ask --oneshot --verbose ">=media-gfx/graphviz-2.20.3" - CVE-2008-4555 + CVE-2008-4555 - + keytoaster - + keytoaster - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-05.xml index 3da6532a71..abedea578b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200811-05.xml @@ -1,6 +1,5 @@ - PHP: Multiple vulnerabilities @@ -8,8 +7,8 @@ which could lead to the remote execution of arbitrary code. php - November 16, 2008 - November 16, 2008: 01 + 2008-11-16 + 2008-11-16: 01 209148 212211 215266 @@ -102,31 +101,31 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/php-5.2.6-r6" + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.2.6-r6" - CVE-2008-0599 - CVE-2008-0674 - CVE-2008-1384 - CVE-2008-2050 - CVE-2008-2051 - CVE-2008-2107 - CVE-2008-2108 - CVE-2008-2371 - CVE-2008-2665 - CVE-2008-2666 - CVE-2008-2829 - CVE-2008-3658 - CVE-2008-3659 - CVE-2008-3660 + CVE-2008-0599 + CVE-2008-0674 + CVE-2008-1384 + CVE-2008-2050 + CVE-2008-2051 + CVE-2008-2107 + CVE-2008-2108 + CVE-2008-2371 + CVE-2008-2665 + CVE-2008-2666 + CVE-2008-2829 + CVE-2008-3658 + CVE-2008-3659 + CVE-2008-3660 - + rbu - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-01.xml index 93b74573ad..502cd0e04f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-01.xml @@ -1,6 +1,5 @@ - OptiPNG: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. optipng - December 02, 2008 - December 02, 2008: 01 + 2008-12-02 + 2008-12-02: 01 246522 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/optipng-0.6.2" + # emerge --ask --oneshot --verbose ">=media-gfx/optipng-0.6.2" - CVE-2008-5101 + CVE-2008-5101 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-02.xml index eec9a31e76..e833310ebc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-02.xml @@ -1,6 +1,5 @@ - enscript: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ code. enscript - December 02, 2008 - December 02, 2008: 02 + 2008-12-02 + 2008-12-02: 02 243228 remote @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/enscript-1.6.4-r4" + # emerge --ask --oneshot --verbose ">=app-text/enscript-1.6.4-r4" - CVE-2008-3863 - CVE-2008-4306 + CVE-2008-3863 + CVE-2008-4306 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-03.xml index 0898f64b27..6486575c55 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-03.xml @@ -1,6 +1,5 @@ - IPsec-Tools: racoon Denial of Service @@ -8,8 +7,8 @@ vulnerability. ipsec-tools - December 02, 2008 - December 02, 2008: 01 + 2008-12-02 + 2008-12-02: 01 232831 remote @@ -58,19 +57,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-firewall/ipsec-tools-0.7.1" + # emerge --ask --oneshot --verbose ">=net-firewall/ipsec-tools-0.7.1" - CVE-2008-3651 - CVE-2008-3652 + CVE-2008-3651 + CVE-2008-3652 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-04.xml index 1faca26e46..1d1e0185a0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-04.xml @@ -1,6 +1,5 @@ - lighttpd: Multiple vulnerabilities @@ -8,8 +7,8 @@ a Denial of Service. lighttpd - December 02, 2008 - December 02, 2008: 01 + 2008-12-02 + 2008-12-02: 01 238180 remote @@ -61,20 +60,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.20" + # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.20" - CVE-2008-4298 - CVE-2008-4359 - CVE-2008-4360 + CVE-2008-4298 + CVE-2008-4359 + CVE-2008-4360 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-05.xml index 389a444a17..32dbe98c4b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-05.xml @@ -1,6 +1,5 @@ - libsamplerate: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. libsamplerate - December 02, 2008 - December 02, 2008: 01 + 2008-12-02 + 2008-12-02: 01 237037 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libsamplerate-0.1.4" + # emerge --ask --oneshot --verbose ">=media-libs/libsamplerate-0.1.4" - CVE-2008-5008 + CVE-2008-5008 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-06.xml index 07980f14cb..da036f1d34 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-06.xml @@ -1,6 +1,5 @@ - libxml2: Multiple vulnerabilities @@ -8,8 +7,8 @@ code or Denial of Service. libxml2 - December 02, 2008 - December 02, 2008: 01 + 2008-12-02 + 2008-12-02: 01 234099 237806 239346 @@ -76,22 +75,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.7.2-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.7.2-r1" - CVE-2008-3281 - CVE-2008-3529 - CVE-2008-4409 - CVE-2008-4225 - CVE-2008-4226 + CVE-2008-3281 + CVE-2008-3529 + CVE-2008-4409 + CVE-2008-4225 + CVE-2008-4226 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-07.xml index 4025d79cc2..1282ce62f4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-07.xml @@ -1,6 +1,5 @@ - Mantis: Multiple vulnerabilities @@ -8,8 +7,8 @@ which leading to the remote execution of arbitrary code. mantisbt - December 02, 2008 - December 02, 2008: 01 + 2008-12-02 + 2008-12-02: 01 238570 241940 242722 @@ -66,21 +65,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-1.1.4-r1" + # emerge --ask --oneshot --verbose ">=www-apps/mantisbt-1.1.4-r1" - CVE-2008-3102 - CVE-2008-4687 - CVE-2008-4688 - CVE-2008-4689 + CVE-2008-3102 + CVE-2008-4687 + CVE-2008-4688 + CVE-2008-4689 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-08.xml index 6c1bdf2ec8..e6b9ab1fad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-08.xml @@ -1,6 +1,5 @@ - Mgetty: Insecure temporary file usage @@ -8,8 +7,8 @@ attacks. mgetty - December 06, 2008 - December 23, 2008: 02 + 2008-12-06 + 2008-12-23: 02 235806 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dialup/mgetty-1.1.36-r3" + # emerge --ask --oneshot --verbose ">=net-dialup/mgetty-1.1.36-r3" - CVE-2008-4936 + CVE-2008-4936 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-09.xml index ed0391baaa..6ea7506ff1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-09.xml @@ -1,6 +1,5 @@ - OpenSC: Insufficient protection of smart card PIN @@ -8,8 +7,8 @@ allowing attackers to reset it. opensc - December 10, 2008 - December 10, 2008: 01 + 2008-12-10 + 2008-12-10: 01 233543 local @@ -50,20 +49,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/opensc-0.11.6" + # emerge --ask --oneshot --verbose ">=dev-libs/opensc-0.11.6" # pkcs15-tool --test-update # pkcs15-tool --test-update --update - CVE-2008-2235 + CVE-2008-2235 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-10.xml index 774d0ba801..53b06ebe3a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-10.xml @@ -1,14 +1,13 @@ - Archive::Tar: Directory traversal vulnerability A directory traversal vulnerability has been discovered in Archive::Tar. Archive-Tar - December 10, 2008 - December 10, 2008: 01 + 2008-12-10 + 2008-12-10: 01 192989 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=perl-core/Archive-Tar-1.40" + # emerge --ask --oneshot --verbose ">=perl-core/Archive-Tar-1.40" - CVE-2007-4829 + CVE-2007-4829 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-11.xml index 4f6db6bb3c..e9921b0202 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-11.xml @@ -1,6 +1,5 @@ - CUPS: Multiple vulnerabilities @@ -8,8 +7,8 @@ remote execution of arbitrary code. cups - December 10, 2008 - December 10, 2008: 01 + 2008-12-10 + 2008-12-10: 01 238976 249727 remote @@ -64,18 +63,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/cups-1.3.9-r1" + # emerge --ask --oneshot --verbose ">=net-print/cups-1.3.9-r1" - CVE-2008-3639 - CVE-2008-3640 - CVE-2008-3641 - CVE-2008-5286 + CVE-2008-3639 + CVE-2008-3640 + CVE-2008-3641 + CVE-2008-5286 - + craig - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-12.xml index 33dd1b7d5c..74bc8ecea1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-12.xml @@ -1,6 +1,5 @@ - Honeyd: Insecure temporary file creation @@ -8,8 +7,8 @@ leading to symlink attacks. honeyd - December 12, 2008 - December 12, 2008: 01 + 2008-12-12 + 2008-12-12: 01 237481 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/honeyd-1.5c-r1" + # emerge --ask --oneshot --verbose ">=net-analyzer/honeyd-1.5c-r1" - CVE-2008-3928 + CVE-2008-3928 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-13.xml index 314bee38f2..998f56c04e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-13.xml @@ -1,6 +1,5 @@ - OpenOffice.org: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code or symlink attacks. openoffice openoffice-bin - December 12, 2008 - December 12, 2008: 01 + 2008-12-12 + 2008-12-12: 01 235824 244995 local, remote @@ -58,26 +57,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-3.0.0" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-3.0.0"

All OpenOffice.org binary users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-3.0.0" + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-3.0.0" - CVE-2008-2237 - CVE-2008-2238 - CVE-2008-4937 + CVE-2008-2237 + CVE-2008-2238 + CVE-2008-4937 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-14.xml index 69058ef87b..00fcaecc78 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-14.xml @@ -1,6 +1,5 @@ - aview: Insecure temporary file usage @@ -8,8 +7,8 @@ symlink attacks. aview - December 14, 2008 - December 14, 2008: 01 + 2008-12-14 + 2008-12-14: 01 235808 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/aview-1.3.0_rc1-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/aview-1.3.0_rc1-r1" - CVE-2008-4935 + CVE-2008-4935 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-15.xml index ff007ad1a2..b334eaa567 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-15.xml @@ -1,6 +1,5 @@ - POV-Ray: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code when reading a specially crafted PNG file povray - December 14, 2008 - December 14, 2008: 01 + 2008-12-14 + 2008-12-14: 01 153538 local @@ -29,7 +28,7 @@ files. The version shipped with POV-Ray is vulnerable to CVE-2008-3964, CVE-2008-1382, CVE-2006-3334, CVE-2006-0481, CVE-2004-0768. A bug in POV-Ray's build system caused it to load the old version when your - installed copy of libpng was >=media-libs/libpng-1.2.10. + installed copy of libpng was >=media-libs/libpng-1.2.10.

@@ -50,22 +49,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/povray-3.6.1-r4" + # emerge --ask --oneshot --verbose ">=media-gfx/povray-3.6.1-r4" - CVE-2004-0768 - CVE-2006-0481 - CVE-2006-3334 - CVE-2008-1382 - CVE-2008-3964 + CVE-2004-0768 + CVE-2006-0481 + CVE-2006-3334 + CVE-2008-1382 + CVE-2008-3964 - + mabi - + mabi - + p-y diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-16.xml index 9d34a4cc1d..b35073105c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-16.xml @@ -1,14 +1,13 @@ - Dovecot: Multiple vulnerabilities Multiple vulnerabilities were found in the Dovecot mailserver. dovecot - December 14, 2008 - December 14, 2008: 01 + 2008-12-14 + 2008-12-14: 01 240409 244962 245316 @@ -58,7 +57,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/dovecot-1.1.7-r1" + # emerge --ask --oneshot --verbose ">=net-mail/dovecot-1.1.7-r1"

Users should be aware that dovecot.conf will still be world-readable after the update. If employing ssl_key_password, it should not be used @@ -67,15 +66,15 @@

- CVE-2008-4577 - CVE-2008-4578 - CVE-2008-4870 - CVE-2008-4907 + CVE-2008-4577 + CVE-2008-4578 + CVE-2008-4870 + CVE-2008-4907 - + craig - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-17.xml index 9e0f116037..38e3b554e8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-17.xml @@ -1,6 +1,5 @@ - Ruby: Multiple vulnerabilities @@ -8,8 +7,8 @@ attacks including arbitrary code execution and Denial of Service. ruby - December 16, 2008 - December 16, 2008: 01 + 2008-12-16 + 2008-12-16: 01 225465 236060 remote @@ -92,29 +91,29 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.6_p287-r1" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.6_p287-r1" - CVE-2008-1447 - CVE-2008-2376 - CVE-2008-2662 - CVE-2008-2663 - CVE-2008-2664 - CVE-2008-2725 - CVE-2008-2726 - CVE-2008-3655 - CVE-2008-3656 - CVE-2008-3657 - CVE-2008-3790 - CVE-2008-3905 + CVE-2008-1447 + CVE-2008-2376 + CVE-2008-2662 + CVE-2008-2663 + CVE-2008-2664 + CVE-2008-2725 + CVE-2008-2726 + CVE-2008-3655 + CVE-2008-3656 + CVE-2008-3657 + CVE-2008-3790 + CVE-2008-3905 - + keytoaster - + hoffie - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-18.xml index f9546b25bb..bbf6062644 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-18.xml @@ -1,6 +1,5 @@ - JasPer: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code via jpeg2k files. jasper - December 16, 2008 - December 16, 2008: 01 + 2008-12-16 + 2008-12-16: 01 222819 remote @@ -60,19 +59,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/jasper-1.900.1-r3" + # emerge --ask --oneshot --verbose ">=media-libs/jasper-1.900.1-r3" - CVE-2008-3520 - CVE-2008-3522 + CVE-2008-3520 + CVE-2008-3522 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-19.xml index 0ce0878bcb..9de6558c33 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-19.xml @@ -1,6 +1,5 @@ - PowerDNS: Multiple vulnerabilities @@ -8,8 +7,8 @@ Denial of Service and easing cache poisoning attacks. pdns - December 19, 2008 - December 19, 2008: 01 + 2008-12-19 + 2008-12-19: 01 234032 247079 remote @@ -55,19 +54,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/pdns-2.9.21.2" + # emerge --ask --oneshot --verbose ">=net-dns/pdns-2.9.21.2" - CVE-2008-3337 - CVE-2008-5277 + CVE-2008-3337 + CVE-2008-5277 - + p-y - + p-y - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-20.xml index 0ab9eb1d48..793de9f890 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-20.xml @@ -1,6 +1,5 @@ - phpCollab: Multiple vulnerabilities @@ -8,8 +7,8 @@ remote injection of shell commands, PHP code and SQL statements. phpcollab - December 21, 2008 - December 21, 2008: 01 + 2008-12-21 + 2008-12-21: 01 235052 remote @@ -66,21 +65,21 @@ users unmerge phpCollab:

- # emerge --unmerge "www-apps/phpcollab" + # emerge --unmerge "www-apps/phpcollab" - CVE-2006-1495 - CVE-2008-4303 - CVE-2008-4304 - CVE-2008-4305 + CVE-2006-1495 + CVE-2008-4303 + CVE-2008-4304 + CVE-2008-4305 - + rbu - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-21.xml index f0be87f7be..fdaa600fff 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-21.xml @@ -1,6 +1,5 @@ - ClamAV: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code or a Denial of Service. clamav - December 23, 2008 - December 23, 2008: 01 + 2008-12-23 + 2008-12-23: 01 245450 249833 remote @@ -53,19 +52,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.94.2" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.94.2" - CVE-2008-5050 - CVE-2008-5314 + CVE-2008-5050 + CVE-2008-5314 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-22.xml index f6e7dfbb00..1a94a5611d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-22.xml @@ -1,6 +1,5 @@ - Ampache: Insecure temporary file usage @@ -8,8 +7,8 @@ symlink attacks. ampache - December 23, 2008 - December 23, 2008: 01 + 2008-12-23 + 2008-12-23: 01 237483 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/ampache-3.4.3" + # emerge --ask --oneshot --verbose ">=www-apps/ampache-3.4.3" - CVE-2008-3929 + CVE-2008-3929 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-23.xml index 0c2e4be90b..f2eade38b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-23.xml @@ -1,14 +1,13 @@ - Imlib2: User-assisted execution of arbitrary code A buffer overflow vulnerability has been discovered in Imlib2. imlib2 - December 23, 2008 - December 23, 2008: 01 + 2008-12-23 + 2008-12-23: 01 248057 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/imlib2-1.4.2-r1" + # emerge --ask --oneshot --verbose ">=media-libs/imlib2-1.4.2-r1" - CVE-2008-5187 + CVE-2008-5187 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-24.xml index 4e7c18dd3c..31986a33ca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200812-24.xml @@ -1,6 +1,5 @@ - VLC: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. vlc - December 24, 2008 - December 24, 2008: 01 + 2008-12-24 + 2008-12-24: 01 245774 249391 remote @@ -61,20 +60,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/vlc-0.9.8a" + # emerge --ask --oneshot --verbose ">=media-video/vlc-0.9.8a" - CVE-2008-5032 - CVE-2008-5036 - CVE-2008-5276 + CVE-2008-5032 + CVE-2008-5036 + CVE-2008-5276 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-01.xml index 2486be14ff..c79192d4a6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-01.xml @@ -1,6 +1,5 @@ - NDISwrapper: Arbitrary remote code execution @@ -8,8 +7,8 @@ with root privileges. ndiswrapper - January 11, 2009 - January 11, 2009: 01 + 2009-01-11 + 2009-01-11: 01 239371 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-wireless/ndiswrapper-1.53-r1" + # emerge --ask --oneshot --verbose ">=net-wireless/ndiswrapper-1.53-r1" - CVE-2008-4395 + CVE-2008-4395 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-02.xml index afa96cfb3d..c08125e8bb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-02.xml @@ -1,6 +1,5 @@ - JHead: Multiple vulnerabilities @@ -8,8 +7,8 @@ code or data loss. jhead - January 11, 2009 - January 11, 2009: 01 + 2009-01-11 + 2009-01-11: 01 242702 243238 remote @@ -63,21 +62,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/jhead-2.84-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/jhead-2.84-r1" - CVE-2008-4575 - CVE-2008-4639 - CVE-2008-4640 - CVE-2008-4641 + CVE-2008-4575 + CVE-2008-4639 + CVE-2008-4640 + CVE-2008-4641 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-03.xml index f24b1c6ccc..deadb50282 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-03.xml @@ -1,14 +1,13 @@ - pdnsd: Denial of Service and cache poisoning Two errors in pdnsd allow for Denial of Service and cache poisoning. pdnsd - January 11, 2009 - January 11, 2009: 01 + 2009-01-11 + 2009-01-11: 01 231285 remote @@ -61,19 +60,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/pdnsd-1.2.7" + # emerge --ask --oneshot --verbose ">=net-dns/pdnsd-1.2.7" - CVE-2008-1447 - CVE-2008-4194 + CVE-2008-1447 + CVE-2008-4194 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-04.xml index 1cc9f28d53..c8d473712c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-04.xml @@ -1,14 +1,13 @@ - D-Bus: Denial of Service An error condition can cause D-Bus to crash. dbus - January 11, 2009 - January 11, 2009: 01 + 2009-01-11 + 2009-01-11: 01 240308 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/dbus-1.2.3-r1" + # emerge --ask --oneshot --verbose ">=sys-apps/dbus-1.2.3-r1" - CVE-2008-3834 + CVE-2008-3834 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-05.xml index c9e0e6ef21..b3a1d2c033 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-05.xml @@ -1,6 +1,5 @@ - Streamripper: Multiple vulnerabilities @@ -8,8 +7,8 @@ for user-assisted execution of arbitrary code. streamripper - January 11, 2009 - January 11, 2009: 01 + 2009-01-11 + 2009-01-11: 01 249039 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/streamripper-1.64.0" + # emerge --ask --oneshot --verbose ">=media-sound/streamripper-1.64.0" - CVE-2008-4829 + CVE-2008-4829 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-06.xml index bb0d63f991..b571496727 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-06.xml @@ -1,14 +1,13 @@ - Tremulous: User-assisted execution of arbitrary code A buffer overflow vulnerability has been discovered in Tremulous. tremulous tremulous-bin - January 11, 2009 - January 11, 2009: 01 + 2009-01-11 + 2009-01-11: 01 222119 remote @@ -49,23 +48,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-fps/tremulous-1.1.0-r2" + # emerge --ask --oneshot --verbose ">=games-fps/tremulous-1.1.0-r2"

Note: The binary version of Tremulous has been removed from the Portage tree.

- CVE-2006-2236 - GLSA 200605-12 + CVE-2006-2236 + GLSA 200605-12 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-07.xml index 9f410d37c0..afb973394a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-07.xml @@ -1,6 +1,5 @@ - MPlayer: Multiple vulnerabilities @@ -8,8 +7,8 @@ code or a Denial of Service. mplayer - January 12, 2009 - January 12, 2009: 01 + 2009-01-12 + 2009-01-12: 01 231836 239130 251017 @@ -64,20 +63,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_rc2_p28058-r1 " + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_rc2_p28058-r1 " - CVE-2008-3162 - CVE-2008-3827 - CVE-2008-5616 + CVE-2008-3162 + CVE-2008-3827 + CVE-2008-5616 - + rbu - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-08.xml index acd2e8ad5e..ce30e1e364 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-08.xml @@ -1,14 +1,13 @@ - Online-Bookmarks: Multiple vulnerabilities Multiple vulnerabilities have been reported in Online-Bookmarks. online-bookmarks - January 12, 2009 - January 12, 2009: 01 + 2009-01-12 + 2009-01-12: 01 235053 remote @@ -53,20 +52,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/online-bookmarks-0.6.28" + # emerge --ask --oneshot --verbose ">=www-apps/online-bookmarks-0.6.28" - CVE-2004-2155 - CVE-2006-6358 - CVE-2006-6359 + CVE-2004-2155 + CVE-2006-6358 + CVE-2006-6359 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-09.xml index b52816217f..f57b16a1ed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-09.xml @@ -1,14 +1,13 @@ - Adobe Reader: User-assisted execution of arbitrary code Adobe Reader is vulnerable to execution of arbitrary code. acroread - January 13, 2009 - January 13, 2009: 01 + 2009-01-13 + 2009-01-13: 01 225483 remote @@ -81,24 +80,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.3" + # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.3" - CVE-2008-2549 - CVE-2008-2992 - CVE-2008-4812 - CVE-2008-4813 - CVE-2008-4814 - CVE-2008-4815 - CVE-2008-4817 + CVE-2008-2549 + CVE-2008-2992 + CVE-2008-4812 + CVE-2008-4813 + CVE-2008-4814 + CVE-2008-4815 + CVE-2008-4817 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-10.xml index 8b0d519649..817a8bad88 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-10.xml @@ -1,14 +1,13 @@ - GnuTLS: Certificate validation error A certificate validation error in GnuTLS might allow for spoofing attacks. gnutls - January 14, 2009 - January 14, 2009: 01 + 2009-01-14 + 2009-01-14: 01 245850 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/gnutls-2.4.1-r2" + # emerge --ask --oneshot --verbose ">=net-libs/gnutls-2.4.1-r2" - CVE-2008-4989 + CVE-2008-4989 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-11.xml index 0394dd30f3..fb7e87cab5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-11.xml @@ -1,14 +1,13 @@ - Avahi: Denial of Service A Denial of Service vulnerability has been discovered in Avahi. avahi - January 14, 2009 - January 14, 2009: 01 + 2009-01-14 + 2009-01-14: 01 250913 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/avahi-0.6.24" + # emerge --ask --oneshot --verbose ">=net-dns/avahi-0.6.24" - CVE-2008-5081 + CVE-2008-5081 - + craig - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-12.xml index 3b1dff3482..4b15fe2563 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-12.xml @@ -1,14 +1,13 @@ - noip-updater: Execution of arbitrary code A buffer overflow in noip-updater can lead to arbitrary code execution. noip-updater - January 18, 2009 - January 18, 2009: 01 + 2009-01-18 + 2009-01-18: 01 248709 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/noip-updater-2.1.9" + # emerge --ask --oneshot --verbose ">=net-dns/noip-updater-2.1.9" - CVE-2008-5297 + CVE-2008-5297 - + keytoaster - + a3li - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-13.xml index d26b5d91bb..bf0ef9b259 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-13.xml @@ -1,6 +1,5 @@ - Pidgin: Multiple vulnerabilities @@ -8,8 +7,8 @@ remote arbitrary code execution, Denial of Service and service spoofing. pidgin - January 20, 2009 - January 20, 2009: 01 + 2009-01-20 + 2009-01-20: 01 230045 234135 remote @@ -73,21 +72,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/pidgin-2.5.1" + # emerge --ask --oneshot --verbose ">=net-im/pidgin-2.5.1" - CVE-2008-2927 - CVE-2008-2955 - CVE-2008-2957 - CVE-2008-3532 + CVE-2008-2927 + CVE-2008-2955 + CVE-2008-2957 + CVE-2008-3532 - + p-y - + a3li - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-14.xml index 34357cb377..2cfd70daad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-14.xml @@ -1,6 +1,5 @@ - Scilab: Insecure temporary file usage @@ -8,8 +7,8 @@ symlink attacks. scilab - January 21, 2009 - January 21, 2009: 01 + 2009-01-21 + 2009-01-21: 01 245922 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sci-mathematics/scilab-4.1.2-r1" + # emerge --ask --oneshot --verbose ">=sci-mathematics/scilab-4.1.2-r1" - CVE-2008-4983 + CVE-2008-4983 - + rbu - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-15.xml index f2ecdd7943..cea4996113 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200901-15.xml @@ -1,14 +1,13 @@ - Net-SNMP: Denial of Service A vulnerability in Net-SNMP could lead to a Denial of Service. net-snmp - January 21, 2009 - January 21, 2009: 01 + 2009-01-21 + 2009-01-21: 01 245306 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.2.1" + # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.2.1" - CVE-2008-4309 + CVE-2008-4309 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-01.xml index 2e9717f76c..865cf92d1a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-01.xml @@ -1,14 +1,13 @@ - sudo: Privilege escalation A vulnerability in sudo may allow for privilege escalation. sudo - February 06, 2009 - February 06, 2009: 01 + 2009-02-06 + 2009-02-06: 01 256633 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.0" + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.0" - CVE-2009-0034 + CVE-2009-0034 - + keytoaster - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-02.xml index bd2017b050..75c83e5cca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-02.xml @@ -1,6 +1,5 @@ - OpenSSL: Certificate validation error @@ -8,8 +7,8 @@ spoofing attacks. openssl - February 12, 2009 - February 12, 2009: 01 + 2009-02-12 + 2009-02-12: 01 251346 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8j" + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8j" - CVE-2008-5077 + CVE-2008-5077 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-03.xml index c13df9a5bb..ad021c251a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-03.xml @@ -1,6 +1,5 @@ - Valgrind: Untrusted search path @@ -8,8 +7,8 @@ execution of arbitrary code. valgrind - February 12, 2009 - February 12, 2009: 01 + 2009-02-12 + 2009-02-12: 01 245317 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/valgrind-3.4.0" + # emerge --ask --oneshot --verbose ">=dev-util/valgrind-3.4.0" - CVE-2008-4865 + CVE-2008-4865 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-04.xml index a3c4e01b01..0e6b52763c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-04.xml @@ -1,6 +1,5 @@ - xterm: User-assisted arbitrary commands execution @@ -8,8 +7,8 @@ arbitrary commands execution. xterm - February 12, 2009 - February 12, 2009: 01 + 2009-02-12 + 2009-02-12: 01 253155 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-terms/xterm-239" + # emerge --ask --oneshot --verbose ">=x11-terms/xterm-239" - CVE-2008-2383 + CVE-2008-2383 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-05.xml index 21a36208bc..7ab94afc28 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-05.xml @@ -1,6 +1,5 @@ - KTorrent: Multiple vulnerabilitites @@ -8,8 +7,8 @@ remote execution of code and arbitrary torrent uploads. ktorrent - February 23, 2009 - February 23, 2009: 01 + 2009-02-23 + 2009-02-23: 01 244741 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-p2p/ktorrent-2.2.8" + # emerge --ask --oneshot --verbose ">=net-p2p/ktorrent-2.2.8" - CVE-2008-5905 - CVE-2008-5906 + CVE-2008-5905 + CVE-2008-5906 - + keytoaster - + craig - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-06.xml index cf9b4807fe..90c11e5214 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200902-06.xml @@ -1,6 +1,5 @@ - GNU Emacs, XEmacs: Multiple vulnerabilities @@ -9,8 +8,8 @@ XEmacs. emacs edit-utils - February 23, 2009 - February 23, 2009: 01 + 2009-02-23 + 2009-02-23: 01 221197 236498 remote @@ -67,25 +66,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/emacs-22.2-r3" + # emerge --ask --oneshot --verbose ">=app-editors/emacs-22.2-r3"

All edit-utils users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-xemacs/edit-utils-2.39" + # emerge --ask --oneshot --verbose ">=app-xemacs/edit-utils-2.39" - CVE-2008-2142 - CVE-2008-3949 + CVE-2008-2142 + CVE-2008-3949 - + rbu - + vorlon - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-01.xml index 60d507513c..7c373050d3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-01.xml @@ -1,6 +1,5 @@ - Vinagre: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ code. vinagre - March 06, 2009 - March 06, 2009: 01 + 2009-03-06 + 2009-03-06: 01 250314 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/vinagre-0.5.2" + # emerge --ask --oneshot --verbose ">=net-misc/vinagre-0.5.2" - CVE-2008-5660 + CVE-2008-5660 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-02.xml index 0cc2f80f90..46b2bcdc37 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-02.xml @@ -1,14 +1,13 @@ - ZNC: Privilege escalation A vulnerability in ZNC allows for privilege escalation. znc - March 06, 2009 - March 06, 2009: 01 + 2009-03-06 + 2009-03-06: 01 260148 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/znc-0.066" + # emerge --ask --oneshot --verbose ">=net-irc/znc-0.066" - CVE-2009-0759 + CVE-2009-0759 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-03.xml index 5ceda06d81..3f71f8bc00 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-03.xml @@ -1,14 +1,13 @@ - Audacity: User-assisted execution of arbitrary code A boundary error in Audacity allows for the execution of arbitrary code. audacity - March 06, 2009 - March 06, 2009: 01 + 2009-03-06 + 2009-03-06: 01 253493 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/audacity-1.3.6" + # emerge --ask --oneshot --verbose ">=media-sound/audacity-1.3.6" - CVE-2009-0490 + CVE-2009-0490 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-04.xml index 8e7c6f97fd..089b0997fd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-04.xml @@ -1,6 +1,5 @@ - DevIL: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ code. devil - March 06, 2009 - March 06, 2009: 01 + 2009-03-06 + 2009-03-06: 01 255217 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/devil-1.7.7" + # emerge --ask --oneshot --verbose ">=media-libs/devil-1.7.7" - CVE-2008-5262 + CVE-2008-5262 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-05.xml index b0725cb053..059102afea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-05.xml @@ -1,6 +1,5 @@ - PDFjam: Multiple vulnerabilities @@ -8,8 +7,8 @@ escalation. pdfjam - March 07, 2009 - March 07, 2009: 01 + 2009-03-07 + 2009-03-07: 01 252734 local @@ -57,19 +56,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/pdfjam-1.20-r1" + # emerge --ask --oneshot --verbose ">=app-text/pdfjam-1.20-r1" - CVE-2008-5843 - CVE-2008-5743 + CVE-2008-5843 + CVE-2008-5743 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-06.xml index f485b6d2ab..d98d4299f8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-06.xml @@ -1,14 +1,13 @@ - nfs-utils: Access restriction bypass An error in nfs-utils allows for bypass of the netgroups restriction. nfs-utils - March 07, 2009 - March 07, 2009: 01 + 2009-03-07 + 2009-03-07: 01 242696 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/nfs-utils-1.1.3" + # emerge --ask --oneshot --verbose ">=net-fs/nfs-utils-1.1.3" - CVE-2008-4552 + CVE-2008-4552 - + craig - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-07.xml index 3f9fd779b4..53f6619876 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-07.xml @@ -1,6 +1,5 @@ - Samba: Data disclosure @@ -8,8 +7,8 @@ contents. samba - March 07, 2009 - March 07, 2009: 01 + 2009-03-07 + 2009-03-07: 01 247620 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.33" + # emerge --ask --oneshot --verbose ">=net-fs/samba-3.0.33" - CVE-2008-4314 + CVE-2008-4314 - + craig - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-08.xml index 124b78c23c..550b1dc55b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-08.xml @@ -1,6 +1,5 @@ - gEDA: Insecure temporary file creation @@ -8,8 +7,8 @@ symlink attacks. geda - March 07, 2009 - March 07, 2009: 01 + 2009-03-07 + 2009-03-07: 01 247538 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sci-electronics/geda-1.4.0-r1" + # emerge --ask --oneshot --verbose ">=sci-electronics/geda-1.4.0-r1" - CVE-2008-5148 + CVE-2008-5148 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-09.xml index 5db8c9301e..861e1b2191 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-09.xml @@ -1,6 +1,5 @@ - OpenTTD: Execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code in the server. openttd - March 07, 2009 - March 07, 2009: 01 + 2009-03-07 + 2009-03-07: 01 233929 remote @@ -49,20 +48,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=games-simulation/openttd-0.6.3" + # emerge --ask --oneshot --verbose ">=games-simulation/openttd-0.6.3" - CVE-2008-3547 - CVE-2008-3576 - CVE-2008-3577 + CVE-2008-3547 + CVE-2008-3576 + CVE-2008-3577 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-10.xml index 289bd796bb..053df34653 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-10.xml @@ -1,6 +1,5 @@ - Irrlicht: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ of Service. irrlicht - March 07, 2009 - March 07, 2009: 01 + 2009-03-07 + 2009-03-07: 01 252203 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-games/irrlicht-1.5" + # emerge --ask --oneshot --verbose ">=dev-games/irrlicht-1.5" - CVE-2008-5876 + CVE-2008-5876 - + rbu - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-11.xml index 8932857b97..d7f794d963 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-11.xml @@ -1,6 +1,5 @@ - PyCrypto: Execution of arbitrary code @@ -8,8 +7,8 @@ when decrypting using ARC2. pycrypto - March 09, 2009 - March 09, 2009: 01 + 2009-03-09 + 2009-03-09: 01 258049 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-python/pycrypto-2.0.1-r8" + # emerge --ask --oneshot --verbose ">=dev-python/pycrypto-2.0.1-r8" - CVE-2009-0544 + CVE-2009-0544 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-12.xml index c07e073662..2d1c825a62 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-12.xml @@ -1,6 +1,5 @@ - OptiPNG: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. optipng - March 09, 2009 - March 09, 2009: 01 + 2009-03-09 + 2009-03-09: 01 260265 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/optipng-0.6.2-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/optipng-0.6.2-r1" - CVE-2009-0749 + CVE-2009-0749 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-13.xml index f71ebb2869..edfc00e1b3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-13.xml @@ -1,14 +1,13 @@ - MPFR: Denial of Service Multiple buffer overflows in MPFR might lead to a Denial of Service. mpfr - March 09, 2009 - March 09, 2009: 01 + 2009-03-09 + 2009-03-09: 01 260968 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/mpfr-2.4.1" + # emerge --ask --oneshot --verbose ">=dev-libs/mpfr-2.4.1" - CVE-2009-0757 + CVE-2009-0757 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-14.xml index c305283b54..1e14bae4b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-14.xml @@ -1,6 +1,5 @@ - BIND: Incorrect signature verification @@ -8,8 +7,8 @@ records authenticated using DNSSEC. bind - March 09, 2009 - March 09, 2009: 01 + 2009-03-09 + 2009-03-09: 01 254134 257949 remote @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.3_p1" + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.3_p1" - CVE-2009-0025 - CVE-2009-0265 + CVE-2009-0025 + CVE-2009-0265 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-15.xml index 23bf413ee5..3ab8cb10ee 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-15.xml @@ -1,6 +1,5 @@ - git: Multiple vulnerabilties @@ -8,8 +7,8 @@ commands. git - March 09, 2009 - March 09, 2009: 01 + 2009-03-09 + 2009-03-09: 01 251343 remote @@ -65,20 +64,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/git-1.6.0.6" + # emerge --ask --oneshot --verbose ">=dev-util/git-1.6.0.6" - CVE-2008-5516 - CVE-2008-5517 - CVE-2008-5916 + CVE-2008-5516 + CVE-2008-5517 + CVE-2008-5916 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-16.xml index 8130baece7..d60c33d817 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-16.xml @@ -1,6 +1,5 @@ - Epiphany: Untrusted search path @@ -8,8 +7,8 @@ execution of arbitrary code. epiphany - March 09, 2009 - March 09, 2009: 01 + 2009-03-09 + 2009-03-09: 01 257000 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/epiphany-2.22.3-r2" + # emerge --ask --oneshot --verbose ">=www-client/epiphany-2.22.3-r2" - CVE-2008-5985 + CVE-2008-5985 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-17.xml index 7ea4036033..16a98cf78c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-17.xml @@ -1,6 +1,5 @@ - Real VNC: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ connecting to a malicious server. vnc - March 09, 2009 - March 09, 2009: 01 + 2009-03-09 + 2009-03-09: 01 255225 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/vnc-4.1.3" + # emerge --ask --oneshot --verbose ">=net-misc/vnc-4.1.3" - CVE-2008-4770 + CVE-2008-4770 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-18.xml index 09b2f88c2c..d6da870a70 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-18.xml @@ -1,6 +1,5 @@ - Openswan: Insecure temporary file creation @@ -8,8 +7,8 @@ for symlink attacks. openswan - March 09, 2009 - March 09, 2009: 01 + 2009-03-09 + 2009-03-09: 01 238574 local @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/openswan-2.4.13-r2" + # emerge --ask --oneshot --verbose ">=net-misc/openswan-2.4.13-r2" - CVE-2008-4190 + CVE-2008-4190 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-19.xml index c0960eebb4..db03e10d1d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-19.xml @@ -1,6 +1,5 @@ - Xerces-C++: Denial of Service @@ -8,8 +7,8 @@ schema files. xerces-c - March 09, 2009 - March 09, 2009: 01 + 2009-03-09 + 2009-03-09: 01 240496 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/xerces-c-3.0.0-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/xerces-c-3.0.0-r1" - CVE-2008-4482 + CVE-2008-4482 - + falco - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-20.xml index 6baa300c8c..3888e893ba 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-20.xml @@ -1,6 +1,5 @@ - WebSVN: Multiple vulnerabilities @@ -8,8 +7,8 @@ disclosure. websvn - March 09, 2009 - March 09, 2009: 01 + 2009-03-09 + 2009-03-09: 01 243852 remote @@ -58,20 +57,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/websvn-2.1.0" + # emerge --ask --oneshot --verbose ">=www-apps/websvn-2.1.0" - CVE-2008-5918 - CVE-2008-5919 - CVE-2009-0240 + CVE-2008-5918 + CVE-2008-5919 + CVE-2009-0240 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-21.xml index 7fb985fdcb..397fbe4daf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-21.xml @@ -1,14 +1,13 @@ - cURL: Arbitrary file access A vulnerability in cURL may allow for arbitrary file access. curl - March 09, 2009 - March 09, 2009: 01 + 2009-03-09 + 2009-03-09: 01 260361 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/curl-7.19.4" + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.19.4" - CVE-2009-0037 + CVE-2009-0037 - + keytoaster - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-22.xml index 1ef5444965..0725d5d435 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-22.xml @@ -1,6 +1,5 @@ - Ganglia: Execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. ganglia - March 10, 2009 - March 10, 2009: 01 + 2009-03-10 + 2009-03-10: 01 255366 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-cluster/ganglia-3.1.1-r2" + # emerge --ask --oneshot --verbose ">=sys-cluster/ganglia-3.1.1-r2" - CVE-2009-0241 + CVE-2009-0241 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-23.xml index eb1e3c1c88..ffa423422d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-23.xml @@ -1,6 +1,5 @@ - Adobe Flash Player: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code execution on a user's system via a malicious Flash file. adobe-flash - March 10, 2009 - May 28, 2009: 04 + 2009-03-10 + 2009-05-28: 04 239543 251496 260264 @@ -107,31 +106,31 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-10.0.22.87" + # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-10.0.22.87" - CVE-2008-3873 - CVE-2008-4401 - CVE-2008-4503 - CVE-2008-4818 - CVE-2008-4819 - CVE-2008-4821 - CVE-2008-4822 - CVE-2008-4823 - CVE-2008-4824 - CVE-2008-5361 - CVE-2008-5362 - CVE-2008-5363 - CVE-2008-5499 - CVE-2009-0114 - CVE-2009-0519 - CVE-2009-0520 - CVE-2009-0521 + CVE-2008-3873 + CVE-2008-4401 + CVE-2008-4503 + CVE-2008-4818 + CVE-2008-4819 + CVE-2008-4821 + CVE-2008-4822 + CVE-2008-4823 + CVE-2008-4824 + CVE-2008-5361 + CVE-2008-5362 + CVE-2008-5363 + CVE-2008-5499 + CVE-2009-0114 + CVE-2009-0519 + CVE-2009-0520 + CVE-2009-0521 - + a3li - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-24.xml index 1d756bf69f..5fb3939840 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-24.xml @@ -1,6 +1,5 @@ - Shadow: Privilege escalation @@ -8,8 +7,8 @@ root privileges. shadow - March 10, 2009 - March 10, 2009: 01 + 2009-03-10 + 2009-03-10: 01 251320 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.1.2.2" + # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.1.2.2" - CVE-2008-5394 + CVE-2008-5394 - + craig - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-25.xml index 791fe8fcb7..762ec8f5d1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-25.xml @@ -1,6 +1,5 @@ - Courier Authentication Library: SQL Injection vulnerability @@ -8,8 +7,8 @@ Authentication Library. courier-authlib - March 11, 2009 - March 11, 2009: 01 + 2009-03-11 + 2009-03-11: 01 252576 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/courier-authlib-0.62.2" + # emerge --ask --oneshot --verbose ">=net-libs/courier-authlib-0.62.2" - CVE-2008-2380 + CVE-2008-2380 - + craig - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-26.xml index f6b463a416..b44f175cd2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-26.xml @@ -1,6 +1,5 @@ - TMSNC: Execution of arbitrary code @@ -8,8 +7,8 @@ when processing an instant message. tmsnc - March 12, 2009 - March 12, 2009: 01 + 2009-03-12 + 2009-03-12: 01 229157 remote @@ -46,18 +45,18 @@ such as CenterIM or Pebrot:

- # emerge --unmerge "net-im/tmsnc" + # emerge --unmerge "net-im/tmsnc" - CVE-2008-2828 + CVE-2008-2828 - + p-y - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-27.xml index ea9f08b2c2..dfb373e18d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-27.xml @@ -1,14 +1,13 @@ - ProFTPD: Multiple vulnerabilities Two vulnerabilities in ProFTPD might allow for SQL injection attacks. proftpd - March 12, 2009 - March 12, 2009: 01 + 2009-03-12 + 2009-03-12: 01 258450 remote @@ -55,19 +54,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.2" + # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.2" - CVE-2009-0542 - CVE-2009-0543 + CVE-2009-0542 + CVE-2009-0543 - + craig - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-28.xml index 186a14e94d..8b34c3c228 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-28.xml @@ -1,6 +1,5 @@ - libpng: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code libpng - March 15, 2009 - March 15, 2009: 01 + 2009-03-15 + 2009-03-15: 01 244808 255231 259578 @@ -68,20 +67,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.35" + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.35" - CVE-2008-5907 - CVE-2008-6218 - CVE-2009-0040 + CVE-2008-5907 + CVE-2008-6218 + CVE-2009-0040 - + craig - + mabi - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-29.xml index f1dcf896c4..324b1ef4e1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-29.xml @@ -1,6 +1,5 @@ - BlueZ: Arbitrary code execution @@ -8,8 +7,8 @@ or a Denial of Service. bluez-utils bluez-libs - March 16, 2009 - March 16, 2009: 01 + 2009-03-16 + 2009-03-16: 01 230591 local, remote @@ -53,24 +52,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-wireless/bluez-utils-3.36" + # emerge --ask --oneshot --verbose ">=net-wireless/bluez-utils-3.36"

All bluez-libs users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-wireless/bluez-libs-3.36" + # emerge --ask --oneshot --verbose ">=net-wireless/bluez-libs-3.36" - CVE-2008-2374 + CVE-2008-2374 - + p-y - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-30.xml index 1375ec5666..3ed54ef5f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-30.xml @@ -1,6 +1,5 @@ - Opera: Multiple vulnerabilities @@ -8,8 +7,8 @@ the execution of arbitrary code. opera - March 16, 2009 - March 17, 2009: 02 + 2009-03-16 + 2009-03-17: 02 247229 261032 remote @@ -68,24 +67,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/opera-9.64" + # emerge --ask --oneshot --verbose ">=www-client/opera-9.64" - CVE-2008-5178 - CVE-2008-5679 - CVE-2008-5680 - CVE-2008-5681 - CVE-2008-5682 - CVE-2008-5683 - CVE-2009-0914 + CVE-2008-5178 + CVE-2008-5679 + CVE-2008-5680 + CVE-2008-5681 + CVE-2008-5682 + CVE-2008-5683 + CVE-2009-0914 - + a3li - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-31.xml index 9bad652f6f..d4f02ac151 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-31.xml @@ -1,6 +1,5 @@ - libcdaudio: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. libcdaudio - March 17, 2009 - March 17, 2009: 01 + 2009-03-17 + 2009-03-17: 01 245649 remote @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libcdaudio-0.99.12-r1" + # emerge --ask --oneshot --verbose ">=media-libs/libcdaudio-0.99.12-r1" - CVE-2008-5030 + CVE-2008-5030 - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-32.xml index 58e36f1136..cf33c151f8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-32.xml @@ -1,6 +1,5 @@ - phpMyAdmin: Multiple vulnerabilities @@ -8,8 +7,8 @@ which may allow for remote code execution. phpmyadmin - March 18, 2009 - March 18, 2009: 01 + 2009-03-18 + 2009-03-18: 01 237781 244914 246831 @@ -76,23 +75,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.11.9.4" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.11.9.4" - CVE-2006-6942 - CVE-2007-5977 - CVE-2008-4096 - CVE-2008-4775 - CVE-2008-5621 - CVE-2008-5622 + CVE-2006-6942 + CVE-2007-5977 + CVE-2008-4096 + CVE-2008-4775 + CVE-2008-5621 + CVE-2008-5622 - + keytoaster - + mabi - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-33.xml index 58fb59fcc5..018dafe8bb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-33.xml @@ -1,6 +1,5 @@ - FFmpeg: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code or a Denial of Service. ffmpeg gst-plugins-ffmpeg mplayer - March 19, 2009 - March 19, 2009: 01 + 2009-03-19 + 2009-03-19: 01 231831 231834 245313 @@ -76,35 +75,35 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-0.4.9_p20090201" + # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-0.4.9_p20090201"

All gst-plugins-ffmpeg users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-ffmpeg-0.10.5" + # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-ffmpeg-0.10.5"

All Mplayer users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_rc2_p28450" + # emerge --ask --oneshot --verbose ">=media-video/mplayer-1.0_rc2_p28450" - CVE-2008-3162 - CVE-2008-4866 - CVE-2008-4867 - CVE-2008-4868 - CVE-2008-4869 - CVE-2009-0385 + CVE-2008-3162 + CVE-2008-4866 + CVE-2008-4867 + CVE-2008-4868 + CVE-2008-4869 + CVE-2009-0385 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-34.xml index bcce88f6c0..f25adcdf37 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-34.xml @@ -1,6 +1,5 @@ - Amarok: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary code. amarok - March 20, 2009 - March 20, 2009: 01 + 2009-03-20 + 2009-03-20: 01 254896 remote @@ -56,19 +55,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/amarok-1.4.10-r2" + # emerge --ask --oneshot --verbose ">=media-sound/amarok-1.4.10-r2" - CVE-2009-0135 - CVE-2009-0136 + CVE-2009-0135 + CVE-2009-0136 - + a3li - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-35.xml index 19676e8566..205b21b10b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-35.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-35.xml @@ -1,14 +1,13 @@ - Muttprint: Insecure temporary file usage An insecure temporary file usage in Muttprint allows for symlink attacks. muttprint - March 23, 2009 - March 23, 2009: 01 + 2009-03-23 + 2009-03-23: 01 250554 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-misc/muttprint-0.72d-r1" + # emerge --ask --oneshot --verbose ">=app-misc/muttprint-0.72d-r1" - CVE-2008-5368 + CVE-2008-5368 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-36.xml index 4d6b6ab163..c00cde52c4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-36.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-36.xml @@ -1,6 +1,5 @@ - MLDonkey: Information disclosure @@ -8,8 +7,8 @@ disclose arbitrary files. mldonkey - March 23, 2009 - March 23, 2009: 01 + 2009-03-23 + 2009-03-23: 01 260072 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-p2p/mldonkey-3.0.0" + # emerge --ask --oneshot --verbose ">=net-p2p/mldonkey-3.0.0" - CVE-2009-0753 + CVE-2009-0753 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-37.xml index 3dc6e1f3b3..aed5a11abd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-37.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-37.xml @@ -1,6 +1,5 @@ - Ghostscript: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ user-assisted execution of arbitrary code. ghostscript-gpl ghostscript-esp ghostscript-gnu - March 23, 2009 - March 23, 2009: 01 + 2009-03-23 + 2009-03-23: 01 261087 remote @@ -62,34 +61,34 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gpl-8.64-r2" + # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gpl-8.64-r2"

All GNU Ghostscript users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gnu-8.62.0" + # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gnu-8.62.0"

We recommend that users unmerge ESP Ghostscript and use GPL or GNU Ghostscript instead:

- # emerge --unmerge "app-text/ghostscript-esp" + # emerge --unmerge "app-text/ghostscript-esp"

For installation instructions, see above.

- CVE-2009-0583 - CVE-2009-0584 + CVE-2009-0583 + CVE-2009-0584 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-38.xml index 8e90dfae3e..86aa85146e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-38.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-38.xml @@ -1,6 +1,5 @@ - Squid: Multiple Denial of Service vulnerabilities @@ -8,8 +7,8 @@ Denial of Service attacks. Squid - March 24, 2009 - March 24, 2009: 01 + 2009-03-24 + 2009-03-24: 01 216319 257585 remote @@ -51,21 +50,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.7.6" + # emerge --ask --oneshot --verbose ">=net-proxy/squid-2.7.6" - CVE-2007-6239 - CVE-2008-1612 - CVE-2009-0478 - GLSA-200801-05 + CVE-2007-6239 + CVE-2008-1612 + CVE-2009-0478 + GLSA-200801-05 - + rbu - + craig - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-39.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-39.xml index 77043c49b7..a1a5f70fce 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-39.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-39.xml @@ -1,6 +1,5 @@ - pam_krb5: Privilege escalation @@ -8,8 +7,8 @@ privileges or overwrite arbitrary files. pam_krb5 - March 25, 2009 - March 25, 2009: 01 + 2009-03-25 + 2009-03-25: 01 257075 local @@ -54,19 +53,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-auth/pam_krb5-3.12" + # emerge --ask --oneshot --verbose ">=sys-auth/pam_krb5-3.12" - CVE-2009-0360 - CVE-2009-0361 + CVE-2009-0360 + CVE-2009-0361 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-40.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-40.xml index 795b98162a..a19c712dc6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-40.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-40.xml @@ -1,14 +1,13 @@ - Analog: Denial of Service A Denial of Service vulnerability was discovered in Analog. analog - March 29, 2009 - March 29, 2009: 01 + 2009-03-29 + 2009-03-29: 01 249140 local @@ -47,22 +46,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/analog-6.0-r2" + # emerge --ask --oneshot --verbose ">=app-admin/analog-6.0-r2"

NOTE: Analog is now linked against the system bzip2 library.

- CVE-2008-1372 - GLSA 200804-02 + CVE-2008-1372 + GLSA 200804-02 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-41.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-41.xml index 57982930e6..ce1ac35887 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-41.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200903-41.xml @@ -1,6 +1,5 @@ - gedit: Untrusted search path @@ -8,8 +7,8 @@ code. gedit - March 30, 2009 - March 30, 2009: 01 + 2009-03-30 + 2009-03-30: 01 257004 local @@ -48,25 +47,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/gedit-2.22.3-r1" + # emerge --ask --oneshot --verbose ">=app-editors/gedit-2.22.3-r1"

All gedit 2.24.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/gedit-2.24.3" + # emerge --ask --oneshot --verbose ">=app-editors/gedit-2.24.3" - CVE-2008-5983 - CVE-2009-0314 + CVE-2008-5983 + CVE-2009-0314 - + a3li - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-01.xml index 7d63424cfa..cfc3153125 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-01.xml @@ -1,6 +1,5 @@ - Openfire: Multiple vulnerabilities @@ -8,8 +7,8 @@ may allow remote execution of arbitrary code. openfire - April 02, 2009 - April 02, 2009: 01 + 2009-04-02 + 2009-04-02: 01 246008 254309 remote @@ -77,20 +76,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/openfire-3.6.3" + # emerge --ask --oneshot --verbose ">=net-im/openfire-3.6.3" - CVE-2008-6508 - CVE-2008-6509 - CVE-2008-6510 - CVE-2008-6511 - CVE-2009-0496 - CVE-2009-0497 + CVE-2008-6508 + CVE-2008-6509 + CVE-2008-6510 + CVE-2008-6511 + CVE-2009-0496 + CVE-2009-0497 - + mabi - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-02.xml index 63cd31cf96..cb414af705 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-02.xml @@ -1,6 +1,5 @@ - GLib: Execution of arbitrary code @@ -8,8 +7,8 @@ when performing base64 conversion. glib - April 03, 2009 - April 05, 2009: 02 + 2009-04-03 + 2009-04-05: 02 249214 remote @@ -50,24 +49,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.18.4-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.18.4-r1"

All GLib 2.16 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.16.6-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.16.6-r1" - CVE-2008-4316 + CVE-2008-4316 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-03.xml index 167fd1f6c6..7547f6b602 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-03.xml @@ -1,6 +1,5 @@ - Gnumeric: Untrusted search path @@ -8,8 +7,8 @@ execution of arbitrary code. gnumeric - April 03, 2009 - April 03, 2009: 01 + 2009-04-03 + 2009-04-03: 01 257012 local @@ -49,15 +48,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-office/gnumeric-1.8.4-r1" + # emerge --ask --oneshot --verbose ">=app-office/gnumeric-1.8.4-r1" - CVE-2009-0318 + CVE-2009-0318 - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-04.xml index 2f5e18ba65..9ba68ebb02 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-04.xml @@ -1,14 +1,13 @@ - WeeChat: Denial of Service A processing error in WeeChat might lead to a Denial of Service. weechat - April 04, 2009 - April 04, 2009: 01 + 2009-04-04 + 2009-04-04: 01 262997 remote @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/weechat-0.2.6.1" + # emerge --ask --oneshot --verbose ">=net-irc/weechat-0.2.6.1" - CVE-2009-0661 + CVE-2009-0661 - + a3li - + a3li - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-05.xml index e9834b2d73..55ea929df8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-05.xml @@ -1,6 +1,5 @@ - ntp: Certificate validation error @@ -8,8 +7,8 @@ spoofing attacks. ntp - April 05, 2009 - April 05, 2009: 01 + 2009-04-05 + 2009-04-05: 01 254098 remote @@ -49,17 +48,17 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.4_p6" + # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.4_p6" - CVE-2008-5077 - CVE-2009-0021 - GLSA 200902-02 + CVE-2008-5077 + CVE-2009-0021 + GLSA 200902-02 - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-06.xml index 2e5d7da104..3311bd7e87 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-06.xml @@ -1,6 +1,5 @@ - Eye of GNOME: Untrusted search path @@ -8,8 +7,8 @@ the execution of arbitrary code. eog - April 06, 2009 - April 06, 2009: 01 + 2009-04-06 + 2009-04-06: 01 257002 local @@ -50,16 +49,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/eog-2.22.3-r3" + # emerge --ask --oneshot --verbose ">=media-gfx/eog-2.22.3-r3" - CVE-2008-5983 - CVE-2008-5987 + CVE-2008-5983 + CVE-2008-5987 - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-07.xml index c9fbbfd3a7..89888c2faf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-07.xml @@ -1,6 +1,5 @@ - Xpdf: Untrusted search path @@ -8,8 +7,8 @@ code. xpdf - April 07, 2009 - April 07, 2009: 01 + 2009-04-07 + 2009-04-07: 01 242930 local @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.02-r2" + # emerge --ask --oneshot --verbose ">=app-text/xpdf-3.02-r2" - CVE-2009-1144 + CVE-2009-1144 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-08.xml index 56ff61a11e..3c23853d69 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-08.xml @@ -1,6 +1,5 @@ - OpenSSL: Denial of Service @@ -8,8 +7,8 @@ certificate details. openssl - April 07, 2009 - April 07, 2009: 01 + 2009-04-07 + 2009-04-07: 01 263751 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8k" + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8k" - CVE-2009-0590 + CVE-2009-0590 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-09.xml index acfe636687..60d2fcb2b2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-09.xml @@ -1,6 +1,5 @@ - MIT Kerberos 5: Multiple vulnerabilities @@ -8,8 +7,8 @@ unauthenticated users to execute arbitrary code with root privileges. mit-krb5 - April 08, 2009 - April 08, 2009: 01 + 2009-04-08 + 2009-04-08: 01 262736 263398 remote @@ -65,18 +64,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.6.3-r6" + # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.6.3-r6" - CVE-2009-0844 - CVE-2009-0845 - CVE-2009-0846 - CVE-2009-0847 + CVE-2009-0844 + CVE-2009-0845 + CVE-2009-0846 + CVE-2009-0847 - + rbu - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-10.xml index 1aff889e81..bd0c7fc6a5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-10.xml @@ -1,6 +1,5 @@ - Avahi: Denial of Service @@ -8,8 +7,8 @@ consumption. avahi - April 08, 2009 - April 08, 2009: 01 + 2009-04-08 + 2009-04-08: 01 260971 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/avahi-0.6.24-r2" + # emerge --ask --oneshot --verbose ">=net-dns/avahi-0.6.24-r2" - CVE-2009-0758 + CVE-2009-0758 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-11.xml index a16c7c5f76..7deb969834 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-11.xml @@ -1,6 +1,5 @@ - Tor: Multiple vulnerabilities @@ -8,8 +7,8 @@ Service, escalation of privileges and information disclosure. tor - April 08, 2009 - April 08, 2009: 01 + 2009-04-08 + 2009-04-08: 01 250018 256078 258833 @@ -72,24 +71,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.0.34" + # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.0.34" - CVE-2008-5397 - CVE-2008-5398 - CVE-2009-0414 - CVE-2009-0936 - CVE-2009-0937 - CVE-2009-0938 - CVE-2009-0939 + CVE-2008-5397 + CVE-2008-5398 + CVE-2009-0414 + CVE-2009-0936 + CVE-2009-0937 + CVE-2009-0938 + CVE-2009-0939 - + craig - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-12.xml index 6af7ae73aa..03d6ecff0c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-12.xml @@ -1,14 +1,13 @@ - Wicd: Information disclosure A vulnerability in Wicd may allow for disclosure of sensitive information. wicd - April 10, 2009 - April 10, 2009: 01 + 2009-04-10 + 2009-04-10: 01 258596 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/wicd-1.5.9" + # emerge --ask --oneshot --verbose ">=net-misc/wicd-1.5.9" - CVE-2009-0489 + CVE-2009-0489 - + rbu - + keytoaster - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-13.xml index bf2c7dd86a..3d7f7bc0d7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-13.xml @@ -1,6 +1,5 @@ - Ventrilo: Denial of Service @@ -8,8 +7,8 @@ Service. ventrilo-server-bin - April 14, 2009 - April 14, 2009: 01 + 2009-04-14 + 2009-04-14: 01 234819 remote @@ -47,15 +46,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/ventrilo-server-bin-3.0.3" + # emerge --ask --oneshot --verbose ">=media-sound/ventrilo-server-bin-3.0.3" - CVE-2008-3680 + CVE-2008-3680 - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-14.xml index 224631909f..c5560851b4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-14.xml @@ -1,14 +1,13 @@ - F-PROT Antivirus: Multiple Denial of Service vulnerabilities Multiple errors in F-PROT Antivirus may lead to a Denial of Service. f-prot - April 14, 2009 - April 17, 2009: 04 + 2009-04-14 + 2009-04-17: 04 232665 253497 remote @@ -57,20 +56,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/f-prot-6.0.2" + # emerge --ask --oneshot --verbose ">=app-antivirus/f-prot-6.0.2" - CVE-2008-3243 - CVE-2008-3244 - CVE-2008-5747 + CVE-2008-3243 + CVE-2008-3244 + CVE-2008-5747 - + craig - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-15.xml index e448c2928c..701079e5a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-15.xml @@ -1,14 +1,13 @@ - mpg123: User-assisted execution of arbitrary code An error in mpg123 might allow for the execution of arbitrary code. mpg123 - April 16, 2009 - April 16, 2009: 01 + 2009-04-16 + 2009-04-16: 01 265342 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/mpg123-1.7.2" + # emerge --ask --oneshot --verbose ">=media-sound/mpg123-1.7.2" - CVE-2009-1301 + CVE-2009-1301 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-16.xml index 734f5c1f03..1ac6e366d9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-16.xml @@ -1,6 +1,5 @@ - libsndfile: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ to execute arbitrary code. libsndfile - April 17, 2009 - April 17, 2009: 01 + 2009-04-17 + 2009-04-17: 01 261173 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.19" + # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.19" - CVE-2009-0186 + CVE-2009-0186 - + a3li - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-17.xml index 8123c5b61a..8d429ffbda 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-17.xml @@ -1,14 +1,13 @@ - Adobe Reader: User-assisted execution of arbitrary code Adobe Reader is vulnerable to execution of arbitrary code. acroread - April 18, 2009 - April 18, 2009: 01 + 2009-04-18 + 2009-04-18: 01 259992 remote @@ -78,23 +77,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.4" + # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.4" - CVE-2009-0193 - CVE-2009-0658 - CVE-2009-0927 - CVE-2009-0928 - CVE-2009-1061 - CVE-2009-1062 + CVE-2009-0193 + CVE-2009-0658 + CVE-2009-0927 + CVE-2009-0928 + CVE-2009-1061 + CVE-2009-1062 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-18.xml index c9352bf243..425e3e56fd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-18.xml @@ -1,6 +1,5 @@ - udev: Multiple vulnerabilities @@ -8,8 +7,8 @@ Service. udev - April 18, 2009 - April 18, 2009: 01 + 2009-04-18 + 2009-04-18: 01 266290 local @@ -51,19 +50,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-fs/udev-124-r2" + # emerge --ask --oneshot --verbose ">=sys-fs/udev-124-r2" - CVE-2009-1185 - CVE-2009-1186 + CVE-2009-1185 + CVE-2009-1186 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-19.xml index 9c75e803b6..f04c018fcf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-19.xml @@ -1,6 +1,5 @@ - LittleCMS: Multiple vulnerabilities @@ -8,8 +7,8 @@ execution of arbitrary code. littlecms - April 19, 2009 - April 19, 2009: 01 + 2009-04-19 + 2009-04-19: 01 260269 264604 remote @@ -64,21 +63,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/lcms-1.18-r1" + # emerge --ask --oneshot --verbose ">=media-libs/lcms-1.18-r1" - CVE-2009-0581 - CVE-2009-0723 - CVE-2009-0733 - CVE-2009-0793 + CVE-2009-0581 + CVE-2009-0723 + CVE-2009-0733 + CVE-2009-0793 - + rbu - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-20.xml index cc9a1fa48f..2d1f9bf55e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200904-20.xml @@ -1,6 +1,5 @@ - CUPS: Multiple vulnerabilities @@ -8,8 +7,8 @@ code or DNS rebinding attacks. cups - April 23, 2009 - April 23, 2009: 01 + 2009-04-23 + 2009-04-23: 01 263070 remote @@ -61,22 +60,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-print/cups-1.3.10" + # emerge --ask --oneshot --verbose ">=net-print/cups-1.3.10" - CVE-2009-0146 - CVE-2009-0147 - CVE-2009-0163 - CVE-2009-0164 - CVE-2009-0166 + CVE-2009-0146 + CVE-2009-0147 + CVE-2009-0163 + CVE-2009-0164 + CVE-2009-0166 - + a3li - + a3li - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-01.xml index 8352e3ef0f..134e6b0c7e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-01.xml @@ -1,6 +1,5 @@ - Asterisk: Multiple vulnerabilities @@ -8,8 +7,8 @@ Service and username disclosure. asterisk - May 02, 2009 - May 02, 2009: 01 + 2009-05-02 + 2009-05-02: 01 218966 224835 232696 @@ -62,24 +61,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.32" + # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.32" - CVE-2008-1897 - CVE-2008-2119 - CVE-2008-3263 - CVE-2008-3264 - CVE-2008-3903 - CVE-2008-5558 - CVE-2009-0041 + CVE-2008-1897 + CVE-2008-2119 + CVE-2008-3263 + CVE-2008-3264 + CVE-2008-3903 + CVE-2008-5558 + CVE-2009-0041 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-02.xml index 5e47c85efd..01f8f9d112 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-02.xml @@ -1,6 +1,5 @@ - Cscope: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arbitrary code. cscope - May 24, 2009 - May 24, 2009: 01 + 2009-05-24 + 2009-05-24: 01 263023 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/cscope-15.7a" + # emerge --ask --oneshot --verbose ">=dev-util/cscope-15.7a" - CVE-2009-0148 - CVE-2009-1577 + CVE-2009-0148 + CVE-2009-1577 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-03.xml index 0048e249fc..437a926929 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-03.xml @@ -1,6 +1,5 @@ - IPSec Tools: Denial of Service @@ -8,8 +7,8 @@ attackers to cause a Denial of Service. ipsec-tools - May 24, 2009 - May 24, 2009: 01 + 2009-05-24 + 2009-05-24: 01 267135 remote @@ -58,19 +57,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-firewall/ipsec-tools-0.7.2" + # emerge --ask --oneshot --verbose ">=net-firewall/ipsec-tools-0.7.2" - CVE-2009-1574 - CVE-2009-1632 + CVE-2009-1574 + CVE-2009-1632 - + craig - + a3li - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-04.xml index 330ac17acb..9b9ea3f3bd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-04.xml @@ -1,6 +1,5 @@ - GnuTLS: Multiple vulnerabilities @@ -8,8 +7,8 @@ spoofing or the generation of invalid keys. gnutls - May 24, 2009 - May 24, 2009: 01 + 2009-05-24 + 2009-05-24: 01 267774 remote @@ -63,20 +62,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/gnutls-2.6.6" + # emerge --ask --oneshot --verbose ">=net-libs/gnutls-2.6.6" - CVE-2009-1415 - CVE-2009-1416 - CVE-2009-1417 + CVE-2009-1415 + CVE-2009-1416 + CVE-2009-1417 - + a3li - + a3li - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-05.xml index 1b1fce391e..e3bdf259b2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-05.xml @@ -1,6 +1,5 @@ - FreeType: Multiple vulnerabilities @@ -8,8 +7,8 @@ of arbitrary code or a Denial of Service. freetype - May 24, 2009 - May 25, 2009: 02 + 2009-05-24 + 2009-05-25: 02 263032 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.3.9-r1" + # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.3.9-r1" - CVE-2009-0946 + CVE-2009-0946 - + a3li - + a3li - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-06.xml index 5acd305cee..d041677718 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-06.xml @@ -1,6 +1,5 @@ - acpid: Denial of Service @@ -8,8 +7,8 @@ Service. acpid - May 24, 2009 - May 24, 2009: 01 + 2009-05-24 + 2009-05-24: 01 268079 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-power/acpid-1.0.10" + # emerge --ask --oneshot --verbose ">=sys-power/acpid-1.0.10" - CVE-2009-0798 + CVE-2009-0798 - + craig - + craig - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-07.xml index 87e7d34505..277c4874fa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-07.xml @@ -1,6 +1,5 @@ - Pidgin: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code or a Denial of Service. pidgin - May 25, 2009 - May 25, 2009: 01 + 2009-05-25 + 2009-05-25: 01 270811 remote @@ -61,19 +60,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/pidgin-2.5.6" + # emerge --ask --oneshot --verbose ">=net-im/pidgin-2.5.6" - CVE-2009-1373 - CVE-2009-1374 - CVE-2009-1375 - CVE-2009-1376 - GLSA 200901-13 + CVE-2009-1373 + CVE-2009-1374 + CVE-2009-1375 + CVE-2009-1376 + GLSA 200901-13 - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-08.xml index 1bf5ed4a13..a77c8ffeb9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-08.xml @@ -1,6 +1,5 @@ - NTP: Remote execution of arbitrary code @@ -8,8 +7,8 @@ remote execution of arbitrary code. ntp - May 26, 2009 - May 26, 2009: 01 + 2009-05-26 + 2009-05-26: 01 263033 268962 remote @@ -67,16 +66,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.4_p7" + # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.4_p7" - CVE-2009-0159 - CVE-2009-1252 + CVE-2009-0159 + CVE-2009-1252 - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-09.xml index 420cc0a132..f6de8fe576 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200905-09.xml @@ -1,6 +1,5 @@ - libsndfile: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ allow remote attackers to execute arbitrary code. libsndfile - May 27, 2009 - May 27, 2009: 01 + 2009-05-27 + 2009-05-27: 01 269863 remote @@ -57,19 +56,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.20" + # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.20" - CVE-2009-1788 - CVE-2009-1791 + CVE-2009-1788 + CVE-2009-1791 - + keytoaster - + a3li - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-01.xml index b046010b46..958e49f638 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-01.xml @@ -1,6 +1,5 @@ - libpng: Information disclosure @@ -8,8 +7,8 @@ disclosure. libpng - June 27, 2009 - June 27, 2009: 01 + 2009-06-27 + 2009-06-27: 01 272970 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.37" + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.37" - CVE-2009-2042 + CVE-2009-2042 - + keytoaster - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-02.xml index 24e6639e80..48f43d309d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-02.xml @@ -1,6 +1,5 @@ - Ruby: Denial of Service @@ -8,8 +7,8 @@ Denial of Service attack. ruby - June 28, 2009 - June 28, 2009: 01 + 2009-06-28 + 2009-06-28: 01 273213 remote @@ -48,15 +47,15 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.6_p369" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.6_p369" - CVE-2009-1904 + CVE-2009-1904 - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-03.xml index 5d25434891..499bd8e4a2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-03.xml @@ -1,6 +1,5 @@ - phpMyAdmin: Multiple vulnerabilities @@ -8,8 +7,8 @@ code or a Cross-Site Scripting attack. phpmyadmin - June 29, 2009 - June 29, 2009: 01 + 2009-06-29 + 2009-06-29: 01 263711 remote @@ -55,16 +54,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.11.9.5" + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-2.11.9.5" - CVE-2009-1150 - CVE-2009-1151 + CVE-2009-1150 + CVE-2009-1151 - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-04.xml index 2fa9ac989b..72b5654ec4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-04.xml @@ -1,6 +1,5 @@ - Apache Tomcat JK Connector: Information disclosure @@ -8,8 +7,8 @@ disclosure flaw. mod_jk - June 29, 2009 - June 29, 2009: 01 + 2009-06-29 + 2009-06-29: 01 265455 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apache/mod_jk-1.2.27" + # emerge --ask --oneshot --verbose ">=www-apache/mod_jk-1.2.27" - CVE-2008-5519 + CVE-2008-5519 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-05.xml index df890cb688..45c506d44d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200906-05.xml @@ -1,6 +1,5 @@ - Wireshark: Multiple vulnerabilities @@ -8,8 +7,8 @@ Denial of Service or remote code execution. wireshark - June 30, 2009 - June 30, 2009: 02 + 2009-06-30 + 2009-06-30: 02 242996 248425 258013 @@ -123,30 +122,30 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.0.8" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.0.8" - CVE-2008-4680 - CVE-2008-4681 - CVE-2008-4682 - CVE-2008-4683 - CVE-2008-4684 - CVE-2008-4685 - CVE-2008-5285 - CVE-2008-6472 - CVE-2009-0599 - CVE-2009-0600 - CVE-2009-0601 - CVE-2009-1210 - CVE-2009-1266 - CVE-2009-1268 - CVE-2009-1269 - CVE-2009-1829 + CVE-2008-4680 + CVE-2008-4681 + CVE-2008-4682 + CVE-2008-4683 + CVE-2008-4684 + CVE-2008-4685 + CVE-2008-5285 + CVE-2008-6472 + CVE-2009-0599 + CVE-2009-0600 + CVE-2009-0601 + CVE-2009-1210 + CVE-2009-1266 + CVE-2009-1268 + CVE-2009-1269 + CVE-2009-1829 - + craig - + craig
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-01.xml index 23ad526d13..c733fea98d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-01.xml @@ -1,6 +1,5 @@ - libwmf: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ vulnerability. libwmf - July 02, 2009 - July 02, 2009: 01 + 2009-07-02 + 2009-07-02: 01 268161 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libwmf-0.2.8.4-r3" + # emerge --ask --oneshot --verbose ">=media-libs/libwmf-0.2.8.4-r3" - CVE-2009-1364 + CVE-2009-1364 - + keytoaster - + craig - + craig
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-02.xml index f90976835a..7dace426b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-02.xml @@ -1,14 +1,13 @@ - ModSecurity: Denial of Service Two vulnerabilities in ModSecurity might lead to a Denial of Service. mod_security - July 02, 2009 - July 02, 2009: 01 + 2009-07-02 + 2009-07-02: 01 262302 remote @@ -55,19 +54,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apache/mod_security-2.5.9" + # emerge --ask --oneshot --verbose ">=www-apache/mod_security-2.5.9" - CVE-2009-1902 - CVE-2009-1903 + CVE-2009-1902 + CVE-2009-1903 - + craig - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-03.xml index e2703089b5..1ae10b0453 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-03.xml @@ -1,6 +1,5 @@ - APR Utility Library: Multiple vulnerabilities @@ -9,8 +8,8 @@ sensitive information. apr-util - July 04, 2009 - July 04, 2009: 01 + 2009-07-04 + 2009-07-04: 01 268643 272260 274193 @@ -69,20 +68,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/apr-util-1.3.7" + # emerge --ask --oneshot --verbose ">=dev-libs/apr-util-1.3.7" - CVE-2009-0023 - CVE-2009-1955 - CVE-2009-1956 + CVE-2009-0023 + CVE-2009-1955 + CVE-2009-1956 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-04.xml index 6666b61e1c..213a434233 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-04.xml @@ -1,6 +1,5 @@ - Apache: Multiple vulnerabilities @@ -8,8 +7,8 @@ privilege escalation, information disclosure or Denial of Service attacks. apache - July 12, 2009 - July 12, 2009: 01 + 2009-07-12 + 2009-07-12: 01 268154 271470 276426 @@ -74,21 +73,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.11-r2" + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.2.11-r2" - CVE-2009-1195 - CVE-2009-1191 - CVE-2009-1890 - CVE-2009-1891 + CVE-2009-1195 + CVE-2009-1191 + CVE-2009-1890 + CVE-2009-1891 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-05.xml index e19d88dcaf..f7527c3eed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-05.xml @@ -1,6 +1,5 @@ - git: git-daemon Denial of Service @@ -8,8 +7,8 @@ consumption. git - July 12, 2009 - July 12, 2009: 01 + 2009-07-12 + 2009-07-12: 01 273905 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/git-1.6.3.3" + # emerge --ask --oneshot --verbose ">=dev-util/git-1.6.3.3" - CVE-2009-2108 + CVE-2009-2108 - + craig - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-06.xml index 082d6369da..d4f7639001 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-06.xml @@ -1,14 +1,13 @@ - Adobe Reader: User-assisted execution of arbitrary code Adobe Reader is vulnerable to remote code execution via crafted PDF files. acroread - July 12, 2009 - July 12, 2009: 01 + 2009-07-12 + 2009-07-12: 01 267846 273908 remote @@ -91,33 +90,33 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.6" + # emerge --ask --oneshot --verbose ">=app-text/acroread-8.1.6" - CVE-2009-0198 - CVE-2009-0509 - CVE-2009-0510 - CVE-2009-0511 - CVE-2009-0512 - CVE-2009-0888 - CVE-2009-0889 - CVE-2009-1492 - CVE-2009-1493 - CVE-2009-1855 - CVE-2009-1856 - CVE-2009-1857 - CVE-2009-1858 - CVE-2009-1859 - CVE-2009-1861 - CVE-2009-2028 + CVE-2009-0198 + CVE-2009-0509 + CVE-2009-0510 + CVE-2009-0511 + CVE-2009-0512 + CVE-2009-0888 + CVE-2009-0889 + CVE-2009-1492 + CVE-2009-1493 + CVE-2009-1855 + CVE-2009-1856 + CVE-2009-1857 + CVE-2009-1858 + CVE-2009-1859 + CVE-2009-1861 + CVE-2009-2028 - + keytoaster - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-07.xml index 63ed6a7487..333fa00937 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-07.xml @@ -1,6 +1,5 @@ - ModPlug: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary code. libmodplug gst-plugins-bad - July 12, 2009 - July 12, 2009: 01 + 2009-07-12 + 2009-07-12: 01 266913 remote @@ -65,7 +64,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libmodplug-0.8.7" + # emerge --ask --oneshot --verbose ">=media-libs/libmodplug-0.8.7"

gst-plugins-bad 0.10.11 and later versions do not include the ModPlug plug-in (it has been moved to media-plugins/gst-plugins-modplug). All @@ -74,20 +73,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-bad-0.10.11" - # emerge --ask --verbose "media-plugins/gst-plugins-modplug" + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-bad-0.10.11" + # emerge --ask --verbose "media-plugins/gst-plugins-modplug" - CVE-2009-1438 - CVE-2009-1513 + CVE-2009-1438 + CVE-2009-1513 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-08.xml index c6988d0b9f..b1bcbffb96 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-08.xml @@ -1,6 +1,5 @@ - Multiple Ralink wireless drivers: Execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code with elevated privileges. rt2400 rt2500 rt2570 rt61 ralink-rt61 - July 12, 2009 - July 12, 2009: 01 + 2009-07-12 + 2009-07-12: 01 257023 remote @@ -63,22 +62,22 @@ stable versions of sys-kernel/gentoo-sources.

- # emerge --unmerge "net-wireless/rt2400" - # emerge --unmerge "net-wireless/rt2500" - # emerge --unmerge "net-wireless/rt2570" - # emerge --unmerge "net-wireless/rt61" - # emerge --unmerge "net-wireless/ralink-rt61" + # emerge --unmerge "net-wireless/rt2400" + # emerge --unmerge "net-wireless/rt2500" + # emerge --unmerge "net-wireless/rt2570" + # emerge --unmerge "net-wireless/rt61" + # emerge --unmerge "net-wireless/ralink-rt61" - CVE-2009-0282 + CVE-2009-0282 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-09.xml index 28d22b7b12..993ed6df0c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-09.xml @@ -1,6 +1,5 @@ - Cyrus-SASL: Execution of arbitrary code @@ -8,8 +7,8 @@ code in applications or daemons that authenticate using SASL. cyrus-sasl - July 12, 2009 - July 12, 2009: 01 + 2009-07-12 + 2009-07-12: 01 270261 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/cyrus-sasl-2.1.23" + # emerge --ask --oneshot --verbose ">=dev-libs/cyrus-sasl-2.1.23" - CVE-2009-0688 + CVE-2009-0688 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-10.xml index b1892d29db..4d5d3aec7c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-10.xml @@ -1,6 +1,5 @@ - Syslog-ng: Chroot escape @@ -8,8 +7,8 @@ escape if a separate vulnerability in Syslog-ng is exploited. syslog-ng - July 12, 2009 - July 12, 2009: 01 + 2009-07-12 + 2009-07-12: 01 247278 local @@ -48,24 +47,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-2.0.10" + # emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-2.0.10"

All Syslog-ng 2.1 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-2.1.3" + # emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-2.1.3" - CVE-2008-5110 + CVE-2008-5110 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-11.xml index 51ada9eda5..0e34d45af1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-11.xml @@ -1,6 +1,5 @@ - GStreamer plug-ins: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. gst-plugins-good gst-plugins-base gst-plugins-libpng - July 12, 2009 - July 12, 2009: 01 + 2009-07-12 + 2009-07-12: 01 256096 261594 272972 @@ -77,34 +76,34 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-good-0.10.14" + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-good-0.10.14"

All gst-plugins-base users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-base-0.10.22" + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-base-0.10.22"

All gst-plugins-libpng users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-libpng-0.10.14-r1" + # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-libpng-0.10.14-r1" - CVE-2009-0386 - CVE-2009-0387 - CVE-2009-0397 - CVE-2009-0586 - CVE-2009-1932 + CVE-2009-0386 + CVE-2009-0387 + CVE-2009-0397 + CVE-2009-0586 + CVE-2009-1932 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-12.xml index 6b28c8a2a6..24d6698260 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-12.xml @@ -1,6 +1,5 @@ - ISC DHCP: dhcpclient Remote execution of arbitrary code @@ -8,8 +7,8 @@ allows for the remote execution of arbitrary code with root privileges. dhcp - July 14, 2009 - July 14, 2009: 01 + 2009-07-14 + 2009-07-14: 01 277729 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/dhcp-3.1.1-r1" + # emerge --ask --oneshot --verbose ">=net-misc/dhcp-3.1.1-r1" - CVE-2009-0692 + CVE-2009-0692 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-13.xml index 89ef20a85b..23d60513f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-13.xml @@ -1,6 +1,5 @@ - PulseAudio: Local privilege escalation @@ -8,8 +7,8 @@ escalated privileges. pulseaudio - July 16, 2009 - July 16, 2009: 01 + 2009-07-16 + 2009-07-16: 01 276986 local @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/pulseaudio-0.9.9-r54" + # emerge --ask --oneshot --verbose ">=media-sound/pulseaudio-0.9.9-r54" - CVE-2009-1894 + CVE-2009-1894 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-14.xml index ed302b9947..281fe2140e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-14.xml @@ -1,6 +1,5 @@ - Rasterbar libtorrent: Directory traversal @@ -8,8 +7,8 @@ remote attacker to overwrite arbitrary files. rb_libtorrent deluge - July 17, 2009 - July 17, 2009: 01 + 2009-07-17 + 2009-07-17: 01 273156 273961 remote @@ -55,24 +54,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/rb_libtorrent-0.13-r1" + # emerge --ask --oneshot --verbose ">=net-libs/rb_libtorrent-0.13-r1"

All Deluge users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-p2p/deluge-1.1.9" + # emerge --ask --oneshot --verbose ">=net-p2p/deluge-1.1.9" - CVE-2009-1760 + CVE-2009-1760 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-15.xml index 97ad8a4879..9e3ef75bc2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-15.xml @@ -1,6 +1,5 @@ - Nagios: Execution of arbitrary code @@ -8,8 +7,8 @@ code. nagios-core - July 19, 2009 - July 19, 2009: 01 + 2009-07-19 + 2009-07-19: 01 245887 249876 275288 @@ -68,7 +67,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-3.0.6-r2" + # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-3.0.6-r2"

NOTE: Users of the Nagios 2 branch can update to version 2.12-r1 which contains a patch to fix CVE-2009-2288. However, that branch is not @@ -77,18 +76,18 @@

- CVE-2008-5027 - CVE-2008-5028 - CVE-2008-6373 - CVE-2009-2288 + CVE-2008-5027 + CVE-2008-5028 + CVE-2008-6373 + CVE-2009-2288 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-16.xml index 9f0cb7837b..0727d80592 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200907-16.xml @@ -1,14 +1,13 @@ - Python: Integer overflows Multiple integer overflows in Python have an unspecified impact. python - July 19, 2009 - July 19, 2009: 01 + 2009-07-19 + 2009-07-19: 01 246991 remote @@ -51,24 +50,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/python-2.5.4-r2" + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.5.4-r2"

All Python 2.4 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.6" + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.4.6" - CVE-2008-5031 + CVE-2008-5031 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-01.xml index 9be8336c40..217074c346 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-01.xml @@ -1,14 +1,13 @@ - OpenSC: Multiple vulnerabilities Multiple vulnerabilities were found in OpenSC. opensc - August 01, 2009 - August 01, 2009: 01 + 2009-08-01 + 2009-08-01: 01 260514 269920 local @@ -60,20 +59,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/opensc-0.11.8" + # emerge --ask --oneshot --verbose ">=dev-libs/opensc-0.11.8" - CVE-2009-0368 - CVE-2009-1603 + CVE-2009-0368 + CVE-2009-1603 OpenSC Security Advisory - + keytoaster - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-02.xml index 4884c598c6..20686adbb3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-02.xml @@ -1,14 +1,13 @@ - BIND: Denial of Service Dynamic Update packets can cause a Denial of Service in the BIND daemon. bind - August 01, 2009 - August 01, 2009: 01 + 2009-08-01 + 2009-08-01: 01 279508 remote @@ -53,16 +52,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.3_p3" + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.3_p3" - CVE-2009-0696 + CVE-2009-0696 ISC advisory - + rbu - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-03.xml index 550b169859..444ec3c9bd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-03.xml @@ -1,6 +1,5 @@ - libTIFF: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ remote execution of arbitrary code. tiff - August 07, 2009 - August 07, 2009: 01 + 2009-08-07 + 2009-08-07: 01 276339 276988 remote @@ -60,19 +59,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r8" + # emerge --ask --oneshot --verbose ">=media-libs/tiff-3.8.2-r8" - CVE-2009-2285 - CVE-2009-2347 + CVE-2009-2285 + CVE-2009-2347 - + rbu - + rbu - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-04.xml index 5c97cfba12..f067525e6b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-04.xml @@ -1,6 +1,5 @@ - Adobe products: Multiple vulnerabilities @@ -8,8 +7,8 @@ attacks including the remote execution of arbitrary code. adobe-flash acroread - August 07, 2009 - August 07, 2009: 01 + 2009-08-07 + 2009-08-07: 01 278813 278819 remote @@ -82,32 +81,32 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-10.0.32.18" + # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-10.0.32.18"

All Adobe Reader users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-9.1.3" + # emerge --ask --oneshot --verbose ">=app-text/acroread-9.1.3" - CVE-2009-1862 - CVE-2009-1863 - CVE-2009-1864 - CVE-2009-1865 - CVE-2009-1866 - CVE-2009-1867 - CVE-2009-1868 - CVE-2009-1869 - CVE-2009-1870 + CVE-2009-1862 + CVE-2009-1863 + CVE-2009-1864 + CVE-2009-1865 + CVE-2009-1866 + CVE-2009-1867 + CVE-2009-1868 + CVE-2009-1869 + CVE-2009-1870 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-05.xml index 15c8b1b125..3bf8561ef7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-05.xml @@ -1,6 +1,5 @@ - Subversion: Remote execution of arbitrary code @@ -9,8 +8,8 @@ arbitrary code. subversion - August 18, 2009 - August 18, 2009: 01 + 2009-08-18 + 2009-08-18: 01 280494 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-util/subversion-1.6.4" + # emerge --ask --oneshot --verbose ">=dev-util/subversion-1.6.4" - CVE-2009-2411 + CVE-2009-2411 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-06.xml index 66f5853120..2e67779a12 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-06.xml @@ -1,6 +1,5 @@ - CDF: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary code. cdf - August 18, 2009 - August 18, 2009: 01 + 2009-08-18 + 2009-08-18: 01 278679 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sci-libs/cdf-3.3.0" + # emerge --ask --oneshot --verbose ">=sci-libs/cdf-3.3.0" - CVE-2009-2850 + CVE-2009-2850 - + rbu - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-07.xml index 7824f4eb66..ed6fc59c7c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-07.xml @@ -1,6 +1,5 @@ - Perl Compress::Raw modules: Denial of Service @@ -8,8 +7,8 @@ lead to a Denial of Service. Compress-Raw-Zlib Compress-Raw-Bzip2 - August 18, 2009 - August 18, 2009: 01 + 2009-08-18 + 2009-08-18: 01 273141 281955 remote @@ -58,25 +57,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=perl-core/Compress-Raw-Zlib-2.020" + # emerge --ask --oneshot --verbose ">=perl-core/Compress-Raw-Zlib-2.020"

All Compress::Raw::Bzip2 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=perl-core/Compress-Raw-Bzip2-2.020" + # emerge --ask --oneshot --verbose ">=perl-core/Compress-Raw-Bzip2-2.020" - CVE-2009-1391 - CVE-2009-1884 + CVE-2009-1391 + CVE-2009-1884 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-08.xml index be457f7b88..b3e7480805 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-08.xml @@ -1,6 +1,5 @@ - ISC DHCP: dhcpd Denial of Service @@ -8,8 +7,8 @@ special conditions, leading to a Denial of Service. dhcp - August 18, 2009 - August 18, 2009: 01 + 2009-08-18 + 2009-08-18: 01 275231 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/dhcp-3.1.2_p1" + # emerge --ask --oneshot --verbose ">=net-misc/dhcp-3.1.2_p1" - CVE-2009-1892 + CVE-2009-1892 - + rbu - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-09.xml index efac18554a..a6bda4917f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-09.xml @@ -1,6 +1,5 @@ - DokuWiki: Local file inclusion @@ -8,8 +7,8 @@ files or even the remote execution of arbitrary code. dokuwiki - August 18, 2009 - August 19, 2009: 02 + 2009-08-18 + 2009-08-19: 02 272431 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-2009-02-14b" + # emerge --ask --oneshot --verbose ">=www-apps/dokuwiki-2009-02-14b" - CVE-2009-1960 + CVE-2009-1960 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-10.xml index c873822e2f..e320764442 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200908-10.xml @@ -1,6 +1,5 @@ - Dillo: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. dillo - August 18, 2009 - August 18, 2009: 01 + 2009-08-18 + 2009-08-18: 01 276432 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/dillo-2.1.1" + # emerge --ask --oneshot --verbose ">=www-client/dillo-2.1.1" - CVE-2009-2294 + CVE-2009-2294 - + rbu - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-01.xml index f806256507..a485acf3a6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-01.xml @@ -1,6 +1,5 @@ - Linux-PAM: Privilege escalation @@ -8,8 +7,8 @@ attackers to cause a Denial of Service or escalate privileges. pam - September 07, 2009 - September 07, 2009: 01 + 2009-09-07 + 2009-09-07: 01 261512 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-libs/pam-1.0.4" + # emerge --ask --oneshot --verbose ">=sys-libs/pam-1.0.4" - CVE-2009-0887 + CVE-2009-0887 - + craig - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-02.xml index b85a37b67a..a5a869ef9b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-02.xml @@ -1,6 +1,5 @@ - libvorbis: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ code or a Denial of Service. libvorbis - September 07, 2009 - September 07, 2009: 01 + 2009-09-07 + 2009-09-07: 01 280590 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libvorbis-1.2.3" + # emerge --ask --oneshot --verbose ">=media-libs/libvorbis-1.2.3" - CVE-2009-2663 + CVE-2009-2663 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-03.xml index bb3d37e9d2..ac569d016a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-03.xml @@ -1,6 +1,5 @@ - Apache Portable Runtime, APR Utility Library: Execution of arbitrary code @@ -8,8 +7,8 @@ Library might allow for the remote execution of arbitrary code. apr apr-util - September 09, 2009 - September 09, 2009: 01 + 2009-09-09 + 2009-09-09: 01 280514 remote @@ -58,24 +57,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/apr-1.3.8" + # emerge --ask --oneshot --verbose ">=dev-libs/apr-1.3.8"

All APR Utility Library users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/apr-util-1.3.9" + # emerge --ask --oneshot --verbose ">=dev-libs/apr-util-1.3.9" - CVE-2009-2412 + CVE-2009-2412 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-04.xml index 299013480f..81f990aabc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-04.xml @@ -1,6 +1,5 @@ - Clam AntiVirus: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code or Denial of Service. clamav - September 09, 2009 - September 09, 2009: 01 + 2009-09-09 + 2009-09-09: 01 264834 265545 remote @@ -67,21 +66,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.95.2" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.95.2" - CVE-2008-6680 - CVE-2009-1270 - CVE-2009-1371 - CVE-2009-1372 + CVE-2008-6680 + CVE-2009-1270 + CVE-2009-1371 + CVE-2009-1372 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-05.xml index 82c8bf2618..56062c2b33 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-05.xml @@ -1,6 +1,5 @@ - Openswan: Denial of Service @@ -8,8 +7,8 @@ remote attackers to cause a Denial of Service. openswan - September 09, 2009 - September 09, 2009: 01 + 2009-09-09 + 2009-09-09: 01 264346 275233 remote @@ -57,19 +56,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/openswan-2.4.15" + # emerge --ask --oneshot --verbose ">=net-misc/openswan-2.4.15" - CVE-2009-0790 - CVE-2009-2185 + CVE-2009-0790 + CVE-2009-2185 - + craig - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-06.xml index 9d85bdb48c..5e76876e4c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-06.xml @@ -1,6 +1,5 @@ - aMule: Parameter injection @@ -8,8 +7,8 @@ arbitrary parameters to a victim's media player. amule - September 09, 2009 - September 09, 2009: 01 + 2009-09-09 + 2009-09-09: 01 268163 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-p2p/amule-2.2.5" + # emerge --ask --oneshot --verbose ">=net-p2p/amule-2.2.5" - CVE-2009-1440 + CVE-2009-1440 - + rbu - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-07.xml index f45cfe1f87..db0ada08a3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-07.xml @@ -1,6 +1,5 @@ - TkMan: Insecure temporary file usage @@ -8,8 +7,8 @@ symlink attacks. tkman - September 09, 2009 - September 09, 2009: 01 + 2009-09-09 + 2009-09-09: 01 247540 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/tkman-2.2-r1" + # emerge --ask --oneshot --verbose ">=app-text/tkman-2.2-r1" - CVE-2008-5137 + CVE-2008-5137 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-08.xml index dc3f4a866e..295ac36525 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-08.xml @@ -1,6 +1,5 @@ - C* music player: Insecure temporary file usage @@ -8,8 +7,8 @@ allowing for symlink attacks. cmus - September 09, 2009 - September 09, 2009: 01 + 2009-09-09 + 2009-09-09: 01 250474 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-sound/cmus-2.2.0-r1" + # emerge --ask --oneshot --verbose ">=media-sound/cmus-2.2.0-r1" - CVE-2008-5375 + CVE-2008-5375 - + craig - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-09.xml index 74310cddd8..13b658e5b5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-09.xml @@ -1,6 +1,5 @@ - Screenie: Insecure temporary file usage @@ -8,8 +7,8 @@ for symlink attacks. screenie - September 09, 2009 - September 09, 2009: 01 + 2009-09-09 + 2009-09-09: 01 250476 local @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-misc/screenie-1.30.0-r1" + # emerge --ask --oneshot --verbose ">=app-misc/screenie-1.30.0-r1" - CVE-2008-5371 + CVE-2008-5371 - + craig - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-10.xml index 4d2ed89dc6..66b1b1ea03 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-10.xml @@ -1,6 +1,5 @@ - LMBench: Insecure temporary file usage @@ -8,8 +7,8 @@ LMBench, allowing for symlink attacks. lmbench - September 09, 2009 - September 09, 2009: 01 + 2009-09-09 + 2009-09-09: 01 246015 local @@ -49,15 +48,15 @@ # emerge --unmerge app-benchmarks/lmbench - CVE-2008-4968 + CVE-2008-4968 - + rbu - + a3li - + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-11.xml index a97f216b3d..deeae32221 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-11.xml @@ -1,6 +1,5 @@ - GCC-XML: Insecure temporary file usage @@ -8,8 +7,8 @@ symlink attacks. gccxml - September 09, 2009 - September 09, 2009: 01 + 2009-09-09 + 2009-09-09: 01 245765 local @@ -46,18 +45,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-cpp/gccxml-0.9.0_pre20090516" + # emerge --ask --oneshot --verbose ">=dev-cpp/gccxml-0.9.0_pre20090516" - CVE-2008-4957 + CVE-2008-4957 - + rbu - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-12.xml index c0cf495b95..58937d7c84 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-12.xml @@ -1,6 +1,5 @@ - HTMLDOC: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ the execution of arbitrary code. htmldoc - September 12, 2009 - September 12, 2009: 01 + 2009-09-12 + 2009-09-12: 01 278186 remote @@ -53,18 +52,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/htmldoc-1.8.27-r1" + # emerge --ask --oneshot --verbose ">=app-text/htmldoc-1.8.27-r1" - CVE-2009-3050 + CVE-2009-3050 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-13.xml index 453b739952..acbdc8ee3a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-13.xml @@ -1,6 +1,5 @@ - irssi: Execution of arbitrary code @@ -8,8 +7,8 @@ found in irssi which might result in the execution of arbitrary code. irssi - September 12, 2009 - September 12, 2009: 01 + 2009-09-12 + 2009-09-12: 01 271875 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/irssi-0.8.13-r1" + # emerge --ask --oneshot --verbose ">=net-irc/irssi-0.8.13-r1" - CVE-2009-1959 + CVE-2009-1959 - + a3li - + craig - + craig
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-14.xml index 6c79d9fc7b..7422ce6b88 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-14.xml @@ -1,6 +1,5 @@ - Horde: Multiple vulnerabilities @@ -9,8 +8,8 @@ Cross-Site Scripting. horde horde-imp horde-passwd - September 12, 2009 - September 12, 2009: 01 + 2009-09-12 + 2009-09-12: 01 256125 262976 262978 @@ -83,31 +82,31 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-3.3.4" + # emerge --ask --oneshot --verbose ">=www-apps/horde-3.3.4"

All Horde IMP users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-imp-4.3.4" + # emerge --ask --oneshot --verbose ">=www-apps/horde-imp-4.3.4"

All Horde Passwd users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-passwd-3.1.1" + # emerge --ask --oneshot --verbose ">=www-apps/horde-passwd-3.1.1" - CVE-2008-5917 - CVE-2009-0930 - CVE-2009-0931 - CVE-2009-0932 - CVE-2009-2360 + CVE-2008-5917 + CVE-2009-0930 + CVE-2009-0931 + CVE-2009-0932 + CVE-2009-2360 - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-15.xml index ec7ca16776..4198eaac5a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-15.xml @@ -1,6 +1,5 @@ - Lynx: Arbitrary command execution @@ -8,8 +7,8 @@ for the remote execution of arbitrary commands. lynx - September 12, 2009 - September 12, 2009: 01 + 2009-09-12 + 2009-09-12: 01 243058 remote @@ -51,20 +50,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/lynx-2.8.6-r4" + # emerge --ask --oneshot --verbose ">=www-client/lynx-2.8.6-r4" - CVE-2005-2929 - CVE-2008-4690 - GLSA 200511-09 + CVE-2005-2929 + CVE-2008-4690 + GLSA 200511-09 - + rbu - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-16.xml index c053270552..ceb3d25f0f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-16.xml @@ -1,6 +1,5 @@ - Wireshark: Denial of Service @@ -8,8 +7,8 @@ Denial of Service. wireshark - September 13, 2009 - September 13, 2009: 01 + 2009-09-13 + 2009-09-13: 01 278564 remote @@ -61,22 +60,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.2.1" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.2.1" - CVE-2009-2559 - CVE-2009-2560 - CVE-2009-2561 - CVE-2009-2562 - CVE-2009-2563 + CVE-2009-2559 + CVE-2009-2560 + CVE-2009-2561 + CVE-2009-2562 + CVE-2009-2563 - + keytoaster - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-17.xml index 97e06251d9..6ccb121957 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-17.xml @@ -1,6 +1,5 @@ - ZNC: Directory traversal @@ -8,8 +7,8 @@ arbitrary files. znc - September 13, 2009 - September 13, 2009: 01 + 2009-09-13 + 2009-09-13: 01 278684 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/znc-0.074" + # emerge --ask --oneshot --verbose ">=net-irc/znc-0.074" - CVE-2009-2658 + CVE-2009-2658 - + keytoaster - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-18.xml index bee7433a0b..5e227c42c6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-18.xml @@ -1,6 +1,5 @@ - nginx: Remote execution of arbitrary code @@ -9,8 +8,8 @@ of Service. nginx - September 18, 2009 - September 18, 2009: 01 + 2009-09-18 + 2009-09-18: 01 285162 remote @@ -53,30 +52,30 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/nginx-0.5.38" + # emerge --ask --oneshot --verbose ">=www-servers/nginx-0.5.38"

All nginx 0.6.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/nginx-0.6.39" + # emerge --ask --oneshot --verbose ">=www-servers/nginx-0.6.39"

All nginx 0.7.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/nginx-0.7.62" + # emerge --ask --oneshot --verbose ">=www-servers/nginx-0.7.62" - CVE-2009-2629 + CVE-2009-2629 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-19.xml index 0e8e82c9dd..d9f1d800a9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-19.xml @@ -1,6 +1,5 @@ - Dnsmasq: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code, or a Denial of Service. dnsmasq - September 20, 2009 - September 20, 2009: 01 + 2009-09-20 + 2009-09-20: 01 282653 remote @@ -61,16 +60,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.5.0" + # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.5.0" - CVE-2009-2957 - CVE-2009-2958 + CVE-2009-2957 + CVE-2009-2958 - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-20.xml index b3fedc8ccf..37e93dae07 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200909-20.xml @@ -1,6 +1,5 @@ - cURL: Certificate validation error @@ -8,8 +7,8 @@ attackers to conduct man-in-the-middle attacks. curl - September 25, 2009 - September 25, 2009: 01 + 2009-09-25 + 2009-09-25: 01 281515 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/curl-7.19.6" + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.19.6" - CVE-2009-2417 + CVE-2009-2417 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-01.xml index 4b2010afa8..135420ac35 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-01.xml @@ -1,6 +1,5 @@ - Wget: Certificate validation error @@ -8,8 +7,8 @@ attackers to conduct man-in-the-middle attacks. wget - October 20, 2009 - October 20, 2009: 01 + 2009-10-20 + 2009-10-20: 01 286058 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/wget-1.12" + # emerge --ask --oneshot --verbose ">=net-misc/wget-1.12" - CVE-2009-3490 + CVE-2009-3490 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-02.xml index d901ff1f45..88915d997b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-02.xml @@ -1,6 +1,5 @@ - Pidgin: Multiple vulnerabilities @@ -9,8 +8,8 @@ Denial of Service. pidgin - October 22, 2009 - October 22, 2009: 01 + 2009-10-22 + 2009-10-22: 01 276000 281545 283324 @@ -69,22 +68,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/pidgin-2.5.9-r1" + # emerge --ask --oneshot --verbose ">=net-im/pidgin-2.5.9-r1" - CVE-2009-1376 - CVE-2009-1889 - CVE-2009-2694 - CVE-2009-3026 - GLSA 200905-07 + CVE-2009-1376 + CVE-2009-1889 + CVE-2009-2694 + CVE-2009-3026 + GLSA 200905-07 - + a3li - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-03.xml index f3e319559c..f45671ba37 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200910-03.xml @@ -1,6 +1,5 @@ - Adobe Reader: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code, or other attacks. acroread - October 25, 2009 - October 25, 2009: 01 + 2009-10-25 + 2009-10-25: 01 289016 remote @@ -51,39 +50,39 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-9.2" + # emerge --ask --oneshot --verbose ">=app-text/acroread-9.2" - APSB09-15 - CVE-2007-0045 - CVE-2007-0048 - CVE-2009-2979 - CVE-2009-2980 - CVE-2009-2981 - CVE-2009-2982 - CVE-2009-2983 - CVE-2009-2985 - CVE-2009-2986 - CVE-2009-2988 - CVE-2009-2990 - CVE-2009-2991 - CVE-2009-2993 - CVE-2009-2994 - CVE-2009-2996 - CVE-2009-2997 - CVE-2009-2998 - CVE-2009-3431 - CVE-2009-3458 - CVE-2009-3459 - CVE-2009-3462 + APSB09-15 + CVE-2007-0045 + CVE-2007-0048 + CVE-2009-2979 + CVE-2009-2980 + CVE-2009-2981 + CVE-2009-2982 + CVE-2009-2983 + CVE-2009-2985 + CVE-2009-2986 + CVE-2009-2988 + CVE-2009-2990 + CVE-2009-2991 + CVE-2009-2993 + CVE-2009-2994 + CVE-2009-2996 + CVE-2009-2997 + CVE-2009-2998 + CVE-2009-3431 + CVE-2009-3458 + CVE-2009-3459 + CVE-2009-3462 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-01.xml index 5c5056b980..cf59ec92fe 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-01.xml @@ -1,6 +1,5 @@ - Horde: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary files to be overwritten and cross-site scripting attacks. horde horde-webmail horde-groupware - November 06, 2009 - November 06, 2009: 01 + 2009-11-06 + 2009-11-06: 01 285052 remote @@ -64,31 +63,31 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-3.3.5" + # emerge --ask --oneshot --verbose ">=www-apps/horde-3.3.5"

All Horde webmail users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-webmail-1.2.4" + # emerge --ask --oneshot --verbose ">=www-apps/horde-webmail-1.2.4"

All Horde groupware users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/horde-groupware-1.2.4" + # emerge --ask --oneshot --verbose ">=www-apps/horde-groupware-1.2.4" - CVE-2009-3236 - CVE-2009-3237 + CVE-2009-3236 + CVE-2009-3237 - + keytoaster - + chainsaw - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-02.xml index b48ddf25ec..fe5bebf16f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-02.xml @@ -1,6 +1,5 @@ - Sun JDK/JRE: Multiple vulnerabilities @@ -8,8 +7,8 @@ including the remote execution of arbitrary code. sun-jre-bin sun-jdk emul-linux-x86-java blackdown-jre blackdown-jdk - November 17, 2009 - November 17, 2009: 01 + 2009-11-17 + 2009-11-17: 01 182824 231337 250012 @@ -85,39 +84,39 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.22" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.5.0.22"

All Sun JRE 1.6.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.6.0.17" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.6.0.17"

All Sun JDK 1.5.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.22" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.5.0.22"

All Sun JDK 1.6.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.6.0.17" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.6.0.17"

All users of the precompiled 32bit Sun JRE 1.5.x should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.5.0.22" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.5.0.22"

All users of the precompiled 32bit Sun JRE 1.6.x should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.6.0.17" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.6.0.17"

All Sun JRE 1.4.x, Sun JDK 1.4.x, Blackdown JRE, Blackdown JDK and precompiled 32bit Sun JRE 1.4.x users are strongly advised to unmerge @@ -136,103 +135,103 @@

- CVE-2008-2086 - CVE-2008-3103 - CVE-2008-3104 - CVE-2008-3105 - CVE-2008-3106 - CVE-2008-3107 - CVE-2008-3108 - CVE-2008-3109 - CVE-2008-3110 - CVE-2008-3111 - CVE-2008-3112 - CVE-2008-3113 - CVE-2008-3114 - CVE-2008-3115 - CVE-2008-5339 - CVE-2008-5340 - CVE-2008-5341 - CVE-2008-5342 - CVE-2008-5343 - CVE-2008-5344 - CVE-2008-5345 - CVE-2008-5346 - CVE-2008-5347 - CVE-2008-5348 - CVE-2008-5349 - CVE-2008-5350 - CVE-2008-5351 - CVE-2008-5352 - CVE-2008-5353 - CVE-2008-5354 - CVE-2008-5355 - CVE-2008-5356 - CVE-2008-5357 - CVE-2008-5358 - CVE-2008-5359 - CVE-2008-5360 - CVE-2009-1093 - CVE-2009-1094 - CVE-2009-1095 - CVE-2009-1096 - CVE-2009-1097 - CVE-2009-1098 - CVE-2009-1099 - CVE-2009-1100 - CVE-2009-1101 - CVE-2009-1102 - CVE-2009-1103 - CVE-2009-1104 - CVE-2009-1105 - CVE-2009-1106 - CVE-2009-1107 - CVE-2009-2409 - CVE-2009-2475 - CVE-2009-2476 - CVE-2009-2670 - CVE-2009-2671 - CVE-2009-2672 - CVE-2009-2673 - CVE-2009-2674 - CVE-2009-2675 - CVE-2009-2676 - CVE-2009-2689 - CVE-2009-2690 - CVE-2009-2716 - CVE-2009-2718 - CVE-2009-2719 - CVE-2009-2720 - CVE-2009-2721 - CVE-2009-2722 - CVE-2009-2723 - CVE-2009-2724 - CVE-2009-3728 - CVE-2009-3729 - CVE-2009-3865 - CVE-2009-3866 - CVE-2009-3867 - CVE-2009-3868 - CVE-2009-3869 - CVE-2009-3871 - CVE-2009-3872 - CVE-2009-3873 - CVE-2009-3874 - CVE-2009-3875 - CVE-2009-3876 - CVE-2009-3877 - CVE-2009-3879 - CVE-2009-3880 - CVE-2009-3881 - CVE-2009-3882 - CVE-2009-3883 - CVE-2009-3884 - CVE-2009-3886 + CVE-2008-2086 + CVE-2008-3103 + CVE-2008-3104 + CVE-2008-3105 + CVE-2008-3106 + CVE-2008-3107 + CVE-2008-3108 + CVE-2008-3109 + CVE-2008-3110 + CVE-2008-3111 + CVE-2008-3112 + CVE-2008-3113 + CVE-2008-3114 + CVE-2008-3115 + CVE-2008-5339 + CVE-2008-5340 + CVE-2008-5341 + CVE-2008-5342 + CVE-2008-5343 + CVE-2008-5344 + CVE-2008-5345 + CVE-2008-5346 + CVE-2008-5347 + CVE-2008-5348 + CVE-2008-5349 + CVE-2008-5350 + CVE-2008-5351 + CVE-2008-5352 + CVE-2008-5353 + CVE-2008-5354 + CVE-2008-5355 + CVE-2008-5356 + CVE-2008-5357 + CVE-2008-5358 + CVE-2008-5359 + CVE-2008-5360 + CVE-2009-1093 + CVE-2009-1094 + CVE-2009-1095 + CVE-2009-1096 + CVE-2009-1097 + CVE-2009-1098 + CVE-2009-1099 + CVE-2009-1100 + CVE-2009-1101 + CVE-2009-1102 + CVE-2009-1103 + CVE-2009-1104 + CVE-2009-1105 + CVE-2009-1106 + CVE-2009-1107 + CVE-2009-2409 + CVE-2009-2475 + CVE-2009-2476 + CVE-2009-2670 + CVE-2009-2671 + CVE-2009-2672 + CVE-2009-2673 + CVE-2009-2674 + CVE-2009-2675 + CVE-2009-2676 + CVE-2009-2689 + CVE-2009-2690 + CVE-2009-2716 + CVE-2009-2718 + CVE-2009-2719 + CVE-2009-2720 + CVE-2009-2721 + CVE-2009-2722 + CVE-2009-2723 + CVE-2009-2724 + CVE-2009-3728 + CVE-2009-3729 + CVE-2009-3865 + CVE-2009-3866 + CVE-2009-3867 + CVE-2009-3868 + CVE-2009-3869 + CVE-2009-3871 + CVE-2009-3872 + CVE-2009-3873 + CVE-2009-3874 + CVE-2009-3875 + CVE-2009-3876 + CVE-2009-3877 + CVE-2009-3879 + CVE-2009-3880 + CVE-2009-3881 + CVE-2009-3882 + CVE-2009-3883 + CVE-2009-3884 + CVE-2009-3886 - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-03.xml index 01a296a2cd..6c58f72d1c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-03.xml @@ -1,6 +1,5 @@ - UW IMAP toolkit: Multiple vulnerabilities @@ -9,8 +8,8 @@ code. c-client uw-imap - November 25, 2009 - November 25, 2009: 01 + 2009-11-25 + 2009-11-25: 01 245425 252567 remote @@ -72,26 +71,26 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/c-client-2007e" + # emerge --ask --oneshot --verbose ">=net-libs/c-client-2007e"

All UW IMAP toolkit users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/uw-imap-2007e" + # emerge --ask --oneshot --verbose ">=net-mail/uw-imap-2007e" - CVE-2008-5005 - CVE-2008-5006 - CVE-2008-5514 + CVE-2008-5005 + CVE-2008-5006 + CVE-2008-5514 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-04.xml index eb30656fe7..755703dfb8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-04.xml @@ -1,6 +1,5 @@ - dstat: Untrusted search path @@ -8,8 +7,8 @@ execution of arbitrary code. dstat - November 25, 2009 - November 25, 2009: 01 + 2009-11-25 + 2009-11-25: 01 293497 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/dstat-0.6.9-r1" + # emerge --ask --oneshot --verbose ">=sys-apps/dstat-0.6.9-r1" - CVE-2009-3894 + CVE-2009-3894 - + rbu - + rbu - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-05.xml index c552866f23..d20a8ebc28 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-05.xml @@ -1,6 +1,5 @@ - Wireshark: Multiple vulnerabilities @@ -8,8 +7,8 @@ the remote execution of arbitrary code, or Denial of Service. wireshark - November 25, 2009 - November 25, 2009: 01 + 2009-11-25 + 2009-11-25: 01 285280 290710 remote @@ -62,25 +61,25 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.2.3" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.2.3" - CVE-2009-2560 - CVE-2009-3241 - CVE-2009-3242 - CVE-2009-3243 - CVE-2009-3549 - CVE-2009-3550 - CVE-2009-3551 - CVE-2009-3829 + CVE-2009-2560 + CVE-2009-3241 + CVE-2009-3242 + CVE-2009-3243 + CVE-2009-3549 + CVE-2009-3550 + CVE-2009-3551 + CVE-2009-3829 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-06.xml index 30adba6d3b..5747d858f6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200911-06.xml @@ -1,6 +1,5 @@ - PEAR Net_Traceroute: Command injection @@ -8,8 +7,8 @@ attackers to execute arbitrary commands. PEAR-Net_Traceroute - November 26, 2009 - November 26, 2009: 01 + 2009-11-26 + 2009-11-26: 01 294264 remote @@ -52,18 +51,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/PEAR-Net_Traceroute-0.21.2" + # emerge --ask --oneshot --verbose ">=dev-php/PEAR-Net_Traceroute-0.21.2" - CVE-2009-4025 + CVE-2009-4025 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200912-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200912-01.xml index 8dc3dff843..16885de4fc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200912-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200912-01.xml @@ -1,6 +1,5 @@ - OpenSSL: Multiple vulnerabilities @@ -9,8 +8,8 @@ byte streams. openssl - December 01, 2009 - December 02, 2009: 02 + 2009-12-01 + 2009-12-02: 02 270305 280591 292022 @@ -73,23 +72,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8l-r2" + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-0.9.8l-r2" - CVE-2009-1377 - CVE-2009-1378 - CVE-2009-1379 - CVE-2009-1387 - CVE-2009-2409 - CVE-2009-3555 + CVE-2009-1377 + CVE-2009-1378 + CVE-2009-1379 + CVE-2009-1387 + CVE-2009-2409 + CVE-2009-3555 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200912-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200912-02.xml index 6dcaa2500b..32b403671d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200912-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200912-02.xml @@ -1,6 +1,5 @@ - Ruby on Rails: Multiple vulnerabilities @@ -8,8 +7,8 @@ leading to the execution of arbitrary SQL statements. rails - December 20, 2009 - December 20, 2009: 01 + 2009-12-20 + 2009-12-20: 01 200159 237385 247549 @@ -80,13 +79,13 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-ruby/rails-2.3.5" + # emerge --ask --oneshot --verbose ">=dev-ruby/rails-2.3.5"

All Ruby on Rails 2.2.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose "=dev-ruby/rails-2.2.3-r1" + # emerge --ask --oneshot --verbose "=dev-ruby/rails-2.2.3-r1"

NOTE: All applications using Ruby on Rails should also be configured to use the latest version available by running "rake rails:update" inside @@ -94,23 +93,23 @@

- CVE-2007-5380 - CVE-2007-6077 - CVE-2008-4094 - CVE-2008-7248 - CVE-2009-2422 - CVE-2009-3009 - CVE-2009-3086 - CVE-2009-4214 - GLSA 200711-17 + CVE-2007-5380 + CVE-2007-6077 + CVE-2008-4094 + CVE-2008-7248 + CVE-2009-2422 + CVE-2009-3009 + CVE-2009-3086 + CVE-2009-4214 + GLSA 200711-17 - + keytoaster - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-01.xml index 4e4e73dd19..aac74f1a69 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-01.xml @@ -1,6 +1,5 @@ - NTP: Denial of Service @@ -8,8 +7,8 @@ consumption. ntp - January 03, 2010 - January 03, 2010: 01 + 2010-01-03 + 2010-01-03: 01 290881 remote @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.4_p7-r1" + # emerge --ask --oneshot --verbose ">=net-misc/ntp-4.2.4_p7-r1" - CVE-2009-3563 + CVE-2009-3563 - + craig - + craig - + craig
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-02.xml index cae51109c1..0b08c9d7f6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-02.xml @@ -1,6 +1,5 @@ - Adobe Flash Player: Multiple vulnerabilities @@ -8,8 +7,8 @@ to execute arbitrary code or cause a Denial of Service. adobe-flash - January 03, 2010 - January 03, 2010: 01 + 2010-01-03 + 2010-01-03: 01 296407 remote @@ -61,23 +60,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-10.0.42.34" + # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-10.0.42.34" - CVE-2009-3794 - CVE-2009-3796 - CVE-2009-3797 - CVE-2009-3798 - CVE-2009-3799 - CVE-2009-3800 + CVE-2009-3794 + CVE-2009-3796 + CVE-2009-3797 + CVE-2009-3798 + CVE-2009-3799 + CVE-2009-3800 - + craig - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-03.xml index 87637c014f..0a759b254d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-03.xml @@ -1,6 +1,5 @@ - PHP: Multiple vulnerabilities @@ -8,8 +7,8 @@ the remote execution of arbitrary code. php - January 05, 2010 - January 05, 2010: 01 + 2010-01-05 + 2010-01-05: 01 249875 255121 260576 @@ -78,39 +77,39 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-libs/c-client-2007e" - # emerge --ask --oneshot --verbose ">=dev-lang/php-5.2.12" + # emerge --ask --oneshot --verbose ">=net-libs/c-client-2007e" + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.2.12" - CVE-2008-5498 - CVE-2008-5514 - CVE-2008-5557 - CVE-2008-5624 - CVE-2008-5625 - CVE-2008-5658 - CVE-2008-5814 - CVE-2008-5844 - CVE-2008-7002 - CVE-2009-0754 - CVE-2009-1271 - CVE-2009-1272 - CVE-2009-2626 - CVE-2009-2687 - CVE-2009-3291 - CVE-2009-3292 - CVE-2009-3293 - CVE-2009-3546 - CVE-2009-3557 - CVE-2009-3558 - CVE-2009-4017 - CVE-2009-4142 - CVE-2009-4143 - GLSA 200911-03 + CVE-2008-5498 + CVE-2008-5514 + CVE-2008-5557 + CVE-2008-5624 + CVE-2008-5625 + CVE-2008-5658 + CVE-2008-5814 + CVE-2008-5844 + CVE-2008-7002 + CVE-2009-0754 + CVE-2009-1271 + CVE-2009-1272 + CVE-2009-2626 + CVE-2009-2687 + CVE-2009-3291 + CVE-2009-3292 + CVE-2009-3293 + CVE-2009-3546 + CVE-2009-3557 + CVE-2009-3558 + CVE-2009-4017 + CVE-2009-4142 + CVE-2009-4143 + GLSA 200911-03 - + keytoaster - + rbu
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-04.xml index 58a3ffc71b..a4490786e2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-04.xml @@ -1,6 +1,5 @@ - VirtualBox: Multiple vulnerabilities @@ -8,8 +7,8 @@ allowing for privilege escalation. virtualbox-bin virtualbox-ose virtualbox-guest-additions virtualbox-ose-additions - January 13, 2010 - January 13, 2010: 01 + 2010-01-13 + 2010-01-13: 01 288836 294678 local @@ -66,40 +65,40 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-bin-3.0.12" + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-bin-3.0.12"

All users of the Open Source version of VirtualBox should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-ose-3.0.12" + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-ose-3.0.12"

All users of the binary VirtualBox Guest Additions should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-guest-additions-3.0.12" + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-guest-additions-3.0.12"

All users of the Open Source VirtualBox Guest Additions should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-ose-additions-3.0.12" + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-ose-additions-3.0.12" - CVE-2009-3692 - CVE-2009-3940 + CVE-2009-3692 + CVE-2009-3940 - + craig - + craig - + craig
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-05.xml index 8fc1176660..df877e365e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-05.xml @@ -1,6 +1,5 @@ - net-snmp: Authorization bypass @@ -8,8 +7,8 @@ net-snmp. net-snmp - January 13, 2010 - January 13, 2010: 01 + 2010-01-13 + 2010-01-13: 01 250429 remote @@ -50,18 +49,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.2.1-r1" + # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.4.2.1-r1" - CVE-2008-6123 + CVE-2008-6123 - + craig - + craig - + craig
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-06.xml index b651e3b086..4d4bfaf3fe 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-06.xml @@ -1,6 +1,5 @@ - aria2: Multiple vulnerabilities @@ -8,8 +7,8 @@ attackers to execute arbitrary code. aria2 - January 13, 2010 - January 13, 2010: 01 + 2010-01-13 + 2010-01-13: 01 288291 remote @@ -50,19 +49,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/aria2-1.6.3" + # emerge --ask --oneshot --verbose ">=net-misc/aria2-1.6.3" - CVE-2009-3575 - CVE-2009-3617 + CVE-2009-3575 + CVE-2009-3617 - + keytoaster - + craig - + craig
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-07.xml index 5d5daba25c..0ebad3a6d4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-07.xml @@ -1,6 +1,5 @@ - Blender: Untrusted search path @@ -8,8 +7,8 @@ execution of arbitrary code. blender - January 13, 2010 - January 13, 2010: 01 + 2010-01-13 + 2010-01-13: 01 245310 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/blender-2.48a-r3" + # emerge --ask --oneshot --verbose ">=media-gfx/blender-2.48a-r3" - CVE-2008-4863 + CVE-2008-4863 - + keytoaster - + craig - + craig
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-08.xml index cd9f876840..efaae0d5f9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-08.xml @@ -1,6 +1,5 @@ - SquirrelMail: Multiple vulnerabilities @@ -8,8 +7,8 @@ results in remote code execution. squirrelmail - January 13, 2010 - January 13, 2010: 01 + 2010-01-13 + 2010-01-13: 01 269567 270671 remote @@ -67,19 +66,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.19" + # emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.19" - CVE-2009-1381 - CVE-2009-1578 - CVE-2009-1579 - CVE-2009-1580 - CVE-2009-1581 + CVE-2009-1381 + CVE-2009-1578 + CVE-2009-1579 + CVE-2009-1580 + CVE-2009-1581 - + craig - + craig
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-09.xml index 1eeb4f5a5f..8d834f0a88 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201001-09.xml @@ -1,6 +1,5 @@ - Ruby: Terminal Control Character Injection @@ -9,8 +8,8 @@ sessions. ruby - January 14, 2010 - January 14, 2010: 01 + 2010-01-14 + 2010-01-14: 01 300468 remote @@ -54,24 +53,24 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.7_p249" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.7_p249"

All Ruby 1.8.6 users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.6_p388" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-1.8.6_p388" - CVE-2009-4492 + CVE-2009-4492 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201003-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201003-01.xml index 7adcbc04d6..8d0c77a439 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201003-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201003-01.xml @@ -1,6 +1,5 @@ - sudo: Privilege escalation @@ -8,8 +7,8 @@ and execute arbitrary code with root privileges. sudo - March 03, 2010 - March 03, 2010: 01 + 2010-03-03 + 2010-03-03: 01 306865 local @@ -58,19 +57,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.2_p4" + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.2_p4" - CVE-2010-0426 - CVE-2010-0427 + CVE-2010-0426 + CVE-2010-0427 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-01.xml index e3adae71c7..7a5e5eff11 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-01.xml @@ -1,6 +1,5 @@ - FreeType 1: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary code. freetype - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 271234 remote @@ -48,7 +47,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/freetype-1.4_pre20080316-r2" + # emerge --ask --oneshot --verbose ">=media-libs/freetype-1.4_pre20080316-r2"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since May 27, 2009. It is likely that your system is already @@ -56,18 +55,18 @@

- CVE-2006-1861 - CVE-2007-2754 - GLSA 200607-02 - GLSA 200705-22 + CVE-2006-1861 + CVE-2007-2754 + GLSA 200607-02 + GLSA 200705-22 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-02.xml index a1be29c6a9..b05fcf56ee 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-02.xml @@ -1,6 +1,5 @@ - CamlImages: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ execution of arbitrary code. camlimages - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 276235 290222 remote @@ -58,17 +57,17 @@ # emerge --ask --oneshot --verbose =dev-ml/camlimages-3.0.2 - CVE-2009-2295 - CVE-2009-2660 - CVE-2009-3296 + CVE-2009-2295 + CVE-2009-2660 + CVE-2009-3296 - + rbu - + a3li - + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-03.xml index 448eba7a3a..30e2a64697 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-03.xml @@ -1,6 +1,5 @@ - ImageMagick: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ the remote execution of arbitrary code. imagemagick - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 271502 remote @@ -50,7 +49,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.5.2.9" + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.5.2.9"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since June 4, 2009. It is likely that your system is already @@ -58,15 +57,15 @@

- CVE-2009-1882 + CVE-2009-1882 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-04.xml index 0243c50a99..5b248e6d42 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-04.xml @@ -1,6 +1,5 @@ - xine-lib: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ of arbitrary code. xine-lib - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 234777 249041 260069 @@ -52,7 +51,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.16.3" + # emerge --ask --oneshot --verbose ">=media-libs/xine-lib-1.1.16.3"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since April 10, 2009. It is likely that your system is @@ -60,33 +59,33 @@

- CVE-2008-3231 - CVE-2008-5233 - CVE-2008-5234 - CVE-2008-5235 - CVE-2008-5236 - CVE-2008-5237 - CVE-2008-5238 - CVE-2008-5239 - CVE-2008-5240 - CVE-2008-5241 - CVE-2008-5242 - CVE-2008-5243 - CVE-2008-5244 - CVE-2008-5245 - CVE-2008-5246 - CVE-2008-5247 - CVE-2008-5248 - CVE-2009-0698 - CVE-2009-1274 + CVE-2008-3231 + CVE-2008-5233 + CVE-2008-5234 + CVE-2008-5235 + CVE-2008-5236 + CVE-2008-5237 + CVE-2008-5238 + CVE-2008-5239 + CVE-2008-5240 + CVE-2008-5241 + CVE-2008-5242 + CVE-2008-5243 + CVE-2008-5244 + CVE-2008-5245 + CVE-2008-5246 + CVE-2008-5247 + CVE-2008-5248 + CVE-2009-0698 + CVE-2009-1274 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-05.xml index af092cd92d..cfad60d30b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-05.xml @@ -1,14 +1,13 @@ - Wireshark: Multiple vulnerabilities Multiple vulnerabilities were found in Wireshark. wireshark - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 297388 318935 remote @@ -47,21 +46,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.2.8-r1" + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-1.2.8-r1" - CVE-2009-4376 - CVE-2009-4377 - CVE-2009-4378 - CVE-2010-1455 + CVE-2009-4376 + CVE-2009-4377 + CVE-2009-4378 + CVE-2010-1455 - + a3li - + keytoaster - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-06.xml index a4346d69f0..31bbccc051 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-06.xml @@ -1,6 +1,5 @@ - Transmission: Multiple vulnerabilities @@ -8,8 +7,8 @@ of arbitrary code. transmission - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 309831 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-p2p/transmission-1.92" + # emerge --ask --oneshot --verbose ">=net-p2p/transmission-1.92" - CVE-2010-1853 + CVE-2010-1853 - + craig - + keytoaster - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-07.xml index 945f28e7d0..27a9070e8c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-07.xml @@ -1,6 +1,5 @@ - SILC: Multiple vulnerabilities @@ -8,8 +7,8 @@ the worst of which allowing for execution of arbitrary code. silc-toolkit silc-client - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 284561 remote @@ -54,27 +53,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/silc-toolkit-1.1.10" + # emerge --ask --oneshot --verbose ">=net-im/silc-toolkit-1.1.10"

All SILC Client users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-im/silc-client-1.1.8" + # emerge --ask --oneshot --verbose ">=net-im/silc-client-1.1.8" - CVE-2008-7159 - CVE-2008-7160 - CVE-2009-3051 - CVE-2009-3163 + CVE-2008-7159 + CVE-2008-7160 + CVE-2009-3051 + CVE-2009-3163 - + craig - + keytoaster - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-08.xml index 9e24b75333..b4d7ac6a97 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-08.xml @@ -1,6 +1,5 @@ - nano: Multiple vulnerabilities @@ -8,8 +7,8 @@ of ownerships of important files. nano - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 315355 local @@ -49,19 +48,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/nano-2.2.4" + # emerge --ask --oneshot --verbose ">=app-editors/nano-2.2.4" - CVE-2010-1160 - CVE-2010-1161 + CVE-2010-1160 + CVE-2010-1161 - + chiiph - + keytoaster - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-09.xml index 3283b97352..c06e4c49e0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-09.xml @@ -1,6 +1,5 @@ - sudo: Privilege escalation @@ -8,8 +7,8 @@ commands. sudo - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 321697 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.2_p6" + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.2_p6" - CVE-2010-1163 + CVE-2010-1163 - + keytoaster - + keytoaster - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-10.xml index a27f03006d..cd7d7bc8d5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-10.xml @@ -1,6 +1,5 @@ - multipath-tools: World-writeable socket @@ -9,8 +8,8 @@ users. multipath-tools - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 264564 local @@ -48,7 +47,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-fs/multipath-tools-0.4.8-r1" + # emerge --ask --oneshot --verbose ">=sys-fs/multipath-tools-0.4.8-r1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since November 13, 2009. It is likely that your system is @@ -56,15 +55,15 @@

- CVE-2009-0115 + CVE-2009-0115 - + craig - + craig - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-11.xml index c4cb1c012d..4bcd1d25c4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-11.xml @@ -1,14 +1,13 @@ - BIND: Multiple vulnerabilities Several cache poisoning vulnerabilities have been found in BIND. BIND - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 301548 308035 remote @@ -53,22 +52,22 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.3_p5" + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.4.3_p5" ISC Advisory - CVE-2009-4022 - CVE-2010-0097 - CVE-2010-0290 - CVE-2010-0382 + CVE-2009-4022 + CVE-2010-0097 + CVE-2010-0290 + CVE-2010-0382 - + craig - + craig - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-12.xml index 4bf64b000a..134468dc11 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-12.xml @@ -1,6 +1,5 @@ - Fetchmail: Multiple vulnerabilities @@ -9,8 +8,8 @@ attacks. fetchmail - June 01, 2010 - June 01, 2010: 01 + 2010-06-01 + 2010-06-01: 01 280537 307761 remote @@ -67,19 +66,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.3.14" + # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.3.14" - CVE-2010-0562 - CVE-2009-2666 + CVE-2010-0562 + CVE-2009-2666 - + craig - + craig - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-13.xml index 3f55113053..4bbc8de86e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-13.xml @@ -1,6 +1,5 @@ - Smarty: Multiple vulnerabilities @@ -8,8 +7,8 @@ attackers to execute arbitrary PHP code. smarty - June 02, 2010 - June 02, 2010: 01 + 2010-06-02 + 2010-06-02: 01 212147 243856 270494 @@ -59,7 +58,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-php/smarty-2.6.23" + # emerge --ask --oneshot --verbose ">=dev-php/smarty-2.6.23"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since June 2, 2009. It is likely that your system is already @@ -67,18 +66,18 @@

- CVE-2008-1066 - CVE-2008-4810 - CVE-2008-4811 - CVE-2009-1669 + CVE-2008-1066 + CVE-2008-4810 + CVE-2008-4811 + CVE-2009-1669 - + p-y - + p-y - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-14.xml index ab654ffa2e..dce23ffd5c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-14.xml @@ -1,6 +1,5 @@ - Newt: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ user-assisted attackers to execute arbitrary code. newt - June 02, 2010 - June 02, 2010: 01 + 2010-06-02 + 2010-06-02: 01 285854 remote @@ -48,7 +47,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/newt-0.52.10-r1" + # emerge --ask --oneshot --verbose ">=dev-libs/newt-0.52.10-r1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since October 26, 2009. It is likely that your system is @@ -56,15 +55,15 @@

- CVE-2009-2905 + CVE-2009-2905 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-15.xml index fdce6a2837..db8037000c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-15.xml @@ -1,6 +1,5 @@ - XEmacs: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ user-assisted attackers to execute arbitrary code. xemacs - June 03, 2010 - June 03, 2010: 01 + 2010-06-03 + 2010-06-03: 01 275397 remote @@ -50,7 +49,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-editors/xemacs-21.4.22-r1" + # emerge --ask --oneshot --verbose ">=app-editors/xemacs-21.4.22-r1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since July 26, 2009. It is likely that your system is already @@ -58,15 +57,15 @@

- CVE-2009-2688 + CVE-2009-2688 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-16.xml index 5ec1e91b10..b0677a7150 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-16.xml @@ -1,14 +1,13 @@ - GD: User-assisted execution of arbitrary code The GD library is prone to a buffer overflow vulnerability. gd - June 03, 2010 - June 03, 2010: 01 + 2010-06-03 + 2010-06-03: 01 292130 remote @@ -48,7 +47,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/gd-2.0.35-r1" + # emerge --ask --oneshot --verbose ">=media-libs/gd-2.0.35-r1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since November 21, 2009. It is likely that your system is @@ -56,15 +55,15 @@

- CVE-2009-3546 + CVE-2009-3546 - + craig - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-17.xml index f464c01c73..e00998bc1e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-17.xml @@ -1,6 +1,5 @@ - lighttpd: Denial of Service @@ -8,8 +7,8 @@ condition. lighttpd - June 03, 2010 - June 03, 2010: 01 + 2010-06-03 + 2010-06-03: 01 303213 remote @@ -47,18 +46,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.25-r1" + # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.25-r1" - CVE-2010-0295 + CVE-2010-0295 - + keytoaster - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-18.xml index 3327e4b5b9..fdb08da5d7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-18.xml @@ -1,6 +1,5 @@ - Oracle JRE/JDK: Multiple vulnerabilities @@ -8,8 +7,8 @@ vulnerabilities. sun-jre-bin sun-jdk emul-linux-x86-java - June 04, 2010 - June 04, 2010: 01 + 2010-06-04 + 2010-06-04: 01 306579 314531 remote @@ -59,20 +58,20 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.6.0.20" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jre-bin-1.6.0.20"

All Oracle JDK 1.6.x users should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.6.0.20" + # emerge --ask --oneshot --verbose ">=dev-java/sun-jdk-1.6.0.20"

All users of the precompiled 32bit Oracle JRE 1.6.x should upgrade to the latest version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.6.0.20" + # emerge --ask --oneshot --verbose ">=app-emulation/emul-linux-x86-java-1.6.0.20"

All Oracle JRE 1.5.x, Oracle JDK 1.5.x, and precompiled 32bit Oracle JRE 1.5.x users are strongly advised to unmerge Java 1.5: @@ -97,45 +96,45 @@

- CVE-2009-3555 - CVE-2010-0082 - CVE-2010-0084 - CVE-2010-0085 - CVE-2010-0087 - CVE-2010-0088 - CVE-2010-0089 - CVE-2010-0090 - CVE-2010-0091 - CVE-2010-0092 - CVE-2010-0093 - CVE-2010-0094 - CVE-2010-0095 - CVE-2010-0837 - CVE-2010-0838 - CVE-2010-0839 - CVE-2010-0840 - CVE-2010-0841 - CVE-2010-0842 - CVE-2010-0843 - CVE-2010-0844 - CVE-2010-0845 - CVE-2010-0846 - CVE-2010-0847 - CVE-2010-0848 - CVE-2010-0849 - CVE-2010-0850 - CVE-2010-0886 - CVE-2010-0887 + CVE-2009-3555 + CVE-2010-0082 + CVE-2010-0084 + CVE-2010-0085 + CVE-2010-0087 + CVE-2010-0088 + CVE-2010-0089 + CVE-2010-0090 + CVE-2010-0091 + CVE-2010-0092 + CVE-2010-0093 + CVE-2010-0094 + CVE-2010-0095 + CVE-2010-0837 + CVE-2010-0838 + CVE-2010-0839 + CVE-2010-0840 + CVE-2010-0841 + CVE-2010-0842 + CVE-2010-0843 + CVE-2010-0844 + CVE-2010-0845 + CVE-2010-0846 + CVE-2010-0847 + CVE-2010-0848 + CVE-2010-0849 + CVE-2010-0850 + CVE-2010-0886 + CVE-2010-0887 Gentoo Linux Java documentation - Oracle Java SE and Java for Business Critical Patch Update Advisory - March 2010 + Oracle Java SE and Java for Business Critical Patch Update Advisory - March 2010 - + a3li - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-19.xml index 6ed0b0414a..06b7016859 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-19.xml @@ -1,14 +1,13 @@ - Bugzilla: Multiple vulnerabilities Bugzilla is prone to multiple medium severity vulnerabilities. bugzilla - June 04, 2010 - June 04, 2010: 02 + 2010-06-04 + 2010-06-04: 02 239564 258592 264572 @@ -53,7 +52,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-apps/bugzilla-3.2.6" + # emerge --ask --oneshot --verbose ">=www-apps/bugzilla-3.2.6"

Bugzilla 2.x and 3.0 have reached their end of life. There will be no more security updates. All Bugzilla 2.x and 3.0 users should update to @@ -61,25 +60,25 @@

- CVE-2008-4437 - CVE-2008-6098 - CVE-2009-0481 - CVE-2009-0482 - CVE-2009-0483 - CVE-2009-0484 - CVE-2009-0485 - CVE-2009-0486 - CVE-2009-1213 - CVE-2009-3125 - CVE-2009-3165 - CVE-2009-3166 - CVE-2009-3387 - CVE-2009-3989 + CVE-2008-4437 + CVE-2008-6098 + CVE-2009-0481 + CVE-2009-0482 + CVE-2009-0483 + CVE-2009-0484 + CVE-2009-0485 + CVE-2009-0486 + CVE-2009-1213 + CVE-2009-3125 + CVE-2009-3165 + CVE-2009-3166 + CVE-2009-3387 + CVE-2009-3989 - + a3li - + jaervosz
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-20.xml index a236214301..14cb1e891c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-20.xml @@ -1,6 +1,5 @@ - Asterisk: Multiple vulnerabilities @@ -8,8 +7,8 @@ a Denial of Service condition, or conduct other attacks. asterisk - June 04, 2010 - June 04, 2010: 01 + 2010-06-04 + 2010-06-04: 01 281107 283624 284892 @@ -62,7 +61,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.37" + # emerge --ask --oneshot --verbose ">=net-misc/asterisk-1.2.37"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since January 5, 2010. It is likely that your system is @@ -70,19 +69,19 @@

- CVE-2009-2726 - CVE-2009-2346 - CVE-2009-4055 - CVE-2009-3727 - CVE-2008-7220 + CVE-2009-2726 + CVE-2009-2346 + CVE-2009-4055 + CVE-2009-3727 + CVE-2008-7220 - + craig - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-21.xml index 31cdc1d585..3bb499adb6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-21.xml @@ -1,6 +1,5 @@ - UnrealIRCd: Multiple vulnerabilities @@ -8,8 +7,8 @@ compromise the "unrealircd" account, or cause a Denial of Service. unrealircd - June 14, 2010 - June 14, 2010: 02 + 2010-06-14 + 2010-06-14: 02 260806 323691 remote @@ -56,21 +55,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-irc/unrealircd-3.2.8.1-r1" + # emerge --ask --oneshot --verbose ">=net-irc/unrealircd-3.2.8.1-r1" UnrealIRCd Security Advisory 20090413 UnrealIRCd Security Advisory 20100612 - CVE-2009-4893 - CVE-2010-2075 + CVE-2009-4893 + CVE-2010-2075 - + a3li - + a3li - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-01.xml index 65263aac98..89a28ea8c8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-01.xml @@ -1,6 +1,5 @@ - wxGTK: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ cause the execution of arbitrary code. wxGTK - September 02, 2010 - September 02, 2010: 01 + 2010-09-02 + 2010-09-02: 01 277722 remote @@ -51,13 +50,13 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/wxGTK-2.6.4.0-r5" + # emerge --ask --oneshot --verbose ">=x11-libs/wxGTK-2.6.4.0-r5"

All wxGTK 2.8 users should upgrade to an updated version:

# emerge --sync - # emerge --ask --oneshot --verbose ">=x11-libs/wxGTK-2.8.10.1-r1" + # emerge --ask --oneshot --verbose ">=x11-libs/wxGTK-2.8.10.1-r1"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since August 9, 2009. It is likely that your system is @@ -65,15 +64,15 @@

- CVE-2009-2369 + CVE-2009-2369 - + craig - + a3li - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-02.xml index ef10078611..b5180aa050 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-02.xml @@ -1,6 +1,5 @@ - Maildrop: privilege escalation @@ -8,8 +7,8 @@ elevate their privileges. maildrop - September 06, 2010 - September 06, 2010: 01 + 2010-09-06 + 2010-09-06: 01 308043 local @@ -49,18 +48,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=mail-filter/maildrop-2.4.2" + # emerge --ask --oneshot --verbose ">=mail-filter/maildrop-2.4.2" - CVE-2010-0301 + CVE-2010-0301 - + a3li - + p-y - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-03.xml index f5072945ca..3c8ce10906 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-03.xml @@ -1,6 +1,5 @@ - sudo: Privilege Escalation @@ -8,8 +7,8 @@ escalate privileges. sudo - September 07, 2010 - September 07, 2010: 01 + 2010-09-07 + 2010-09-07: 01 322517 335381 local @@ -57,19 +56,19 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.4_p3-r1" + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.7.4_p3-r1" - CVE-2010-1646 - CVE-2010-2956 + CVE-2010-1646 + CVE-2010-2956 - + vorlon - + vorlon - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-04.xml index eecb6647f8..cc918f5c05 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-04.xml @@ -1,6 +1,5 @@ - SARG: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ SARG allowing for remote code execution. SARG sarg - September 07, 2010 - September 07, 2010: 01 + 2010-09-07 + 2010-09-07: 01 222121 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/sarg-2.2.5-r5" + # emerge --ask --oneshot --verbose ">=net-analyzer/sarg-2.2.5-r5" - CVE-2008-1922 + CVE-2008-1922 - + rbu - + craig - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-05.xml index 55646aaa1a..bd43918823 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-05.xml @@ -1,6 +1,5 @@ - Adobe Reader: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code or other attacks. acroread - September 07, 2010 - September 07, 2010: 01 + 2010-09-07 + 2010-09-07: 01 297385 306429 313343 @@ -54,58 +53,58 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-9.3.4" + # emerge --ask --oneshot --verbose ">=app-text/acroread-9.3.4" - APSA10-01 - APSB10-02 - APSB10-07 - APSB10-09 - APSB10-14 - APSB10-16 - CVE-2009-3953 - CVE-2009-4324 - CVE-2010-0186 - CVE-2010-0188 - CVE-2010-0190 - CVE-2010-0191 - CVE-2010-0192 - CVE-2010-0193 - CVE-2010-0194 - CVE-2010-0195 - CVE-2010-0196 - CVE-2010-0197 - CVE-2010-0198 - CVE-2010-0199 - CVE-2010-0201 - CVE-2010-0202 - CVE-2010-0203 - CVE-2010-0204 - CVE-2010-1241 - CVE-2010-1285 - CVE-2010-1295 - CVE-2010-1297 - CVE-2010-2168 - CVE-2010-2201 - CVE-2010-2202 - CVE-2010-2203 - CVE-2010-2204 - CVE-2010-2205 - CVE-2010-2206 - CVE-2010-2207 - CVE-2010-2208 - CVE-2010-2209 - CVE-2010-2210 - CVE-2010-2211 - CVE-2010-2212 + APSA10-01 + APSB10-02 + APSB10-07 + APSB10-09 + APSB10-14 + APSB10-16 + CVE-2009-3953 + CVE-2009-4324 + CVE-2010-0186 + CVE-2010-0188 + CVE-2010-0190 + CVE-2010-0191 + CVE-2010-0192 + CVE-2010-0193 + CVE-2010-0194 + CVE-2010-0195 + CVE-2010-0196 + CVE-2010-0197 + CVE-2010-0198 + CVE-2010-0199 + CVE-2010-0201 + CVE-2010-0202 + CVE-2010-0203 + CVE-2010-0204 + CVE-2010-1241 + CVE-2010-1285 + CVE-2010-1295 + CVE-2010-1297 + CVE-2010-2168 + CVE-2010-2201 + CVE-2010-2202 + CVE-2010-2203 + CVE-2010-2204 + CVE-2010-2205 + CVE-2010-2206 + CVE-2010-2207 + CVE-2010-2208 + CVE-2010-2209 + CVE-2010-2210 + CVE-2010-2211 + CVE-2010-2212 - + a3li - + craig - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-06.xml index 76b9bb0997..9a7fcc9a17 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-06.xml @@ -1,14 +1,13 @@ - Clam AntiVirus: Multiple vulnerabilities Multiple vulnerabilities have been reported in Clam AntiVirus. clamav - September 07, 2010 - September 07, 2010: 01 + 2010-09-07 + 2010-09-07: 01 314087 321157 remote @@ -47,21 +46,21 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.96.1" + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.96.1" - CVE-2010-0098 - CVE-2010-1311 - CVE-2010-1639 - CVE-2010-1640 + CVE-2010-0098 + CVE-2010-1311 + CVE-2010-1639 + CVE-2010-1640 - + craig - + keytoaster - + a3li
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-07.xml index b798248f1b..486d735c38 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-07.xml @@ -1,14 +1,13 @@ - libxml2: Denial of Service Multiple Denial of Services vulnerabilities were found in libxml2. libxml2 - September 21, 2010 - September 21, 2010: 01 + 2010-09-21 + 2010-09-21: 01 280617 remote @@ -57,7 +56,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.7.3-r2" + # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.7.3-r2"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since August 30, 2009. It is likely that your system is @@ -65,16 +64,16 @@

- CVE-2009-2414 - CVE-2009-2416 + CVE-2009-2414 + CVE-2009-2416 - + a3li - + craig - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-08.xml index d6b0e82e4e..3938edd516 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-08.xml @@ -1,6 +1,5 @@ - python-updater: Untrusted search path @@ -8,8 +7,8 @@ the execution of arbitrary code. python-updater - September 21, 2010 - September 21, 2010: 01 + 2010-09-21 + 2010-09-21: 01 288361 local @@ -50,16 +49,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/python-updater-0.7-r1" + # emerge --ask --oneshot --verbose ">=app-admin/python-updater-0.7-r1" - + craig - + craig - + craig
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-09.xml index 163ac30139..3bf4a1ad14 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201009-09.xml @@ -1,6 +1,5 @@ - fence: Multiple symlink vulnerabilities @@ -8,8 +7,8 @@ local users to overwrite arbitrary files via a symlink attack. fence - September 29, 2010 - September 29, 2010: 01 + 2010-09-29 + 2010-09-29: 01 240576 local @@ -48,16 +47,16 @@ # emerge --unmerge sys-cluster/fence - CVE-2008-4579 - CVE-2008-4580 + CVE-2008-4579 + CVE-2008-4580 - + rbu - + craig - + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201010-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201010-01.xml index bd7bdae80a..2d80c2ee55 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201010-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201010-01.xml @@ -6,8 +6,8 @@ escalation or a Denial of Service. libpng - October 05, 2010 - January 03, 2017: 9 + 2010-10-05 + 2017-01-03: 9 307637 324153 335887 @@ -68,17 +68,17 @@ - + CVE-2010-0205 - + CVE-2010-1205 - + CVE-2010-2249 - craig - system - system + craig + system + system diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201011-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201011-01.xml index cc3091ad96..3686afbf96 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201011-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201011-01.xml @@ -1,6 +1,5 @@ - GNU C library: Multiple vulnerabilities @@ -8,8 +7,8 @@ local attackers to execute arbitrary code as root. glibc - November 15, 2010 - November 15, 2010: 01 + 2010-11-15 + 2010-11-15: 01 285818 325555 330923 @@ -54,23 +53,23 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.11.2-r3" + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.11.2-r3" - CVE-2009-4880 - CVE-2009-4881 - CVE-2010-0296 - CVE-2010-0830 - CVE-2010-3847 - CVE-2010-3856 + CVE-2009-4880 + CVE-2009-4881 + CVE-2010-0296 + CVE-2010-0830 + CVE-2010-3847 + CVE-2010-3856 - + craig - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201012-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201012-01.xml index 871306a1c3..8739805739 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201012-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201012-01.xml @@ -1,6 +1,5 @@ - Chromium: Multiple vulnerabilities @@ -8,8 +7,8 @@ allow user-assisted execution of arbitrary code. chromium - December 17, 2010 - December 17, 2010: 01 + 2010-12-17 + 2010-12-17: 01 325451 326717 330003 @@ -73,27 +72,27 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-client/chromium-8.0.552.224" + # emerge --ask --oneshot --verbose ">=www-client/chromium-8.0.552.224" - Release Notes 5.0.375.86 - Release Notes 5.0.375.99 - Release Notes 5.0.375.125 - Release Notes 5.0.375.127 - Release Notes 6.0.472.59 - Release Notes 6.0.472.62 - Release Notes 7.0.517.41 - Release Notes 7.0.517.44 - Release Notes 8.0.552.215 - Release Notes 8.0.552.224 + Release Notes 5.0.375.86 + Release Notes 5.0.375.99 + Release Notes 5.0.375.125 + Release Notes 5.0.375.127 + Release Notes 6.0.472.59 + Release Notes 6.0.472.62 + Release Notes 7.0.517.41 + Release Notes 7.0.517.44 + Release Notes 8.0.552.215 + Release Notes 8.0.552.224 - + craig - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-01.xml index 906eb036c3..43973c2422 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-01.xml @@ -1,6 +1,5 @@ - gif2png: User-assisted execution of arbitrary code @@ -8,8 +7,8 @@ arguments. gif2png - January 05, 2011 - January 05, 2011: 01 + 2011-01-05 + 2011-01-05: 01 346501 remote @@ -51,18 +50,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-gfx/gif2png-2.5.1-r1" + # emerge --ask --oneshot --verbose ">=media-gfx/gif2png-2.5.1-r1" - CVE-2009-5018 + CVE-2009-5018 - + underling - + underling - + underling
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-02.xml index 3ebf52facf..84cd07c4ae 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-02.xml @@ -1,6 +1,5 @@ - Tor: Remote heap-based buffer overflow @@ -8,8 +7,8 @@ code execution. Tor - January 15, 2011 - January 15, 2011: 01 + 2011-01-15 + 2011-01-15: 01 349312 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.1.28" + # emerge --ask --oneshot --verbose ">=net-misc/tor-0.2.1.28" - CVE-2010-1676 + CVE-2010-1676 - + underling - + underling - + underling
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-03.xml index 6f498b88c0..f3684ab2ad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-03.xml @@ -1,6 +1,5 @@ - libvpx: User-assisted execution of arbitrary code @@ -9,8 +8,8 @@ user-assisted execution of arbitrary code. libvpx - January 15, 2011 - January 15, 2011: 01 + 2011-01-15 + 2011-01-15: 01 345559 remote @@ -49,7 +48,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=media-libs/libvpx-0.9.5" + # emerge --ask --oneshot --verbose ">=media-libs/libvpx-0.9.5"

Packages which depend on this library may need to be recompiled. Tools such as revdep-rebuild may assist in identifying some of these @@ -57,15 +56,15 @@

- CVE-2010-4203 + CVE-2010-4203 - + underling - + underling - + underling
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-04.xml index 7c7a70a85f..a0f0c3b102 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-04.xml @@ -1,14 +1,13 @@ - aria2: Directory traversal A directory traversal vulnerability has been found in aria2. aria2 - January 15, 2011 - January 15, 2011: 01 + 2011-01-15 + 2011-01-15: 01 320975 remote @@ -45,18 +44,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-misc/aria2-1.9.3" + # emerge --ask --oneshot --verbose ">=net-misc/aria2-1.9.3" - CVE-2010-1512 + CVE-2010-1512 - + craig - + keytoaster - + vorlon
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-05.xml index 9320122f75..45499a8bad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-05.xml @@ -1,6 +1,5 @@ - OpenAFS: Arbitrary code execution @@ -8,8 +7,8 @@ execution of arbitrary code. OpenAFS - January 16, 2011 - January 16, 2011: 01 + 2011-01-16 + 2011-01-16: 01 265538 remote @@ -55,16 +54,16 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-fs/openafs-1.4.9" + # emerge --ask --oneshot --verbose ">=net-fs/openafs-1.4.9" - CVE-2009-1250 - CVE-2009-1251 + CVE-2009-1250 + CVE-2009-1251 - + craig - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-06.xml index 559fd0aa3c..47b2d89af6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-06.xml @@ -1,6 +1,5 @@ - IO::Socket::SSL: Certificate validation error @@ -8,8 +7,8 @@ attackers to conduct man-in-the-middle attacks. IO::Socket::SSL - January 16, 2011 - January 16, 2011: 01 + 2011-01-16 + 2011-01-16: 01 276360 remote @@ -48,18 +47,18 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=dev-perl/IO-Socket-SSL-1.26" + # emerge --ask --oneshot --verbose ">=dev-perl/IO-Socket-SSL-1.26" - CVE-2009-3024 + CVE-2009-3024 - + craig - + craig - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-07.xml index 31924b56c7..c4ce935371 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-07.xml @@ -1,6 +1,5 @@ - Prewikka: password disclosure @@ -8,8 +7,8 @@ password used by Prewikka. Prewikka - January 16, 2011 - January 16, 2011: 01 + 2011-01-16 + 2011-01-16: 01 270056 local @@ -46,7 +45,7 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=net-analyzer/prewikka-0.9.14-r2" + # emerge --ask --oneshot --verbose ">=net-analyzer/prewikka-0.9.14-r2"

NOTE: This is a legacy GLSA. Updates for all affected architectures are available since May 18, 2009 . It is likely that your system is already @@ -54,15 +53,15 @@

- CVE-2010-2058 + CVE-2010-2058 - + craig - + craig - + p-y
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-08.xml index c53377884c..670d40df3e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-08.xml @@ -1,6 +1,5 @@ - Adobe Reader: Multiple vulnerabilities @@ -8,8 +7,8 @@ arbitrary code. acroread - January 21, 2011 - January 21, 2011: 02 + 2011-01-21 + 2011-01-21: 02 336508 343091 remote @@ -50,40 +49,40 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=app-text/acroread-9.4.1" + # emerge --ask --oneshot --verbose ">=app-text/acroread-9.4.1" - APSB10-21 - APSB10-28 - CVE-2010-2883 - CVE-2010-2884 - CVE-2010-2887 - CVE-2010-2889 - CVE-2010-2890 - CVE-2010-3619 - CVE-2010-3620 - CVE-2010-3621 - CVE-2010-3622 - CVE-2010-3625 - CVE-2010-3626 - CVE-2010-3627 - CVE-2010-3628 - CVE-2010-3629 - CVE-2010-3630 - CVE-2010-3632 - CVE-2010-3654 - CVE-2010-3656 - CVE-2010-3657 - CVE-2010-3658 - CVE-2010-4091 + APSB10-21 + APSB10-28 + CVE-2010-2883 + CVE-2010-2884 + CVE-2010-2887 + CVE-2010-2889 + CVE-2010-2890 + CVE-2010-3619 + CVE-2010-3620 + CVE-2010-3621 + CVE-2010-3622 + CVE-2010-3625 + CVE-2010-3626 + CVE-2010-3627 + CVE-2010-3628 + CVE-2010-3629 + CVE-2010-3630 + CVE-2010-3632 + CVE-2010-3654 + CVE-2010-3656 + CVE-2010-3657 + CVE-2010-3658 + CVE-2010-4091 - + underling - + underling - + underling
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-09.xml index 5fe38f4025..761845901a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201101-09.xml @@ -1,6 +1,5 @@ - Adobe Flash Player: Multiple vulnerabilities @@ -8,8 +7,8 @@ to execute arbitrary code or cause a Denial of Service. adobe-flash - January 21, 2011 - January 21, 2011: 01 + 2011-01-21 + 2011-01-21: 01 307749 322855 332205 @@ -54,78 +53,78 @@

# emerge --sync - # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-10.1.102.64" + # emerge --ask --oneshot --verbose ">=www-plugins/adobe-flash-10.1.102.64" - APSB10-06 - APSB10-14 - APSB10-16 - APSB10-22 - APSB10-26 - CVE-2008-4546 - CVE-2009-3793 - CVE-2010-0186 - CVE-2010-0187 - CVE-2010-0209 - CVE-2010-1297 - CVE-2010-2160 - CVE-2010-2161 - CVE-2010-2162 - CVE-2010-2163 - CVE-2010-2164 - CVE-2010-2165 - CVE-2010-2166 - CVE-2010-2167 - CVE-2010-2169 - CVE-2010-2170 - CVE-2010-2171 - CVE-2010-2172 - CVE-2010-2173 - CVE-2010-2174 - CVE-2010-2175 - CVE-2010-2176 - CVE-2010-2177 - CVE-2010-2178 - CVE-2010-2179 - CVE-2010-2180 - CVE-2010-2181 - CVE-2010-2182 - CVE-2010-2183 - CVE-2010-2184 - CVE-2010-2185 - CVE-2010-2186 - CVE-2010-2187 - CVE-2010-2188 - CVE-2010-2189 - CVE-2010-2213 - CVE-2010-2214 - CVE-2010-2215 - CVE-2010-2216 - CVE-2010-2884 - CVE-2010-3636 - CVE-2010-3639 - CVE-2010-3640 - CVE-2010-3641 - CVE-2010-3642 - CVE-2010-3643 - CVE-2010-3644 - CVE-2010-3645 - CVE-2010-3646 - CVE-2010-3647 - CVE-2010-3648 - CVE-2010-3649 - CVE-2010-3650 - CVE-2010-3652 - CVE-2010-3654 - CVE-2010-3976 + APSB10-06 + APSB10-14 + APSB10-16 + APSB10-22 + APSB10-26 + CVE-2008-4546 + CVE-2009-3793 + CVE-2010-0186 + CVE-2010-0187 + CVE-2010-0209 + CVE-2010-1297 + CVE-2010-2160 + CVE-2010-2161 + CVE-2010-2162 + CVE-2010-2163 + CVE-2010-2164 + CVE-2010-2165 + CVE-2010-2166 + CVE-2010-2167 + CVE-2010-2169 + CVE-2010-2170 + CVE-2010-2171 + CVE-2010-2172 + CVE-2010-2173 + CVE-2010-2174 + CVE-2010-2175 + CVE-2010-2176 + CVE-2010-2177 + CVE-2010-2178 + CVE-2010-2179 + CVE-2010-2180 + CVE-2010-2181 + CVE-2010-2182 + CVE-2010-2183 + CVE-2010-2184 + CVE-2010-2185 + CVE-2010-2186 + CVE-2010-2187 + CVE-2010-2188 + CVE-2010-2189 + CVE-2010-2213 + CVE-2010-2214 + CVE-2010-2215 + CVE-2010-2216 + CVE-2010-2884 + CVE-2010-3636 + CVE-2010-3639 + CVE-2010-3640 + CVE-2010-3641 + CVE-2010-3642 + CVE-2010-3643 + CVE-2010-3644 + CVE-2010-3645 + CVE-2010-3646 + CVE-2010-3647 + CVE-2010-3648 + CVE-2010-3649 + CVE-2010-3650 + CVE-2010-3652 + CVE-2010-3654 + CVE-2010-3976 - + a3li - + underling - + underling
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-01.xml index 93b517a2f6..3cab9ddcb3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-01.xml @@ -6,8 +6,8 @@ execution of arbitrary code and other attacks. openssl - October 09, 2011 - June 06, 2015: 13 + 2011-10-09 + 2015-06-06: 13 303739 308011 322575 @@ -82,22 +82,22 @@

- CVE-2009-3245 - CVE-2009-4355 - CVE-2010-0433 - CVE-2010-0740 - CVE-2010-0742 - CVE-2010-1633 - CVE-2010-2939 - CVE-2010-3864 - CVE-2010-4180 - CVE-2010-4252 - CVE-2011-0014 - CVE-2011-3207 - CVE-2011-3210 + CVE-2009-3245 + CVE-2009-4355 + CVE-2010-0433 + CVE-2010-0740 + CVE-2010-0742 + CVE-2010-1633 + CVE-2010-2939 + CVE-2010-3864 + CVE-2010-4180 + CVE-2010-4252 + CVE-2011-0014 + CVE-2011-3207 + CVE-2011-3210 - craig - + craig + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-02.xml index ab8b75cef7..e2e0283173 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-02.xml @@ -6,8 +6,8 @@ execution of arbitrary code, or a Denial of Service condition. wireshark - October 09, 2011 - October 09, 2011: 1 + 2011-10-09 + 2011-10-09: 1 323859 330479 339401 @@ -57,49 +57,49 @@ - CVE-2010-2283 - CVE-2010-2284 - CVE-2010-2285 - CVE-2010-2286 - CVE-2010-2287 - CVE-2010-2992 - CVE-2010-2993 - CVE-2010-2994 - CVE-2010-2995 - CVE-2010-3133 - CVE-2010-3445 - CVE-2010-4300 - CVE-2010-4301 - CVE-2010-4538 - CVE-2011-0024 - CVE-2011-0444 - CVE-2011-0445 - CVE-2011-0538 - CVE-2011-0713 - CVE-2011-1138 - CVE-2011-1139 - CVE-2011-1140 - CVE-2011-1141 - CVE-2011-1142 - CVE-2011-1143 - CVE-2011-1590 - CVE-2011-1591 - CVE-2011-1592 - CVE-2011-1956 - CVE-2011-1957 - CVE-2011-1958 - CVE-2011-1959 - CVE-2011-2174 - CVE-2011-2175 - CVE-2011-2597 - CVE-2011-2698 - CVE-2011-3266 - CVE-2011-3360 - CVE-2011-3482 - CVE-2011-3483 + CVE-2010-2283 + CVE-2010-2284 + CVE-2010-2285 + CVE-2010-2286 + CVE-2010-2287 + CVE-2010-2992 + CVE-2010-2993 + CVE-2010-2994 + CVE-2010-2995 + CVE-2010-3133 + CVE-2010-3445 + CVE-2010-4300 + CVE-2010-4301 + CVE-2010-4538 + CVE-2011-0024 + CVE-2011-0444 + CVE-2011-0445 + CVE-2011-0538 + CVE-2011-0713 + CVE-2011-1138 + CVE-2011-1139 + CVE-2011-1140 + CVE-2011-1141 + CVE-2011-1142 + CVE-2011-1143 + CVE-2011-1590 + CVE-2011-1591 + CVE-2011-1592 + CVE-2011-1956 + CVE-2011-1957 + CVE-2011-1958 + CVE-2011-1959 + CVE-2011-2174 + CVE-2011-2175 + CVE-2011-2597 + CVE-2011-2698 + CVE-2011-3266 + CVE-2011-3360 + CVE-2011-3482 + CVE-2011-3483 - + underling - a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-03.xml index 2ebd383b54..ba155a6d15 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-03.xml @@ -6,8 +6,8 @@ leading to privilege escalation. bugzilla - October 10, 2011 - October 10, 2011: 1 + 2011-10-10 + 2011-10-10: 1 352781 380255 386203 @@ -55,27 +55,27 @@

- CVE-2010-2761 - CVE-2010-3172 - CVE-2010-3764 - CVE-2010-4411 - CVE-2010-4567 - CVE-2010-4568 - CVE-2010-4569 - CVE-2010-4570 - CVE-2010-4572 - CVE-2011-0046 - CVE-2011-0048 - CVE-2011-2379 - CVE-2011-2380 - CVE-2011-2381 - CVE-2011-2976 - CVE-2011-2977 - CVE-2011-2978 - CVE-2011-2979 + CVE-2010-2761 + CVE-2010-3172 + CVE-2010-3764 + CVE-2010-4411 + CVE-2010-4567 + CVE-2010-4568 + CVE-2010-4569 + CVE-2010-4570 + CVE-2010-4572 + CVE-2011-0046 + CVE-2011-0048 + CVE-2011-2379 + CVE-2011-2380 + CVE-2011-2381 + CVE-2011-2976 + CVE-2011-2977 + CVE-2011-2978 + CVE-2011-2979 - + keytoaster - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-04.xml index 16873863b3..320c5296f5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-04.xml @@ -6,8 +6,8 @@ allowing for remote execution of arbitrary code. Dovecot - October 10, 2011 - October 10, 2011: 2 + 2011-10-10 + 2011-10-10: 2 286844 293954 314533 @@ -61,18 +61,18 @@

- CVE-2009-3235 - CVE-2009-3897 - CVE-2010-0745 - CVE-2010-3304 - CVE-2010-3706 - CVE-2010-3707 - CVE-2010-3779 - CVE-2010-3780 - CVE-2011-1929 - CVE-2011-2166 - CVE-2011-2167 + CVE-2009-3235 + CVE-2009-3897 + CVE-2010-0745 + CVE-2010-3304 + CVE-2010-3706 + CVE-2010-3707 + CVE-2010-3779 + CVE-2010-3780 + CVE-2011-1929 + CVE-2011-2166 + CVE-2011-2167 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-05.xml index 538cbd75da..e2b8bcb924 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-05.xml @@ -6,8 +6,8 @@ man-in-the-middle attacks. gnutls - October 10, 2011 - October 10, 2011: 1 + 2011-10-10 + 2011-10-10: 1 281224 292025 remote @@ -52,13 +52,13 @@

- CVE-2009-2730 - CVE-2009-3555 + CVE-2009-2730 + CVE-2009-3555 - + keytoaster - + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-06.xml index 47771f87d5..142e262365 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-06.xml @@ -6,8 +6,8 @@ leading to remote execution of arbitrary code. php - October 10, 2011 - October 10, 2011: 2 + 2011-10-10 + 2011-10-10: 2 306939 332039 340807 @@ -59,75 +59,75 @@ - CVE-2006-7243 - CVE-2009-5016 - CVE-2010-1128 - CVE-2010-1129 - CVE-2010-1130 - CVE-2010-1860 - CVE-2010-1861 - CVE-2010-1862 - CVE-2010-1864 - CVE-2010-1866 - CVE-2010-1868 - CVE-2010-1914 - CVE-2010-1915 - CVE-2010-1917 - CVE-2010-2093 - CVE-2010-2094 - CVE-2010-2097 - CVE-2010-2100 - CVE-2010-2101 - CVE-2010-2190 - CVE-2010-2191 - CVE-2010-2225 - CVE-2010-2484 - CVE-2010-2531 - CVE-2010-2950 - CVE-2010-3062 - CVE-2010-3063 - CVE-2010-3064 - CVE-2010-3065 - CVE-2010-3436 - CVE-2010-3709 - CVE-2010-3709 - CVE-2010-3710 - CVE-2010-3710 - CVE-2010-3870 - CVE-2010-4150 - CVE-2010-4409 - CVE-2010-4645 - CVE-2010-4697 - CVE-2010-4698 - CVE-2010-4699 - CVE-2010-4700 - CVE-2011-0420 - CVE-2011-0421 - CVE-2011-0708 - CVE-2011-0752 - CVE-2011-0753 - CVE-2011-0755 - CVE-2011-1092 - CVE-2011-1148 - CVE-2011-1153 - CVE-2011-1464 - CVE-2011-1466 - CVE-2011-1467 - CVE-2011-1468 - CVE-2011-1469 - CVE-2011-1470 - CVE-2011-1471 - CVE-2011-1657 - CVE-2011-1938 - CVE-2011-2202 - CVE-2011-2483 - CVE-2011-3182 - CVE-2011-3189 - CVE-2011-3267 - CVE-2011-3268 + CVE-2006-7243 + CVE-2009-5016 + CVE-2010-1128 + CVE-2010-1129 + CVE-2010-1130 + CVE-2010-1860 + CVE-2010-1861 + CVE-2010-1862 + CVE-2010-1864 + CVE-2010-1866 + CVE-2010-1868 + CVE-2010-1914 + CVE-2010-1915 + CVE-2010-1917 + CVE-2010-2093 + CVE-2010-2094 + CVE-2010-2097 + CVE-2010-2100 + CVE-2010-2101 + CVE-2010-2190 + CVE-2010-2191 + CVE-2010-2225 + CVE-2010-2484 + CVE-2010-2531 + CVE-2010-2950 + CVE-2010-3062 + CVE-2010-3063 + CVE-2010-3064 + CVE-2010-3065 + CVE-2010-3436 + CVE-2010-3709 + CVE-2010-3709 + CVE-2010-3710 + CVE-2010-3710 + CVE-2010-3870 + CVE-2010-4150 + CVE-2010-4409 + CVE-2010-4645 + CVE-2010-4697 + CVE-2010-4698 + CVE-2010-4699 + CVE-2010-4700 + CVE-2011-0420 + CVE-2011-0421 + CVE-2011-0708 + CVE-2011-0752 + CVE-2011-0753 + CVE-2011-0755 + CVE-2011-1092 + CVE-2011-1148 + CVE-2011-1153 + CVE-2011-1464 + CVE-2011-1466 + CVE-2011-1467 + CVE-2011-1468 + CVE-2011-1469 + CVE-2011-1470 + CVE-2011-1471 + CVE-2011-1657 + CVE-2011-1938 + CVE-2011-2202 + CVE-2011-2483 + CVE-2011-3182 + CVE-2011-3189 + CVE-2011-3267 + CVE-2011-3268 - craig - + craig + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-07.xml index f55107bcd7..3439824d9b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-07.xml @@ -4,8 +4,8 @@ vsftpd: Denial of Service A Denial of Service vulnerability was found in vsftpd. vsftpd - October 10, 2011 - October 10, 2011: 1 + 2011-10-10 + 2011-10-10: 1 357001 remote @@ -40,10 +40,10 @@ - CVE-2011-0762 + CVE-2011-0762 - craig - + craig + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-08.xml index 25dd4f4f1d..bdeec1f2f9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-08.xml @@ -6,8 +6,8 @@ leading to remote passive code execution. feh - October 13, 2011 - October 13, 2011: 2 + 2011-10-13 + 2011-10-13: 2 325531 354063 local, remote @@ -45,10 +45,10 @@ - CVE-2010-2246 - CVE-2011-0702 - CVE-2011-1031 + CVE-2010-2246 + CVE-2011-0702 + CVE-2011-1031 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-09.xml index f9603ed828..6b7b581e47 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-09.xml @@ -4,8 +4,8 @@ Conky: Privilege escalation A privilege escalation vulnerability was found in Conky. Conky - October 13, 2011 - October 13, 2011: 1 + 2011-10-13 + 2011-10-13: 1 354061 local @@ -40,10 +40,10 @@ - CVE-2011-3616 + CVE-2011-3616 - craig - + craig + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-10.xml index 35c0048a5c..035e1b8380 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-10.xml @@ -6,8 +6,8 @@ or overwriting of local files. Wget - October 13, 2011 - October 13, 2011: 1 + 2011-10-13 + 2011-10-13: 1 329941 remote @@ -51,12 +51,12 @@

- CVE-2010-2252 + CVE-2010-2252 - + underling - + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-11.xml index 08494b19b1..ec671adca1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-11.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause a Denial of Service. Adobe Flash Player - October 13, 2011 - October 13, 2011: 1 + 2011-10-13 + 2011-10-13: 1 354207 359019 363179 @@ -54,19 +54,19 @@ - + APSA11-01 - + APSA11-02 - + APSB11-02 - + APSB11-12 - + APSB11-13 @@ -75,61 +75,61 @@ APSB11-26 - CVE-2011-0558 - CVE-2011-0559 - CVE-2011-0560 - CVE-2011-0561 - CVE-2011-0571 - CVE-2011-0572 - CVE-2011-0573 - CVE-2011-0574 - CVE-2011-0575 - CVE-2011-0577 - CVE-2011-0578 - CVE-2011-0579 - CVE-2011-0589 - CVE-2011-0607 - CVE-2011-0608 - CVE-2011-0609 - CVE-2011-0611 - CVE-2011-0618 - CVE-2011-0619 - CVE-2011-0620 - CVE-2011-0621 - CVE-2011-0622 - CVE-2011-0623 - CVE-2011-0624 - CVE-2011-0625 - CVE-2011-0626 - CVE-2011-0627 - CVE-2011-0628 - CVE-2011-2107 - CVE-2011-2110 - CVE-2011-2125 - CVE-2011-2130 - CVE-2011-2134 - CVE-2011-2136 - CVE-2011-2137 - CVE-2011-2138 - CVE-2011-2139 - CVE-2011-2140 - CVE-2011-2414 - CVE-2011-2415 - CVE-2011-2416 - CVE-2011-2417 - CVE-2011-2424 - CVE-2011-2425 - CVE-2011-2426 - CVE-2011-2427 - CVE-2011-2428 - CVE-2011-2429 - CVE-2011-2430 - CVE-2011-2444 + CVE-2011-0558 + CVE-2011-0559 + CVE-2011-0560 + CVE-2011-0561 + CVE-2011-0571 + CVE-2011-0572 + CVE-2011-0573 + CVE-2011-0574 + CVE-2011-0575 + CVE-2011-0577 + CVE-2011-0578 + CVE-2011-0579 + CVE-2011-0589 + CVE-2011-0607 + CVE-2011-0608 + CVE-2011-0609 + CVE-2011-0611 + CVE-2011-0618 + CVE-2011-0619 + CVE-2011-0620 + CVE-2011-0621 + CVE-2011-0622 + CVE-2011-0623 + CVE-2011-0624 + CVE-2011-0625 + CVE-2011-0626 + CVE-2011-0627 + CVE-2011-0628 + CVE-2011-2107 + CVE-2011-2110 + CVE-2011-2125 + CVE-2011-2130 + CVE-2011-2134 + CVE-2011-2136 + CVE-2011-2137 + CVE-2011-2138 + CVE-2011-2139 + CVE-2011-2140 + CVE-2011-2414 + CVE-2011-2415 + CVE-2011-2416 + CVE-2011-2417 + CVE-2011-2424 + CVE-2011-2425 + CVE-2011-2426 + CVE-2011-2427 + CVE-2011-2428 + CVE-2011-2429 + CVE-2011-2430 + CVE-2011-2444 - + underling - + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-12.xml index 88fc4275a2..623c5f6427 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-12.xml @@ -4,8 +4,8 @@ Unbound: Denial of Service Multiple Denial of Service vulnerabilities were found in Unbound. unbound - October 15, 2011 - October 15, 2011: 1 + 2011-10-15 + 2011-10-15: 1 309117 368981 remote @@ -39,11 +39,11 @@ - CVE-2010-0969 - CVE-2011-1922 + CVE-2010-0969 + CVE-2011-1922 - craig - + craig + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-13.xml index 715f79174d..855fb3e4a3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-13.xml @@ -6,8 +6,8 @@ which may allow a remote attacker to execute arbitrary code. Tor - October 18, 2011 - October 18, 2011: 1 + 2011-10-18 + 2011-10-18: 1 351920 359789 remote @@ -49,19 +49,19 @@

- CVE-2011-0015 - CVE-2011-0016 - CVE-2011-0427 - CVE-2011-0490 - CVE-2011-0491 - CVE-2011-0492 - CVE-2011-0493 - CVE-2011-1924 + CVE-2011-0015 + CVE-2011-0016 + CVE-2011-0427 + CVE-2011-0490 + CVE-2011-0491 + CVE-2011-0492 + CVE-2011-0493 + CVE-2011-1924 - + underling - + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-14.xml index 2cce3feae0..8a279cb9ca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-14.xml @@ -6,8 +6,8 @@ allowing for a symlink attack. D-Bus - October 21, 2011 - October 21, 2011: 1 + 2011-10-21 + 2011-10-21: 1 348766 371261 372743 @@ -45,12 +45,12 @@ - CVE-2010-4352 - CVE-2011-2200 - CVE-2011-2533 + CVE-2010-4352 + CVE-2011-2200 + CVE-2011-2533 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-15.xml index e025ccad6a..a8c43777a9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-15.xml @@ -7,8 +7,8 @@ arbitrary code. GnuPG - October 22, 2011 - October 22, 2011: 1 + 2011-10-22 + 2011-10-22: 1 329583 remote @@ -50,10 +50,10 @@ - CVE-2010-2547 + CVE-2010-2547 - system - + system + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-16.xml index ace2f481ed..db5aa72b96 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-16.xml @@ -7,8 +7,8 @@ Denial of Service. Cyrus IMAP Server - October 22, 2011 - October 22, 2011: 1 + 2011-10-22 + 2011-10-22: 1 283596 382349 385729 @@ -48,12 +48,12 @@ - CVE-2009-2632 - CVE-2011-3208 - CVE-2011-3481 + CVE-2009-2632 + CVE-2011-3208 + CVE-2011-3481 - a3li - + a3li + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-17.xml index 07e0ad35bc..4358fcc627 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-17.xml @@ -6,8 +6,8 @@ of Service. avahi - October 22, 2011 - October 22, 2011: 1 + 2011-10-22 + 2011-10-22: 1 335885 355583 remote @@ -43,11 +43,11 @@ - CVE-2010-2244 - CVE-2011-1002 + CVE-2010-2244 + CVE-2011-1002 - craig - + craig + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-18.xml index 71fbdbb2db..8b3cd0715d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-18.xml @@ -6,8 +6,8 @@ escalation. rgmanager - October 22, 2011 - October 22, 2011: 1 + 2011-10-22 + 2011-10-22: 1 352213 local @@ -41,10 +41,10 @@ - CVE-2010-3389 + CVE-2010-3389 - craig - + craig + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-19.xml index 7045319f6a..c9a960b562 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-19.xml @@ -6,8 +6,8 @@ attackers to disclose information. xorg-server - October 22, 2011 - October 22, 2011: 2 + 2011-10-22 + 2011-10-22: 2 387069 local @@ -63,9 +63,9 @@ - CVE-2011-4028 - CVE-2011-4029 + CVE-2011-4028 + CVE-2011-4029 - a3li - a3li + a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-20.xml index 06072f698f..26a7cfa32a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-20.xml @@ -6,8 +6,8 @@ severe of which may allow the execution of arbitrary code. Clam AntiVirus - October 24, 2011 - October 24, 2011: 2 + 2011-10-24 + 2011-10-24: 2 338226 347627 354019 @@ -48,19 +48,19 @@ - CVE-2010-0405 - CVE-2010-3434 - CVE-2010-4260 - CVE-2010-4261 - CVE-2010-4479 - CVE-2011-1003 - CVE-2011-2721 - CVE-2011-3627 + CVE-2010-0405 + CVE-2010-3434 + CVE-2010-4260 + CVE-2010-4261 + CVE-2010-4479 + CVE-2011-1003 + CVE-2011-2721 + CVE-2011-3627 - + underling - + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-21.xml index ca52cbfb1f..72feb09fd3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-21.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code. Asterisk - October 24, 2011 - October 24, 2011: 1 + 2011-10-24 + 2011-10-24: 1 352059 355967 359767 @@ -55,22 +55,22 @@ - CVE-2011-1147 - CVE-2011-1174 - CVE-2011-1175 - CVE-2011-1507 - CVE-2011-1599 - CVE-2011-2529 - CVE-2011-2535 - CVE-2011-2536 - CVE-2011-2665 - CVE-2011-2666 - CVE-2011-4063 + CVE-2011-1147 + CVE-2011-1174 + CVE-2011-1175 + CVE-2011-1507 + CVE-2011-1599 + CVE-2011-2529 + CVE-2011-2535 + CVE-2011-2536 + CVE-2011-2665 + CVE-2011-2666 + CVE-2011-4063 - + underling - + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-22.xml index 9e185314ea..4b0dc06243 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-22.xml @@ -7,8 +7,8 @@ arbitrary code and Denial of Service. postgresql-server postgresql-base - October 25, 2011 - March 05, 2012: 3 + 2011-10-25 + 2012-03-05: 3 261223 284274 297383 @@ -156,24 +156,24 @@ - CVE-2009-0922 - CVE-2009-3229 - CVE-2009-3230 - CVE-2009-3231 - CVE-2009-4034 - CVE-2009-4136 - CVE-2010-0442 - CVE-2010-0733 - CVE-2010-1169 - CVE-2010-1170 - CVE-2010-1447 - CVE-2010-1975 - CVE-2010-3433 - CVE-2010-4015 - CVE-2011-2483 + CVE-2009-0922 + CVE-2009-3229 + CVE-2009-3230 + CVE-2009-3231 + CVE-2009-4034 + CVE-2009-4136 + CVE-2010-0442 + CVE-2010-0733 + CVE-2010-1169 + CVE-2010-1170 + CVE-2010-1447 + CVE-2010-1975 + CVE-2010-3433 + CVE-2010-4015 + CVE-2011-2483 - + keytoaster - a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-23.xml index 35d3593a3e..343fe4989f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-23.xml @@ -6,8 +6,8 @@ attacker to conduct SQL injection. mod_authnz_external - October 25, 2011 - October 25, 2011: 1 + 2011-10-25 + 2011-10-25: 1 386165 remote @@ -48,10 +48,10 @@ - CVE-2011-2688 + CVE-2011-2688 - + underling - a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-24.xml index aea4aecc06..cd3b2aa393 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-24.xml @@ -6,8 +6,8 @@ execute arbitrary code or cause a Denial of Service. Squid - October 26, 2011 - October 26, 2011: 1 + 2011-10-26 + 2011-10-26: 1 279379 279380 301828 @@ -51,17 +51,17 @@

- CVE-2009-2621 - CVE-2009-2622 - CVE-2009-2855 - CVE-2010-0308 - CVE-2010-0639 - CVE-2010-2951 - CVE-2010-3072 - CVE-2011-3205 + CVE-2009-2621 + CVE-2009-2622 + CVE-2009-2855 + CVE-2010-0308 + CVE-2010-0639 + CVE-2010-2951 + CVE-2010-3072 + CVE-2011-3205 - craig - + craig + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-25.xml index 076c4bdb8b..d8c2528528 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-25.xml @@ -6,8 +6,8 @@ to inject FTP commands or cause a Denial of Service. Pure-FTPd - October 26, 2011 - October 26, 2011: 1 + 2011-10-26 + 2011-10-26: 1 358375 365751 remote @@ -49,13 +49,13 @@

- CVE-2011-0418 - CVE-2011-1575 + CVE-2011-0418 + CVE-2011-1575 - + underling - + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-26.xml index f1ea0c0519..31f30d6057 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201110-26.xml @@ -6,8 +6,8 @@ execution of arbitrary code or a Denial of Service. libxml2 - October 26, 2011 - October 26, 2011: 1 + 2011-10-26 + 2011-10-26: 1 345555 370715 386985 @@ -44,16 +44,16 @@ - CVE-2010-4008 - CVE-2010-4494 - CVE-2011-1944 - CVE-2011-2821 - CVE-2011-2834 + CVE-2010-4008 + CVE-2010-4494 + CVE-2011-1944 + CVE-2011-2821 + CVE-2011-2834 - + underling - + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-01.xml index 82a5ddb400..c4ecff3bdd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-01.xml @@ -7,8 +7,8 @@ privilege escalation. chromium v8 - November 01, 2011 - November 01, 2011: 1 + 2011-11-01 + 2011-11-01: 1 351525 353626 354121 @@ -88,123 +88,123 @@ - CVE-2011-2345 - CVE-2011-2346 - CVE-2011-2347 - CVE-2011-2348 - CVE-2011-2349 - CVE-2011-2350 - CVE-2011-2351 - CVE-2011-2834 - CVE-2011-2835 - CVE-2011-2837 - CVE-2011-2838 - CVE-2011-2839 - CVE-2011-2840 - CVE-2011-2841 - CVE-2011-2843 - CVE-2011-2844 - CVE-2011-2845 - CVE-2011-2846 - CVE-2011-2847 - CVE-2011-2848 - CVE-2011-2849 - CVE-2011-2850 - CVE-2011-2851 - CVE-2011-2852 - CVE-2011-2853 - CVE-2011-2854 - CVE-2011-2855 - CVE-2011-2856 - CVE-2011-2857 - CVE-2011-2858 - CVE-2011-2859 - CVE-2011-2860 - CVE-2011-2861 - CVE-2011-2862 - CVE-2011-2864 - CVE-2011-2874 - CVE-2011-3234 - CVE-2011-3873 - CVE-2011-3875 - CVE-2011-3876 - CVE-2011-3877 - CVE-2011-3878 - CVE-2011-3879 - CVE-2011-3880 - CVE-2011-3881 - CVE-2011-3882 - CVE-2011-3883 - CVE-2011-3884 - CVE-2011-3885 - CVE-2011-3886 - CVE-2011-3887 - CVE-2011-3888 - CVE-2011-3889 - CVE-2011-3890 - CVE-2011-3891 - + CVE-2011-2345 + CVE-2011-2346 + CVE-2011-2347 + CVE-2011-2348 + CVE-2011-2349 + CVE-2011-2350 + CVE-2011-2351 + CVE-2011-2834 + CVE-2011-2835 + CVE-2011-2837 + CVE-2011-2838 + CVE-2011-2839 + CVE-2011-2840 + CVE-2011-2841 + CVE-2011-2843 + CVE-2011-2844 + CVE-2011-2845 + CVE-2011-2846 + CVE-2011-2847 + CVE-2011-2848 + CVE-2011-2849 + CVE-2011-2850 + CVE-2011-2851 + CVE-2011-2852 + CVE-2011-2853 + CVE-2011-2854 + CVE-2011-2855 + CVE-2011-2856 + CVE-2011-2857 + CVE-2011-2858 + CVE-2011-2859 + CVE-2011-2860 + CVE-2011-2861 + CVE-2011-2862 + CVE-2011-2864 + CVE-2011-2874 + CVE-2011-3234 + CVE-2011-3873 + CVE-2011-3875 + CVE-2011-3876 + CVE-2011-3877 + CVE-2011-3878 + CVE-2011-3879 + CVE-2011-3880 + CVE-2011-3881 + CVE-2011-3882 + CVE-2011-3883 + CVE-2011-3884 + CVE-2011-3885 + CVE-2011-3886 + CVE-2011-3887 + CVE-2011-3888 + CVE-2011-3889 + CVE-2011-3890 + CVE-2011-3891 + Release Notes 10.0.648.127 - + Release Notes 10.0.648.133 - + Release Notes 10.0.648.205 - + Release Notes 11.0.696.57 - + Release Notes 11.0.696.65 - + Release Notes 11.0.696.68 - + Release Notes 11.0.696.71 - + Release Notes 12.0.742.112 - + Release Notes 12.0.742.91 - + Release Notes 13.0.782.107 - + Release Notes 13.0.782.215 - + Release Notes 13.0.782.220 - + Release Notes 14.0.835.163 - + Release Notes 14.0.835.202 - + Release Notes 15.0.874.102 - + Release Notes 8.0.552.237 - + Release Notes 9.0.597.107 - + Release Notes 9.0.597.84 - + Release Notes 9.0.597.94 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-02.xml index 15bf9f07f4..1ef3ecb92f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-02.xml @@ -6,8 +6,8 @@ allowing attackers to cause unspecified impact. sun-jre-bin sun-jdk emul-linux-x86-java - November 05, 2011 - November 05, 2011: 1 + 2011-11-05 + 2011-11-05: 1 340421 354213 370559 @@ -80,90 +80,90 @@

- CVE-2010-3541 - CVE-2010-3548 - CVE-2010-3549 - CVE-2010-3550 - CVE-2010-3551 - CVE-2010-3552 - CVE-2010-3553 - CVE-2010-3554 - CVE-2010-3555 - CVE-2010-3556 - CVE-2010-3557 - CVE-2010-3558 - CVE-2010-3559 - CVE-2010-3560 - CVE-2010-3561 - CVE-2010-3562 - CVE-2010-3563 - CVE-2010-3565 - CVE-2010-3566 - CVE-2010-3567 - CVE-2010-3568 - CVE-2010-3569 - CVE-2010-3570 - CVE-2010-3571 - CVE-2010-3572 - CVE-2010-3573 - CVE-2010-3574 - CVE-2010-4422 - CVE-2010-4447 - CVE-2010-4448 - CVE-2010-4450 - CVE-2010-4451 - CVE-2010-4452 - CVE-2010-4454 - CVE-2010-4462 - CVE-2010-4463 - CVE-2010-4465 - CVE-2010-4466 - CVE-2010-4467 - CVE-2010-4468 - CVE-2010-4469 - CVE-2010-4470 - CVE-2010-4471 - CVE-2010-4472 - CVE-2010-4473 - CVE-2010-4474 - CVE-2010-4475 - CVE-2010-4476 - CVE-2011-0802 - CVE-2011-0814 - CVE-2011-0815 - CVE-2011-0862 - CVE-2011-0863 - CVE-2011-0864 - CVE-2011-0865 - CVE-2011-0867 - CVE-2011-0868 - CVE-2011-0869 - CVE-2011-0871 - CVE-2011-0872 - CVE-2011-0873 - CVE-2011-3389 - CVE-2011-3516 - CVE-2011-3521 - CVE-2011-3544 - CVE-2011-3545 - CVE-2011-3546 - CVE-2011-3547 - CVE-2011-3548 - CVE-2011-3549 - CVE-2011-3550 - CVE-2011-3551 - CVE-2011-3552 - CVE-2011-3553 - CVE-2011-3554 - CVE-2011-3555 - CVE-2011-3556 - CVE-2011-3557 - CVE-2011-3558 - CVE-2011-3560 - CVE-2011-3561 + CVE-2010-3541 + CVE-2010-3548 + CVE-2010-3549 + CVE-2010-3550 + CVE-2010-3551 + CVE-2010-3552 + CVE-2010-3553 + CVE-2010-3554 + CVE-2010-3555 + CVE-2010-3556 + CVE-2010-3557 + CVE-2010-3558 + CVE-2010-3559 + CVE-2010-3560 + CVE-2010-3561 + CVE-2010-3562 + CVE-2010-3563 + CVE-2010-3565 + CVE-2010-3566 + CVE-2010-3567 + CVE-2010-3568 + CVE-2010-3569 + CVE-2010-3570 + CVE-2010-3571 + CVE-2010-3572 + CVE-2010-3573 + CVE-2010-3574 + CVE-2010-4422 + CVE-2010-4447 + CVE-2010-4448 + CVE-2010-4450 + CVE-2010-4451 + CVE-2010-4452 + CVE-2010-4454 + CVE-2010-4462 + CVE-2010-4463 + CVE-2010-4465 + CVE-2010-4466 + CVE-2010-4467 + CVE-2010-4468 + CVE-2010-4469 + CVE-2010-4470 + CVE-2010-4471 + CVE-2010-4472 + CVE-2010-4473 + CVE-2010-4474 + CVE-2010-4475 + CVE-2010-4476 + CVE-2011-0802 + CVE-2011-0814 + CVE-2011-0815 + CVE-2011-0862 + CVE-2011-0863 + CVE-2011-0864 + CVE-2011-0865 + CVE-2011-0867 + CVE-2011-0868 + CVE-2011-0869 + CVE-2011-0871 + CVE-2011-0872 + CVE-2011-0873 + CVE-2011-3389 + CVE-2011-3516 + CVE-2011-3521 + CVE-2011-3544 + CVE-2011-3545 + CVE-2011-3546 + CVE-2011-3547 + CVE-2011-3548 + CVE-2011-3549 + CVE-2011-3550 + CVE-2011-3551 + CVE-2011-3552 + CVE-2011-3553 + CVE-2011-3554 + CVE-2011-3555 + CVE-2011-3556 + CVE-2011-3557 + CVE-2011-3558 + CVE-2011-3560 + CVE-2011-3561 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-03.xml index 4af3494749..e9068054c0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-03.xml @@ -6,8 +6,8 @@ execution of arbitrary code, a Denial of Service, or privilege escalation. ebuild OpenTTD - November 11, 2011 - November 11, 2011: 2 + 2011-11-11 + 2011-11-11: 2 381799 local, remote @@ -47,13 +47,13 @@

- CVE-2010-4168 - CVE-2011-3341 - CVE-2011-3342 - CVE-2011-3343 + CVE-2010-4168 + CVE-2011-3341 + CVE-2011-3342 + CVE-2011-3343 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-04.xml index b5e86a78e2..3d13a9280f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-04.xml @@ -6,8 +6,8 @@ flaw, allowing attackers to call arbitrary PHP functions. PhpDocumentor - November 11, 2011 - November 11, 2011: 1 + 2011-11-11 + 2011-11-11: 1 213318 remote @@ -48,12 +48,12 @@

- + CVE-2008-1066 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-05.xml index 8d9f241b53..1c90bff85d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-05.xml @@ -6,8 +6,8 @@ some of which may allow execution of arbitrary code. chromium v8 - November 19, 2011 - November 19, 2011: 1 + 2011-11-19 + 2011-11-19: 1 390113 390779 remote @@ -60,41 +60,41 @@ - + CVE-2011-3892 - + CVE-2011-3893 - + CVE-2011-3894 - + CVE-2011-3895 - + CVE-2011-3896 - + CVE-2011-3897 - + CVE-2011-3898 - + CVE-2011-3900 - + Release Notes 15.0.874.120 - + Release Notes 15.0.874.121 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-06.xml index c005e67108..ed36e3e13d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-06.xml @@ -6,8 +6,8 @@ to execute arbitrary code or cause a Denial of Service. MaraDNS - November 20, 2011 - November 20, 2011: 1 + 2011-11-20 + 2011-11-20: 1 352569 remote @@ -46,10 +46,10 @@

- CVE-2011-0520 + CVE-2011-0520 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-07.xml index 9effd86ff0..1eb6ced915 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-07.xml @@ -7,8 +7,8 @@ of arbitrary code and Denial of Service. TinTin++ - November 20, 2011 - November 20, 2011: 1 + 2011-11-20 + 2011-11-20: 1 209903 remote @@ -49,10 +49,10 @@

- CVE-2008-0671 - CVE-2008-0672 - CVE-2008-0673 + CVE-2008-0671 + CVE-2008-0672 + CVE-2008-0673 - system - ackle + system + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-08.xml index f53a0b6a2d..0d8c0c1d80 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-08.xml @@ -7,8 +7,8 @@ Service. radvd - November 20, 2011 - November 20, 2011: 1 + 2011-11-20 + 2011-11-20: 1 385967 local, remote @@ -44,12 +44,12 @@ - CVE-2011-3601 - CVE-2011-3602 - CVE-2011-3603 - CVE-2011-3604 - CVE-2011-3605 + CVE-2011-3601 + CVE-2011-3602 + CVE-2011-3603 + CVE-2011-3604 + CVE-2011-3605 - ago - ackle + ago + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-09.xml index 36aa682d50..e683973bdd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-09.xml @@ -7,8 +7,8 @@ compartment. Safe - November 20, 2011 - November 20, 2011: 1 + 2011-11-20 + 2011-11-20: 1 325563 remote @@ -66,10 +66,10 @@

- CVE-2010-1168 + CVE-2010-1168 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-10.xml index a070ec0d48..489ece237d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-10.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause a Denial of Service. evince - November 20, 2011 - November 20, 2011: 1 + 2011-11-20 + 2011-11-20: 1 350681 363447 remote @@ -51,13 +51,13 @@

- CVE-2010-2640 - CVE-2010-2641 - CVE-2010-2642 - CVE-2010-2643 + CVE-2010-2640 + CVE-2010-2641 + CVE-2010-2642 + CVE-2010-2643 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-11.xml index 4b3579d85d..02c9444a09 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-11.xml @@ -6,8 +6,8 @@ arbitrary code or a Denial of Service. tar - November 20, 2011 - November 20, 2011: 1 + 2011-11-20 + 2011-11-20: 1 313333 remote @@ -49,10 +49,10 @@

- CVE-2010-0624 + CVE-2010-0624 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-12.xml index f06469b36e..65aca03fcd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201111-12.xml @@ -6,8 +6,8 @@ found in abcm2ps. abcm2ps - November 20, 2011 - November 20, 2011: 1 + 2011-11-20 + 2011-11-20: 1 322859 remote @@ -56,12 +56,12 @@

- CVE-2010-3441 - CVE-2010-4743 - CVE-2010-4744 + CVE-2010-3441 + CVE-2010-4743 + CVE-2010-4744 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-01.xml index fa354b5e57..44c2fa6e9c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-01.xml @@ -6,8 +6,8 @@ of which allows the execution of arbitrary PHP code. phpMyAdmin - January 04, 2012 - January 04, 2012: 1 + 2012-01-04 + 2012-01-04: 1 302745 335490 336462 @@ -52,99 +52,99 @@ - CVE-2008-7251 - CVE-2008-7252 - CVE-2010-2958 - CVE-2010-3055 - CVE-2010-3056 - CVE-2010-3263 - CVE-2011-0986 - CVE-2011-0987 - CVE-2011-2505 - CVE-2011-2506 - CVE-2011-2507 - CVE-2011-2508 - CVE-2011-2642 - CVE-2011-2643 - CVE-2011-2718 - CVE-2011-2719 - CVE-2011-3646 - CVE-2011-4064 - CVE-2011-4107 - CVE-2011-4634 - CVE-2011-4780 - CVE-2011-4782 - + CVE-2008-7251 + CVE-2008-7252 + CVE-2010-2958 + CVE-2010-3055 + CVE-2010-3056 + CVE-2010-3263 + CVE-2011-0986 + CVE-2011-0987 + CVE-2011-2505 + CVE-2011-2506 + CVE-2011-2507 + CVE-2011-2508 + CVE-2011-2642 + CVE-2011-2643 + CVE-2011-2718 + CVE-2011-2719 + CVE-2011-3646 + CVE-2011-4064 + CVE-2011-4107 + CVE-2011-4634 + CVE-2011-4780 + CVE-2011-4782 + PMASA-2010-1 - + PMASA-2010-2 - + PMASA-2010-4 - + PMASA-2010-5 - + PMASA-2010-6 - + PMASA-2010-7 - + PMASA-2011-1 - + PMASA-2011-10 - + PMASA-2011-11 - + PMASA-2011-12 - + PMASA-2011-15 - + PMASA-2011-16 - + PMASA-2011-17 - + PMASA-2011-18 - + PMASA-2011-19 - + PMASA-2011-2 - + PMASA-2011-20 - + PMASA-2011-5 - + PMASA-2011-6 - + PMASA-2011-7 - + PMASA-2011-8 - + PMASA-2011-9 - + underling - + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-02.xml index 0e6bb3a252..25dd10b66c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-02.xml @@ -6,8 +6,8 @@ allow execution of arbitrary code. MySQL - January 05, 2012 - January 05, 2012: 1 + 2012-01-05 + 2012-01-05: 1 220813 229329 237166 @@ -62,40 +62,40 @@

- CVE-2008-3963 - CVE-2008-4097 - CVE-2008-4098 - CVE-2008-4456 - CVE-2008-7247 - CVE-2009-2446 - CVE-2009-4019 - CVE-2009-4028 - CVE-2009-4484 - CVE-2010-1621 - CVE-2010-1626 - CVE-2010-1848 - CVE-2010-1849 - CVE-2010-1850 - CVE-2010-2008 - CVE-2010-3676 - CVE-2010-3677 - CVE-2010-3678 - CVE-2010-3679 - CVE-2010-3680 - CVE-2010-3681 - CVE-2010-3682 - CVE-2010-3683 - CVE-2010-3833 - CVE-2010-3834 - CVE-2010-3835 - CVE-2010-3836 - CVE-2010-3837 - CVE-2010-3838 - CVE-2010-3839 - CVE-2010-3840 + CVE-2008-3963 + CVE-2008-4097 + CVE-2008-4098 + CVE-2008-4456 + CVE-2008-7247 + CVE-2009-2446 + CVE-2009-4019 + CVE-2009-4028 + CVE-2009-4484 + CVE-2010-1621 + CVE-2010-1626 + CVE-2010-1848 + CVE-2010-1849 + CVE-2010-1850 + CVE-2010-2008 + CVE-2010-3676 + CVE-2010-3677 + CVE-2010-3678 + CVE-2010-3679 + CVE-2010-3680 + CVE-2010-3681 + CVE-2010-3682 + CVE-2010-3683 + CVE-2010-3833 + CVE-2010-3834 + CVE-2010-3835 + CVE-2010-3836 + CVE-2010-3837 + CVE-2010-3838 + CVE-2010-3839 + CVE-2010-3840 - a3li - + a3li + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-03.xml index d2aa5c927f..ae58dca11e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-03.xml @@ -6,8 +6,8 @@ some of which may allow execution of arbitrary code. chromium v8 - January 08, 2012 - January 08, 2012: 1 + 2012-01-08 + 2012-01-08: 1 394587 397907 remote @@ -60,56 +60,56 @@ - + CVE-2011-3903 - + CVE-2011-3904 - + CVE-2011-3906 - + CVE-2011-3907 - + CVE-2011-3908 - + CVE-2011-3909 - + CVE-2011-3910 - + CVE-2011-3912 - + CVE-2011-3913 - + CVE-2011-3914 - + CVE-2011-3917 - + CVE-2011-3921 - + CVE-2011-3922 - + Release Notes 16.0.912.63 - + Release Notes 16.0.912.75 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-04.xml index c293c9f5ab..3041cf9b16 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-04.xml @@ -6,8 +6,8 @@ arbitrary code. Logsurfer - January 20, 2012 - January 20, 2012: 1 + 2012-01-20 + 2012-01-20: 1 387397 remote @@ -44,10 +44,10 @@ - + CVE-2011-3626 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-05.xml index 5b95c69345..2adbd19ae9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-05.xml @@ -6,8 +6,8 @@ could lead to execution of arbitrary code with root privileges. mDNSResponder - January 22, 2012 - January 22, 2012: 1 + 2012-01-22 + 2012-01-22: 1 290822 local, remote @@ -48,15 +48,15 @@

- CVE-2007-2386 - CVE-2007-3744 - CVE-2007-3828 - CVE-2008-0989 - CVE-2008-2326 - CVE-2008-3630 + CVE-2007-2386 + CVE-2007-3744 + CVE-2007-3828 + CVE-2008-0989 + CVE-2008-2326 + CVE-2008-3630 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-06.xml index 412bc4b10d..dcc9b5d234 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-06.xml @@ -6,8 +6,8 @@ result in execution of arbitrary code or a Denial of Service. iscsitarget - January 23, 2012 - January 23, 2012: 1 + 2012-01-23 + 2012-01-23: 1 314187 remote @@ -49,8 +49,8 @@

- CVE-2010-0743 + CVE-2010-0743 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-07.xml index 8e34d5842b..0c3427c284 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-07.xml @@ -6,8 +6,8 @@ could allow local attackers to gain root privileges. NX Server NX Node - January 23, 2012 - January 23, 2012: 1 + 2012-01-23 + 2012-01-23: 1 378345 local @@ -58,12 +58,12 @@

- + CVE-2011-3977 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-08.xml index 9dada34b7a..26240ac2ab 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-08.xml @@ -6,8 +6,8 @@ execution of arbitrary code or a Denial of Service. FontForge - January 23, 2012 - January 23, 2012: 1 + 2012-01-23 + 2012-01-23: 1 386293 remote @@ -49,10 +49,10 @@

- CVE-2010-4259 + CVE-2010-4259 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-09.xml index e176b92014..0dca541106 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-09.xml @@ -7,8 +7,8 @@ Service. FreeType - January 23, 2012 - January 23, 2012: 1 + 2012-01-23 + 2012-01-23: 1 332701 342121 345843 @@ -49,72 +49,72 @@ - + CVE-2010-1797 - + CVE-2010-2497 - + CVE-2010-2498 - + CVE-2010-2499 - + CVE-2010-2500 - + CVE-2010-2519 - + CVE-2010-2520 - + CVE-2010-2527 - + CVE-2010-2541 - + CVE-2010-2805 - + CVE-2010-2806 - + CVE-2010-2807 - + CVE-2010-2808 - + CVE-2010-3053 - + CVE-2010-3054 - + CVE-2010-3311 - + CVE-2010-3814 - + CVE-2010-3855 - + CVE-2011-0226 - + CVE-2011-3256 - + CVE-2011-3439 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-10.xml index 76cd5bb6cd..d11401d01f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-10.xml @@ -6,8 +6,8 @@ execution of arbitrary code or a Denial of Service. JasPer - January 23, 2012 - January 23, 2012: 1 + 2012-01-23 + 2012-01-23: 1 394879 remote @@ -56,11 +56,11 @@ - CVE-2011-4516 - CVE-2011-4517 + CVE-2011-4516 + CVE-2011-4517 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-11.xml index 2503ca9b26..f47a40e3e2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-11.xml @@ -6,8 +6,8 @@ attackers to overwrite arbitrary files. fwbuilder - January 23, 2012 - January 23, 2012: 1 + 2012-01-23 + 2012-01-23: 1 235809 285861 local @@ -49,9 +49,9 @@

- CVE-2008-4956 - CVE-2009-4664 + CVE-2008-4956 + CVE-2009-4664 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-12.xml index 0bd1787b29..d34e4c28b9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-12.xml @@ -6,8 +6,8 @@ which may allow a remote attacker to execute arbitrary code. Tor - January 23, 2012 - January 23, 2012: 1 + 2012-01-23 + 2012-01-23: 1 388769 394969 remote @@ -57,12 +57,12 @@ - CVE-2011-2768 - CVE-2011-2769 - CVE-2011-2778 + CVE-2011-2768 + CVE-2011-2769 + CVE-2011-2778 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-13.xml index bbafd290a0..443fe11702 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-13.xml @@ -6,8 +6,8 @@ most severe of which may allow remote execution of arbitrary code. mit-krb5 - January 23, 2012 - January 23, 2012: 1 + 2012-01-23 + 2012-01-23: 1 303723 308021 321935 @@ -58,29 +58,29 @@ - CVE-2009-3295 - CVE-2009-4212 - CVE-2010-0283 - CVE-2010-0629 - CVE-2010-1320 - CVE-2010-1321 - CVE-2010-1322 - CVE-2010-1323 - CVE-2010-1324 - CVE-2010-4020 - CVE-2010-4021 - CVE-2010-4022 - CVE-2011-0281 - CVE-2011-0282 - CVE-2011-0283 - CVE-2011-0284 - CVE-2011-0285 - CVE-2011-1527 - CVE-2011-1528 - CVE-2011-1529 - CVE-2011-1530 - CVE-2011-4151 + CVE-2009-3295 + CVE-2009-4212 + CVE-2010-0283 + CVE-2010-0629 + CVE-2010-1320 + CVE-2010-1321 + CVE-2010-1322 + CVE-2010-1323 + CVE-2010-1324 + CVE-2010-4020 + CVE-2010-4021 + CVE-2010-4022 + CVE-2011-0281 + CVE-2011-0282 + CVE-2011-0283 + CVE-2011-0284 + CVE-2011-0285 + CVE-2011-1527 + CVE-2011-1528 + CVE-2011-1529 + CVE-2011-1530 + CVE-2011-4151 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-14.xml index 4edc2f848b..980c41e7bb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-14.xml @@ -7,8 +7,8 @@ code. mit-krb5-appl - January 23, 2012 - January 23, 2012: 1 + 2012-01-23 + 2012-01-23: 1 374229 396137 remote @@ -62,9 +62,9 @@ - CVE-2011-1526 - CVE-2011-4862 + CVE-2011-1526 + CVE-2011-4862 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-15.xml index 27f39adfce..5c0bd1d4f8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-15.xml @@ -6,8 +6,8 @@ attackers to gain escalated privileges. ktsuss - January 27, 2012 - January 27, 2012: 1 + 2012-01-27 + 2012-01-27: 1 381115 local @@ -49,11 +49,11 @@ - CVE-2011-2921 - CVE-2011-2922 + CVE-2011-2921 + CVE-2011-2922 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-16.xml index 79d77ddce3..5ad983dec3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-16.xml @@ -7,8 +7,8 @@ locking utilities. xkeyboard-config xorg-server - January 27, 2012 - January 27, 2012: 1 + 2012-01-27 + 2012-01-27: 1 399347 local @@ -63,8 +63,8 @@

- CVE-2012-0064 + CVE-2012-0064 - a3li - a3li + a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-17.xml index 84bfb109a7..a63bb3a25e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-17.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. chromium - January 28, 2012 - January 28, 2012: 1 + 2012-01-28 + 2012-01-28: 1 400551 remote @@ -44,29 +44,29 @@ - + CVE-2011-3924 - + CVE-2011-3925 - + CVE-2011-3926 - + CVE-2011-3927 - + CVE-2011-3928 - + Release Notes 16.0.912.77 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-18.xml index adf353f6dd..79cb40ddd3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-18.xml @@ -6,8 +6,8 @@ attackers to cause a Denial of Service or possibly execute arbitrary code. bip - January 30, 2012 - January 30, 2012: 1 + 2012-01-30 + 2012-01-30: 1 336321 400599 remote @@ -56,11 +56,11 @@

- CVE-2010-3071 - CVE-2012-0806 + CVE-2010-3071 + CVE-2012-0806 - + underling - a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-19.xml index 81a863cadb..ff66f9b628 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201201-19.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or conduct various other attacks. acroread - January 30, 2012 - January 30, 2012: 1 + 2012-01-30 + 2012-01-30: 1 354211 382969 393481 @@ -45,64 +45,64 @@ - CVE-2010-4091 - CVE-2011-0562 - CVE-2011-0563 - CVE-2011-0565 - CVE-2011-0566 - CVE-2011-0567 - CVE-2011-0570 - CVE-2011-0585 - CVE-2011-0586 - CVE-2011-0587 - CVE-2011-0588 - CVE-2011-0589 - CVE-2011-0590 - CVE-2011-0591 - CVE-2011-0592 - CVE-2011-0593 - CVE-2011-0594 - CVE-2011-0595 - CVE-2011-0596 - CVE-2011-0598 - CVE-2011-0599 - CVE-2011-0600 - CVE-2011-0602 - CVE-2011-0603 - CVE-2011-0604 - CVE-2011-0605 - CVE-2011-0606 - CVE-2011-2130 - CVE-2011-2134 - CVE-2011-2135 - CVE-2011-2136 - CVE-2011-2137 - CVE-2011-2138 - CVE-2011-2139 - CVE-2011-2140 - CVE-2011-2414 - CVE-2011-2415 - CVE-2011-2416 - CVE-2011-2417 - CVE-2011-2424 - CVE-2011-2425 - CVE-2011-2431 - CVE-2011-2432 - CVE-2011-2433 - CVE-2011-2434 - CVE-2011-2435 - CVE-2011-2436 - CVE-2011-2437 - CVE-2011-2438 - CVE-2011-2439 - CVE-2011-2440 - CVE-2011-2441 - CVE-2011-2442 - CVE-2011-2462 - CVE-2011-4369 + CVE-2010-4091 + CVE-2011-0562 + CVE-2011-0563 + CVE-2011-0565 + CVE-2011-0566 + CVE-2011-0567 + CVE-2011-0570 + CVE-2011-0585 + CVE-2011-0586 + CVE-2011-0587 + CVE-2011-0588 + CVE-2011-0589 + CVE-2011-0590 + CVE-2011-0591 + CVE-2011-0592 + CVE-2011-0593 + CVE-2011-0594 + CVE-2011-0595 + CVE-2011-0596 + CVE-2011-0598 + CVE-2011-0599 + CVE-2011-0600 + CVE-2011-0602 + CVE-2011-0603 + CVE-2011-0604 + CVE-2011-0605 + CVE-2011-0606 + CVE-2011-2130 + CVE-2011-2134 + CVE-2011-2135 + CVE-2011-2136 + CVE-2011-2137 + CVE-2011-2138 + CVE-2011-2139 + CVE-2011-2140 + CVE-2011-2414 + CVE-2011-2415 + CVE-2011-2416 + CVE-2011-2417 + CVE-2011-2424 + CVE-2011-2425 + CVE-2011-2431 + CVE-2011-2432 + CVE-2011-2433 + CVE-2011-2434 + CVE-2011-2435 + CVE-2011-2436 + CVE-2011-2437 + CVE-2011-2438 + CVE-2011-2439 + CVE-2011-2440 + CVE-2011-2441 + CVE-2011-2442 + CVE-2011-2462 + CVE-2011-4369 - + underling - a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-01.xml index 3452a00cc7..d56dddf0f0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-01.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. chromium - February 18, 2012 - February 18, 2012: 1 + 2012-02-18 + 2012-02-18: 1 402841 404067 remote @@ -49,110 +49,110 @@ - + CVE-2011-3016 - + CVE-2011-3017 - + CVE-2011-3018 - + CVE-2011-3019 - + CVE-2011-3020 - + CVE-2011-3021 - + CVE-2011-3022 - + CVE-2011-3023 - + CVE-2011-3024 - + CVE-2011-3025 - + CVE-2011-3027 - + CVE-2011-3953 - + CVE-2011-3954 - + CVE-2011-3955 - + CVE-2011-3956 - + CVE-2011-3957 - + CVE-2011-3958 - + CVE-2011-3959 - + CVE-2011-3960 - + CVE-2011-3961 - + CVE-2011-3962 - + CVE-2011-3963 - + CVE-2011-3964 - + CVE-2011-3965 - + CVE-2011-3966 - + CVE-2011-3967 - + CVE-2011-3968 - + CVE-2011-3969 - + CVE-2011-3970 - + CVE-2011-3971 - + CVE-2011-3972 - + Release Notes 17.0.963.46 - + Release Notes 17.0.963.56 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-02.xml index fb2031a7a3..5b1111f5eb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-02.xml @@ -6,8 +6,8 @@ leading to remote execution of arbitrary code. Quagga - February 21, 2012 - February 21, 2012: 2 + 2012-02-21 + 2012-02-21: 2 334303 359903 384651 @@ -55,18 +55,18 @@ - CVE-2010-1674 - CVE-2010-1675 - CVE-2010-2948 - CVE-2010-2949 - CVE-2011-3323 - CVE-2011-3324 - CVE-2011-3325 - CVE-2011-3326 - CVE-2011-3327 + CVE-2010-1674 + CVE-2010-1675 + CVE-2010-2948 + CVE-2010-2949 + CVE-2011-3323 + CVE-2011-3324 + CVE-2011-3325 + CVE-2011-3326 + CVE-2011-3327 - + underling - a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-03.xml index 21d10084c6..c8781abc85 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-03.xml @@ -6,8 +6,8 @@ to cause a Denial of Service condition. maradns - February 22, 2012 - February 22, 2012: 1 + 2012-02-22 + 2012-02-22: 1 397431 remote @@ -42,8 +42,8 @@ - CVE-2012-0024 + CVE-2012-0024 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-04.xml index 2efcbfcecb..ec90803cd3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-04.xml @@ -6,8 +6,8 @@ a Denial of Service condition. pdns - February 22, 2012 - February 22, 2012: 1 + 2012-02-22 + 2012-02-22: 1 398403 remote @@ -54,11 +54,11 @@ - CVE-2012-0206 - PowerDNS + CVE-2012-0206 + PowerDNS Security Advisory 2012-01 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-05.xml index 122ea63a71..6f9f9a9ccb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-05.xml @@ -6,8 +6,8 @@ code. heimdal - February 22, 2012 - February 22, 2012: 1 + 2012-02-22 + 2012-02-22: 1 396105 remote @@ -44,8 +44,8 @@ - CVE-2011-4862 + CVE-2011-4862 - ago - ackle + ago + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-06.xml index ec0f9bc975..3f3c8dd381 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-06.xml @@ -6,8 +6,8 @@ a Denial of Service condition. asterisk - February 22, 2012 - February 22, 2012: 1 + 2012-02-22 + 2012-02-22: 1 399507 remote @@ -43,8 +43,8 @@ - CVE-2012-0885 + CVE-2012-0885 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-07.xml index 0a2f2d9815..906990821f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-07.xml @@ -6,8 +6,8 @@ might allow guest OS users to read arbitrary files on the host OS. libvirt - February 27, 2012 - February 27, 2012: 1 + 2012-02-27 + 2012-02-27: 1 358877 372963 373991 @@ -46,11 +46,11 @@ - CVE-2011-1146 - CVE-2011-1486 - CVE-2011-2178 - CVE-2011-2511 + CVE-2011-1146 + CVE-2011-1486 + CVE-2011-2178 + CVE-2011-2511 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-08.xml index 35757c9e76..6623ec1d37 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-08.xml @@ -6,8 +6,8 @@ cause a Denial of Service and potentially arbitrary code execution. ebuild stunnel - February 29, 2012 - July 30, 2012: 2 + 2012-02-29 + 2012-07-30: 2 379859 remote @@ -42,8 +42,8 @@ - CVE-2011-2940 + CVE-2011-2940 - ago - ago + ago + ago diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-09.xml index 856531bcf0..470996ff47 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201202-09.xml @@ -6,8 +6,8 @@ code or Denial of Service. libxml2 - February 29, 2012 - February 29, 2012: 2 + 2012-02-29 + 2012-02-29: 2 398361 remote @@ -47,8 +47,8 @@

- CVE-2011-3919 + CVE-2011-3919 - ago - ackle + ago + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-01.xml index fe6b66333c..165e5b8b50 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-01.xml @@ -6,8 +6,8 @@ execute arbitrary code. spamdyke - March 06, 2012 - March 06, 2012: 1 + 2012-03-06 + 2012-03-06: 1 399157 remote @@ -42,8 +42,8 @@ - CVE-2012-0802 + CVE-2012-0802 - ago - ackle + ago + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-02.xml index ffd4fdb65c..b7f7b48064 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-02.xml @@ -6,8 +6,8 @@ which might allow remote execution of arbitrary code. cURL - March 06, 2012 - March 06, 2012: 1 + 2012-03-06 + 2012-03-06: 1 308645 373235 400799 @@ -64,17 +64,17 @@ - CVE-2010-0734 + CVE-2010-0734 - CVE-2011-2192 + CVE-2011-2192 - CVE-2011-3389 + CVE-2011-3389 - CVE-2012-0036 + CVE-2012-0036 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-03.xml index 65e1fab0d3..c9c65316a9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-03.xml @@ -6,8 +6,8 @@ which might allow local attackers to gain escalated privileges. puppet - March 06, 2012 - March 06, 2012: 1 + 2012-03-06 + 2012-03-06: 1 303729 308031 384859 @@ -49,17 +49,17 @@ - CVE-2009-3564 - CVE-2010-0156 - CVE-2011-3848 - CVE-2011-3869 - CVE-2011-3870 - CVE-2011-3871 - CVE-2011-3872 - CVE-2012-1053 + CVE-2009-3564 + CVE-2010-0156 + CVE-2011-3848 + CVE-2011-3869 + CVE-2011-3870 + CVE-2011-3871 + CVE-2011-3872 + CVE-2012-1053 - CVE-2012-1054 + CVE-2012-1054 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-04.xml index b7be26ffa6..3a57a4ee12 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-04.xml @@ -6,8 +6,8 @@ to cause a Denial of Service condition. libxml2 - March 06, 2012 - March 06, 2012: 1 + 2012-03-06 + 2012-03-06: 1 405261 remote @@ -43,8 +43,8 @@ - CVE-2012-0841 + CVE-2012-0841 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-05.xml index 892b4b7217..1b31b1ef88 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-05.xml @@ -6,8 +6,8 @@ cause a Denial of Service condition. rack - March 06, 2012 - March 06, 2012: 1 + 2012-03-06 + 2012-03-06: 1 396455 remote @@ -42,8 +42,8 @@ - CVE-2011-5036 + CVE-2011-5036 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-06.xml index 43fda601bd..9d265929e7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-06.xml @@ -6,8 +6,8 @@ attackers to possibly gain escalated privileges. sudo - March 06, 2012 - March 06, 2012: 1 + 2012-03-06 + 2012-03-06: 1 351490 401533 local @@ -53,11 +53,11 @@ - CVE-2011-0010 - CVE-2012-0809 + CVE-2011-0010 + CVE-2012-0809 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-07.xml index 4a6964b863..7848a162cb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-07.xml @@ -6,8 +6,8 @@ of arbitrary code. foomatic-filters - March 06, 2012 - March 06, 2012: 1 + 2012-03-06 + 2012-03-06: 1 379559 remote @@ -46,9 +46,9 @@ - CVE-2011-2697 - CVE-2011-2964 + CVE-2011-2697 + CVE-2011-2964 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-08.xml index 7704d7b700..79fabf95a7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-08.xml @@ -4,8 +4,8 @@ libxslt: Denial of Service A vulnerability in libxslt could result in Denial of Service. libxslt - March 06, 2012 - March 06, 2012: 1 + 2012-03-06 + 2012-03-06: 1 402861 remote @@ -42,8 +42,8 @@ - CVE-2011-3970 + CVE-2011-3970 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-09.xml index f8215de1b0..f8a89cf921 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-09.xml @@ -6,8 +6,8 @@ to execute arbitrary code. ImageMagick - March 06, 2012 - March 06, 2012: 1 + 2012-03-06 + 2012-03-06: 1 402999 remote @@ -52,9 +52,9 @@ - CVE-2012-0247 - CVE-2012-0248 + CVE-2012-0247 + CVE-2012-0248 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-10.xml index ee601ed771..2bcaaaa321 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-10.xml @@ -6,8 +6,8 @@ attacker to execute arbitrary code or cause a Denial of Service condition. libmikmod - March 06, 2012 - March 06, 2012: 1 + 2012-03-06 + 2012-03-06: 1 335892 remote @@ -56,9 +56,9 @@

- CVE-2010-2546 - CVE-2010-2971 + CVE-2010-2546 + CVE-2010-2971 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-11.xml index 7aa72875fc..9b4b7aebc2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-11.xml @@ -6,8 +6,8 @@ execution of arbitrary code. usbmuxd - March 06, 2012 - March 06, 2012: 1 + 2012-03-06 + 2012-03-06: 1 399409 local @@ -46,8 +46,8 @@ - CVE-2012-0065 + CVE-2012-0065 - ago - ackle + ago + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-12.xml index 831a623b9f..2f7a231081 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-12.xml @@ -7,8 +7,8 @@ information. openssl - March 06, 2012 - June 06, 2015: 9 + 2012-03-06 + 2015-06-06: 9 397695 399365 remote @@ -93,16 +93,16 @@ - CVE-2011-4108 - CVE-2011-4109 - CVE-2011-4576 - CVE-2011-4577 - CVE-2011-4619 - CVE-2012-0027 - + CVE-2011-4108 + CVE-2011-4109 + CVE-2011-4576 + CVE-2011-4577 + CVE-2011-4619 + CVE-2012-0027 + CVE-2012-0050 - ago - ackle + ago + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-13.xml index 4296f860c5..aeb62aa62a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-13.xml @@ -6,8 +6,8 @@ condition. Openswan - March 16, 2012 - March 16, 2012: 1 + 2012-03-16 + 2012-03-16: 1 372961 389097 local, remote @@ -54,9 +54,9 @@

- CVE-2011-2147 - CVE-2011-4073 + CVE-2011-2147 + CVE-2011-4073 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-14.xml index fe8f97462b..a30d141049 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-14.xml @@ -6,8 +6,8 @@ execution of arbitrary code or Denial of Service. audacious-plugins - March 16, 2012 - March 16, 2012: 1 + 2012-03-16 + 2012-03-16: 1 383991 remote @@ -62,12 +62,12 @@ - CVE-2011-2911 - CVE-2011-2912 - CVE-2011-2913 - CVE-2011-2914 - CVE-2011-2915 + CVE-2011-2911 + CVE-2011-2912 + CVE-2011-2913 + CVE-2011-2914 + CVE-2011-2915 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-15.xml index b1c6b4bce3..e5528e1c92 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-15.xml @@ -6,8 +6,8 @@ which might allow execution of arbitrary code. gif2png - March 16, 2012 - March 16, 2012: 1 + 2012-03-16 + 2012-03-16: 1 351698 remote @@ -51,9 +51,9 @@ - CVE-2010-4694 - CVE-2010-4695 + CVE-2010-4694 + CVE-2010-4695 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-16.xml index 03927b2042..2a1dd0f28c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-16.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. libmodplug - March 16, 2012 - March 16, 2012: 2 + 2012-03-16 + 2012-03-16: 2 362503 379557 remote @@ -70,15 +70,15 @@

- CVE-2011-1574 - CVE-2011-2911 - CVE-2011-2912 - CVE-2011-2913 - CVE-2011-2914 - CVE-2011-2915 + CVE-2011-1574 + CVE-2011-2911 + CVE-2011-2912 + CVE-2011-2913 + CVE-2011-2914 + CVE-2011-2915 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-17.xml index e02b8e4f92..8de15d627f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-17.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. hplip - March 16, 2012 - March 16, 2012: 1 + 2012-03-16 + 2012-03-16: 1 352085 388655 local, remote @@ -54,11 +54,11 @@ - CVE-2010-4267 - CVE-2011-2722 + CVE-2010-4267 + CVE-2011-2722 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-18.xml index e64a53e192..df8ff28b4a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-18.xml @@ -6,8 +6,8 @@ possibly allowing symlink attacks. Minitube - March 16, 2012 - March 16, 2012: 1 + 2012-03-16 + 2012-03-16: 1 388867 local @@ -50,6 +50,6 @@ Release - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-19.xml index bf17f6b3f4..01b118404f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-19.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. chromium - March 25, 2012 - March 25, 2012: 1 + 2012-03-25 + 2012-03-25: 1 406975 407465 407755 @@ -51,98 +51,98 @@ - + CVE-2011-3031 - + CVE-2011-3032 - + CVE-2011-3033 - + CVE-2011-3034 - + CVE-2011-3035 - + CVE-2011-3036 - + CVE-2011-3037 - + CVE-2011-3038 - + CVE-2011-3039 - + CVE-2011-3040 - + CVE-2011-3041 - + CVE-2011-3042 - + CVE-2011-3043 - + CVE-2011-3044 - + CVE-2011-3046 - + CVE-2011-3047 - + CVE-2011-3049 - + CVE-2011-3050 - + CVE-2011-3051 - + CVE-2011-3052 - + CVE-2011-3053 - + CVE-2011-3054 - + CVE-2011-3055 - + CVE-2011-3056 - + CVE-2011-3057 - + Release Notes 17.0.963.65 - + Release Notes 17.0.963.78 - + Release Notes 17.0.963.79 - + Release Notes 17.0.963.83 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-20.xml index 12daa03f4a..e9662188e4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-20.xml @@ -6,8 +6,8 @@ arbitrary code. Logwatch - March 28, 2012 - March 28, 2012: 1 + 2012-03-28 + 2012-03-28: 1 356387 remote @@ -43,8 +43,8 @@ - CVE-2011-1018 + CVE-2011-1018 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-21.xml index b7997d15a8..b7d8a3f0d7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-21.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. Asterisk - March 28, 2012 - March 28, 2012: 1 + 2012-03-28 + 2012-03-28: 1 408431 remote @@ -49,15 +49,15 @@ - + AST-2012-002 - + AST-2012-003 - CVE-2012-1183 - CVE-2012-1184 + CVE-2012-1183 + CVE-2012-1184 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-22.xml index f05ab05bd6..cd962340bf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-22.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. nginx - March 28, 2012 - March 28, 2012: 1 + 2012-03-28 + 2012-03-28: 1 293785 293786 293788 @@ -66,17 +66,17 @@ - CVE-2009-3555 + CVE-2009-3555 - CVE-2009-3896 + CVE-2009-3896 - CVE-2009-3898 + CVE-2009-3898 - CVE-2011-4315 + CVE-2011-4315 - CVE-2012-1180 + CVE-2012-1180 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-23.xml index 7a72191bf2..417eb3dc0b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-23.xml @@ -6,8 +6,8 @@ which might allow execution of arbitrary code. libzip - March 29, 2012 - March 29, 2012: 1 + 2012-03-29 + 2012-03-29: 1 409117 remote @@ -53,9 +53,9 @@ - CVE-2012-1162 - CVE-2012-1163 + CVE-2012-1162 + CVE-2012-1163 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-24.xml index c5ac7a1f44..5f21af549b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201203-24.xml @@ -6,8 +6,8 @@ some of which may allow execution of arbitrary code. chromium v8 - March 30, 2012 - March 30, 2012: 1 + 2012-03-30 + 2012-03-30: 1 410045 remote @@ -63,41 +63,41 @@ - + CVE-2011-3057 - + CVE-2011-3058 - + CVE-2011-3059 - + CVE-2011-3060 - + CVE-2011-3061 - + CVE-2011-3062 - + CVE-2011-3063 - + CVE-2011-3064 - + CVE-2011-3065 - + Release Notes 18.0.1025.142 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-01.xml index a9a159e140..31a5bb2f1e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-01.xml @@ -6,8 +6,8 @@ attackers to gain escalated privileges. virtualbox - April 09, 2012 - April 09, 2012: 1 + 2012-04-09 + 2012-04-09: 1 386317 399807 local @@ -55,12 +55,12 @@ - CVE-2010-4414 - CVE-2011-2300 - CVE-2011-2305 - CVE-2012-0105 - CVE-2012-0111 + CVE-2010-4414 + CVE-2011-2300 + CVE-2011-2305 + CVE-2012-0105 + CVE-2012-0111 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-02.xml index 5845a2a036..20fb9cfe5c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-02.xml @@ -6,8 +6,8 @@ arbitrary code. InspIRCd - April 10, 2012 - April 10, 2012: 1 + 2012-04-10 + 2012-04-10: 1 409159 remote @@ -43,8 +43,8 @@ - CVE-2012-1836 + CVE-2012-1836 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-03.xml index b8f93b6946..2a675462be 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-03.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. chromium - April 10, 2012 - April 10, 2012: 1 + 2012-04-10 + 2012-04-10: 1 410963 remote @@ -45,50 +45,50 @@ - + CVE-2011-3066 - + CVE-2011-3067 - + CVE-2011-3068 - + CVE-2011-3069 - + CVE-2011-3070 - + CVE-2011-3071 - + CVE-2011-3072 - + CVE-2011-3073 - + CVE-2011-3074 - + CVE-2011-3075 - + CVE-2011-3076 - + CVE-2011-3077 - + Release Notes 18.0.1025.151 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-04.xml index 880a27c83b..3ac9395b37 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-04.xml @@ -7,8 +7,8 @@ Service. FreeType - April 17, 2012 - April 17, 2012: 1 + 2012-04-17 + 2012-04-17: 1 407257 remote @@ -44,26 +44,26 @@ - CVE-2012-1126 - CVE-2012-1127 - CVE-2012-1128 - CVE-2012-1129 - CVE-2012-1130 - CVE-2012-1131 - CVE-2012-1132 - CVE-2012-1133 - CVE-2012-1134 - CVE-2012-1135 - CVE-2012-1136 - CVE-2012-1137 - CVE-2012-1138 - CVE-2012-1139 - CVE-2012-1140 - CVE-2012-1141 - CVE-2012-1142 - CVE-2012-1143 - CVE-2012-1144 + CVE-2012-1126 + CVE-2012-1127 + CVE-2012-1128 + CVE-2012-1129 + CVE-2012-1130 + CVE-2012-1131 + CVE-2012-1132 + CVE-2012-1133 + CVE-2012-1134 + CVE-2012-1135 + CVE-2012-1136 + CVE-2012-1137 + CVE-2012-1138 + CVE-2012-1139 + CVE-2012-1140 + CVE-2012-1141 + CVE-2012-1142 + CVE-2012-1143 + CVE-2012-1144 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-05.xml index a49cb99250..d5e96caf1d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-05.xml @@ -6,8 +6,8 @@ execution of arbitrary code. SWFTools - April 17, 2012 - April 18, 2012: 2 + 2012-04-17 + 2012-04-18: 2 332649 remote @@ -49,8 +49,8 @@

- CVE-2010-1516 + CVE-2010-1516 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-06.xml index 5e0f58eb1c..aeb9888a35 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-06.xml @@ -6,8 +6,8 @@ which may allow a local attacker to gain root privileges. polkit - April 17, 2012 - April 17, 2012: 1 + 2012-04-17 + 2012-04-17: 1 314535 364973 401513 @@ -57,12 +57,12 @@ - CVE-2010-0750 - CVE-2011-1485 - CVE-2011-4945 + CVE-2010-0750 + CVE-2011-1485 + CVE-2011-4945 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-07.xml index d02c805fb0..564d368408 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-07.xml @@ -6,8 +6,8 @@ might allow remote attackers to execute arbitrary code. Adobe Flash Player - April 17, 2012 - April 17, 2012: 1 + 2012-04-17 + 2012-04-17: 1 390149 404101 407023 @@ -51,28 +51,28 @@ - CVE-2011-2445 - CVE-2011-2450 - CVE-2011-2451 - CVE-2011-2452 - CVE-2011-2453 - CVE-2011-2454 - CVE-2011-2455 - CVE-2011-2456 - CVE-2011-2457 - CVE-2011-2458 - CVE-2011-2459 - CVE-2011-2460 - CVE-2012-0752 - CVE-2012-0753 - CVE-2012-0754 - CVE-2012-0755 - CVE-2012-0756 - CVE-2012-0767 - CVE-2012-0768 - CVE-2012-0769 - CVE-2012-0773 + CVE-2011-2445 + CVE-2011-2450 + CVE-2011-2451 + CVE-2011-2452 + CVE-2011-2453 + CVE-2011-2454 + CVE-2011-2455 + CVE-2011-2456 + CVE-2011-2457 + CVE-2011-2458 + CVE-2011-2459 + CVE-2011-2460 + CVE-2012-0752 + CVE-2012-0753 + CVE-2012-0754 + CVE-2012-0755 + CVE-2012-0756 + CVE-2012-0767 + CVE-2012-0768 + CVE-2012-0769 + CVE-2012-0773 - ago - ackle + ago + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-08.xml index 5f66954891..74b7d859c0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201204-08.xml @@ -7,8 +7,8 @@ code. DBD-Pg - April 17, 2012 - April 17, 2012: 1 + 2012-04-17 + 2012-04-17: 1 407549 remote @@ -46,8 +46,8 @@ - CVE-2012-1151 + CVE-2012-1151 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-01.xml index 1fcb87f9c9..b96db195de 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-01.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. chromium - May 15, 2012 - May 15, 2012: 1 + 2012-05-15 + 2012-05-15: 1 414199 remote @@ -44,17 +44,17 @@ - CVE-2011-3078 - CVE-2011-3081 - CVE-2012-1521 - + CVE-2011-3078 + CVE-2011-3081 + CVE-2012-1521 + Release Notes 18.0.1025.168 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-02.xml index 005ec14a4a..5ea051af6c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-02.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. ConnMan - May 15, 2012 - May 15, 2012: 1 + 2012-05-15 + 2012-05-15: 1 415415 remote @@ -49,10 +49,10 @@ - CVE-2012-2320 - CVE-2012-2321 - CVE-2012-2322 + CVE-2012-2320 + CVE-2012-2321 + CVE-2012-2322 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-03.xml index f9b96dd31e..661c431162 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-03.xml @@ -6,8 +6,8 @@ some of which may allow execution of arbitrary code. chromium v8 - May 21, 2012 - May 21, 2012: 1 + 2012-05-21 + 2012-05-21: 1 416119 remote @@ -58,62 +58,62 @@ - + CVE-2011-3083 - + CVE-2011-3084 - + CVE-2011-3085 - + CVE-2011-3086 - + CVE-2011-3087 - + CVE-2011-3088 - + CVE-2011-3089 - + CVE-2011-3090 - + CVE-2011-3091 - + CVE-2011-3092 - + CVE-2011-3093 - + CVE-2011-3094 - + CVE-2011-3095 - + CVE-2011-3096 - + CVE-2011-3100 - + CVE-2011-3101 - + Release Notes 19.0.1084.46 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-04.xml index 1169967f72..efd5b37e61 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201205-04.xml @@ -6,8 +6,8 @@ some of which may allow execution of arbitrary code. chromium v8 - May 27, 2012 - May 27, 2012: 1 + 2012-05-27 + 2012-05-27: 1 417321 remote @@ -59,41 +59,41 @@ - + CVE-2011-3103 - + CVE-2011-3104 - + CVE-2011-3105 - + CVE-2011-3106 - + CVE-2011-3107 - + CVE-2011-3108 - + CVE-2011-3109 - + CVE-2011-3111 - + CVE-2011-3115 - + Release Notes 19.0.1084.52 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-01.xml index a99347edf5..117b8e88c0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-01.xml @@ -6,8 +6,8 @@ which allowing to cause remote Denial of Service. bind - June 02, 2012 - June 02, 2012: 1 + 2012-06-02 + 2012-06-02: 1 347621 356223 368863 @@ -54,16 +54,16 @@

- CVE-2010-3613 - CVE-2010-3614 - CVE-2010-3615 - CVE-2010-3762 - CVE-2011-0414 - CVE-2011-1910 - CVE-2011-2464 - CVE-2011-2465 - CVE-2011-4313 + CVE-2010-3613 + CVE-2010-3614 + CVE-2010-3615 + CVE-2010-3762 + CVE-2011-0414 + CVE-2011-1910 + CVE-2011-2464 + CVE-2011-2465 + CVE-2011-4313 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-02.xml index d3d160cb77..be3aa2f939 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-02.xml @@ -6,8 +6,8 @@ code or Denial of Service. qt-gui - June 03, 2012 - June 03, 2012: 1 + 2012-06-03 + 2012-06-03: 1 384089 remote @@ -45,10 +45,10 @@

- CVE-2011-3194 + CVE-2011-3194 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-03.xml index a4bdd77571..64d3fca29d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-03.xml @@ -6,8 +6,8 @@ which allow for the execution of arbitrary code. Opera - June 15, 2012 - June 15, 2012: 1 + 2012-06-15 + 2012-06-15: 1 264831 283391 290862 @@ -76,111 +76,111 @@ - CVE-2009-1234 - CVE-2009-2059 - CVE-2009-2063 - CVE-2009-2067 - CVE-2009-2070 - CVE-2009-3013 - CVE-2009-3044 - CVE-2009-3045 - CVE-2009-3046 - CVE-2009-3047 - CVE-2009-3048 - CVE-2009-3049 - CVE-2009-3831 - CVE-2009-4071 - CVE-2009-4072 - CVE-2010-0653 - CVE-2010-1349 - CVE-2010-1989 - CVE-2010-1993 - CVE-2010-2121 - CVE-2010-2421 - CVE-2010-2455 - CVE-2010-2576 - CVE-2010-2658 - CVE-2010-2659 - CVE-2010-2660 - CVE-2010-2661 - CVE-2010-2662 - CVE-2010-2663 - CVE-2010-2664 - CVE-2010-2665 - CVE-2010-3019 - CVE-2010-3020 - CVE-2010-3021 - CVE-2010-4579 - CVE-2010-4580 - CVE-2010-4581 - CVE-2010-4582 - CVE-2010-4583 - CVE-2010-4584 - CVE-2010-4585 - CVE-2010-4586 - CVE-2011-0681 - CVE-2011-0682 - CVE-2011-0683 - CVE-2011-0684 - CVE-2011-0685 - CVE-2011-0686 - CVE-2011-0687 - CVE-2011-1337 - CVE-2011-1824 - CVE-2011-2609 - CVE-2011-2610 - CVE-2011-2611 - CVE-2011-2612 - CVE-2011-2613 - CVE-2011-2614 - CVE-2011-2615 - CVE-2011-2616 - CVE-2011-2617 - CVE-2011-2618 - CVE-2011-2619 - CVE-2011-2620 - CVE-2011-2621 - CVE-2011-2622 - CVE-2011-2623 - CVE-2011-2624 - CVE-2011-2625 - CVE-2011-2626 - CVE-2011-2627 - CVE-2011-2628 - CVE-2011-2629 - CVE-2011-2630 - CVE-2011-2631 - CVE-2011-2632 - CVE-2011-2633 - CVE-2011-2634 - CVE-2011-2635 - CVE-2011-2636 - CVE-2011-2637 - CVE-2011-2638 - CVE-2011-2639 - CVE-2011-2640 - CVE-2011-2641 - CVE-2011-3388 - CVE-2011-4065 - CVE-2011-4681 - CVE-2011-4682 - CVE-2011-4683 - CVE-2012-1924 - CVE-2012-1925 - CVE-2012-1926 - CVE-2012-1927 - CVE-2012-1928 - CVE-2012-1930 - CVE-2012-1931 - CVE-2012-3555 - CVE-2012-3556 - CVE-2012-3557 - CVE-2012-3558 - CVE-2012-3560 - CVE-2012-3561 + CVE-2009-1234 + CVE-2009-2059 + CVE-2009-2063 + CVE-2009-2067 + CVE-2009-2070 + CVE-2009-3013 + CVE-2009-3044 + CVE-2009-3045 + CVE-2009-3046 + CVE-2009-3047 + CVE-2009-3048 + CVE-2009-3049 + CVE-2009-3831 + CVE-2009-4071 + CVE-2009-4072 + CVE-2010-0653 + CVE-2010-1349 + CVE-2010-1989 + CVE-2010-1993 + CVE-2010-2121 + CVE-2010-2421 + CVE-2010-2455 + CVE-2010-2576 + CVE-2010-2658 + CVE-2010-2659 + CVE-2010-2660 + CVE-2010-2661 + CVE-2010-2662 + CVE-2010-2663 + CVE-2010-2664 + CVE-2010-2665 + CVE-2010-3019 + CVE-2010-3020 + CVE-2010-3021 + CVE-2010-4579 + CVE-2010-4580 + CVE-2010-4581 + CVE-2010-4582 + CVE-2010-4583 + CVE-2010-4584 + CVE-2010-4585 + CVE-2010-4586 + CVE-2011-0681 + CVE-2011-0682 + CVE-2011-0683 + CVE-2011-0684 + CVE-2011-0685 + CVE-2011-0686 + CVE-2011-0687 + CVE-2011-1337 + CVE-2011-1824 + CVE-2011-2609 + CVE-2011-2610 + CVE-2011-2611 + CVE-2011-2612 + CVE-2011-2613 + CVE-2011-2614 + CVE-2011-2615 + CVE-2011-2616 + CVE-2011-2617 + CVE-2011-2618 + CVE-2011-2619 + CVE-2011-2620 + CVE-2011-2621 + CVE-2011-2622 + CVE-2011-2623 + CVE-2011-2624 + CVE-2011-2625 + CVE-2011-2626 + CVE-2011-2627 + CVE-2011-2628 + CVE-2011-2629 + CVE-2011-2630 + CVE-2011-2631 + CVE-2011-2632 + CVE-2011-2633 + CVE-2011-2634 + CVE-2011-2635 + CVE-2011-2636 + CVE-2011-2637 + CVE-2011-2638 + CVE-2011-2639 + CVE-2011-2640 + CVE-2011-2641 + CVE-2011-3388 + CVE-2011-4065 + CVE-2011-4681 + CVE-2011-4682 + CVE-2011-4683 + CVE-2012-1924 + CVE-2012-1925 + CVE-2012-1926 + CVE-2012-1927 + CVE-2012-1928 + CVE-2012-1930 + CVE-2012-1931 + CVE-2012-3555 + CVE-2012-3556 + CVE-2012-3557 + CVE-2012-3558 + CVE-2012-3560 + CVE-2012-3561 - + keytoaster - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-04.xml index 16c76aa19d..7efbb6b666 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-04.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code. argyllcms - June 18, 2012 - June 18, 2012: 1 + 2012-06-18 + 2012-06-18: 1 416781 remote @@ -45,10 +45,10 @@ - + CVE-2012-1616 - n0idx80 - n0idx80 + n0idx80 + n0idx80 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-05.xml index 9929beab00..6651f21795 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-05.xml @@ -6,8 +6,8 @@ to execute arbitrary code. Asterisk - June 21, 2012 - June 21, 2012: 1 + 2012-06-21 + 2012-06-21: 1 413353 418189 418191 @@ -57,12 +57,12 @@ - CVE-2012-2414 - CVE-2012-2415 - CVE-2012-2416 - CVE-2012-2947 - CVE-2012-2948 + CVE-2012-2414 + CVE-2012-2415 + CVE-2012-2416 + CVE-2012-2947 + CVE-2012-2948 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-06.xml index 416dec08f2..2194d1135b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-06.xml @@ -6,8 +6,8 @@ code. OpenJPEG - June 21, 2012 - June 21, 2012: 1 + 2012-06-21 + 2012-06-21: 1 409203 remote @@ -41,8 +41,8 @@ - CVE-2012-1499 + CVE-2012-1499 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-07.xml index 36b34e8b0f..3a28abd555 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-07.xml @@ -6,8 +6,8 @@ execution of arbitrary code. nginx - June 21, 2012 - June 21, 2012: 1 + 2012-06-21 + 2012-06-21: 1 411751 remote @@ -47,8 +47,8 @@ - CVE-2012-2089 + CVE-2012-2089 - ago - ackle + ago + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-08.xml index 2bd6590789..de4f07e3c5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-08.xml @@ -6,8 +6,8 @@ which might allow execution of arbitrary code as root. wicd - June 21, 2012 - June 21, 2012: 1 + 2012-06-21 + 2012-06-21: 1 401005 411729 local @@ -50,11 +50,11 @@ - CVE-2012-0813 - CVE-2012-2095 + CVE-2012-0813 + CVE-2012-2095 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-09.xml index eb3f2e5fed..e9282f101b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-09.xml @@ -6,8 +6,8 @@ which leading to remote execution of arbitrary code. MediaWiki - June 21, 2012 - June 21, 2012: 1 + 2012-06-21 + 2012-06-21: 1 366685 409513 remote @@ -47,22 +47,22 @@ - CVE-2010-2787 - CVE-2010-2788 - CVE-2010-2789 - CVE-2011-0003 - CVE-2011-0047 - CVE-2011-0537 - CVE-2011-1579 - CVE-2011-1580 - CVE-2011-1766 - CVE-2011-1766 - CVE-2012-1578 - CVE-2012-1579 - CVE-2012-1580 - CVE-2012-1581 - CVE-2012-1582 + CVE-2010-2787 + CVE-2010-2788 + CVE-2010-2789 + CVE-2011-0003 + CVE-2011-0047 + CVE-2011-0537 + CVE-2011-1579 + CVE-2011-1580 + CVE-2011-1766 + CVE-2011-1766 + CVE-2012-1578 + CVE-2012-1579 + CVE-2012-1580 + CVE-2012-1581 + CVE-2012-1582 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-10.xml index 44c50cc63a..04b71a8ff9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-10.xml @@ -6,8 +6,8 @@ which allowing for remote Denial of Service. ejabberd - June 21, 2012 - June 21, 2012: 1 + 2012-06-21 + 2012-06-21: 1 308047 370201 386075 @@ -44,12 +44,12 @@ - CVE-2010-0305 - CVE-2011-1753 - CVE-2011-4320 + CVE-2010-0305 + CVE-2011-1753 + CVE-2011-4320 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-11.xml index 60566be288..4c932eceec 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-11.xml @@ -6,8 +6,8 @@ allowing for the remote execution of arbitrary code. Pidgin - June 21, 2012 - June 21, 2012: 1 + 2012-06-21 + 2012-06-21: 1 299751 372785 385073 @@ -45,12 +45,12 @@ - CVE-2010-0013 - CVE-2011-2485 - CVE-2011-3594 + CVE-2010-0013 + CVE-2011-2485 + CVE-2011-3594 - + keytoaster - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-12.xml index 9fa6cf430a..d34e5e7da6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-12.xml @@ -42,7 +42,7 @@ - CVE-2011-2199 + CVE-2011-2199 underling craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-13.xml index f620e1e690..5c9a40fdab 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-13.xml @@ -6,8 +6,8 @@ allowing for the remote execution of arbitrary code. mono mono-debugger - June 21, 2012 - June 21, 2012: 1 + 2012-06-21 + 2012-06-21: 1 277878 342133 345561 @@ -69,19 +69,19 @@ - CVE-2009-0217 - CVE-2010-3332 - CVE-2010-3369 - CVE-2010-4159 - CVE-2010-4225 - CVE-2010-4254 - CVE-2011-0989 - CVE-2011-0990 - CVE-2011-0991 - CVE-2011-0992 + CVE-2009-0217 + CVE-2010-3332 + CVE-2010-3369 + CVE-2010-4159 + CVE-2010-4225 + CVE-2010-4254 + CVE-2011-0989 + CVE-2011-0990 + CVE-2011-0991 + CVE-2011-0992 - craig - + craig + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-14.xml index 910f31d018..6af7f1b8fd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-14.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or conduct various other attacks. acroread - June 22, 2012 - June 22, 2012: 1 + 2012-06-22 + 2012-06-22: 1 405949 411499 remote @@ -44,15 +44,15 @@ - CVE-2011-4370 - CVE-2011-4371 - CVE-2011-4372 - CVE-2011-4373 - CVE-2012-0774 - CVE-2012-0775 - CVE-2012-0776 - CVE-2012-0777 + CVE-2011-4370 + CVE-2011-4371 + CVE-2011-4372 + CVE-2011-4373 + CVE-2012-0774 + CVE-2012-0775 + CVE-2012-0776 + CVE-2012-0777 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-15.xml index b8c3827a73..28bd63e070 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-15.xml @@ -6,8 +6,8 @@ execute arbitrary code or cause a Denial of Service condition. libpng - June 22, 2012 - January 03, 2017: 5 + 2012-06-22 + 2017-01-03: 5 373967 386185 401987 @@ -90,18 +90,18 @@

- CVE-2009-5063 - CVE-2011-2501 - CVE-2011-2690 - CVE-2011-2691 - CVE-2011-2692 - CVE-2011-3026 - CVE-2011-3045 - CVE-2011-3048 - CVE-2011-3464 + CVE-2009-5063 + CVE-2011-2501 + CVE-2011-2690 + CVE-2011-2691 + CVE-2011-2692 + CVE-2011-3026 + CVE-2011-3045 + CVE-2011-3048 + CVE-2011-3464 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-16.xml index ed773e226e..9931093f8b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-16.xml @@ -6,8 +6,8 @@ resulting in Denial of Service. TagLib - June 22, 2012 - June 22, 2012: 1 + 2012-06-22 + 2012-06-22: 1 407673 410953 remote @@ -58,10 +58,10 @@

- CVE-2012-1107 - CVE-2012-1108 - CVE-2012-1584 + CVE-2012-1107 + CVE-2012-1108 + CVE-2012-1584 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-17.xml index 6bed28d703..81bd8d9f9a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-17.xml @@ -6,8 +6,8 @@ possibly allowing symlink attacks. virtualenv - June 22, 2012 - June 22, 2012: 1 + 2012-06-22 + 2012-06-22: 1 395285 local @@ -41,8 +41,8 @@ - CVE-2011-4617 + CVE-2011-4617 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-18.xml index 716cd2dba8..e70b8faf6d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-18.xml @@ -6,8 +6,8 @@ remote attacker to perform man-in-the-middle or Denial of Service attacks. GnuTLS - June 23, 2012 - June 23, 2012: 1 + 2012-06-23 + 2012-06-23: 1 281224 292025 389947 @@ -61,11 +61,11 @@ - CVE-2009-2730 - CVE-2009-3555 - CVE-2011-4128 - CVE-2012-1573 + CVE-2009-2730 + CVE-2009-3555 + CVE-2011-4128 + CVE-2012-1573 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-19.xml index a937e883d7..30c01976c0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-19.xml @@ -6,8 +6,8 @@ gain escalated privileges. nvidia-drivers - June 23, 2012 - June 23, 2012: 1 + 2012-06-23 + 2012-06-23: 1 411617 local @@ -47,8 +47,8 @@ - CVE-2012-0946 + CVE-2012-0946 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-20.xml index bc946857ca..57271d8704 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-20.xml @@ -6,8 +6,8 @@ Service condition. gdk-pixbuf - June 23, 2012 - June 23, 2012: 1 + 2012-06-23 + 2012-06-23: 1 373999 412033 remote @@ -54,11 +54,11 @@

- CVE-2011-2485 - CVE-2012-2370 + CVE-2011-2485 + CVE-2012-2370 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-21.xml index ad3d24b7d8..3b012d8eb7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-21.xml @@ -6,8 +6,8 @@ could result in the execution of arbitrary code or Denial of Service. Adobe Flash Player - June 23, 2012 - June 23, 2012: 1 + 2012-06-23 + 2012-06-23: 1 414603 420311 remote @@ -46,15 +46,15 @@ - CVE-2012-0779 - CVE-2012-2034 - CVE-2012-2035 - CVE-2012-2036 - CVE-2012-2037 - CVE-2012-2038 - CVE-2012-2039 - CVE-2012-2040 + CVE-2012-0779 + CVE-2012-2034 + CVE-2012-2035 + CVE-2012-2036 + CVE-2012-2037 + CVE-2012-2038 + CVE-2012-2039 + CVE-2012-2040 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-22.xml index 8f57043f00..676e1105e3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-22.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code with root privileges. Samba - June 24, 2012 - June 24, 2012: 1 + 2012-06-24 + 2012-06-24: 1 290633 310105 323785 @@ -55,22 +55,22 @@ - CVE-2009-2906 - CVE-2009-2948 - CVE-2010-0728 - CVE-2010-1635 - CVE-2010-1642 - CVE-2010-2063 - CVE-2010-3069 - CVE-2011-0719 - CVE-2011-1678 - CVE-2011-2724 - CVE-2012-0870 - CVE-2012-1182 - CVE-2012-2111 + CVE-2009-2906 + CVE-2009-2948 + CVE-2010-0728 + CVE-2010-1635 + CVE-2010-1642 + CVE-2010-2063 + CVE-2010-3069 + CVE-2011-0719 + CVE-2011-1678 + CVE-2011-2724 + CVE-2012-0870 + CVE-2012-1182 + CVE-2012-2111 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-23.xml index 486814d7c0..a4ebb4f4cf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-23.xml @@ -4,8 +4,8 @@ PyCrypto: Weak key generation PyCrypto generates weak ElGamal keys. pycrypto - June 24, 2012 - June 24, 2012: 1 + 2012-06-24 + 2012-06-24: 1 417625 remote @@ -37,8 +37,8 @@ - CVE-2012-2417 + CVE-2012-2417 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-24.xml index 8147f0539c..3bc2a06066 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-24.xml @@ -6,8 +6,8 @@ which allowing to read, modify and overwrite arbitrary files. apache tomcat - June 24, 2012 - March 20, 2016: 3 + 2012-06-24 + 2016-03-20: 3 272566 273662 303719 @@ -70,41 +70,41 @@ - CVE-2008-5515 - CVE-2009-0033 - CVE-2009-0580 - CVE-2009-0781 - CVE-2009-0783 - CVE-2009-2693 - CVE-2009-2901 - CVE-2009-2902 - CVE-2010-1157 - CVE-2010-2227 - CVE-2010-3718 - CVE-2010-4172 - CVE-2010-4312 - CVE-2011-0013 - CVE-2011-0534 - CVE-2011-1088 - CVE-2011-1183 - CVE-2011-1184 - CVE-2011-1419 - CVE-2011-1475 - CVE-2011-1582 - CVE-2011-2204 - CVE-2011-2481 - CVE-2011-2526 - CVE-2011-2729 - CVE-2011-3190 - CVE-2011-3375 - CVE-2011-4858 - CVE-2011-5062 - CVE-2011-5063 - CVE-2011-5064 - CVE-2012-0022 + CVE-2008-5515 + CVE-2009-0033 + CVE-2009-0580 + CVE-2009-0781 + CVE-2009-0783 + CVE-2009-2693 + CVE-2009-2901 + CVE-2009-2902 + CVE-2010-1157 + CVE-2010-2227 + CVE-2010-3718 + CVE-2010-4172 + CVE-2010-4312 + CVE-2011-0013 + CVE-2011-0534 + CVE-2011-1088 + CVE-2011-1183 + CVE-2011-1184 + CVE-2011-1419 + CVE-2011-1475 + CVE-2011-1582 + CVE-2011-2204 + CVE-2011-2481 + CVE-2011-2526 + CVE-2011-2729 + CVE-2011-3190 + CVE-2011-3375 + CVE-2011-4858 + CVE-2011-5062 + CVE-2011-5063 + CVE-2011-5064 + CVE-2012-0022 - craig - + craig + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-25.xml index 68c569e795..4562803a16 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-25.xml @@ -4,8 +4,8 @@ Apache HTTP Server: Multiple vulnerabilities Multiple vulnerabilities were found in Apache HTTP Server. apache - June 24, 2012 - June 24, 2012: 1 + 2012-06-24 + 2012-06-24: 1 308049 330195 380475 @@ -55,22 +55,22 @@ - CVE-2010-0408 - CVE-2010-0434 - CVE-2010-1452 - CVE-2010-2791 - CVE-2011-3192 - CVE-2011-3348 - CVE-2011-3368 - CVE-2011-3607 - CVE-2011-4317 - CVE-2012-0021 - CVE-2012-0031 - CVE-2012-0053 - CVE-2012-0883 + CVE-2010-0408 + CVE-2010-0434 + CVE-2010-1452 + CVE-2010-2791 + CVE-2011-3192 + CVE-2011-3348 + CVE-2011-3368 + CVE-2011-3607 + CVE-2011-4317 + CVE-2012-0021 + CVE-2012-0031 + CVE-2012-0053 + CVE-2012-0883 - craig - + craig + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-26.xml index bf57bee853..244dfc790a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-26.xml @@ -7,8 +7,8 @@ arbitrary code. RPM - June 24, 2012 - June 24, 2012: 1 + 2012-06-24 + 2012-06-24: 1 335880 384967 410949 @@ -72,17 +72,17 @@ - CVE-2010-2059 - CVE-2010-2197 - CVE-2010-2198 - CVE-2010-2199 - CVE-2011-3378 - CVE-2012-0060 - CVE-2012-0061 - CVE-2012-0815 + CVE-2010-2059 + CVE-2010-2197 + CVE-2010-2198 + CVE-2010-2199 + CVE-2011-3378 + CVE-2012-0060 + CVE-2012-0061 + CVE-2012-0815 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-27.xml index ede13c650d..2ad1e1d51d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-27.xml @@ -6,8 +6,8 @@ execute arbitrary code. mini_httpd - June 24, 2012 - June 24, 2012: 1 + 2012-06-24 + 2012-06-24: 1 303755 remote @@ -42,10 +42,10 @@ - CVE-2009-4490 + CVE-2009-4490 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-28.xml index 20a5331e36..08c0a463ed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-28.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code. TeX Live - June 25, 2012 - June 25, 2012: 1 + 2012-06-25 + 2012-06-25: 1 264598 324019 remote @@ -44,13 +44,13 @@ - CVE-2009-1284 - CVE-2010-0739 - CVE-2010-0827 - CVE-2010-1440 + CVE-2009-1284 + CVE-2010-0739 + CVE-2010-0827 + CVE-2010-1440 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-29.xml index 7c4685d552..6a497fbf6d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-29.xml @@ -6,8 +6,8 @@ which leading to privilege escalation. mount-cifs - June 25, 2012 - February 02, 2014: 2 + 2012-06-25 + 2014-02-02: 2 308067 remote @@ -43,11 +43,11 @@ - CVE-2010-0547 - CVE-2010-0787 + CVE-2010-0547 + CVE-2010-0787 - + keytoaster - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-30.xml index d29b201acf..f0fb5e64e7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-30.xml @@ -6,8 +6,8 @@ attackers to conduct man-in-the-middle attacks. sendmail - June 25, 2012 - June 25, 2012: 1 + 2012-06-25 + 2012-06-25: 1 299120 remote @@ -42,10 +42,10 @@ - CVE-2009-4565 + CVE-2009-4565 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-31.xml index 73c233eadf..8b17a3d719 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-31.xml @@ -7,8 +7,8 @@ Service, corrupt data, or obtain sensitive information. pam - June 25, 2012 - June 25, 2012: 1 + 2012-06-25 + 2012-06-25: 1 343399 386273 388431 @@ -55,19 +55,19 @@

- CVE-2010-3316 - CVE-2010-3430 - CVE-2010-3431 - CVE-2010-3435 - CVE-2010-3853 - CVE-2010-4706 - CVE-2010-4707 - CVE-2010-4708 - CVE-2011-3148 - CVE-2011-3149 + CVE-2010-3316 + CVE-2010-3430 + CVE-2010-3431 + CVE-2010-3435 + CVE-2010-3853 + CVE-2010-4706 + CVE-2010-4707 + CVE-2010-4708 + CVE-2011-3148 + CVE-2011-3149 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-32.xml index f7eeba470a..d3d91d8e3f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-32.xml @@ -6,8 +6,8 @@ enable remote attackers to conduct man-in-the-middle attacks. Links - June 25, 2012 - June 25, 2012: 1 + 2012-06-25 + 2012-06-25: 1 253847 411493 remote @@ -44,8 +44,8 @@ - Secunia Advisory SA33391 + Secunia Advisory SA33391 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-33.xml index 796bf1260d..d6e4f7de60 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-33.xml @@ -6,8 +6,8 @@ possibly allowing remote code execution. Postfix - June 25, 2012 - June 25, 2012: 1 + 2012-06-25 + 2012-06-25: 1 358085 366605 remote @@ -47,9 +47,9 @@ - CVE-2011-0411 - CVE-2011-1720 + CVE-2011-0411 + CVE-2011-1720 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-34.xml index f589ab06d3..566953732a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-34.xml @@ -6,8 +6,8 @@ attackers to conduct man-in-the-middle attacks. msmtp - June 25, 2012 - June 25, 2012: 1 + 2012-06-25 + 2012-06-25: 1 293647 remote @@ -44,8 +44,8 @@ - CVE-2009-3942 + CVE-2009-3942 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-35.xml index 2636b1f16d..968237043d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-35.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-35.xml @@ -6,8 +6,8 @@ remote execution of arbitrary code. nbd - June 25, 2012 - June 25, 2012: 1 + 2012-06-25 + 2012-06-25: 1 353097 372891 remote @@ -43,11 +43,11 @@ - CVE-2011-0530 - CVE-2011-1925 + CVE-2011-0530 + CVE-2011-1925 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-36.xml index 068602a8f7..07d978e7aa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-36.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-36.xml @@ -6,8 +6,8 @@ to arbitrary system command execution. logrotate - June 25, 2012 - June 25, 2012: 1 + 2012-06-25 + 2012-06-25: 1 356811 372973 local @@ -48,13 +48,13 @@ - CVE-2011-1098 - CVE-2011-1154 - CVE-2011-1155 - CVE-2011-1549 + CVE-2011-1098 + CVE-2011-1154 + CVE-2011-1155 + CVE-2011-1549 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-01.xml index 327262216a..77826694f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-01.xml @@ -6,8 +6,8 @@ to gain escalated privileges. sudo - July 09, 2012 - July 09, 2012: 1 + 2012-07-09 + 2012-07-09: 1 416281 local @@ -43,8 +43,8 @@ - CVE-2012-2337 + CVE-2012-2337 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-02.xml index 1b35ff7d63..281432dd42 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-02.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. libxml2 - July 09, 2012 - July 09, 2012: 1 + 2012-07-09 + 2012-07-09: 1 416209 remote @@ -43,10 +43,10 @@ - CVE-2011-3102 + CVE-2011-3102 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-03.xml index 1815989b42..0eb206aca6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-03.xml @@ -6,8 +6,8 @@ execution of arbitrary code. ChaSen - July 09, 2012 - July 09, 2012: 1 + 2012-07-09 + 2012-07-09: 1 390769 remote @@ -42,8 +42,8 @@ - CVE-2011-4000 + CVE-2011-4000 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-04.xml index 173e30d304..178b217428 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-04.xml @@ -6,8 +6,8 @@ privilege escalation or Denial of Service. xorg-server - July 09, 2012 - July 09, 2012: 1 + 2012-07-09 + 2012-07-09: 1 412609 local @@ -58,8 +58,8 @@

X.Org X Server 1.9.x is not affected.

- CVE-2012-2118 + CVE-2012-2118 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-05.xml index 1dbf1dce9a..0f10c86afc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-05.xml @@ -6,8 +6,8 @@ arbitrary code. pidgin-otr - July 09, 2012 - July 09, 2012: 1 + 2012-07-09 + 2012-07-09: 1 416263 remote @@ -43,10 +43,10 @@ - CVE-2012-2369 + CVE-2012-2369 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-06.xml index 247de6236d..f19941710a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-06.xml @@ -6,8 +6,8 @@ cause a Denial of Service condition. jruby - July 09, 2012 - July 09, 2012: 1 + 2012-07-09 + 2012-07-09: 1 396305 remote @@ -41,8 +41,8 @@ - CVE-2011-4838 + CVE-2011-4838 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-07.xml index 8ffe82ac13..0b1180209d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-07.xml @@ -6,8 +6,8 @@ to kill arbitrary processes. keepalived - July 09, 2012 - July 09, 2012: 1 + 2012-07-09 + 2012-07-09: 1 371469 local @@ -43,8 +43,8 @@ - CVE-2011-1784 + CVE-2011-1784 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-08.xml index 592c49e87e..503dc2fd6e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-08.xml @@ -7,8 +7,8 @@ disclosure. Gnash - July 09, 2012 - July 09, 2012: 1 + 2012-07-09 + 2012-07-09: 1 391283 408209 local, remote @@ -53,9 +53,9 @@ - CVE-2011-4328 - CVE-2012-1175 + CVE-2011-4328 + CVE-2012-1175 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-09.xml index 2cc9e991ae..7d0c8e7e69 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-09.xml @@ -6,8 +6,8 @@ execution of arbitrary code or Denial of Service. mod_fcgid - July 09, 2012 - July 09, 2012: 1 + 2012-07-09 + 2012-07-09: 1 344685 409373 local, remote @@ -55,11 +55,11 @@ - CVE-2010-3872 - CVE-2012-1181 + CVE-2010-3872 + CVE-2012-1181 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-10.xml index 0393d13fde..661e41945e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201207-10.xml @@ -6,8 +6,8 @@ allow execution of arbitrary code or local privilege escalation. cups - July 09, 2012 - July 09, 2012: 1 + 2012-07-09 + 2012-07-09: 1 295256 308045 325551 @@ -53,39 +53,39 @@

- + CVE-2009-3553 - + CVE-2010-0302 - + CVE-2010-0393 - + CVE-2010-0540 - + CVE-2010-0542 - + CVE-2010-1748 - + CVE-2010-2431 - + CVE-2010-2432 - + CVE-2010-2941 - + CVE-2011-3170 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-01.xml index 61d9c3a2f5..0e2bcf01b0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-01.xml @@ -6,8 +6,8 @@ arbitrary code. socat - August 14, 2012 - August 14, 2012: 1 + 2012-08-14 + 2012-08-14: 1 415977 local, remote @@ -41,11 +41,11 @@ - CVE-2012-0219 + CVE-2012-0219 Socat security advisory 3 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-02.xml index d52918180c..6832ec913d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-02.xml @@ -6,8 +6,8 @@ which could lead to execution of arbitrary code. Puppet - August 14, 2012 - August 14, 2012: 1 + 2012-08-14 + 2012-08-14: 1 410857 local @@ -61,12 +61,12 @@ - CVE-2012-1906 - CVE-2012-1986 - CVE-2012-1987 - CVE-2012-1988 - CVE-2012-1989 + CVE-2012-1906 + CVE-2012-1986 + CVE-2012-1987 + CVE-2012-1988 + CVE-2012-1989 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-03.xml index e1a92e79e1..61885e5f11 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-03.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. chromium - August 14, 2012 - August 14, 2012: 1 + 2012-08-14 + 2012-08-14: 1 423719 426204 429174 @@ -46,42 +46,42 @@ - CVE-2012-2815 - CVE-2012-2817 - CVE-2012-2818 - CVE-2012-2819 - CVE-2012-2820 - CVE-2012-2821 - CVE-2012-2823 - CVE-2012-2824 - CVE-2012-2825 - CVE-2012-2826 - CVE-2012-2829 - CVE-2012-2830 - CVE-2012-2831 - CVE-2012-2834 - CVE-2012-2842 - CVE-2012-2843 - CVE-2012-2846 - CVE-2012-2847 - CVE-2012-2848 - CVE-2012-2849 - CVE-2012-2853 - CVE-2012-2854 - CVE-2012-2857 - CVE-2012-2858 - CVE-2012-2859 - CVE-2012-2860 - + CVE-2012-2815 + CVE-2012-2817 + CVE-2012-2818 + CVE-2012-2819 + CVE-2012-2820 + CVE-2012-2821 + CVE-2012-2823 + CVE-2012-2824 + CVE-2012-2825 + CVE-2012-2826 + CVE-2012-2829 + CVE-2012-2830 + CVE-2012-2831 + CVE-2012-2834 + CVE-2012-2842 + CVE-2012-2843 + CVE-2012-2846 + CVE-2012-2847 + CVE-2012-2848 + CVE-2012-2849 + CVE-2012-2853 + CVE-2012-2854 + CVE-2012-2857 + CVE-2012-2858 + CVE-2012-2859 + CVE-2012-2860 + Release Notes 20.0.1132.43 - + Release Notes 20.0.1132.57 - + Release Notes 21.0.1180.57 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-04.xml index 63b09a1fd0..d687b3d297 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-04.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. gajim - August 14, 2012 - August 14, 2012: 1 + 2012-08-14 + 2012-08-14: 1 411269 412215 local, remote @@ -49,10 +49,10 @@ - CVE-2012-2085 - CVE-2012-2086 - CVE-2012-2093 + CVE-2012-2085 + CVE-2012-2086 + CVE-2012-2093 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-05.xml index 1da1bc165d..70608514b4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-05.xml @@ -6,8 +6,8 @@ Config-IniFiles module, possibly allowing symlink attacks. Config-IniFiles - August 14, 2012 - August 14, 2012: 1 + 2012-08-14 + 2012-08-14: 1 414485 local @@ -45,10 +45,10 @@ - CVE-2012-2451 + CVE-2012-2451 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-06.xml index d6dc7f2060..0a44a534c5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201208-06.xml @@ -6,8 +6,8 @@ man-in-the-middle attacks. libgdata - August 14, 2012 - August 14, 2012: 1 + 2012-08-14 + 2012-08-14: 1 408245 remote @@ -43,8 +43,8 @@ - CVE-2012-1177 + CVE-2012-1177 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-01.xml index 82f1415c56..4b0f35cbd0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-01.xml @@ -6,8 +6,8 @@ worst of which could result in execution of arbitrary code. adobe-flash - September 05, 2012 - September 05, 2012: 2 + 2012-09-05 + 2012-09-05: 2 431432 432286 remote @@ -47,14 +47,14 @@ - CVE-2012-1535 - CVE-2012-4163 - CVE-2012-4164 - CVE-2012-4165 - CVE-2012-4166 - CVE-2012-4167 - CVE-2012-4168 + CVE-2012-1535 + CVE-2012-4163 + CVE-2012-4164 + CVE-2012-4165 + CVE-2012-4166 + CVE-2012-4167 + CVE-2012-4168 - ago - ackle + ago + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-02.xml index 6ff3e6e99a..f5ede1ee25 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-02.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. tiff - September 23, 2012 - June 02, 2014: 6 + 2012-09-23 + 2014-06-02: 6 307001 324885 357271 @@ -62,34 +62,34 @@ - CVE-2009-2347 - CVE-2009-5022 - CVE-2010-1411 - CVE-2010-2065 - CVE-2010-2067 - CVE-2010-2233 - CVE-2010-2443 - CVE-2010-2481 - CVE-2010-2482 - CVE-2010-2483 - CVE-2010-2595 - CVE-2010-2596 - CVE-2010-2597 - CVE-2010-2630 - CVE-2010-2631 - CVE-2010-3087 - CVE-2010-4665 - CVE-2011-0192 - CVE-2011-0192 - CVE-2011-1167 - CVE-2011-1167 - CVE-2012-1173 - CVE-2012-2088 - CVE-2012-2113 - CVE-2012-3401 + CVE-2009-2347 + CVE-2009-5022 + CVE-2010-1411 + CVE-2010-2065 + CVE-2010-2067 + CVE-2010-2233 + CVE-2010-2443 + CVE-2010-2481 + CVE-2010-2482 + CVE-2010-2483 + CVE-2010-2595 + CVE-2010-2596 + CVE-2010-2597 + CVE-2010-2630 + CVE-2010-2631 + CVE-2010-3087 + CVE-2010-4665 + CVE-2011-0192 + CVE-2011-0192 + CVE-2011-1167 + CVE-2011-1167 + CVE-2012-1173 + CVE-2012-2088 + CVE-2012-2113 + CVE-2012-3401 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-03.xml index e1718ac315..ad220378c4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-03.xml @@ -6,8 +6,8 @@ to remote execution of arbitrary code. php - September 24, 2012 - September 24, 2012: 1 + 2012-09-24 + 2012-09-24: 1 384301 396311 396533 @@ -67,26 +67,26 @@ - CVE-2011-1398 - CVE-2011-3379 - CVE-2011-4566 - CVE-2011-4885 - CVE-2012-0057 - CVE-2012-0788 - CVE-2012-0789 - CVE-2012-0830 - CVE-2012-0831 - CVE-2012-1172 - CVE-2012-1823 - CVE-2012-2143 - CVE-2012-2311 - CVE-2012-2335 - CVE-2012-2336 - CVE-2012-2386 - CVE-2012-2688 - CVE-2012-3365 - CVE-2012-3450 + CVE-2011-1398 + CVE-2011-3379 + CVE-2011-4566 + CVE-2011-4885 + CVE-2012-0057 + CVE-2012-0788 + CVE-2012-0789 + CVE-2012-0830 + CVE-2012-0831 + CVE-2012-1172 + CVE-2012-1823 + CVE-2012-2143 + CVE-2012-2311 + CVE-2012-2335 + CVE-2012-2336 + CVE-2012-2386 + CVE-2012-2688 + CVE-2012-3365 + CVE-2012-3450 - ago - ackle + ago + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-04.xml index 708d346ccf..3a8c08f125 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-04.xml @@ -6,8 +6,8 @@ which may allow remote Denial of Service. bind - September 24, 2012 - September 24, 2012: 1 + 2012-09-24 + 2012-09-24: 1 402661 419637 427966 @@ -56,12 +56,12 @@ - CVE-2012-1033 - CVE-2012-1667 - CVE-2012-3817 - CVE-2012-3868 - CVE-2012-4244 + CVE-2012-1033 + CVE-2012-1667 + CVE-2012-3817 + CVE-2012-3868 + CVE-2012-4244 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-05.xml index 357b46562a..244e36901e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-05.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code or cause a Denial of Service. libreoffice - September 24, 2012 - September 24, 2012: 1 + 2012-09-24 + 2012-09-24: 1 386081 409455 416457 @@ -73,13 +73,13 @@ - CVE-2011-2713 - CVE-2012-0037 - CVE-2012-1149 - CVE-2012-2665 + CVE-2011-2713 + CVE-2012-0037 + CVE-2012-1149 + CVE-2012-2665 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-06.xml index 3e556afea2..4be3bd83bf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-06.xml @@ -6,8 +6,8 @@ resulting in Denial of Service. expat - September 24, 2012 - September 24, 2012: 1 + 2012-09-24 + 2012-09-24: 1 280615 303727 407519 @@ -48,14 +48,14 @@

- CVE-2009-3560 - CVE-2009-3720 - CVE-2012-0876 - CVE-2012-1147 - CVE-2012-1148 + CVE-2009-3560 + CVE-2009-3720 + CVE-2012-0876 + CVE-2012-1147 + CVE-2012-1148 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-07.xml index f028c3f8f9..2ef1339b87 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-07.xml @@ -8,8 +8,8 @@ result in execution of arbitrary code or Denial of Service. icu - September 24, 2012 - September 24, 2012: 1 + 2012-09-24 + 2012-09-24: 1 394201 remote @@ -49,8 +49,8 @@ - CVE-2011-4599 + CVE-2011-4599 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-08.xml index c4e977516f..2d1f808236 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-08.xml @@ -4,8 +4,8 @@ SquidClamav: Denial of Service A vulnerability in SquidClamav may result in Denial of Service. squidclamav - September 24, 2012 - September 24, 2012: 1 + 2012-09-24 + 2012-09-24: 1 428778 remote @@ -39,11 +39,11 @@ - CVE-2012-3501 - SquidClamav News + CVE-2012-3501 + SquidClamav News - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-09.xml index e49fb76fe9..bad91a172b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-09.xml @@ -6,8 +6,8 @@ of Service or a bypass of security restrictions. atheme - September 25, 2012 - September 25, 2012: 1 + 2012-09-25 + 2012-09-25: 1 409103 remote @@ -44,10 +44,10 @@ - CVE-2012-1576 + CVE-2012-1576 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-10.xml index 0d5b9dbafe..c777af605f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-10.xml @@ -6,8 +6,8 @@ execution of arbitrary code. calligra - September 25, 2012 - September 25, 2012: 1 + 2012-09-25 + 2012-09-25: 1 428890 remote @@ -43,8 +43,8 @@ - CVE-2012-3456 + CVE-2012-3456 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-11.xml index b24cb4c131..b41047f03d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-11.xml @@ -6,8 +6,8 @@ which may allow remote execution of arbitrary code. opera - September 25, 2012 - September 25, 2012: 1 + 2012-09-25 + 2012-09-25: 1 429478 434584 remote @@ -47,16 +47,16 @@ - CVE-2012-4010 - CVE-2012-4142 - CVE-2012-4143 - CVE-2012-4144 - CVE-2012-4145 - CVE-2012-4146 - Opera 12.01 for + CVE-2012-4010 + CVE-2012-4142 + CVE-2012-4143 + CVE-2012-4144 + CVE-2012-4145 + CVE-2012-4146 + Opera 12.01 for UNIX changelog - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-12.xml index 87fa78cdaf..cebb109cde 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-12.xml @@ -6,8 +6,8 @@ condition. libtasn1 - September 25, 2012 - September 25, 2012: 1 + 2012-09-25 + 2012-09-25: 1 409031 remote @@ -48,10 +48,10 @@

- CVE-2012-1569 + CVE-2012-1569 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-13.xml index ec2b5db028..7dfa02c1cf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-13.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. libjpeg-turbo - September 26, 2012 - September 26, 2012: 1 + 2012-09-26 + 2012-09-26: 1 426938 remote @@ -47,8 +47,8 @@

- CVE-2012-2806 + CVE-2012-2806 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-14.xml index f655550199..ac0308a19c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-14.xml @@ -4,8 +4,8 @@ file: Denial of Service A vulnerability in file could result in Denial of Service. file - September 26, 2012 - September 26, 2012: 1 + 2012-09-26 + 2012-09-26: 1 427368 remote @@ -42,8 +42,8 @@ - CVE-2012-1571 + CVE-2012-1571 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-15.xml index f0e61cb3c5..ca9637fa7f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-15.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. asterisk - September 26, 2012 - September 26, 2012: 1 + 2012-09-26 + 2012-09-26: 1 425050 433750 remote @@ -54,13 +54,13 @@ - CVE-2012-2186 - CVE-2012-3812 - CVE-2012-3863 - CVE-2012-4737 + CVE-2012-2186 + CVE-2012-3812 + CVE-2012-3863 + CVE-2012-4737 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-16.xml index c1e439e585..6c4ca06bf9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-16.xml @@ -6,8 +6,8 @@ conduct SQL injection. sqlalchemy - September 26, 2012 - September 26, 2012: 1 + 2012-09-26 + 2012-09-26: 1 407437 remote @@ -42,10 +42,10 @@ - CVE-2012-0805 + CVE-2012-0805 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-17.xml index 10a8f3171f..71905cbea2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-17.xml @@ -6,8 +6,8 @@ arbitrary code or cause Denial of Service. pidgin - September 27, 2012 - September 27, 2012: 1 + 2012-09-27 + 2012-09-27: 1 425076 remote @@ -43,8 +43,8 @@ - CVE-2012-3374 + CVE-2012-3374 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-18.xml index 839a29a8b7..855dfa3f80 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-18.xml @@ -6,8 +6,8 @@ lead to SQL injection or cross-site scripting attacks. postfixadmin - September 27, 2012 - September 27, 2012: 1 + 2012-09-27 + 2012-09-27: 1 400971 remote @@ -44,11 +44,11 @@ - CVE-2012-0811 - CVE-2012-0812 + CVE-2012-0811 + CVE-2012-0812 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-19.xml index 4f9ce6e485..a82a16aa10 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-19.xml @@ -6,8 +6,8 @@ arbitrary code. nut - September 27, 2012 - September 27, 2012: 1 + 2012-09-27 + 2012-09-27: 1 419377 remote @@ -42,8 +42,8 @@ - CVE-2012-2944 + CVE-2012-2944 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-20.xml index 5e4a09281f..934ff2a5f3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-20.xml @@ -4,8 +4,8 @@ mod_rpaf: Denial of Service A vulnerability in mod_rpaf may result in Denial of Service. mod_rpaf - September 27, 2012 - September 27, 2012: 1 + 2012-09-27 + 2012-09-27: 1 432406 remote @@ -41,8 +41,8 @@ - CVE-2012-3526 + CVE-2012-3526 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-21.xml index 65e2f41e13..2e87146459 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-21.xml @@ -6,8 +6,8 @@ allowing remote attackers to create or overwrite arbitrary files. fastjar - September 28, 2012 - September 28, 2012: 1 + 2012-09-28 + 2012-09-28: 1 325557 remote @@ -42,9 +42,9 @@ - CVE-2010-0831 - CVE-2010-2322 + CVE-2010-0831 + CVE-2010-2322 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-22.xml index 1322f116c0..7f0ca963fa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-22.xml @@ -6,8 +6,8 @@ escalated privileges. libgssglue - September 28, 2012 - September 28, 2012: 1 + 2012-09-28 + 2012-09-28: 1 385321 local @@ -41,8 +41,8 @@ - CVE-2011-2709 + CVE-2011-2709 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-23.xml index c4755d61b0..f915ab6161 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-23.xml @@ -6,8 +6,8 @@ which allow execution of arbitrary code or Denial of Service. gimp - September 28, 2012 - September 28, 2012: 1 + 2012-09-28 + 2012-09-28: 1 293127 350915 372975 @@ -47,17 +47,17 @@ - CVE-2009-1570 - CVE-2009-3909 - CVE-2010-4540 - CVE-2010-4541 - CVE-2010-4542 - CVE-2010-4543 - CVE-2011-1178 - CVE-2011-2896 - CVE-2012-2763 - CVE-2012-3402 + CVE-2009-1570 + CVE-2009-3909 + CVE-2010-4540 + CVE-2010-4541 + CVE-2010-4542 + CVE-2010-4543 + CVE-2011-1178 + CVE-2011-2896 + CVE-2012-2763 + CVE-2012-3402 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-24.xml index d360b59f15..2598c93f05 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-24.xml @@ -7,8 +7,8 @@ PostgreSQL - September 28, 2012 - January 20, 2014: 2 + 2012-09-28 + 2014-01-20: 2 406037 419727 431766 @@ -87,16 +87,16 @@ - CVE-2012-0866 - CVE-2012-0867 - CVE-2012-0868 - CVE-2012-2143 - CVE-2012-2655 - CVE-2012-3488 - CVE-2012-3489 + CVE-2012-0866 + CVE-2012-0867 + CVE-2012-0868 + CVE-2012-2143 + CVE-2012-2655 + CVE-2012-3488 + CVE-2012-3489 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-25.xml index 8e5009eeeb..422b260282 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201209-25.xml @@ -8,8 +8,8 @@ code, and a Denial of Service. vmware-server vmware-player vmware-workstation - September 29, 2012 - September 29, 2012: 2 + 2012-09-29 + 2012-09-29: 2 213548 224637 236167 @@ -98,112 +98,112 @@ - CVE-2007-5269 - + CVE-2007-5269 + CVE-2007-5503 - + CVE-2007-5671 - + CVE-2008-0967 - + CVE-2008-1340 - + CVE-2008-1361 - + CVE-2008-1362 - + CVE-2008-1363 - + CVE-2008-1364 - + CVE-2008-1392 - + CVE-2008-1447 - + CVE-2008-1806 - + CVE-2008-1807 - + CVE-2008-1808 - + CVE-2008-2098 - + CVE-2008-2100 - + CVE-2008-2101 - + CVE-2008-4915 - + CVE-2008-4916 - + CVE-2008-4917 - + CVE-2009-0040 - + CVE-2009-0909 - + CVE-2009-0910 - CVE-2009-1244 - + CVE-2009-1244 + CVE-2009-2267 - + CVE-2009-3707 - + CVE-2009-3732 - + CVE-2009-3733 - + CVE-2009-4811 - + CVE-2010-1137 - + CVE-2010-1138 - + CVE-2010-1139 - + CVE-2010-1140 - + CVE-2010-1141 - + CVE-2010-1142 - + CVE-2010-1143 - CVE-2011-3868 + CVE-2011-3868 - system - ackle + system + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-01.xml index a801679f57..9b2be147cf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-01.xml @@ -6,8 +6,8 @@ attackers to conduct man-in-the-middle attacks. w3m - October 18, 2012 - October 18, 2012: 1 + 2012-10-18 + 2012-10-18: 1 325431 remote @@ -42,8 +42,8 @@ - CVE-2010-2074 + CVE-2010-2074 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-02.xml index 9d804f19dd..2953f4d5c3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-02.xml @@ -6,8 +6,8 @@ which allowing for injection of arbitrary web script or HTML. MoinMoin - October 18, 2012 - October 18, 2012: 1 + 2012-10-18 + 2012-10-18: 1 305663 339295 remote @@ -46,16 +46,16 @@ - CVE-2010-0668 - CVE-2010-0669 - CVE-2010-0717 - CVE-2010-0828 - CVE-2010-1238 - CVE-2010-2487 - CVE-2010-2969 - CVE-2010-2970 - CVE-2011-1058 + CVE-2010-0668 + CVE-2010-0669 + CVE-2010-0717 + CVE-2010-0828 + CVE-2010-1238 + CVE-2010-2487 + CVE-2010-2969 + CVE-2010-2970 + CVE-2011-1058 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-03.xml index 3deaeb2d6d..2377f25c57 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-03.xml @@ -6,8 +6,8 @@ overwrite arbitrary files has been found in rdesktop. rdesktop - October 18, 2012 - October 18, 2012: 1 + 2012-10-18 + 2012-10-18: 1 364191 remote @@ -42,10 +42,10 @@ - CVE-2011-1595 + CVE-2011-1595 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-04.xml index a114d20fc5..ed78e07eac 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-04.xml @@ -6,8 +6,8 @@ to execute arbitrary code. ebuild - October 18, 2012 - October 18, 2012: 1 + 2012-10-18 + 2012-10-18: 1 364889 365259 372411 @@ -49,13 +49,13 @@ - CVE-2011-1750 - CVE-2011-1751 - CVE-2011-2212 - CVE-2011-2512 - CVE-2012-0029 - CVE-2012-2652 + CVE-2011-1750 + CVE-2011-1751 + CVE-2011-2212 + CVE-2011-2512 + CVE-2012-0029 + CVE-2012-2652 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-05.xml index 0ed0fbb769..5d61a182a1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-05.xml @@ -6,8 +6,8 @@ allow execution of arbitrary code. bash - October 20, 2012 - October 20, 2012: 1 + 2012-10-20 + 2012-10-20: 1 251319 431850 local @@ -56,11 +56,11 @@ - CVE-2008-5374 - CVE-2012-3410 + CVE-2008-5374 + CVE-2012-3410 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-06.xml index 3a59ad0673..39ac325d4d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-06.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. libav - October 20, 2012 - October 20, 2012: 1 + 2012-10-20 + 2012-10-20: 1 408555 422537 remote @@ -46,22 +46,22 @@ - CVE-2011-3929 - CVE-2011-3936 - CVE-2011-3937 - CVE-2011-3937 - CVE-2011-3940 - CVE-2011-3945 - CVE-2011-3947 - CVE-2011-3951 - CVE-2011-3952 - CVE-2012-0848 - CVE-2012-0851 - CVE-2012-0852 - CVE-2012-0853 - CVE-2012-0858 - CVE-2012-0947 + CVE-2011-3929 + CVE-2011-3936 + CVE-2011-3937 + CVE-2011-3937 + CVE-2011-3940 + CVE-2011-3945 + CVE-2011-3947 + CVE-2011-3951 + CVE-2011-3952 + CVE-2012-0848 + CVE-2012-0851 + CVE-2012-0852 + CVE-2012-0853 + CVE-2012-0858 + CVE-2012-0947 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-07.xml index 2dc4761eca..3b79f41c0f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201210-07.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. chromium - October 21, 2012 - October 21, 2012: 1 + 2012-10-21 + 2012-10-21: 1 433551 436234 437664 @@ -48,56 +48,56 @@ - CVE-2012-2859 - CVE-2012-2860 - CVE-2012-2865 - CVE-2012-2866 - CVE-2012-2867 - CVE-2012-2868 - CVE-2012-2869 - CVE-2012-2872 - CVE-2012-2874 - CVE-2012-2876 - CVE-2012-2877 - CVE-2012-2878 - CVE-2012-2879 - CVE-2012-2880 - CVE-2012-2881 - CVE-2012-2882 - CVE-2012-2883 - CVE-2012-2884 - CVE-2012-2885 - CVE-2012-2886 - CVE-2012-2887 - CVE-2012-2888 - CVE-2012-2889 - CVE-2012-2891 - CVE-2012-2892 - CVE-2012-2894 - CVE-2012-2896 - CVE-2012-2900 - CVE-2012-5108 - CVE-2012-5110 - CVE-2012-5111 - CVE-2012-5112 - CVE-2012-5376 - + CVE-2012-2859 + CVE-2012-2860 + CVE-2012-2865 + CVE-2012-2866 + CVE-2012-2867 + CVE-2012-2868 + CVE-2012-2869 + CVE-2012-2872 + CVE-2012-2874 + CVE-2012-2876 + CVE-2012-2877 + CVE-2012-2878 + CVE-2012-2879 + CVE-2012-2880 + CVE-2012-2881 + CVE-2012-2882 + CVE-2012-2883 + CVE-2012-2884 + CVE-2012-2885 + CVE-2012-2886 + CVE-2012-2887 + CVE-2012-2888 + CVE-2012-2889 + CVE-2012-2891 + CVE-2012-2892 + CVE-2012-2894 + CVE-2012-2896 + CVE-2012-2900 + CVE-2012-5108 + CVE-2012-5110 + CVE-2012-5111 + CVE-2012-5112 + CVE-2012-5376 + Release Notes 21.0.1180.89 - + Release Notes 22.0.1229.79 - + Release Notes 22.0.1229.92 - + Release Notes 22.0.1229.94 - + phajdan.jr - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201211-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201211-01.xml index 70fe2b214e..29b80098e1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201211-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201211-01.xml @@ -6,8 +6,8 @@ which allowing for local file inclusion. MantisBT - November 08, 2012 - November 08, 2012: 1 + 2012-11-08 + 2012-11-08: 1 348761 381417 386153 @@ -49,30 +49,30 @@ - CVE-2010-3303 - CVE-2010-3763 - CVE-2010-4348 - CVE-2010-4349 - CVE-2010-4350 - CVE-2011-2938 - CVE-2011-3356 - CVE-2011-3357 - CVE-2011-3358 - CVE-2011-3578 - CVE-2011-3755 - CVE-2012-1118 - CVE-2012-1119 - CVE-2012-1120 - CVE-2012-1121 - CVE-2012-1122 - CVE-2012-1123 - CVE-2012-2691 - CVE-2012-2692 + CVE-2010-3303 + CVE-2010-3763 + CVE-2010-4348 + CVE-2010-4349 + CVE-2010-4350 + CVE-2011-2938 + CVE-2011-3356 + CVE-2011-3357 + CVE-2011-3358 + CVE-2011-3578 + CVE-2011-3755 + CVE-2012-1118 + CVE-2012-1119 + CVE-2012-1120 + CVE-2012-1121 + CVE-2012-1122 + CVE-2012-1123 + CVE-2012-2691 + CVE-2012-2692 - + underling - + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-01.xml index 6be2552dac..38d3b766c2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-01.xml @@ -7,8 +7,8 @@ allow execution of arbitrary code or local privilege escalation. firefox - January 08, 2013 - January 08, 2013: 1 + 2013-01-08 + 2013-01-08: 1 180159 181361 207261 @@ -293,953 +293,953 @@ - + CVE-2011-3101 - CVE-2007-2436 + CVE-2007-2436 - CVE-2007-2437 + CVE-2007-2437 - CVE-2007-2671 - CVE-2007-3073 - CVE-2008-0016 + CVE-2007-2671 + CVE-2007-3073 + CVE-2008-0016 - CVE-2008-0017 + CVE-2008-0017 - CVE-2008-0367 - CVE-2008-3835 + CVE-2008-0367 + CVE-2008-3835 - CVE-2008-3836 + CVE-2008-3836 - CVE-2008-3837 + CVE-2008-3837 - CVE-2008-4058 + CVE-2008-4058 - CVE-2008-4059 + CVE-2008-4059 - CVE-2008-4060 + CVE-2008-4060 - CVE-2008-4061 + CVE-2008-4061 - CVE-2008-4062 + CVE-2008-4062 - CVE-2008-4063 + CVE-2008-4063 - CVE-2008-4064 + CVE-2008-4064 - CVE-2008-4065 + CVE-2008-4065 - CVE-2008-4066 + CVE-2008-4066 - CVE-2008-4067 + CVE-2008-4067 - CVE-2008-4068 + CVE-2008-4068 - CVE-2008-4069 + CVE-2008-4069 - CVE-2008-4070 + CVE-2008-4070 - CVE-2008-4582 + CVE-2008-4582 - CVE-2008-5012 + CVE-2008-5012 - CVE-2008-5013 + CVE-2008-5013 - CVE-2008-5014 + CVE-2008-5014 - CVE-2008-5015 + CVE-2008-5015 - CVE-2008-5016 + CVE-2008-5016 - CVE-2008-5017 + CVE-2008-5017 - CVE-2008-5018 + CVE-2008-5018 - CVE-2008-5019 + CVE-2008-5019 - CVE-2008-5021 + CVE-2008-5021 - CVE-2008-5022 + CVE-2008-5022 - CVE-2008-5023 + CVE-2008-5023 - CVE-2008-5024 + CVE-2008-5024 - CVE-2008-5052 + CVE-2008-5052 - CVE-2008-5500 + CVE-2008-5500 - CVE-2008-5501 + CVE-2008-5501 - CVE-2008-5502 + CVE-2008-5502 - CVE-2008-5503 + CVE-2008-5503 - CVE-2008-5504 + CVE-2008-5504 - CVE-2008-5505 + CVE-2008-5505 - CVE-2008-5506 + CVE-2008-5506 - CVE-2008-5507 + CVE-2008-5507 - CVE-2008-5508 + CVE-2008-5508 - CVE-2008-5510 + CVE-2008-5510 - CVE-2008-5511 + CVE-2008-5511 - CVE-2008-5512 + CVE-2008-5512 - CVE-2008-5513 + CVE-2008-5513 - CVE-2008-5822 + CVE-2008-5822 - CVE-2008-5913 + CVE-2008-5913 - CVE-2008-6961 + CVE-2008-6961 - CVE-2009-0071 + CVE-2009-0071 - CVE-2009-0071 + CVE-2009-0071 - CVE-2009-0352 + CVE-2009-0352 - CVE-2009-0353 + CVE-2009-0353 - CVE-2009-0354 + CVE-2009-0354 - CVE-2009-0355 + CVE-2009-0355 - CVE-2009-0356 + CVE-2009-0356 - CVE-2009-0357 + CVE-2009-0357 - CVE-2009-0358 + CVE-2009-0358 - CVE-2009-0652 + CVE-2009-0652 - CVE-2009-0771 + CVE-2009-0771 - CVE-2009-0772 + CVE-2009-0772 - CVE-2009-0773 + CVE-2009-0773 - CVE-2009-0774 + CVE-2009-0774 - CVE-2009-0775 + CVE-2009-0775 - CVE-2009-0776 + CVE-2009-0776 - CVE-2009-0777 + CVE-2009-0777 - CVE-2009-1044 + CVE-2009-1044 - CVE-2009-1169 + CVE-2009-1169 - CVE-2009-1302 + CVE-2009-1302 - CVE-2009-1303 + CVE-2009-1303 - CVE-2009-1304 + CVE-2009-1304 - CVE-2009-1305 + CVE-2009-1305 - CVE-2009-1306 + CVE-2009-1306 - CVE-2009-1307 + CVE-2009-1307 - CVE-2009-1308 + CVE-2009-1308 - CVE-2009-1309 + CVE-2009-1309 - CVE-2009-1310 + CVE-2009-1310 - CVE-2009-1311 + CVE-2009-1311 - CVE-2009-1312 + CVE-2009-1312 - CVE-2009-1313 + CVE-2009-1313 - CVE-2009-1392 + CVE-2009-1392 - CVE-2009-1563 + CVE-2009-1563 - CVE-2009-1571 + CVE-2009-1571 - CVE-2009-1828 + CVE-2009-1828 - CVE-2009-1832 + CVE-2009-1832 - CVE-2009-1833 + CVE-2009-1833 - CVE-2009-1834 + CVE-2009-1834 - CVE-2009-1835 + CVE-2009-1835 - CVE-2009-1836 + CVE-2009-1836 - CVE-2009-1837 + CVE-2009-1837 - CVE-2009-1838 + CVE-2009-1838 - CVE-2009-1839 + CVE-2009-1839 - CVE-2009-1840 + CVE-2009-1840 - CVE-2009-1841 + CVE-2009-1841 - CVE-2009-2043 + CVE-2009-2043 - CVE-2009-2044 + CVE-2009-2044 - CVE-2009-2061 + CVE-2009-2061 - CVE-2009-2065 + CVE-2009-2065 - CVE-2009-2210 + CVE-2009-2210 - CVE-2009-2404 + CVE-2009-2404 - CVE-2009-2408 + CVE-2009-2408 - CVE-2009-2462 + CVE-2009-2462 - CVE-2009-2463 + CVE-2009-2463 - CVE-2009-2464 + CVE-2009-2464 - CVE-2009-2465 + CVE-2009-2465 - CVE-2009-2466 + CVE-2009-2466 - CVE-2009-2467 + CVE-2009-2467 - CVE-2009-2469 + CVE-2009-2469 - CVE-2009-2470 + CVE-2009-2470 - CVE-2009-2471 + CVE-2009-2471 - CVE-2009-2472 + CVE-2009-2472 - CVE-2009-2477 + CVE-2009-2477 - CVE-2009-2478 - CVE-2009-2479 - CVE-2009-2535 + CVE-2009-2478 + CVE-2009-2479 + CVE-2009-2535 - CVE-2009-2654 + CVE-2009-2654 - CVE-2009-2662 + CVE-2009-2662 - CVE-2009-2664 + CVE-2009-2664 - CVE-2009-2665 + CVE-2009-2665 - CVE-2009-3069 + CVE-2009-3069 - CVE-2009-3070 + CVE-2009-3070 - CVE-2009-3071 + CVE-2009-3071 - CVE-2009-3072 + CVE-2009-3072 - CVE-2009-3074 + CVE-2009-3074 - CVE-2009-3075 + CVE-2009-3075 - CVE-2009-3076 + CVE-2009-3076 - CVE-2009-3077 + CVE-2009-3077 - CVE-2009-3078 + CVE-2009-3078 - CVE-2009-3079 + CVE-2009-3079 - CVE-2009-3274 + CVE-2009-3274 - CVE-2009-3371 + CVE-2009-3371 - CVE-2009-3372 + CVE-2009-3372 - CVE-2009-3373 + CVE-2009-3373 - CVE-2009-3374 + CVE-2009-3374 - CVE-2009-3375 + CVE-2009-3375 - CVE-2009-3376 + CVE-2009-3376 - CVE-2009-3377 + CVE-2009-3377 - CVE-2009-3378 + CVE-2009-3378 - CVE-2009-3379 + CVE-2009-3379 - CVE-2009-3380 + CVE-2009-3380 - CVE-2009-3381 + CVE-2009-3381 - CVE-2009-3382 + CVE-2009-3382 - CVE-2009-3383 + CVE-2009-3383 - CVE-2009-3388 + CVE-2009-3388 - CVE-2009-3389 + CVE-2009-3389 - CVE-2009-3555 + CVE-2009-3555 - CVE-2009-3978 + CVE-2009-3978 - CVE-2009-3979 + CVE-2009-3979 - CVE-2009-3980 + CVE-2009-3980 - CVE-2009-3981 + CVE-2009-3981 - CVE-2009-3982 + CVE-2009-3982 - CVE-2009-3983 + CVE-2009-3983 - CVE-2009-3984 + CVE-2009-3984 - CVE-2009-3985 + CVE-2009-3985 - CVE-2009-3986 + CVE-2009-3986 - CVE-2009-3987 + CVE-2009-3987 - CVE-2009-3988 + CVE-2009-3988 - CVE-2010-0159 + CVE-2010-0159 - CVE-2010-0160 + CVE-2010-0160 - CVE-2010-0162 + CVE-2010-0162 - CVE-2010-0163 + CVE-2010-0163 - CVE-2010-0164 + CVE-2010-0164 - CVE-2010-0165 + CVE-2010-0165 - CVE-2010-0166 + CVE-2010-0166 - CVE-2010-0167 + CVE-2010-0167 - CVE-2010-0167 + CVE-2010-0167 - CVE-2010-0168 + CVE-2010-0168 - CVE-2010-0169 + CVE-2010-0169 - CVE-2010-0169 + CVE-2010-0169 - CVE-2010-0170 + CVE-2010-0170 - CVE-2010-0171 + CVE-2010-0171 - CVE-2010-0171 + CVE-2010-0171 - CVE-2010-0172 + CVE-2010-0172 - CVE-2010-0173 + CVE-2010-0173 - CVE-2010-0174 + CVE-2010-0174 - CVE-2010-0174 + CVE-2010-0174 - CVE-2010-0175 + CVE-2010-0175 - CVE-2010-0175 + CVE-2010-0175 - CVE-2010-0176 + CVE-2010-0176 - CVE-2010-0176 + CVE-2010-0176 - CVE-2010-0177 + CVE-2010-0177 - CVE-2010-0178 + CVE-2010-0178 - CVE-2010-0179 + CVE-2010-0179 - CVE-2010-0181 + CVE-2010-0181 - CVE-2010-0182 + CVE-2010-0182 - CVE-2010-0183 + CVE-2010-0183 - CVE-2010-0220 + CVE-2010-0220 - CVE-2010-0648 + CVE-2010-0648 - CVE-2010-0654 + CVE-2010-0654 - CVE-2010-1028 + CVE-2010-1028 - CVE-2010-1121 + CVE-2010-1121 - CVE-2010-1125 + CVE-2010-1125 - CVE-2010-1196 + CVE-2010-1196 - CVE-2010-1197 + CVE-2010-1197 - CVE-2010-1198 + CVE-2010-1198 - CVE-2010-1199 + CVE-2010-1199 - CVE-2010-1200 + CVE-2010-1200 - CVE-2010-1201 + CVE-2010-1201 - CVE-2010-1202 + CVE-2010-1202 - CVE-2010-1203 + CVE-2010-1203 - CVE-2010-1205 + CVE-2010-1205 - CVE-2010-1206 + CVE-2010-1206 - CVE-2010-1207 + CVE-2010-1207 - CVE-2010-1208 + CVE-2010-1208 - CVE-2010-1209 + CVE-2010-1209 - CVE-2010-1210 + CVE-2010-1210 - CVE-2010-1211 + CVE-2010-1211 - CVE-2010-1212 + CVE-2010-1212 - CVE-2010-1213 + CVE-2010-1213 - CVE-2010-1214 + CVE-2010-1214 - CVE-2010-1215 + CVE-2010-1215 - CVE-2010-1585 + CVE-2010-1585 - CVE-2010-2751 + CVE-2010-2751 - CVE-2010-2752 + CVE-2010-2752 - CVE-2010-2753 + CVE-2010-2753 - CVE-2010-2754 + CVE-2010-2754 - CVE-2010-2755 + CVE-2010-2755 - CVE-2010-2760 + CVE-2010-2760 - CVE-2010-2762 + CVE-2010-2762 - CVE-2010-2763 + CVE-2010-2763 - CVE-2010-2764 + CVE-2010-2764 - CVE-2010-2765 + CVE-2010-2765 - CVE-2010-2766 + CVE-2010-2766 - CVE-2010-2767 + CVE-2010-2767 - CVE-2010-2768 + CVE-2010-2768 - CVE-2010-2769 + CVE-2010-2769 - CVE-2010-2770 + CVE-2010-2770 - CVE-2010-3131 + CVE-2010-3131 - CVE-2010-3166 + CVE-2010-3166 - CVE-2010-3167 + CVE-2010-3167 - CVE-2010-3168 + CVE-2010-3168 - CVE-2010-3169 + CVE-2010-3169 - CVE-2010-3170 + CVE-2010-3170 - CVE-2010-3171 + CVE-2010-3171 - CVE-2010-3173 + CVE-2010-3173 - CVE-2010-3174 + CVE-2010-3174 - CVE-2010-3175 + CVE-2010-3175 - CVE-2010-3176 + CVE-2010-3176 - CVE-2010-3177 + CVE-2010-3177 - CVE-2010-3178 + CVE-2010-3178 - CVE-2010-3179 + CVE-2010-3179 - CVE-2010-3180 + CVE-2010-3180 - CVE-2010-3182 + CVE-2010-3182 - CVE-2010-3183 + CVE-2010-3183 - CVE-2010-3399 + CVE-2010-3399 - CVE-2010-3400 + CVE-2010-3400 - CVE-2010-3765 - CVE-2010-3766 + CVE-2010-3765 + CVE-2010-3766 - CVE-2010-3767 + CVE-2010-3767 - CVE-2010-3768 + CVE-2010-3768 - CVE-2010-3769 + CVE-2010-3769 - CVE-2010-3770 + CVE-2010-3770 - CVE-2010-3771 + CVE-2010-3771 - CVE-2010-3772 + CVE-2010-3772 - CVE-2010-3773 + CVE-2010-3773 - CVE-2010-3774 + CVE-2010-3774 - CVE-2010-3775 + CVE-2010-3775 - CVE-2010-3776 + CVE-2010-3776 - CVE-2010-3777 + CVE-2010-3777 - CVE-2010-3778 + CVE-2010-3778 - CVE-2010-4508 + CVE-2010-4508 - CVE-2010-5074 + CVE-2010-5074 - CVE-2011-0051 + CVE-2011-0051 - CVE-2011-0053 + CVE-2011-0053 - CVE-2011-0054 + CVE-2011-0054 - CVE-2011-0055 + CVE-2011-0055 - CVE-2011-0056 + CVE-2011-0056 - CVE-2011-0057 + CVE-2011-0057 - CVE-2011-0058 + CVE-2011-0058 - CVE-2011-0059 + CVE-2011-0059 - CVE-2011-0061 + CVE-2011-0061 - CVE-2011-0062 + CVE-2011-0062 - CVE-2011-0065 + CVE-2011-0065 - CVE-2011-0066 + CVE-2011-0066 - CVE-2011-0067 + CVE-2011-0067 - CVE-2011-0068 + CVE-2011-0068 - CVE-2011-0069 + CVE-2011-0069 - CVE-2011-0070 + CVE-2011-0070 - CVE-2011-0071 + CVE-2011-0071 - CVE-2011-0072 + CVE-2011-0072 - CVE-2011-0073 + CVE-2011-0073 - CVE-2011-0074 + CVE-2011-0074 - CVE-2011-0075 + CVE-2011-0075 - CVE-2011-0076 + CVE-2011-0076 - CVE-2011-0077 + CVE-2011-0077 - CVE-2011-0078 + CVE-2011-0078 - CVE-2011-0079 + CVE-2011-0079 - CVE-2011-0080 + CVE-2011-0080 - CVE-2011-0081 + CVE-2011-0081 - CVE-2011-0082 + CVE-2011-0082 - CVE-2011-0083 + CVE-2011-0083 - CVE-2011-0084 + CVE-2011-0084 - CVE-2011-0085 + CVE-2011-0085 - CVE-2011-1187 - CVE-2011-1202 + CVE-2011-1187 + CVE-2011-1202 - CVE-2011-1712 + CVE-2011-1712 - CVE-2011-2362 + CVE-2011-2362 - CVE-2011-2363 + CVE-2011-2363 - CVE-2011-2364 + CVE-2011-2364 - CVE-2011-2365 + CVE-2011-2365 - CVE-2011-2369 + CVE-2011-2369 - CVE-2011-2370 + CVE-2011-2370 - CVE-2011-2371 + CVE-2011-2371 - CVE-2011-2372 + CVE-2011-2372 - CVE-2011-2373 + CVE-2011-2373 - CVE-2011-2374 + CVE-2011-2374 - CVE-2011-2375 + CVE-2011-2375 - CVE-2011-2376 + CVE-2011-2376 - CVE-2011-2377 + CVE-2011-2377 - CVE-2011-2378 + CVE-2011-2378 - CVE-2011-2605 + CVE-2011-2605 - CVE-2011-2980 + CVE-2011-2980 - CVE-2011-2981 + CVE-2011-2981 - CVE-2011-2982 + CVE-2011-2982 - CVE-2011-2983 + CVE-2011-2983 - CVE-2011-2984 + CVE-2011-2984 - CVE-2011-2985 + CVE-2011-2985 - CVE-2011-2986 + CVE-2011-2986 - CVE-2011-2987 + CVE-2011-2987 - CVE-2011-2988 + CVE-2011-2988 - CVE-2011-2989 + CVE-2011-2989 - CVE-2011-2990 + CVE-2011-2990 - CVE-2011-2991 + CVE-2011-2991 - CVE-2011-2993 + CVE-2011-2993 - CVE-2011-2995 + CVE-2011-2995 - CVE-2011-2996 + CVE-2011-2996 - CVE-2011-2997 + CVE-2011-2997 - CVE-2011-2998 + CVE-2011-2998 - CVE-2011-2999 + CVE-2011-2999 - CVE-2011-3000 + CVE-2011-3000 - CVE-2011-3001 + CVE-2011-3001 - CVE-2011-3002 + CVE-2011-3002 - CVE-2011-3003 + CVE-2011-3003 - CVE-2011-3004 + CVE-2011-3004 - CVE-2011-3005 + CVE-2011-3005 - CVE-2011-3026 - CVE-2011-3062 - CVE-2011-3232 + CVE-2011-3026 + CVE-2011-3062 + CVE-2011-3232 - CVE-2011-3389 - CVE-2011-3640 - CVE-2011-3647 + CVE-2011-3389 + CVE-2011-3640 + CVE-2011-3647 - CVE-2011-3648 + CVE-2011-3648 - CVE-2011-3649 + CVE-2011-3649 - CVE-2011-3650 + CVE-2011-3650 - CVE-2011-3651 + CVE-2011-3651 - CVE-2011-3652 + CVE-2011-3652 - CVE-2011-3653 + CVE-2011-3653 - CVE-2011-3654 + CVE-2011-3654 - CVE-2011-3655 + CVE-2011-3655 - CVE-2011-3658 + CVE-2011-3658 - CVE-2011-3659 + CVE-2011-3659 - CVE-2011-3660 + CVE-2011-3660 - CVE-2011-3661 + CVE-2011-3661 - CVE-2011-3663 + CVE-2011-3663 - CVE-2011-3665 + CVE-2011-3665 - CVE-2011-3670 + CVE-2011-3670 - CVE-2011-3866 + CVE-2011-3866 - CVE-2011-4688 + CVE-2011-4688 - CVE-2012-0441 - CVE-2012-0442 + CVE-2012-0441 + CVE-2012-0442 - CVE-2012-0443 + CVE-2012-0443 - CVE-2012-0444 + CVE-2012-0444 - CVE-2012-0445 + CVE-2012-0445 - CVE-2012-0446 + CVE-2012-0446 - CVE-2012-0447 + CVE-2012-0447 - CVE-2012-0449 + CVE-2012-0449 - CVE-2012-0450 + CVE-2012-0450 - CVE-2012-0451 - CVE-2012-0452 + CVE-2012-0451 + CVE-2012-0452 - CVE-2012-0455 - CVE-2012-0456 - CVE-2012-0457 - CVE-2012-0458 - CVE-2012-0459 - CVE-2012-0460 - CVE-2012-0461 - CVE-2012-0462 - CVE-2012-0463 - CVE-2012-0464 - CVE-2012-0467 - CVE-2012-0468 - CVE-2012-0469 - CVE-2012-0470 - CVE-2012-0471 - CVE-2012-0473 - CVE-2012-0474 - CVE-2012-0475 - CVE-2012-0477 - CVE-2012-0478 - CVE-2012-0479 - CVE-2012-1937 - CVE-2012-1938 - CVE-2012-1939 - CVE-2012-1940 - CVE-2012-1941 - CVE-2012-1945 - CVE-2012-1946 - CVE-2012-1947 - CVE-2012-1948 - CVE-2012-1949 - CVE-2012-1950 - CVE-2012-1951 - CVE-2012-1952 - CVE-2012-1953 - CVE-2012-1954 - CVE-2012-1955 - CVE-2012-1956 + CVE-2012-0455 + CVE-2012-0456 + CVE-2012-0457 + CVE-2012-0458 + CVE-2012-0459 + CVE-2012-0460 + CVE-2012-0461 + CVE-2012-0462 + CVE-2012-0463 + CVE-2012-0464 + CVE-2012-0467 + CVE-2012-0468 + CVE-2012-0469 + CVE-2012-0470 + CVE-2012-0471 + CVE-2012-0473 + CVE-2012-0474 + CVE-2012-0475 + CVE-2012-0477 + CVE-2012-0478 + CVE-2012-0479 + CVE-2012-1937 + CVE-2012-1938 + CVE-2012-1939 + CVE-2012-1940 + CVE-2012-1941 + CVE-2012-1945 + CVE-2012-1946 + CVE-2012-1947 + CVE-2012-1948 + CVE-2012-1949 + CVE-2012-1950 + CVE-2012-1951 + CVE-2012-1952 + CVE-2012-1953 + CVE-2012-1954 + CVE-2012-1955 + CVE-2012-1956 - CVE-2012-1957 - CVE-2012-1958 - CVE-2012-1959 - CVE-2012-1960 - CVE-2012-1961 - CVE-2012-1962 - CVE-2012-1963 - CVE-2012-1964 - CVE-2012-1965 - CVE-2012-1966 - CVE-2012-1967 - CVE-2012-1970 + CVE-2012-1957 + CVE-2012-1958 + CVE-2012-1959 + CVE-2012-1960 + CVE-2012-1961 + CVE-2012-1962 + CVE-2012-1963 + CVE-2012-1964 + CVE-2012-1965 + CVE-2012-1966 + CVE-2012-1967 + CVE-2012-1970 - CVE-2012-1971 + CVE-2012-1971 - CVE-2012-1972 + CVE-2012-1972 - CVE-2012-1973 + CVE-2012-1973 - CVE-2012-1974 + CVE-2012-1974 - CVE-2012-1975 + CVE-2012-1975 - CVE-2012-1976 + CVE-2012-1976 - CVE-2012-1994 - CVE-2012-3956 + CVE-2012-1994 + CVE-2012-3956 - CVE-2012-3957 + CVE-2012-3957 - CVE-2012-3958 + CVE-2012-3958 - CVE-2012-3959 + CVE-2012-3959 - CVE-2012-3960 + CVE-2012-3960 - CVE-2012-3961 + CVE-2012-3961 - CVE-2012-3962 + CVE-2012-3962 - CVE-2012-3963 + CVE-2012-3963 - CVE-2012-3964 + CVE-2012-3964 - CVE-2012-3965 + CVE-2012-3965 - CVE-2012-3966 + CVE-2012-3966 - CVE-2012-3967 + CVE-2012-3967 - CVE-2012-3968 + CVE-2012-3968 - CVE-2012-3969 + CVE-2012-3969 - CVE-2012-3970 + CVE-2012-3970 - CVE-2012-3971 + CVE-2012-3971 - CVE-2012-3972 + CVE-2012-3972 - CVE-2012-3973 + CVE-2012-3973 - CVE-2012-3975 + CVE-2012-3975 - CVE-2012-3976 + CVE-2012-3976 - CVE-2012-3977 + CVE-2012-3977 - CVE-2012-3978 + CVE-2012-3978 - CVE-2012-3980 + CVE-2012-3980 - CVE-2012-3982 + CVE-2012-3982 - CVE-2012-3984 + CVE-2012-3984 - CVE-2012-3985 + CVE-2012-3985 - CVE-2012-3986 + CVE-2012-3986 - CVE-2012-3988 + CVE-2012-3988 - CVE-2012-3989 + CVE-2012-3989 - CVE-2012-3990 + CVE-2012-3990 - CVE-2012-3991 + CVE-2012-3991 - CVE-2012-3992 + CVE-2012-3992 - CVE-2012-3993 + CVE-2012-3993 - CVE-2012-3994 + CVE-2012-3994 - CVE-2012-3995 + CVE-2012-3995 - CVE-2012-4179 + CVE-2012-4179 - CVE-2012-4180 + CVE-2012-4180 - CVE-2012-4181 + CVE-2012-4181 - CVE-2012-4182 + CVE-2012-4182 - CVE-2012-4183 + CVE-2012-4183 - CVE-2012-4184 + CVE-2012-4184 - CVE-2012-4185 + CVE-2012-4185 - CVE-2012-4186 + CVE-2012-4186 - CVE-2012-4187 + CVE-2012-4187 - CVE-2012-4188 + CVE-2012-4188 - CVE-2012-4190 + CVE-2012-4190 - CVE-2012-4191 + CVE-2012-4191 - CVE-2012-4192 + CVE-2012-4192 - CVE-2012-4193 + CVE-2012-4193 - CVE-2012-4194 - CVE-2012-4195 - CVE-2012-4196 - CVE-2012-4201 - CVE-2012-4202 - CVE-2012-4204 - CVE-2012-4205 - CVE-2012-4206 - CVE-2012-4207 - CVE-2012-4208 - CVE-2012-4209 - CVE-2012-4210 - CVE-2012-4212 - CVE-2012-4215 - CVE-2012-4216 - CVE-2012-5354 + CVE-2012-4194 + CVE-2012-4195 + CVE-2012-4196 + CVE-2012-4201 + CVE-2012-4202 + CVE-2012-4204 + CVE-2012-4205 + CVE-2012-4206 + CVE-2012-4207 + CVE-2012-4208 + CVE-2012-4209 + CVE-2012-4210 + CVE-2012-4212 + CVE-2012-4215 + CVE-2012-4216 + CVE-2012-5354 - CVE-2012-5829 - CVE-2012-5830 - CVE-2012-5833 - CVE-2012-5835 - CVE-2012-5836 - CVE-2012-5838 - CVE-2012-5839 - CVE-2012-5840 - CVE-2012-5841 - CVE-2012-5842 - CVE-2012-5843 - + CVE-2012-5829 + CVE-2012-5830 + CVE-2012-5833 + CVE-2012-5835 + CVE-2012-5836 + CVE-2012-5838 + CVE-2012-5839 + CVE-2012-5840 + CVE-2012-5841 + CVE-2012-5842 + CVE-2012-5843 + Firefox Blocking Fraudulent Certificates - + Mozilla Foundation Security Advisory 2011-11 - + Mozilla Foundation Security Advisory 2011-34 - + keytoaster - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-02.xml index f0b93a82b5..e0e83b449b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-02.xml @@ -4,8 +4,8 @@ HAProxy: Arbitrary code execution A buffer overflow in HAProxy may allow execution of arbitrary code. haproxy - January 08, 2013 - January 08, 2013: 1 + 2013-01-08 + 2013-01-08: 1 417079 remote @@ -40,10 +40,10 @@ - CVE-2012-2942 + CVE-2012-2942 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-03.xml index 480d5d7ea5..84d3ca6805 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-03.xml @@ -6,8 +6,8 @@ to cause Denial of Service or obtain sensitive information. tor - January 08, 2013 - January 08, 2013: 1 + 2013-01-08 + 2013-01-08: 1 432188 434882 444804 @@ -45,13 +45,13 @@ - CVE-2012-3517 - CVE-2012-3518 - CVE-2012-3519 - CVE-2012-4419 - CVE-2012-4922 - CVE-2012-5573 + CVE-2012-3517 + CVE-2012-3518 + CVE-2012-3519 + CVE-2012-4419 + CVE-2012-4922 + CVE-2012-5573 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-04.xml index b3d0c17d10..5b30e74cd1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-04.xml @@ -6,8 +6,8 @@ to execute arbitrary code on the DHCP client. dhcpcd - January 09, 2013 - January 09, 2013: 1 + 2013-01-09 + 2013-01-09: 1 362459 remote @@ -44,10 +44,10 @@ - CVE-2011-0996 + CVE-2011-0996 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-05.xml index d2daa5c4c1..069aeebe0d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-05.xml @@ -6,8 +6,8 @@ result in execution of arbitrary code or Denial of Service. bzip2 - January 09, 2013 - January 09, 2013: 1 + 2013-01-09 + 2013-01-09: 1 338215 local @@ -45,8 +45,8 @@ - CVE-2010-0405 + CVE-2010-0405 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-06.xml index 41f56f8271..6b89301f0c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-06.xml @@ -6,8 +6,8 @@ which may allow remote Denial of Service. ISC DHCP Server - January 09, 2013 - January 09, 2013: 1 + 2013-01-09 + 2013-01-09: 1 362453 378799 393617 @@ -46,18 +46,18 @@ - CVE-2011-0997 - CVE-2011-2748 - CVE-2011-2749 - CVE-2011-4539 - CVE-2011-4868 - CVE-2012-3570 - CVE-2012-3571 - CVE-2012-3954 - CVE-2012-3955 + CVE-2011-0997 + CVE-2011-2748 + CVE-2011-2749 + CVE-2011-4539 + CVE-2011-4868 + CVE-2012-3570 + CVE-2012-3571 + CVE-2012-3954 + CVE-2012-3955 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-07.xml index d0c0b3807c..63e4c4544a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201301-07.xml @@ -6,8 +6,8 @@ leading to privilege escalation. DokuWiki - January 09, 2013 - January 09, 2013: 1 + 2013-01-09 + 2013-01-09: 1 301310 386155 412891 @@ -47,15 +47,15 @@ - CVE-2010-0287 - CVE-2010-0288 - CVE-2010-0289 - CVE-2011-2510 - CVE-2011-3727 - CVE-2012-0283 + CVE-2010-0287 + CVE-2010-0288 + CVE-2010-0289 + CVE-2011-2510 + CVE-2011-3727 + CVE-2012-0283 - + keytoaster - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201304-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201304-01.xml index a0ea597c3c..e8c77d8b8a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201304-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201304-01.xml @@ -6,8 +6,8 @@ gain escalated privileges. nvidia-drivers - April 08, 2013 - April 08, 2013: 1 + 2013-04-08 + 2013-04-08: 1 429614 464248 remote @@ -55,9 +55,9 @@ - CVE-2012-4225 - CVE-2013-0131 + CVE-2012-4225 + CVE-2013-0131 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201307-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201307-01.xml index b072e1b6b4..0e922a5b08 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201307-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201307-01.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. HAProxy - July 11, 2013 - July 11, 2013: 1 + 2013-07-11 + 2013-07-11: 1 464340 473674 remote @@ -46,13 +46,13 @@ - CVE-2013-1912 - CVE-2013-2175 + CVE-2013-1912 + CVE-2013-2175 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-01.xml index eaa3204c18..0f5d830b98 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-01.xml @@ -6,8 +6,8 @@ attackers to compromise user system putty - August 21, 2013 - August 21, 2013: 2 + 2013-08-21 + 2013-08-21: 2 394429 479872 local, remote @@ -43,11 +43,11 @@ - CVE-2011-4607 - CVE-2013-4852 + CVE-2011-4607 + CVE-2013-4852 - ackle - + ackle + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-02.xml index 32f4887903..5dc984d358 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-02.xml @@ -6,8 +6,8 @@ to cause a Denial of Service. d-bus - August 22, 2013 - August 22, 2013: 1 + 2013-08-22 + 2013-08-22: 1 473190 local @@ -45,14 +45,14 @@ - + CVE-2013-2168 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-03.xml index c63b10ed97..dffb8a97a3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-03.xml @@ -7,8 +7,8 @@ escalation. Ebuild - August 22, 2013 - January 30, 2014: 2 + 2013-08-22 + 2014-01-30: 2 431732 451058 469960 @@ -47,84 +47,84 @@ - CVE-2012-1525 - CVE-2012-1530 - CVE-2012-2049 - CVE-2012-2050 - CVE-2012-2051 - CVE-2012-4147 - CVE-2012-4148 - CVE-2012-4149 - CVE-2012-4150 - CVE-2012-4151 - CVE-2012-4152 - CVE-2012-4153 - CVE-2012-4154 - CVE-2012-4155 - CVE-2012-4156 - CVE-2012-4157 - CVE-2012-4158 - CVE-2012-4159 - CVE-2012-4160 - CVE-2012-4363 - CVE-2013-0601 - CVE-2013-0602 - CVE-2013-0603 - CVE-2013-0604 - CVE-2013-0605 - CVE-2013-0606 - CVE-2013-0607 - CVE-2013-0608 - CVE-2013-0609 - CVE-2013-0610 - CVE-2013-0611 - CVE-2013-0612 - CVE-2013-0613 - CVE-2013-0614 - CVE-2013-0615 - CVE-2013-0616 - CVE-2013-0617 - CVE-2013-0618 - CVE-2013-0619 - CVE-2013-0620 - CVE-2013-0621 - CVE-2013-0622 - CVE-2013-0623 - CVE-2013-0624 - CVE-2013-0626 - CVE-2013-0627 - CVE-2013-0640 - CVE-2013-0641 - CVE-2013-2549 - CVE-2013-2550 - CVE-2013-2718 - CVE-2013-2719 - CVE-2013-2720 - CVE-2013-2721 - CVE-2013-2722 - CVE-2013-2723 - CVE-2013-2724 - CVE-2013-2725 - CVE-2013-2726 - CVE-2013-2727 - CVE-2013-2729 - CVE-2013-2730 - CVE-2013-2731 - CVE-2013-2732 - CVE-2013-2733 - CVE-2013-2734 - CVE-2013-2735 - CVE-2013-2736 - CVE-2013-2737 - CVE-2013-3337 - CVE-2013-3338 - CVE-2013-3339 - CVE-2013-3340 - CVE-2013-3341 - CVE-2013-3342 + CVE-2012-1525 + CVE-2012-1530 + CVE-2012-2049 + CVE-2012-2050 + CVE-2012-2051 + CVE-2012-4147 + CVE-2012-4148 + CVE-2012-4149 + CVE-2012-4150 + CVE-2012-4151 + CVE-2012-4152 + CVE-2012-4153 + CVE-2012-4154 + CVE-2012-4155 + CVE-2012-4156 + CVE-2012-4157 + CVE-2012-4158 + CVE-2012-4159 + CVE-2012-4160 + CVE-2012-4363 + CVE-2013-0601 + CVE-2013-0602 + CVE-2013-0603 + CVE-2013-0604 + CVE-2013-0605 + CVE-2013-0606 + CVE-2013-0607 + CVE-2013-0608 + CVE-2013-0609 + CVE-2013-0610 + CVE-2013-0611 + CVE-2013-0612 + CVE-2013-0613 + CVE-2013-0614 + CVE-2013-0615 + CVE-2013-0616 + CVE-2013-0617 + CVE-2013-0618 + CVE-2013-0619 + CVE-2013-0620 + CVE-2013-0621 + CVE-2013-0622 + CVE-2013-0623 + CVE-2013-0624 + CVE-2013-0626 + CVE-2013-0627 + CVE-2013-0640 + CVE-2013-0641 + CVE-2013-2549 + CVE-2013-2550 + CVE-2013-2718 + CVE-2013-2719 + CVE-2013-2720 + CVE-2013-2721 + CVE-2013-2722 + CVE-2013-2723 + CVE-2013-2724 + CVE-2013-2725 + CVE-2013-2726 + CVE-2013-2727 + CVE-2013-2729 + CVE-2013-2730 + CVE-2013-2731 + CVE-2013-2732 + CVE-2013-2733 + CVE-2013-2734 + CVE-2013-2735 + CVE-2013-2736 + CVE-2013-2737 + CVE-2013-3337 + CVE-2013-3338 + CVE-2013-3339 + CVE-2013-3340 + CVE-2013-3341 + CVE-2013-3342 - ackle - + ackle + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-04.xml index 8da001b041..ce5601ed3e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-04.xml @@ -6,8 +6,8 @@ which could lead to execution of arbitrary code. puppet - August 23, 2013 - August 23, 2013: 1 + 2013-08-23 + 2013-08-23: 1 456002 461656 473720 @@ -45,18 +45,18 @@ - CVE-2012-6120 - CVE-2013-1640 - CVE-2013-1652 - CVE-2013-1653 - CVE-2013-1654 - CVE-2013-1655 - CVE-2013-2274 - CVE-2013-2275 - CVE-2013-3567 - CVE-2013-4761 - CVE-2013-4956 + CVE-2012-6120 + CVE-2013-1640 + CVE-2013-1652 + CVE-2013-1653 + CVE-2013-1654 + CVE-2013-1655 + CVE-2013-2274 + CVE-2013-2275 + CVE-2013-3567 + CVE-2013-4761 + CVE-2013-4956 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-05.xml index c63c908552..a83e517156 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-05.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code or cause Denial of Service. wireshark - August 28, 2013 - August 30, 2013: 2 + 2013-08-28 + 2013-08-30: 2 398549 427964 431572 @@ -55,67 +55,67 @@ - CVE-2012-0041 - CVE-2012-0042 - CVE-2012-0043 - CVE-2012-0066 - CVE-2012-0067 - CVE-2012-0068 - CVE-2012-3548 - CVE-2012-4048 - CVE-2012-4049 - CVE-2012-4285 - CVE-2012-4286 - CVE-2012-4287 - CVE-2012-4288 - CVE-2012-4289 - CVE-2012-4290 - CVE-2012-4291 - CVE-2012-4292 - CVE-2012-4293 - CVE-2012-4294 - CVE-2012-4295 - CVE-2012-4296 - CVE-2012-4297 - CVE-2012-4298 - CVE-2013-3555 - CVE-2013-3556 - CVE-2013-3557 - CVE-2013-3558 - CVE-2013-3559 - CVE-2013-3560 - CVE-2013-3561 - CVE-2013-3562 - CVE-2013-4074 - CVE-2013-4075 - CVE-2013-4076 - CVE-2013-4077 - CVE-2013-4078 - CVE-2013-4079 - CVE-2013-4080 - CVE-2013-4081 - CVE-2013-4082 - CVE-2013-4083 - CVE-2013-4920 - CVE-2013-4921 - CVE-2013-4922 - CVE-2013-4923 - CVE-2013-4924 - CVE-2013-4925 - CVE-2013-4926 - CVE-2013-4927 - CVE-2013-4928 - CVE-2013-4929 - CVE-2013-4930 - CVE-2013-4931 - CVE-2013-4932 - CVE-2013-4933 - CVE-2013-4934 - CVE-2013-4935 - CVE-2013-4936 + CVE-2012-0041 + CVE-2012-0042 + CVE-2012-0043 + CVE-2012-0066 + CVE-2012-0067 + CVE-2012-0068 + CVE-2012-3548 + CVE-2012-4048 + CVE-2012-4049 + CVE-2012-4285 + CVE-2012-4286 + CVE-2012-4287 + CVE-2012-4288 + CVE-2012-4289 + CVE-2012-4290 + CVE-2012-4291 + CVE-2012-4292 + CVE-2012-4293 + CVE-2012-4294 + CVE-2012-4295 + CVE-2012-4296 + CVE-2012-4297 + CVE-2012-4298 + CVE-2013-3555 + CVE-2013-3556 + CVE-2013-3557 + CVE-2013-3558 + CVE-2013-3559 + CVE-2013-3560 + CVE-2013-3561 + CVE-2013-3562 + CVE-2013-4074 + CVE-2013-4075 + CVE-2013-4076 + CVE-2013-4077 + CVE-2013-4078 + CVE-2013-4079 + CVE-2013-4080 + CVE-2013-4081 + CVE-2013-4082 + CVE-2013-4083 + CVE-2013-4920 + CVE-2013-4921 + CVE-2013-4922 + CVE-2013-4923 + CVE-2013-4924 + CVE-2013-4925 + CVE-2013-4926 + CVE-2013-4927 + CVE-2013-4928 + CVE-2013-4929 + CVE-2013-4930 + CVE-2013-4931 + CVE-2013-4932 + CVE-2013-4933 + CVE-2013-4934 + CVE-2013-4935 + CVE-2013-4936 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-06.xml index c8ce0ba901..d9236a7063 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201308-06.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. mysql - August 29, 2013 - August 30, 2013: 2 + 2013-08-29 + 2013-08-30: 2 399375 411503 412889 @@ -50,112 +50,112 @@ - CVE-2011-2262 - CVE-2012-0075 - CVE-2012-0087 - CVE-2012-0101 - CVE-2012-0102 - CVE-2012-0112 - CVE-2012-0113 - CVE-2012-0114 - CVE-2012-0115 - CVE-2012-0116 - CVE-2012-0117 - CVE-2012-0118 - CVE-2012-0119 - CVE-2012-0120 - CVE-2012-0484 - CVE-2012-0485 - CVE-2012-0486 - CVE-2012-0487 - CVE-2012-0488 - CVE-2012-0489 - CVE-2012-0490 - CVE-2012-0491 - CVE-2012-0492 - CVE-2012-0493 - CVE-2012-0494 - CVE-2012-0495 - CVE-2012-0496 - CVE-2012-0540 - CVE-2012-0553 - CVE-2012-0572 - CVE-2012-0574 - CVE-2012-0578 - CVE-2012-0583 - CVE-2012-1688 - CVE-2012-1689 - CVE-2012-1690 - CVE-2012-1696 - CVE-2012-1697 - CVE-2012-1702 - CVE-2012-1703 - CVE-2012-1705 - CVE-2012-1734 - CVE-2012-2102 - CVE-2012-2122 - CVE-2012-2749 - CVE-2012-3150 - CVE-2012-3158 - CVE-2012-3160 - CVE-2012-3163 - CVE-2012-3166 - CVE-2012-3167 - CVE-2012-3173 - CVE-2012-3177 - CVE-2012-3180 - CVE-2012-3197 - CVE-2012-5060 - CVE-2012-5096 - CVE-2012-5611 - CVE-2012-5612 - CVE-2012-5613 - CVE-2012-5614 - CVE-2012-5615 - CVE-2012-5627 - CVE-2013-0367 - CVE-2013-0368 - CVE-2013-0371 - CVE-2013-0375 - CVE-2013-0383 - CVE-2013-0384 - CVE-2013-0385 - CVE-2013-0386 - CVE-2013-0389 - CVE-2013-1492 - CVE-2013-1502 - CVE-2013-1506 - CVE-2013-1511 - CVE-2013-1512 - CVE-2013-1521 - CVE-2013-1523 - CVE-2013-1526 - CVE-2013-1531 - CVE-2013-1532 - CVE-2013-1544 - CVE-2013-1548 - CVE-2013-1552 - CVE-2013-1555 - CVE-2013-1566 - CVE-2013-1567 - CVE-2013-1570 - CVE-2013-1623 - CVE-2013-2375 - CVE-2013-2376 - CVE-2013-2378 - CVE-2013-2381 - CVE-2013-2389 - CVE-2013-2391 - CVE-2013-2392 - CVE-2013-2395 - CVE-2013-3802 - CVE-2013-3804 - CVE-2013-3808 + CVE-2011-2262 + CVE-2012-0075 + CVE-2012-0087 + CVE-2012-0101 + CVE-2012-0102 + CVE-2012-0112 + CVE-2012-0113 + CVE-2012-0114 + CVE-2012-0115 + CVE-2012-0116 + CVE-2012-0117 + CVE-2012-0118 + CVE-2012-0119 + CVE-2012-0120 + CVE-2012-0484 + CVE-2012-0485 + CVE-2012-0486 + CVE-2012-0487 + CVE-2012-0488 + CVE-2012-0489 + CVE-2012-0490 + CVE-2012-0491 + CVE-2012-0492 + CVE-2012-0493 + CVE-2012-0494 + CVE-2012-0495 + CVE-2012-0496 + CVE-2012-0540 + CVE-2012-0553 + CVE-2012-0572 + CVE-2012-0574 + CVE-2012-0578 + CVE-2012-0583 + CVE-2012-1688 + CVE-2012-1689 + CVE-2012-1690 + CVE-2012-1696 + CVE-2012-1697 + CVE-2012-1702 + CVE-2012-1703 + CVE-2012-1705 + CVE-2012-1734 + CVE-2012-2102 + CVE-2012-2122 + CVE-2012-2749 + CVE-2012-3150 + CVE-2012-3158 + CVE-2012-3160 + CVE-2012-3163 + CVE-2012-3166 + CVE-2012-3167 + CVE-2012-3173 + CVE-2012-3177 + CVE-2012-3180 + CVE-2012-3197 + CVE-2012-5060 + CVE-2012-5096 + CVE-2012-5611 + CVE-2012-5612 + CVE-2012-5613 + CVE-2012-5614 + CVE-2012-5615 + CVE-2012-5627 + CVE-2013-0367 + CVE-2013-0368 + CVE-2013-0371 + CVE-2013-0375 + CVE-2013-0383 + CVE-2013-0384 + CVE-2013-0385 + CVE-2013-0386 + CVE-2013-0389 + CVE-2013-1492 + CVE-2013-1502 + CVE-2013-1506 + CVE-2013-1511 + CVE-2013-1512 + CVE-2013-1521 + CVE-2013-1523 + CVE-2013-1526 + CVE-2013-1531 + CVE-2013-1532 + CVE-2013-1544 + CVE-2013-1548 + CVE-2013-1552 + CVE-2013-1555 + CVE-2013-1566 + CVE-2013-1567 + CVE-2013-1570 + CVE-2013-1623 + CVE-2013-2375 + CVE-2013-2376 + CVE-2013-2378 + CVE-2013-2381 + CVE-2013-2389 + CVE-2013-2391 + CVE-2013-2392 + CVE-2013-2395 + CVE-2013-3802 + CVE-2013-3804 + CVE-2013-3808 - + underling - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-01.xml index d1c62750c2..0f9788c73e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-01.xml @@ -6,8 +6,8 @@ to cause a Denial of Service condition. cyrus-sasl - September 01, 2013 - September 01, 2013: 1 + 2013-09-01 + 2013-09-01: 1 476764 remote @@ -46,12 +46,12 @@ - CVE-2013-4122 + CVE-2013-4122 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-02.xml index fcb81b9a00..db94be7c1c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-02.xml @@ -7,8 +7,8 @@ of Service condition. strongswan - September 01, 2013 - September 01, 2013: 1 + 2013-09-01 + 2013-09-01: 1 468504 479396 483202 @@ -46,14 +46,14 @@ - CVE-2013-2054 - CVE-2013-2944 - CVE-2013-5018 + CVE-2013-2054 + CVE-2013-2944 + CVE-2013-5018 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-03.xml index 4a838a0a45..a765efbec6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-03.xml @@ -6,8 +6,8 @@ cause a Denial of Service. Xlockmore - September 02, 2013 - September 02, 2013: 1 + 2013-09-02 + 2013-09-02: 1 255229 440776 477328 @@ -46,11 +46,11 @@ - CVE-2012-4524 - CVE-2013-4143 + CVE-2012-4524 + CVE-2013-4143 - craig - + craig + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-04.xml index cdc1f28106..76c9e9717c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-04.xml @@ -6,8 +6,8 @@ code or Denial of Service. snack - September 11, 2013 - September 11, 2013: 1 + 2013-09-11 + 2013-09-11: 1 446822 remote @@ -45,10 +45,10 @@ - CVE-2012-6303 + CVE-2012-6303 - ackle - + ackle + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-05.xml index c8e72bf0a7..69b0be4479 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-05.xml @@ -7,8 +7,8 @@ symlink attacks. pip - September 12, 2013 - September 12, 2013: 1 + 2013-09-12 + 2013-09-12: 1 462616 480202 local, remote @@ -46,13 +46,13 @@ - CVE-2013-1629 - CVE-2013-1888 + CVE-2013-1629 + CVE-2013-1888 - + keytoaster - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-06.xml index 6cece4a287..93b8abef31 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-06.xml @@ -6,8 +6,8 @@ worst of which could result in execution of arbitrary code. adobe-flash - September 14, 2013 - September 14, 2013: 2 + 2013-09-14 + 2013-09-14: 2 437808 442084 446984 @@ -58,82 +58,82 @@ - CVE-2012-5248 - CVE-2012-5249 - CVE-2012-5250 - CVE-2012-5251 - CVE-2012-5252 - CVE-2012-5253 - CVE-2012-5254 - CVE-2012-5255 - CVE-2012-5256 - CVE-2012-5257 - CVE-2012-5258 - CVE-2012-5259 - CVE-2012-5260 - CVE-2012-5261 - CVE-2012-5262 - CVE-2012-5263 - CVE-2012-5264 - CVE-2012-5265 - CVE-2012-5266 - CVE-2012-5267 - CVE-2012-5268 - CVE-2012-5269 - CVE-2012-5270 - CVE-2012-5271 - CVE-2012-5272 - CVE-2012-5274 - CVE-2012-5275 - CVE-2012-5276 - CVE-2012-5277 - CVE-2012-5278 - CVE-2012-5279 - CVE-2012-5280 - CVE-2012-5676 - CVE-2012-5677 - CVE-2012-5678 - CVE-2013-0504 - CVE-2013-0630 - CVE-2013-0633 - CVE-2013-0634 - CVE-2013-0637 - CVE-2013-0638 - CVE-2013-0639 - CVE-2013-0642 - CVE-2013-0643 - CVE-2013-0644 - CVE-2013-0645 - CVE-2013-0646 - CVE-2013-0647 - CVE-2013-0648 - CVE-2013-0649 - CVE-2013-0650 - CVE-2013-1365 - CVE-2013-1366 - CVE-2013-1367 - CVE-2013-1368 - CVE-2013-1369 - CVE-2013-1370 - CVE-2013-1371 - CVE-2013-1372 - CVE-2013-1373 - CVE-2013-1374 - CVE-2013-1375 - CVE-2013-1378 - CVE-2013-1379 - CVE-2013-1380 - CVE-2013-2555 - CVE-2013-2728 - CVE-2013-3343 - CVE-2013-3344 - CVE-2013-3345 - CVE-2013-3347 - CVE-2013-3361 - CVE-2013-3362 - CVE-2013-3363 - CVE-2013-5324 + CVE-2012-5248 + CVE-2012-5249 + CVE-2012-5250 + CVE-2012-5251 + CVE-2012-5252 + CVE-2012-5253 + CVE-2012-5254 + CVE-2012-5255 + CVE-2012-5256 + CVE-2012-5257 + CVE-2012-5258 + CVE-2012-5259 + CVE-2012-5260 + CVE-2012-5261 + CVE-2012-5262 + CVE-2012-5263 + CVE-2012-5264 + CVE-2012-5265 + CVE-2012-5266 + CVE-2012-5267 + CVE-2012-5268 + CVE-2012-5269 + CVE-2012-5270 + CVE-2012-5271 + CVE-2012-5272 + CVE-2012-5274 + CVE-2012-5275 + CVE-2012-5276 + CVE-2012-5277 + CVE-2012-5278 + CVE-2012-5279 + CVE-2012-5280 + CVE-2012-5676 + CVE-2012-5677 + CVE-2012-5678 + CVE-2013-0504 + CVE-2013-0630 + CVE-2013-0633 + CVE-2013-0634 + CVE-2013-0637 + CVE-2013-0638 + CVE-2013-0639 + CVE-2013-0642 + CVE-2013-0643 + CVE-2013-0644 + CVE-2013-0645 + CVE-2013-0646 + CVE-2013-0647 + CVE-2013-0648 + CVE-2013-0649 + CVE-2013-0650 + CVE-2013-1365 + CVE-2013-1366 + CVE-2013-1367 + CVE-2013-1368 + CVE-2013-1369 + CVE-2013-1370 + CVE-2013-1371 + CVE-2013-1372 + CVE-2013-1373 + CVE-2013-1374 + CVE-2013-1375 + CVE-2013-1378 + CVE-2013-1379 + CVE-2013-1380 + CVE-2013-2555 + CVE-2013-2728 + CVE-2013-3343 + CVE-2013-3344 + CVE-2013-3345 + CVE-2013-3347 + CVE-2013-3361 + CVE-2013-3362 + CVE-2013-3363 + CVE-2013-5324 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-07.xml index 6138e98f11..159353ab56 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-07.xml @@ -6,8 +6,8 @@ attacker to execute arbitrary code or cause a Denial of Service condition. libotr - September 15, 2013 - September 15, 2013: 1 + 2013-09-15 + 2013-09-15: 1 430486 remote @@ -43,12 +43,12 @@ - CVE-2012-3461 + CVE-2012-3461 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-08.xml index 17ace76726..3ae2fe9a60 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-08.xml @@ -6,8 +6,8 @@ which could result in arbitrary code execution. filezilla - September 15, 2013 - September 15, 2013: 1 + 2013-09-15 + 2013-09-15: 1 479880 482672 local, remote @@ -45,21 +45,21 @@ - + CVE-2013-4206 - + CVE-2013-4207 - + CVE-2013-4208 - CVE-2013-4852 + CVE-2013-4852 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-09.xml index 9bb3f40b0a..c973841502 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-09.xml @@ -6,8 +6,8 @@ the worst of which may lead to arbitrary code execution. libraw - September 15, 2013 - September 15, 2013: 1 + 2013-09-15 + 2013-09-15: 1 471694 482926 remote @@ -56,15 +56,15 @@ - CVE-2013-1438 - CVE-2013-1439 - CVE-2013-2126 - CVE-2013-2127 + CVE-2013-1438 + CVE-2013-1439 + CVE-2013-2126 + CVE-2013-2127 - + pinkbyte - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-10.xml index f04b98efb5..8ebbcf2f69 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-10.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. acroread - September 15, 2013 - September 15, 2013: 1 + 2013-09-15 + 2013-09-15: 1 483210 remote @@ -40,12 +40,12 @@ - CVE-2013-3346 + CVE-2013-3346 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-11.xml index b00446299d..17358674e7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-11.xml @@ -7,8 +7,8 @@ sensitive information. subversion - September 23, 2013 - September 23, 2013: 1 + 2013-09-23 + 2013-09-23: 1 350166 356741 369065 @@ -49,25 +49,25 @@ - CVE-2010-4539 - CVE-2010-4644 - CVE-2011-0715 - CVE-2011-1752 - CVE-2011-1783 - CVE-2011-1921 - CVE-2013-1845 - CVE-2013-1846 - CVE-2013-1847 - CVE-2013-1849 - CVE-2013-1884 - CVE-2013-1968 - CVE-2013-2088 - CVE-2013-2112 - CVE-2013-4131 - CVE-2013-4277 + CVE-2010-4539 + CVE-2010-4644 + CVE-2011-0715 + CVE-2011-1752 + CVE-2011-1783 + CVE-2011-1921 + CVE-2013-1845 + CVE-2013-1846 + CVE-2013-1847 + CVE-2013-1849 + CVE-2013-1884 + CVE-2013-1968 + CVE-2013-2088 + CVE-2013-2112 + CVE-2013-4131 + CVE-2013-4277 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-12.xml index 76ef2ffd39..6f5b4b52b0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-12.xml @@ -7,8 +7,8 @@ a Denial of Service condition or perform man-in-the-middle attacks. apache - September 23, 2013 - September 23, 2013: 1 + 2013-09-23 + 2013-09-23: 1 275645 438680 466502 @@ -49,14 +49,14 @@ - CVE-2007-6750 - CVE-2012-4929 - CVE-2013-1862 - CVE-2013-1896 - + CVE-2007-6750 + CVE-2012-4929 + CVE-2013-1862 + CVE-2013-1896 + Compression and Information Leakage of Plaintext - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-13.xml index 2b13c86819..dce5c4f351 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-13.xml @@ -6,8 +6,8 @@ may allow execution of arbitrary code. libzrtpcpp - September 24, 2013 - September 24, 2013: 1 + 2013-09-24 + 2013-09-24: 1 481228 remote @@ -42,10 +42,10 @@ - CVE-2013-2221 - CVE-2013-2222 - CVE-2013-2223 + CVE-2013-2221 + CVE-2013-2222 + CVE-2013-2223 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-14.xml index c95032945c..035680ad7c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-14.xml @@ -6,8 +6,8 @@ of which may allow execution of arbitrary code. moinmoin - September 24, 2013 - September 24, 2013: 1 + 2013-09-24 + 2013-09-24: 1 449314 remote @@ -42,11 +42,11 @@ - CVE-2012-6080 - CVE-2012-6081 - CVE-2012-6082 - CVE-2012-6495 + CVE-2012-6080 + CVE-2012-6081 + CVE-2012-6082 + CVE-2012-6495 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-15.xml index 69c23efa5d..874c96c79b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-15.xml @@ -6,8 +6,8 @@ which leading to remote execution of arbitrary code. ProFTPD - September 24, 2013 - September 24, 2013: 1 + 2013-09-24 + 2013-09-24: 1 305343 343389 348998 @@ -50,17 +50,17 @@ - CVE-2009-3555 - CVE-2010-3867 - CVE-2010-4221 - CVE-2010-4652 - CVE-2011-1137 - CVE-2011-4130 - CVE-2012-6095 - CVE-2013-4359 + CVE-2009-3555 + CVE-2010-3867 + CVE-2010-4221 + CVE-2010-4652 + CVE-2011-1137 + CVE-2011-4130 + CVE-2012-6095 + CVE-2013-4359 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-16.xml index 07b548a93a..3529e19ecd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-16.xml @@ -6,8 +6,8 @@ some of which may allow execution of arbitrary code. chromium v8 - September 24, 2013 - September 25, 2013: 2 + 2013-09-24 + 2013-09-25: 2 442096 444826 445246 @@ -74,161 +74,161 @@ - CVE-2012-5116 - CVE-2012-5117 - CVE-2012-5118 - CVE-2012-5120 - CVE-2012-5121 - CVE-2012-5122 - CVE-2012-5123 - CVE-2012-5124 - CVE-2012-5125 - CVE-2012-5126 - CVE-2012-5127 - CVE-2012-5128 - CVE-2012-5130 - CVE-2012-5132 - CVE-2012-5133 - CVE-2012-5135 - CVE-2012-5136 - CVE-2012-5137 - CVE-2012-5138 - CVE-2012-5139 - CVE-2012-5140 - CVE-2012-5141 - CVE-2012-5142 - CVE-2012-5143 - CVE-2012-5144 - CVE-2012-5145 - CVE-2012-5146 - CVE-2012-5147 - CVE-2012-5148 - CVE-2012-5149 - CVE-2012-5150 - CVE-2012-5151 - CVE-2012-5152 - CVE-2012-5153 - CVE-2012-5154 - CVE-2013-0828 - CVE-2013-0829 - CVE-2013-0830 - CVE-2013-0831 - CVE-2013-0832 - CVE-2013-0833 - CVE-2013-0834 - CVE-2013-0835 - CVE-2013-0836 - CVE-2013-0837 - CVE-2013-0838 - CVE-2013-0839 - CVE-2013-0840 - CVE-2013-0841 - CVE-2013-0842 - CVE-2013-0879 - CVE-2013-0880 - CVE-2013-0881 - CVE-2013-0882 - CVE-2013-0883 - CVE-2013-0884 - CVE-2013-0885 - CVE-2013-0887 - CVE-2013-0888 - CVE-2013-0889 - CVE-2013-0890 - CVE-2013-0891 - CVE-2013-0892 - CVE-2013-0893 - CVE-2013-0894 - CVE-2013-0895 - CVE-2013-0896 - CVE-2013-0897 - CVE-2013-0898 - CVE-2013-0899 - CVE-2013-0900 - CVE-2013-0902 - CVE-2013-0903 - CVE-2013-0904 - CVE-2013-0905 - CVE-2013-0906 - CVE-2013-0907 - CVE-2013-0908 - CVE-2013-0909 - CVE-2013-0910 - CVE-2013-0911 - CVE-2013-0912 - CVE-2013-0916 - CVE-2013-0917 - CVE-2013-0918 - CVE-2013-0919 - CVE-2013-0920 - CVE-2013-0921 - CVE-2013-0922 - CVE-2013-0923 - CVE-2013-0924 - CVE-2013-0925 - CVE-2013-0926 - CVE-2013-2836 - CVE-2013-2837 - CVE-2013-2838 - CVE-2013-2839 - CVE-2013-2840 - CVE-2013-2841 - CVE-2013-2842 - CVE-2013-2843 - CVE-2013-2844 - CVE-2013-2845 - CVE-2013-2846 - CVE-2013-2847 - CVE-2013-2848 - CVE-2013-2849 - CVE-2013-2853 - CVE-2013-2855 - CVE-2013-2856 - CVE-2013-2857 - CVE-2013-2858 - CVE-2013-2859 - CVE-2013-2860 - CVE-2013-2861 - CVE-2013-2862 - CVE-2013-2863 - CVE-2013-2865 - CVE-2013-2867 - CVE-2013-2868 - CVE-2013-2869 - CVE-2013-2870 - CVE-2013-2871 - CVE-2013-2874 - CVE-2013-2875 - CVE-2013-2876 - CVE-2013-2877 - CVE-2013-2878 - CVE-2013-2879 - CVE-2013-2880 - CVE-2013-2881 - CVE-2013-2882 - CVE-2013-2883 - CVE-2013-2884 - CVE-2013-2885 - CVE-2013-2886 - CVE-2013-2887 - CVE-2013-2900 - CVE-2013-2901 - CVE-2013-2902 - CVE-2013-2903 - CVE-2013-2904 - CVE-2013-2905 - + CVE-2012-5116 + CVE-2012-5117 + CVE-2012-5118 + CVE-2012-5120 + CVE-2012-5121 + CVE-2012-5122 + CVE-2012-5123 + CVE-2012-5124 + CVE-2012-5125 + CVE-2012-5126 + CVE-2012-5127 + CVE-2012-5128 + CVE-2012-5130 + CVE-2012-5132 + CVE-2012-5133 + CVE-2012-5135 + CVE-2012-5136 + CVE-2012-5137 + CVE-2012-5138 + CVE-2012-5139 + CVE-2012-5140 + CVE-2012-5141 + CVE-2012-5142 + CVE-2012-5143 + CVE-2012-5144 + CVE-2012-5145 + CVE-2012-5146 + CVE-2012-5147 + CVE-2012-5148 + CVE-2012-5149 + CVE-2012-5150 + CVE-2012-5151 + CVE-2012-5152 + CVE-2012-5153 + CVE-2012-5154 + CVE-2013-0828 + CVE-2013-0829 + CVE-2013-0830 + CVE-2013-0831 + CVE-2013-0832 + CVE-2013-0833 + CVE-2013-0834 + CVE-2013-0835 + CVE-2013-0836 + CVE-2013-0837 + CVE-2013-0838 + CVE-2013-0839 + CVE-2013-0840 + CVE-2013-0841 + CVE-2013-0842 + CVE-2013-0879 + CVE-2013-0880 + CVE-2013-0881 + CVE-2013-0882 + CVE-2013-0883 + CVE-2013-0884 + CVE-2013-0885 + CVE-2013-0887 + CVE-2013-0888 + CVE-2013-0889 + CVE-2013-0890 + CVE-2013-0891 + CVE-2013-0892 + CVE-2013-0893 + CVE-2013-0894 + CVE-2013-0895 + CVE-2013-0896 + CVE-2013-0897 + CVE-2013-0898 + CVE-2013-0899 + CVE-2013-0900 + CVE-2013-0902 + CVE-2013-0903 + CVE-2013-0904 + CVE-2013-0905 + CVE-2013-0906 + CVE-2013-0907 + CVE-2013-0908 + CVE-2013-0909 + CVE-2013-0910 + CVE-2013-0911 + CVE-2013-0912 + CVE-2013-0916 + CVE-2013-0917 + CVE-2013-0918 + CVE-2013-0919 + CVE-2013-0920 + CVE-2013-0921 + CVE-2013-0922 + CVE-2013-0923 + CVE-2013-0924 + CVE-2013-0925 + CVE-2013-0926 + CVE-2013-2836 + CVE-2013-2837 + CVE-2013-2838 + CVE-2013-2839 + CVE-2013-2840 + CVE-2013-2841 + CVE-2013-2842 + CVE-2013-2843 + CVE-2013-2844 + CVE-2013-2845 + CVE-2013-2846 + CVE-2013-2847 + CVE-2013-2848 + CVE-2013-2849 + CVE-2013-2853 + CVE-2013-2855 + CVE-2013-2856 + CVE-2013-2857 + CVE-2013-2858 + CVE-2013-2859 + CVE-2013-2860 + CVE-2013-2861 + CVE-2013-2862 + CVE-2013-2863 + CVE-2013-2865 + CVE-2013-2867 + CVE-2013-2868 + CVE-2013-2869 + CVE-2013-2870 + CVE-2013-2871 + CVE-2013-2874 + CVE-2013-2875 + CVE-2013-2876 + CVE-2013-2877 + CVE-2013-2878 + CVE-2013-2879 + CVE-2013-2880 + CVE-2013-2881 + CVE-2013-2882 + CVE-2013-2883 + CVE-2013-2884 + CVE-2013-2885 + CVE-2013-2886 + CVE-2013-2887 + CVE-2013-2900 + CVE-2013-2901 + CVE-2013-2902 + CVE-2013-2903 + CVE-2013-2904 + CVE-2013-2905 + Release Notes 23.0.1271.64 - + Release Notes 23.0.1271.91 - + Release Notes 23.0.1271.95 - ackle - + ackle + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-17.xml index 0b6f864d24..42c7bc3457 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-17.xml @@ -6,8 +6,8 @@ Daemon, the worst of which could result in arbitrary code execution. monkeyd - September 25, 2013 - September 25, 2013: 1 + 2013-09-25 + 2013-09-25: 1 471906 472400 472644 @@ -45,14 +45,14 @@ - CVE-2013-2163 - CVE-2013-3724 - CVE-2013-3843 + CVE-2013-2163 + CVE-2013-3724 + CVE-2013-3843 - + pinkbyte - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-18.xml index 71170e1a64..15b04ff76f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-18.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code or cause Denial of Service. libvirt - September 25, 2013 - September 25, 2013: 1 + 2013-09-25 + 2013-09-25: 1 454588 470096 remote @@ -49,11 +49,11 @@ - CVE-2013-0170 - CVE-2013-1962 + CVE-2013-0170 + CVE-2013-1962 - ackle - + ackle + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-19.xml index efa061179a..b233872d1e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-19.xml @@ -6,8 +6,8 @@ arbitrary code. tpp - September 25, 2013 - September 25, 2013: 1 + 2013-09-25 + 2013-09-25: 1 474018 remote @@ -43,12 +43,12 @@ - CVE-2013-2208 + CVE-2013-2208 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-20.xml index ff48422cb0..b3645b7adc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-20.xml @@ -6,8 +6,8 @@ which could lead to arbitrary code execution. dropbear - September 26, 2013 - September 26, 2013: 1 + 2013-09-26 + 2013-09-26: 1 328409 405607 remote @@ -48,15 +48,15 @@ - CVE-2012-0920 + CVE-2012-0920 libtommath Gentoo bug - + underling - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-21.xml index cfb7fc7358..f8371506b8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-21.xml @@ -6,8 +6,8 @@ arbitrary shell code. klibc - September 26, 2013 - September 26, 2013: 1 + 2013-09-26 + 2013-09-26: 1 369075 remote @@ -45,12 +45,12 @@ - CVE-2011-1930 + CVE-2011-1930 - + pinkbyte - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-22.xml index 6ec23783ea..be1827444d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-22.xml @@ -6,8 +6,8 @@ resulting in remote Denial of Service. squid - September 27, 2013 - September 27, 2013: 1 + 2013-09-27 + 2013-09-27: 1 261208 389133 447596 @@ -47,14 +47,14 @@ - CVE-2009-0801 - CVE-2011-4096 - CVE-2012-5643 - CVE-2013-0189 - CVE-2013-1839 - CVE-2013-4115 - CVE-2013-4123 + CVE-2009-0801 + CVE-2011-4096 + CVE-2012-5643 + CVE-2013-0189 + CVE-2013-1839 + CVE-2013-4115 + CVE-2013-4123 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-23.xml index c9679c3cee..84ff6bad15 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-23.xml @@ -7,8 +7,8 @@ execute arbitrary code. firefox,thunderbird,seamonkey - September 27, 2013 - September 27, 2013: 1 + 2013-09-27 + 2013-09-27: 1 450940 458390 460818 @@ -122,111 +122,111 @@ - CVE-2013-0744 - CVE-2013-0745 - CVE-2013-0746 - CVE-2013-0747 - CVE-2013-0748 - CVE-2013-0749 - CVE-2013-0750 - CVE-2013-0751 - CVE-2013-0752 - CVE-2013-0753 - CVE-2013-0754 - CVE-2013-0755 - CVE-2013-0756 - CVE-2013-0757 - CVE-2013-0758 - CVE-2013-0759 - CVE-2013-0760 - CVE-2013-0761 - CVE-2013-0762 - CVE-2013-0763 - CVE-2013-0764 - CVE-2013-0765 - CVE-2013-0766 - CVE-2013-0767 - CVE-2013-0768 - CVE-2013-0769 - CVE-2013-0770 - CVE-2013-0771 - CVE-2013-0772 - CVE-2013-0773 - CVE-2013-0774 - CVE-2013-0775 - CVE-2013-0776 - CVE-2013-0777 - CVE-2013-0778 - CVE-2013-0779 - CVE-2013-0780 - CVE-2013-0781 - CVE-2013-0782 - CVE-2013-0783 - CVE-2013-0784 - CVE-2013-0787 - CVE-2013-0788 - CVE-2013-0789 - CVE-2013-0791 - CVE-2013-0792 - CVE-2013-0793 - CVE-2013-0794 - CVE-2013-0795 - CVE-2013-0796 - CVE-2013-0797 - CVE-2013-0799 - CVE-2013-0800 - CVE-2013-0801 - CVE-2013-1670 - CVE-2013-1671 - CVE-2013-1674 - CVE-2013-1675 - CVE-2013-1676 - CVE-2013-1677 - CVE-2013-1678 - CVE-2013-1679 - CVE-2013-1680 - CVE-2013-1681 - CVE-2013-1682 - CVE-2013-1684 - CVE-2013-1687 - CVE-2013-1690 - CVE-2013-1692 - CVE-2013-1693 - CVE-2013-1694 - CVE-2013-1697 - CVE-2013-1701 - CVE-2013-1702 - CVE-2013-1704 - CVE-2013-1705 - CVE-2013-1707 - CVE-2013-1708 - CVE-2013-1709 - CVE-2013-1710 - CVE-2013-1711 - CVE-2013-1712 - CVE-2013-1713 - CVE-2013-1714 - CVE-2013-1717 - CVE-2013-1718 - CVE-2013-1719 - CVE-2013-1720 - CVE-2013-1722 - CVE-2013-1723 - CVE-2013-1724 - CVE-2013-1725 - CVE-2013-1726 - CVE-2013-1728 - CVE-2013-1730 - CVE-2013-1732 - CVE-2013-1735 - CVE-2013-1736 - CVE-2013-1737 - CVE-2013-1738 + CVE-2013-0744 + CVE-2013-0745 + CVE-2013-0746 + CVE-2013-0747 + CVE-2013-0748 + CVE-2013-0749 + CVE-2013-0750 + CVE-2013-0751 + CVE-2013-0752 + CVE-2013-0753 + CVE-2013-0754 + CVE-2013-0755 + CVE-2013-0756 + CVE-2013-0757 + CVE-2013-0758 + CVE-2013-0759 + CVE-2013-0760 + CVE-2013-0761 + CVE-2013-0762 + CVE-2013-0763 + CVE-2013-0764 + CVE-2013-0765 + CVE-2013-0766 + CVE-2013-0767 + CVE-2013-0768 + CVE-2013-0769 + CVE-2013-0770 + CVE-2013-0771 + CVE-2013-0772 + CVE-2013-0773 + CVE-2013-0774 + CVE-2013-0775 + CVE-2013-0776 + CVE-2013-0777 + CVE-2013-0778 + CVE-2013-0779 + CVE-2013-0780 + CVE-2013-0781 + CVE-2013-0782 + CVE-2013-0783 + CVE-2013-0784 + CVE-2013-0787 + CVE-2013-0788 + CVE-2013-0789 + CVE-2013-0791 + CVE-2013-0792 + CVE-2013-0793 + CVE-2013-0794 + CVE-2013-0795 + CVE-2013-0796 + CVE-2013-0797 + CVE-2013-0799 + CVE-2013-0800 + CVE-2013-0801 + CVE-2013-1670 + CVE-2013-1671 + CVE-2013-1674 + CVE-2013-1675 + CVE-2013-1676 + CVE-2013-1677 + CVE-2013-1678 + CVE-2013-1679 + CVE-2013-1680 + CVE-2013-1681 + CVE-2013-1682 + CVE-2013-1684 + CVE-2013-1687 + CVE-2013-1690 + CVE-2013-1692 + CVE-2013-1693 + CVE-2013-1694 + CVE-2013-1697 + CVE-2013-1701 + CVE-2013-1702 + CVE-2013-1704 + CVE-2013-1705 + CVE-2013-1707 + CVE-2013-1708 + CVE-2013-1709 + CVE-2013-1710 + CVE-2013-1711 + CVE-2013-1712 + CVE-2013-1713 + CVE-2013-1714 + CVE-2013-1717 + CVE-2013-1718 + CVE-2013-1719 + CVE-2013-1720 + CVE-2013-1722 + CVE-2013-1723 + CVE-2013-1724 + CVE-2013-1725 + CVE-2013-1726 + CVE-2013-1728 + CVE-2013-1730 + CVE-2013-1732 + CVE-2013-1735 + CVE-2013-1736 + CVE-2013-1737 + CVE-2013-1738 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-24.xml index 1b342254a8..469cfec834 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201309-24.xml @@ -7,8 +7,8 @@ Service, or gain access to data on the host. xen - September 27, 2013 - September 27, 2013: 1 + 2013-09-27 + 2013-09-27: 1 385319 386371 420875 @@ -89,68 +89,68 @@ - CVE-2011-2901 - CVE-2011-3262 - CVE-2012-0217 - CVE-2012-0218 - CVE-2012-2934 - CVE-2012-3432 - CVE-2012-3433 - CVE-2012-3494 - CVE-2012-3495 - CVE-2012-3496 - CVE-2012-3497 - CVE-2012-3498 - CVE-2012-3515 - CVE-2012-4411 - CVE-2012-4535 - CVE-2012-4536 - CVE-2012-4537 - CVE-2012-4538 - CVE-2012-4539 - CVE-2012-5510 - CVE-2012-5511 - CVE-2012-5512 - CVE-2012-5513 - CVE-2012-5514 - CVE-2012-5515 - CVE-2012-5525 - CVE-2012-5634 - CVE-2012-6030 - CVE-2012-6031 - CVE-2012-6032 - CVE-2012-6033 - CVE-2012-6034 - CVE-2012-6035 - CVE-2012-6036 - CVE-2012-6075 - CVE-2012-6333 - CVE-2013-0151 - CVE-2013-0152 - CVE-2013-0153 - CVE-2013-0154 - CVE-2013-0215 - CVE-2013-1432 - CVE-2013-1917 - CVE-2013-1918 - CVE-2013-1919 - CVE-2013-1920 - CVE-2013-1922 - CVE-2013-1952 - CVE-2013-1964 - CVE-2013-2076 - CVE-2013-2077 - CVE-2013-2078 - CVE-2013-2194 - CVE-2013-2195 - CVE-2013-2196 - CVE-2013-2211 - + CVE-2011-2901 + CVE-2011-3262 + CVE-2012-0217 + CVE-2012-0218 + CVE-2012-2934 + CVE-2012-3432 + CVE-2012-3433 + CVE-2012-3494 + CVE-2012-3495 + CVE-2012-3496 + CVE-2012-3497 + CVE-2012-3498 + CVE-2012-3515 + CVE-2012-4411 + CVE-2012-4535 + CVE-2012-4536 + CVE-2012-4537 + CVE-2012-4538 + CVE-2012-4539 + CVE-2012-5510 + CVE-2012-5511 + CVE-2012-5512 + CVE-2012-5513 + CVE-2012-5514 + CVE-2012-5515 + CVE-2012-5525 + CVE-2012-5634 + CVE-2012-6030 + CVE-2012-6031 + CVE-2012-6032 + CVE-2012-6033 + CVE-2012-6034 + CVE-2012-6035 + CVE-2012-6036 + CVE-2012-6075 + CVE-2012-6333 + CVE-2013-0151 + CVE-2013-0152 + CVE-2013-0153 + CVE-2013-0154 + CVE-2013-0215 + CVE-2013-1432 + CVE-2013-1917 + CVE-2013-1918 + CVE-2013-1919 + CVE-2013-1920 + CVE-2013-1922 + CVE-2013-1952 + CVE-2013-1964 + CVE-2013-2076 + CVE-2013-2077 + CVE-2013-2078 + CVE-2013-2194 + CVE-2013-2195 + CVE-2013-2196 + CVE-2013-2211 + Xen TMEM - craig - + craig + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-01.xml index bfef3f91db..839ab48ad2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-01.xml @@ -6,8 +6,8 @@ allowing a remote attacker to execute arbitrary Perl code. Module-Signature - October 04, 2013 - October 04, 2013: 1 + 2013-10-04 + 2013-10-04: 1 472428 remote @@ -51,12 +51,12 @@ - CVE-2013-2145 + CVE-2013-2145 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-02.xml index 29b3470aa5..5343be624e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-02.xml @@ -6,8 +6,8 @@ man-in-the-middle attacks. isync - October 05, 2013 - October 05, 2013: 1 + 2013-10-05 + 2013-10-05: 1 458420 remote @@ -41,8 +41,8 @@ - CVE-2013-0289 + CVE-2013-0289 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-03.xml index 4b2f41de09..f1acb57e97 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-03.xml @@ -6,8 +6,8 @@ may allow execution of arbitrary code. poppler - October 06, 2013 - October 06, 2013: 1 + 2013-10-06 + 2013-10-06: 1 263028 290430 290464 @@ -51,40 +51,40 @@ - CVE-2009-0146 - CVE-2009-0147 - CVE-2009-0165 - CVE-2009-0166 - CVE-2009-0195 - CVE-2009-0799 - CVE-2009-0800 - CVE-2009-1179 - CVE-2009-1180 - CVE-2009-1181 - CVE-2009-1182 - CVE-2009-1183 - CVE-2009-1187 - CVE-2009-1188 - CVE-2009-3603 - CVE-2009-3604 - CVE-2009-3605 - CVE-2009-3606 - CVE-2009-3607 - CVE-2009-3608 - CVE-2009-3609 - CVE-2009-3938 - CVE-2010-3702 - CVE-2010-3703 - CVE-2010-3704 - CVE-2010-4653 - CVE-2010-4654 - CVE-2012-2142 - CVE-2013-1788 - CVE-2013-1789 - CVE-2013-1790 + CVE-2009-0146 + CVE-2009-0147 + CVE-2009-0165 + CVE-2009-0166 + CVE-2009-0195 + CVE-2009-0799 + CVE-2009-0800 + CVE-2009-1179 + CVE-2009-1180 + CVE-2009-1181 + CVE-2009-1182 + CVE-2009-1183 + CVE-2009-1187 + CVE-2009-1188 + CVE-2009-3603 + CVE-2009-3604 + CVE-2009-3605 + CVE-2009-3606 + CVE-2009-3607 + CVE-2009-3608 + CVE-2009-3609 + CVE-2009-3938 + CVE-2010-3702 + CVE-2010-3703 + CVE-2010-3704 + CVE-2010-4653 + CVE-2010-4654 + CVE-2012-2142 + CVE-2013-1788 + CVE-2013-1789 + CVE-2013-1790 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-04.xml index d5883652e9..f19e81d942 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-04.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. nginx - October 06, 2013 - October 06, 2013: 1 + 2013-10-06 + 2013-10-06: 1 458726 468870 local, remote @@ -46,10 +46,10 @@ - CVE-2013-0337 - CVE-2013-2028 - CVE-2013-2070 + CVE-2013-0337 + CVE-2013-2028 + CVE-2013-2070 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-05.xml index 9201a431ef..10dea9c620 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-05.xml @@ -6,8 +6,8 @@ arbitrary code. gegl - October 06, 2013 - October 06, 2013: 1 + 2013-10-06 + 2013-10-06: 1 442016 remote @@ -47,8 +47,8 @@

- CVE-2012-4433 + CVE-2012-4433 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-06.xml index 69dbcddcb2..fa7a305a50 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-06.xml @@ -6,8 +6,8 @@ execution of arbitrary code or Denial of Service. aircrack-ng - October 07, 2013 - October 07, 2013: 1 + 2013-10-07 + 2013-10-07: 1 311797 remote @@ -42,8 +42,8 @@ - CVE-2010-1159 + CVE-2010-1159 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-07.xml index 71f7d82ec1..416ef24289 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-07.xml @@ -6,8 +6,8 @@ arbitrary code. openjpeg - October 10, 2013 - October 10, 2013: 1 + 2013-10-10 + 2013-10-10: 1 412895 425772 433766 @@ -44,10 +44,10 @@ - CVE-2009-5030 - CVE-2012-3358 - CVE-2012-3535 + CVE-2009-5030 + CVE-2012-3358 + CVE-2012-3535 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-08.xml index 0a9c754770..9a232d2e45 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-08.xml @@ -6,8 +6,8 @@ which could lead to arbitrary code execution. quagga - October 10, 2013 - October 10, 2013: 1 + 2013-10-10 + 2013-10-10: 1 408507 475706 remote @@ -44,14 +44,14 @@ - CVE-2012-0249 - CVE-2012-0250 - CVE-2012-0255 - CVE-2012-1820 - CVE-2013-2236 + CVE-2012-0249 + CVE-2012-0250 + CVE-2012-0255 + CVE-2012-1820 + CVE-2013-2236 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-09.xml index 06e57cb32a..c102f1d6c0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-09.xml @@ -6,8 +6,8 @@ perform man-in-the-middle attacks. setuptools - October 10, 2013 - October 10, 2013: 1 + 2013-10-10 + 2013-10-10: 1 479964 remote @@ -39,8 +39,8 @@ - CVE-2013-1633 + CVE-2013-1633 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-10.xml index ce5baffa04..8fb5d7efd4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-10.xml @@ -6,8 +6,8 @@ which might allow a remote attacker to cause a Denial of Service condition. PolarSSL - October 17, 2013 - October 17, 2013: 1 + 2013-10-17 + 2013-10-17: 1 358783 416399 455562 @@ -47,13 +47,13 @@ - CVE-2011-1923 - CVE-2012-2130 - CVE-2013-0169 - CVE-2013-1621 - CVE-2013-4623 - CVE-2013-5915 + CVE-2011-1923 + CVE-2012-2130 + CVE-2013-0169 + CVE-2013-1621 + CVE-2013-4623 + CVE-2013-5915 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-11.xml index 593beb4483..9bbb2a22cb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-11.xml @@ -6,8 +6,8 @@ Parallel-ForkManager module, possibly allowing symlink attacks. Parallel-ForkManager - October 17, 2013 - October 17, 2013: 1 + 2013-10-17 + 2013-10-17: 1 389839 local @@ -44,10 +44,10 @@ - CVE-2011-4115 + CVE-2011-4115 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-12.xml index 5824c64205..4c6bb7f105 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-12.xml @@ -7,8 +7,8 @@ code. FFmpeg - October 25, 2013 - October 25, 2013: 1 + 2013-10-25 + 2013-10-25: 1 285719 307755 339036 @@ -68,102 +68,102 @@ - CVE-2009-4631 - CVE-2009-4632 - CVE-2009-4633 - CVE-2009-4634 - CVE-2009-4635 - CVE-2009-4636 - CVE-2009-4637 - CVE-2009-4638 - CVE-2009-4639 - CVE-2009-4640 - CVE-2010-3429 - CVE-2010-3908 - CVE-2010-4704 - CVE-2010-4704 - CVE-2010-4705 - CVE-2011-1931 - CVE-2011-3362 - CVE-2011-3893 - CVE-2011-3895 - CVE-2011-3929 - CVE-2011-3934 - CVE-2011-3935 - CVE-2011-3936 - CVE-2011-3937 - CVE-2011-3940 - CVE-2011-3941 - CVE-2011-3944 - CVE-2011-3945 - CVE-2011-3946 - CVE-2011-3947 - CVE-2011-3949 - CVE-2011-3950 - CVE-2011-3951 - CVE-2011-3952 - CVE-2011-3973 - CVE-2011-3974 - CVE-2011-4351 - CVE-2011-4352 - CVE-2011-4353 - CVE-2011-4364 - CVE-2012-0947 - CVE-2012-2771 - CVE-2012-2772 - CVE-2012-2773 - CVE-2012-2774 - CVE-2012-2775 - CVE-2012-2776 - CVE-2012-2777 - CVE-2012-2778 - CVE-2012-2779 - CVE-2012-2780 - CVE-2012-2781 - CVE-2012-2782 - CVE-2012-2783 - CVE-2012-2784 - CVE-2012-2785 - CVE-2012-2786 - CVE-2012-2787 - CVE-2012-2788 - CVE-2012-2789 - CVE-2012-2790 - CVE-2012-2791 - CVE-2012-2792 - CVE-2012-2793 - CVE-2012-2794 - CVE-2012-2795 - CVE-2012-2796 - CVE-2012-2797 - CVE-2012-2798 - CVE-2012-2799 - CVE-2012-2800 - CVE-2012-2801 - CVE-2012-2802 - CVE-2012-2803 - CVE-2012-2804 - CVE-2012-2805 - CVE-2013-3670 - CVE-2013-3671 - CVE-2013-3672 - CVE-2013-3673 - CVE-2013-3674 - CVE-2013-3675 - + CVE-2009-4631 + CVE-2009-4632 + CVE-2009-4633 + CVE-2009-4634 + CVE-2009-4635 + CVE-2009-4636 + CVE-2009-4637 + CVE-2009-4638 + CVE-2009-4639 + CVE-2009-4640 + CVE-2010-3429 + CVE-2010-3908 + CVE-2010-4704 + CVE-2010-4704 + CVE-2010-4705 + CVE-2011-1931 + CVE-2011-3362 + CVE-2011-3893 + CVE-2011-3895 + CVE-2011-3929 + CVE-2011-3934 + CVE-2011-3935 + CVE-2011-3936 + CVE-2011-3937 + CVE-2011-3940 + CVE-2011-3941 + CVE-2011-3944 + CVE-2011-3945 + CVE-2011-3946 + CVE-2011-3947 + CVE-2011-3949 + CVE-2011-3950 + CVE-2011-3951 + CVE-2011-3952 + CVE-2011-3973 + CVE-2011-3974 + CVE-2011-4351 + CVE-2011-4352 + CVE-2011-4353 + CVE-2011-4364 + CVE-2012-0947 + CVE-2012-2771 + CVE-2012-2772 + CVE-2012-2773 + CVE-2012-2774 + CVE-2012-2775 + CVE-2012-2776 + CVE-2012-2777 + CVE-2012-2778 + CVE-2012-2779 + CVE-2012-2780 + CVE-2012-2781 + CVE-2012-2782 + CVE-2012-2783 + CVE-2012-2784 + CVE-2012-2785 + CVE-2012-2786 + CVE-2012-2787 + CVE-2012-2788 + CVE-2012-2789 + CVE-2012-2790 + CVE-2012-2791 + CVE-2012-2792 + CVE-2012-2793 + CVE-2012-2794 + CVE-2012-2795 + CVE-2012-2796 + CVE-2012-2797 + CVE-2012-2798 + CVE-2012-2799 + CVE-2012-2800 + CVE-2012-2801 + CVE-2012-2802 + CVE-2012-2803 + CVE-2012-2804 + CVE-2012-2805 + CVE-2013-3670 + CVE-2013-3671 + CVE-2013-3672 + CVE-2013-3673 + CVE-2013-3674 + CVE-2013-3675 + FFmpeg 0.10.x Changelog - + FFmpeg 1.0.x Changelog NGS Secure Research NGS00068 - Secunia Advisory SA36760 + Secunia Advisory SA36760 Secunia Advisory SA46134 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-13.xml index 4780a41f8a..6e0f1cb7a8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-13.xml @@ -6,8 +6,8 @@ FFmpeg, the worst of which may lead to the execution of arbitrary code. MPlayer - October 25, 2013 - October 25, 2013: 1 + 2013-10-25 + 2013-10-25: 1 253649 279342 339037 @@ -48,17 +48,17 @@ - CVE-2007-6718 - CVE-2008-4610 - CVE-2010-2062 - CVE-2010-3429 - CVE-2011-3625 - FFmpeg: + CVE-2007-6718 + CVE-2008-4610 + CVE-2010-2062 + CVE-2010-3429 + CVE-2011-3625 + FFmpeg: Multiple Vulnerabilities - a3li - + a3li + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-14.xml index e91ae173fb..d19215af91 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-14.xml @@ -6,8 +6,8 @@ context-dependent attackers to conduct symlink attacks. groff - October 25, 2013 - October 25, 2013: 1 + 2013-10-25 + 2013-10-25: 1 386335 local, remote @@ -41,17 +41,17 @@ - CVE-2009-5044 - CVE-2009-5078 - CVE-2009-5079 - CVE-2009-5080 - CVE-2009-5081 - CVE-2009-5082 + CVE-2009-5044 + CVE-2009-5078 + CVE-2009-5079 + CVE-2009-5080 + CVE-2009-5081 + CVE-2009-5082 - + creffett - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-15.xml index b7061efc0a..1873759209 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-15.xml @@ -7,8 +7,8 @@ an Automake-based build. automake - October 25, 2013 - October 25, 2013: 1 + 2013-10-25 + 2013-10-25: 1 295357 426336 local @@ -45,13 +45,13 @@ - CVE-2009-4029 - CVE-2012-3386 + CVE-2009-4029 + CVE-2012-3386 - + underling - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-16.xml index 94d30193a1..2d53f7d64d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-16.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. tptest - October 26, 2013 - October 26, 2013: 1 + 2013-10-26 + 2013-10-26: 1 261191 remote @@ -42,13 +42,13 @@ - CVE-2009-0650 - CVE-2009-0659 + CVE-2009-0650 + CVE-2009-0659 - + pinkbyte - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-17.xml index df19f7bcc8..bc6f510b83 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-17.xml @@ -6,8 +6,8 @@ symlink attacks. pmake - October 28, 2013 - October 28, 2013: 2 + 2013-10-28 + 2013-10-28: 2 367891 local @@ -45,8 +45,8 @@ - CVE-2011-1920 + CVE-2011-1920 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-18.xml index a44d54691b..fb3222c772 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-18.xml @@ -6,8 +6,8 @@ of which could lead to Denial of Service. gnutls - October 28, 2013 - October 28, 2013: 1 + 2013-10-28 + 2013-10-28: 1 455560 471788 remote @@ -47,14 +47,14 @@ - CVE-2013-1619 - CVE-2013-2116 + CVE-2013-1619 + CVE-2013-2116 Lucky Thirteen: Breaking the TLS and DTLS Record Protocols - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-19.xml index 0ce1fc17b6..bc2e18c756 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-19.xml @@ -6,8 +6,8 @@ arbitrary code. x2goserver - October 28, 2013 - October 28, 2013: 1 + 2013-10-28 + 2013-10-28: 1 472582 remote @@ -43,12 +43,12 @@ - CVE-2013-4376 + CVE-2013-4376 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-20.xml index 66fdd9c1e8..af17b2b88a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-20.xml @@ -6,8 +6,8 @@ escalated privileges. acpid - October 28, 2013 - October 28, 2013: 1 + 2013-10-28 + 2013-10-28: 1 434522 local @@ -37,8 +37,8 @@ - CVE-2011-2777 + CVE-2011-2777 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-21.xml index e3e2788b23..b967c6219e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201310-21.xml @@ -6,8 +6,8 @@ which could lead to Denial of Service. mediawiki - October 28, 2013 - October 28, 2013: 1 + 2013-10-28 + 2013-10-28: 1 460352 466124 468110 @@ -62,24 +62,24 @@ - CVE-2013-1816 - CVE-2013-1817 - CVE-2013-1818 - CVE-2013-1951 - CVE-2013-2031 - CVE-2013-2032 - CVE-2013-2114 - CVE-2013-4301 - CVE-2013-4302 - CVE-2013-4303 - CVE-2013-4304 - CVE-2013-4305 - CVE-2013-4306 - CVE-2013-4307 - CVE-2013-4308 + CVE-2013-1816 + CVE-2013-1817 + CVE-2013-1818 + CVE-2013-1951 + CVE-2013-2031 + CVE-2013-2032 + CVE-2013-2114 + CVE-2013-4301 + CVE-2013-4302 + CVE-2013-4303 + CVE-2013-4304 + CVE-2013-4305 + CVE-2013-4306 + CVE-2013-4307 + CVE-2013-4308 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-01.xml index 68ac8bbdbf..af4e459661 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-01.xml @@ -6,8 +6,8 @@ execution of arbitrary code. mednafen - November 04, 2013 - November 04, 2013: 1 + 2013-11-04 + 2013-11-04: 1 326141 remote @@ -43,10 +43,10 @@ - CVE-2010-3085 + CVE-2010-3085 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-02.xml index 7176a14b12..a0e2f18535 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-02.xml @@ -7,8 +7,8 @@ or conduct other attacks. phpmyadmin - November 04, 2013 - November 04, 2013: 1 + 2013-11-04 + 2013-11-04: 1 465420 467080 478696 @@ -48,20 +48,20 @@ - CVE-2013-1937 - CVE-2013-3238 - CVE-2013-3239 - CVE-2013-4995 - CVE-2013-4996 - CVE-2013-4997 - CVE-2013-4998 - CVE-2013-4999 - CVE-2013-5000 - CVE-2013-5001 - CVE-2013-5002 - CVE-2013-5003 - CVE-2013-5029 + CVE-2013-1937 + CVE-2013-3238 + CVE-2013-3239 + CVE-2013-4995 + CVE-2013-4996 + CVE-2013-4997 + CVE-2013-4998 + CVE-2013-4999 + CVE-2013-5000 + CVE-2013-5001 + CVE-2013-5002 + CVE-2013-5003 + CVE-2013-5029 - a3li - a3li + a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-03.xml index b1b6c99b11..9a83e4812f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-03.xml @@ -6,8 +6,8 @@ SQL injection. quassel - November 07, 2013 - November 07, 2013: 1 + 2013-11-07 + 2013-11-07: 1 338879 487632 remote @@ -52,11 +52,11 @@ - CVE-2010-3443 - CVE-2013-4422 + CVE-2010-3443 + CVE-2013-4422 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-04.xml index 5a75da42e6..31015d6a48 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-04.xml @@ -6,8 +6,8 @@ attackers to conduct symlink attacks. vixie-cron - November 07, 2013 - November 07, 2013: 1 + 2013-11-07 + 2013-11-07: 1 308055 local @@ -42,12 +42,12 @@ - CVE-2010-0424 + CVE-2010-0424 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-05.xml index 9bd9cdb7d1..bdc784e0ce 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-05.xml @@ -6,8 +6,8 @@ which allow execution of arbitrary code. gimp - November 10, 2013 - November 10, 2013: 1 + 2013-11-10 + 2013-11-10: 1 434580 444280 remote @@ -44,10 +44,10 @@ - CVE-2012-3403 - CVE-2012-3481 - CVE-2012-5576 + CVE-2012-3403 + CVE-2012-3481 + CVE-2012-5576 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-06.xml index 912be6b562..42d5022851 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-06.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code or cause Denial of Service. libxml2 - November 10, 2013 - November 10, 2013: 1 + 2013-11-10 + 2013-11-10: 1 434344 444836 458430 @@ -48,13 +48,13 @@ - CVE-2012-2871 - CVE-2012-5134 - CVE-2013-0338 - CVE-2013-1664 - CVE-2013-1969 - CVE-2013-2877 + CVE-2012-2871 + CVE-2012-5134 + CVE-2013-0338 + CVE-2013-1664 + CVE-2013-1969 + CVE-2013-2877 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-07.xml index 51118aa29b..bfdb35dbd2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-07.xml @@ -6,8 +6,8 @@ which could allow attackers to execute arbitrary code. blender - November 13, 2013 - November 13, 2013: 1 + 2013-11-13 + 2013-11-13: 1 219008 293130 local, remote @@ -43,14 +43,14 @@ - CVE-2008-1102 - CVE-2008-1103 - + CVE-2008-1102 + CVE-2008-1103 + CVE-2009-3850 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-08.xml index 438fdeccde..4db96b206f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-08.xml @@ -6,8 +6,8 @@ code or Denial of Service. Netpbm - November 13, 2013 - November 13, 2013: 1 + 2013-11-13 + 2013-11-13: 1 308025 remote @@ -48,10 +48,10 @@

- + CVE-2009-4274 - craig - Zlogene + craig + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-09.xml index 61520763a1..27b936d23b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-09.xml @@ -6,8 +6,8 @@ of which allow execution of arbitrary code or Denial of Service. freeradius - November 13, 2013 - November 13, 2013: 1 + 2013-11-13 + 2013-11-13: 1 339389 386183 434802 @@ -43,11 +43,11 @@ - CVE-2010-3696 - CVE-2010-3697 - CVE-2011-2701 - CVE-2012-3547 + CVE-2010-3696 + CVE-2010-3697 + CVE-2011-2701 + CVE-2012-3547 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-10.xml index 28e326c9c2..d3a2c4e2eb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-10.xml @@ -7,8 +7,8 @@ Service condition. graphicsmagick - November 19, 2013 - November 19, 2013: 1 + 2013-11-19 + 2013-11-19: 1 365769 488050 remote @@ -45,11 +45,11 @@ - CVE-2008-1097 - CVE-2009-1882 - CVE-2009-3736 - CVE-2013-4589 + CVE-2008-1097 + CVE-2009-1882 + CVE-2009-3736 + CVE-2013-4589 - ackle - Zlogene + ackle + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-11.xml index 28819ea4dc..9e936ff523 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-11.xml @@ -6,8 +6,8 @@ attacker to execute arbitrary code or cause a Denial of Service condition. ctorrent - November 20, 2013 - November 22, 2013: 2 + 2013-11-20 + 2013-11-22: 2 266953 remote @@ -45,12 +45,12 @@ - + CVE-2009-1759 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-12.xml index 4cc4558504..3a43a0ab44 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-12.xml @@ -6,8 +6,8 @@ arbitrary code. opendchub - November 20, 2013 - November 20, 2013: 1 + 2013-11-20 + 2013-11-20: 1 314551 remote @@ -44,12 +44,12 @@ - + CVE-2010-1147 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-13.xml index 2cd734294e..af78f7683d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-13.xml @@ -6,8 +6,8 @@ remote attackers to read encrypted traffic. openvpn - November 20, 2013 - November 20, 2013: 1 + 2013-11-20 + 2013-11-20: 1 293894 468756 remote @@ -44,13 +44,13 @@ - CVE-2009-3555 - CVE-2013-2061 + CVE-2009-3555 + CVE-2013-2061 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-14.xml index a24378da30..93ea1009bc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-14.xml @@ -7,8 +7,8 @@ man-in-the-middle attacks. qt-core qt-gui - November 22, 2013 - November 22, 2013: 1 + 2013-11-22 + 2013-11-22: 1 361401 382171 384103 @@ -64,8 +64,8 @@

- CVE-2011-3193 - CVE-2013-0254 + CVE-2011-3193 + CVE-2013-0254 Security advisory: Fraudulent certificates @@ -73,8 +73,8 @@ What the DigiNotar security breach means for Qt users - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-15.xml index c2d5aa168f..8bc2cd85fa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-15.xml @@ -7,8 +7,8 @@ disclosure. zabbix - November 25, 2013 - November 25, 2013: 1 + 2013-11-25 + 2013-11-25: 1 312875 394497 428372 @@ -47,14 +47,14 @@ - CVE-2010-1277 - CVE-2011-2904 - CVE-2011-3263 - CVE-2011-4674 - CVE-2012-3435 - CVE-2013-1364 - CVE-2013-5572 + CVE-2010-1277 + CVE-2011-2904 + CVE-2011-3263 + CVE-2011-4674 + CVE-2012-3435 + CVE-2013-1364 + CVE-2013-5572 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-16.xml index 2d49e40641..5805bc1f5b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-16.xml @@ -6,8 +6,8 @@ to conduct symlink attacks. fcron - November 25, 2013 - November 25, 2013: 1 + 2013-11-25 + 2013-11-25: 1 308075 local @@ -40,12 +40,12 @@ - CVE-2010-0792 + CVE-2010-0792 - + keytoaster - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-17.xml index 13e1b43fe2..452fd3191b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-17.xml @@ -6,8 +6,8 @@ could allow a local attacker to cause a Denial of Service condition. perl - November 28, 2013 - November 28, 2013: 1 + 2013-11-28 + 2013-11-28: 1 249629 313565 362025 @@ -47,14 +47,14 @@ - CVE-2008-5302 - CVE-2008-5303 - CVE-2010-1158 - CVE-2011-0761 - CVE-2011-1487 + CVE-2008-5302 + CVE-2008-5303 + CVE-2010-1158 + CVE-2011-0761 + CVE-2011-1487 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-18.xml index b31f798a12..9bbaea6f2d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-18.xml @@ -6,8 +6,8 @@ Unbound. unbound - November 28, 2013 - November 28, 2013: 1 + 2013-11-28 + 2013-11-28: 1 395287 remote @@ -42,9 +42,9 @@ - CVE-2011-4528 - CVE-2011-4869 + CVE-2011-4528 + CVE-2011-4869 - craig - Zlogene + craig + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-19.xml index 2ed9ff8740..e5c05c782d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-19.xml @@ -6,8 +6,8 @@ attackers to bypass access restrictions. rssh - November 28, 2013 - November 28, 2013: 1 + 2013-11-28 + 2013-11-28: 1 415255 445166 local @@ -47,17 +47,17 @@ - + CVE-2012-2252 - + CVE-2012-3478 - + underling - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-20.xml index ab99d089af..ef6e7803b7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-20.xml @@ -6,8 +6,8 @@ attacker to execute arbitrary code or cause a Denial of Service condition. okular - November 28, 2013 - November 28, 2013: 1 + 2013-11-28 + 2013-11-28: 1 334469 remote @@ -44,12 +44,12 @@ - + CVE-2010-2575 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-21.xml index 743371bfca..c54c4a8616 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-21.xml @@ -6,8 +6,8 @@ server to execute arbitrary code or cause a Denial of Service condition. cpio - November 28, 2013 - November 28, 2013: 1 + 2013-11-28 + 2013-11-28: 1 314663 remote @@ -43,12 +43,12 @@ - + CVE-2010-0624 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-22.xml index a12ddb02c8..d2ed33c7a0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201311-22.xml @@ -6,8 +6,8 @@ allows remote attackers to cause a Denial of Service condition. namazu - November 28, 2013 - November 28, 2013: 1 + 2013-11-28 + 2013-11-28: 1 391259 remote @@ -44,10 +44,10 @@ - CVE-2009-5028 - CVE-2011-4345 - CVE-2011-4711 + CVE-2009-5028 + CVE-2011-4345 + CVE-2011-4711 - craig - Zlogene + craig + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-01.xml index 250799d55f..ca5f01e8b2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-01.xml @@ -6,8 +6,8 @@ worst of which allowing arbitrary code execution and privilege escalation. glibc - December 03, 2013 - December 03, 2013: 1 + 2013-12-03 + 2013-12-03: 1 350744 356567 386323 @@ -58,20 +58,20 @@ - CVE-2009-5029 - CVE-2010-3847 - CVE-2011-0536 - CVE-2011-1071 - CVE-2011-1089 - CVE-2011-1095 - CVE-2011-1658 - CVE-2011-1659 - CVE-2012-0864 + CVE-2009-5029 + CVE-2010-3847 + CVE-2011-0536 + CVE-2011-1071 + CVE-2011-1089 + CVE-2011-1095 + CVE-2011-1658 + CVE-2011-1659 + CVE-2012-0864 - + underling - + phajdan.jr diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-02.xml index 22d8f0ab87..0232ed7f01 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-02.xml @@ -7,8 +7,8 @@ condition. busybox - December 03, 2013 - December 03, 2013: 1 + 2013-12-03 + 2013-12-03: 1 379857 426504 461372 @@ -47,14 +47,14 @@ - CVE-2006-1168 - CVE-2011-2716 - CVE-2013-1813 + CVE-2006-1168 + CVE-2011-2716 + CVE-2013-1813 - + underling - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-03.xml index de23f65c1d..ce8f08d0a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-03.xml @@ -6,8 +6,8 @@ attackers to determine private keys or cause a Denial of Service. OpenSSL - December 03, 2013 - June 06, 2015: 5 + 2013-12-03 + 2015-06-06: 5 369753 406199 412643 @@ -72,18 +72,18 @@ - CVE-2006-7250 - CVE-2011-1945 - CVE-2012-0884 - CVE-2012-1165 - CVE-2012-2110 - CVE-2012-2333 - CVE-2012-2686 - CVE-2013-0166 - CVE-2013-0169 + CVE-2006-7250 + CVE-2011-1945 + CVE-2012-0884 + CVE-2012-1165 + CVE-2012-2110 + CVE-2012-2333 + CVE-2012-2686 + CVE-2013-0166 + CVE-2013-0169 - + underling - n0idx80 + n0idx80 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-04.xml index 28ed56836b..af6bced008 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-04.xml @@ -6,8 +6,8 @@ execute arbitrary code or cause a Denial of Service condition. libtheora - December 03, 2013 - December 03, 2013: 1 + 2013-12-03 + 2013-12-03: 1 298039 remote @@ -45,12 +45,12 @@

- + CVE-2009-3389 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-05.xml index e0be095e23..660a36f4c0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-05.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause a Denial of Service condition. swi-prolog - December 06, 2013 - December 06, 2013: 1 + 2013-12-06 + 2013-12-06: 1 450284 remote @@ -44,11 +44,11 @@ - CVE-2012-6089 - CVE-2012-6090 + CVE-2012-6089 + CVE-2012-6090 - ackle - + ackle + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-06.xml index af2d0d1b7d..341a61127d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-06.xml @@ -6,8 +6,8 @@ execution, and privilege escalation. festival - December 09, 2013 - December 09, 2013: 1 + 2013-12-09 + 2013-12-09: 1 386319 remote @@ -45,10 +45,10 @@ - CVE-2010-3996 + CVE-2010-3996 - ackle - + ackle + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-07.xml index 1ebc52bcd3..63701d3f05 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-07.xml @@ -7,8 +7,8 @@ condition. openexr - December 09, 2013 - December 09, 2013: 1 + 2013-12-09 + 2013-12-09: 1 277202 local, remote @@ -53,15 +53,15 @@

- + CVE-2009-1720 - + CVE-2009-1721 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-08.xml index 121409561e..e1897bb1a9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-08.xml @@ -6,8 +6,8 @@ code execution or Denial of Service. libwebp - December 10, 2013 - December 10, 2013: 1 + 2013-12-10 + 2013-12-10: 1 442152 remote @@ -41,8 +41,8 @@ - CVE-2012-5127 + CVE-2012-5127 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-09.xml index 1645a9fce1..04126873d2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-09.xml @@ -7,8 +7,8 @@ condition. cabextract - December 14, 2013 - December 14, 2013: 1 + 2013-12-14 + 2013-12-14: 1 329891 remote @@ -48,15 +48,15 @@

- + CVE-2010-2800 - + CVE-2010-2801 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-10.xml index 2c9415c1cb..e0a4f212e1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-10.xml @@ -6,8 +6,8 @@ attacker to execute arbitrary code. libsmi - December 14, 2013 - December 14, 2013: 1 + 2013-12-14 + 2013-12-14: 1 342127 local, remote @@ -52,10 +52,10 @@

- CVE-2010-2891 + CVE-2010-2891 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-11.xml index 32601300ed..945fb9219e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-11.xml @@ -6,8 +6,8 @@ allow for user-assisted arbitrary code execution. win32codecs - December 16, 2013 - December 16, 2013: 1 + 2013-12-16 + 2013-12-16: 1 232999 remote @@ -41,12 +41,12 @@ - CVE-2007-5400 + CVE-2007-5400 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-12.xml index 302ba43a27..84b05b8bf4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-12.xml @@ -6,8 +6,8 @@ allowing execution of arbitrary code or Denial of Service. mit-krb5 - December 16, 2013 - December 16, 2013: 1 + 2013-12-16 + 2013-12-16: 1 429324 466268 469752 @@ -53,14 +53,14 @@ - CVE-2002-2443 - CVE-2012-1014 - CVE-2012-1015 - CVE-2013-1416 - CVE-2013-1417 - CVE-2013-1418 - CVE-2013-6800 + CVE-2002-2443 + CVE-2012-1014 + CVE-2012-1015 + CVE-2013-1416 + CVE-2013-1417 + CVE-2013-1418 + CVE-2013-6800 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-13.xml index ee088cb147..4ef2503ae1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-13.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code or cause Denial of Service. wireshark - December 16, 2013 - December 16, 2013: 1 + 2013-12-16 + 2013-12-16: 1 484582 490434 remote @@ -50,18 +50,18 @@ - CVE-2013-5717 - CVE-2013-5718 - CVE-2013-5719 - CVE-2013-5720 - CVE-2013-5721 - CVE-2013-5722 - CVE-2013-6336 - CVE-2013-6337 - CVE-2013-6338 - CVE-2013-6339 - CVE-2013-6340 + CVE-2013-5717 + CVE-2013-5718 + CVE-2013-5719 + CVE-2013-5720 + CVE-2013-5721 + CVE-2013-5722 + CVE-2013-6336 + CVE-2013-6337 + CVE-2013-6338 + CVE-2013-6339 + CVE-2013-6340 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-14.xml index 3663ef5ac7..ba38610649 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-14.xml @@ -6,8 +6,8 @@ execute arbitrary code or cause a Denial of Service condition. libsndfile - December 17, 2013 - December 17, 2013: 1 + 2013-12-17 + 2013-12-17: 1 375125 remote @@ -51,10 +51,10 @@

- CVE-2011-2696 + CVE-2011-2696 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-15.xml index 7ee578819d..0b3dff9738 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-15.xml @@ -6,8 +6,8 @@ attackers to cause a Denial of Service condition. tinyproxy - December 23, 2013 - December 23, 2013: 1 + 2013-12-23 + 2013-12-23: 1 432046 remote @@ -44,12 +44,12 @@ - CVE-2012-3505 + CVE-2012-3505 - + creffett - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-16.xml index 53e2265077..2a3751213f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201312-16.xml @@ -6,8 +6,8 @@ or Denial of Service. xfig - December 27, 2013 - December 27, 2013: 1 + 2013-12-27 + 2013-12-27: 1 348344 remote @@ -47,10 +47,10 @@

- + CVE-2010-4262 - craig - Zlogene + craig + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-01.xml index 6191c04e0a..99dbaab240 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-01.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code. libgdiplus - January 05, 2014 - January 05, 2014: 1 + 2014-01-05 + 2014-01-05: 1 334101 remote @@ -50,10 +50,10 @@

- CVE-2010-1526 + CVE-2010-1526 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-02.xml index 942b6f0660..4e12746b21 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-02.xml @@ -6,8 +6,8 @@ accepted as valid. gajim - January 06, 2014 - January 06, 2014: 1 + 2014-01-06 + 2014-01-06: 1 442860 remote @@ -44,12 +44,12 @@ - CVE-2012-5524 + CVE-2012-5524 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-03.xml index a79a024e81..da7c742377 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-03.xml @@ -6,8 +6,8 @@ remote attacker. nagstamon - January 06, 2014 - January 06, 2014: 2 + 2014-01-06 + 2014-01-06: 2 476538 remote @@ -44,12 +44,12 @@ - CVE-2013-4114 + CVE-2013-4114 - + underling - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-04.xml index a7d5e69fef..6b6390be86 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-04.xml @@ -6,8 +6,8 @@ which allow remote attackers to cause a Denial of Service condition. python - January 06, 2014 - June 17, 2015: 5 + 2014-01-06 + 2015-06-17: 5 325593 355927 358663 @@ -85,19 +85,19 @@ - CVE-2010-1634 - CVE-2010-2089 - CVE-2010-3492 - CVE-2010-3493 - CVE-2011-1015 - CVE-2012-0845 - CVE-2012-1150 - CVE-2013-2099 + CVE-2010-1634 + CVE-2010-2089 + CVE-2010-3492 + CVE-2010-3493 + CVE-2011-1015 + CVE-2012-0845 + CVE-2012-1150 + CVE-2013-2099 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-05.xml index a54a6f31f6..1a3a6b720a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-05.xml @@ -6,8 +6,8 @@ of Service. dhcp - January 06, 2014 - January 06, 2014: 1 + 2014-01-06 + 2014-01-06: 1 463848 remote @@ -43,12 +43,12 @@ - CVE-2013-2494 + CVE-2013-2494 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-06.xml index 82d697f2ea..bc524ec3ad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-06.xml @@ -6,8 +6,8 @@ to gain escalated privileges. git - January 10, 2014 - January 10, 2014: 1 + 2014-01-10 + 2014-01-10: 1 335891 local @@ -50,10 +50,10 @@ - CVE-2010-2542 + CVE-2010-2542 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-07.xml index 905d929f2e..839d47d43c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-07.xml @@ -6,8 +6,8 @@ libxslt. libxslt - January 10, 2014 - January 10, 2014: 1 + 2014-01-10 + 2014-01-10: 1 433603 436284 463236 @@ -58,11 +58,11 @@

- CVE-2012-2870 - CVE-2012-2893 - CVE-2012-6139 - CVE-2013-4520 + CVE-2012-2870 + CVE-2012-2893 + CVE-2012-6139 + CVE-2013-4520 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-08.xml index a9a6b5c11d..b60322e890 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-08.xml @@ -3,9 +3,9 @@ NTP: Traffic amplification NTP can be abused to amplify Denial of Service attack traffic. - - January 16, 2014 - January 16, 2014: 1 + + 2014-01-16 + 2014-01-16: 1 496776 remote @@ -59,13 +59,13 @@

- CVE-2013-5211 - VU#348126 + CVE-2013-5211 + VU#348126 - + keytoaster - + keytoaster
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-09.xml index 5587a34516..73332b6472 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-09.xml @@ -6,8 +6,8 @@ code or Denial of Service. openswan - January 18, 2014 - January 18, 2014: 1 + 2014-01-18 + 2014-01-18: 1 483204 remote @@ -42,8 +42,8 @@ - CVE-2013-2053 + CVE-2013-2053 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-10.xml index 41768ef240..8e41bd0447 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-10.xml @@ -6,8 +6,8 @@ of which may allow execution of arbitrary code. libexif - January 19, 2014 - January 19, 2014: 1 + 2014-01-19 + 2014-01-19: 1 426366 remote @@ -61,15 +61,15 @@ - CVE-2012-2812 - CVE-2012-2813 - CVE-2012-2814 - CVE-2012-2836 - CVE-2012-2837 - CVE-2012-2840 - CVE-2012-2841 - CVE-2012-2845 + CVE-2012-2812 + CVE-2012-2813 + CVE-2012-2814 + CVE-2012-2836 + CVE-2012-2837 + CVE-2012-2840 + CVE-2012-2841 + CVE-2012-2845 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-11.xml index c5dc9cae33..21457d3200 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-11.xml @@ -7,8 +7,8 @@ context-dependent attacker to execute arbitrary code. perl - January 19, 2014 - January 19, 2014: 1 + 2014-01-19 + 2014-01-19: 1 384887 448632 460444 @@ -60,12 +60,12 @@ - CVE-2011-2728 - CVE-2011-2939 - CVE-2012-5195 + CVE-2011-2728 + CVE-2011-2939 + CVE-2012-5195 - CVE-2013-1667 + CVE-2013-1667 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-12.xml index 5149c1f367..d227762a30 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-12.xml @@ -6,8 +6,8 @@ the worst of which allow execution of arbitrary code. gnustep-base - January 20, 2014 - January 20, 2014: 1 + 2014-01-20 + 2014-01-20: 1 325577 local, remote @@ -53,11 +53,11 @@

- CVE-2010-1457 - CVE-2010-1620 + CVE-2010-1457 + CVE-2010-1620 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-13.xml index 9096c62f97..394b2df770 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-13.xml @@ -7,8 +7,8 @@ condition. virtualbox - January 20, 2014 - January 20, 2014: 1 + 2014-01-20 + 2014-01-20: 1 434872 498166 local @@ -56,15 +56,15 @@ - CVE-2012-3221 - CVE-2013-5892 - CVE-2014-0404 - CVE-2014-0405 - CVE-2014-0406 - CVE-2014-0407 + CVE-2012-3221 + CVE-2013-5892 + CVE-2014-0404 + CVE-2014-0405 + CVE-2014-0406 + CVE-2014-0407 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-14.xml index 12461391a8..d6df9702ab 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-14.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. curl - January 20, 2014 - January 20, 2014: 1 + 2014-01-20 + 2014-01-20: 1 456074 465678 474354 @@ -49,11 +49,11 @@ - CVE-2013-0249 - CVE-2013-1944 - CVE-2013-2174 - CVE-2013-6422 + CVE-2013-0249 + CVE-2013-1944 + CVE-2013-2174 + CVE-2013-6422 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-15.xml index f3ad69bfff..e52280e3ed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-15.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. asterisk - January 21, 2014 - January 21, 2014: 1 + 2014-01-21 + 2014-01-21: 1 449828 463622 482776 @@ -54,17 +54,17 @@ - CVE-2012-5976 - CVE-2012-5977 - CVE-2013-2264 - CVE-2013-2685 - CVE-2013-2686 - CVE-2013-5641 - CVE-2013-5642 - CVE-2013-7100 + CVE-2012-5976 + CVE-2012-5977 + CVE-2013-2264 + CVE-2013-2685 + CVE-2013-2686 + CVE-2013-5641 + CVE-2013-5642 + CVE-2013-7100 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-16.xml index 3abef0437f..9bdc926b30 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-16.xml @@ -6,8 +6,8 @@ code. ccid - January 21, 2014 - January 21, 2014: 1 + 2014-01-21 + 2014-01-21: 1 349559 local @@ -45,10 +45,10 @@

- CVE-2010-4530 + CVE-2010-4530 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-17.xml index 7dbf850f74..e9bcfb131e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-17.xml @@ -6,8 +6,8 @@ code or Denial of Service. pcsc-lite - January 21, 2014 - January 21, 2014: 1 + 2014-01-21 + 2014-01-21: 1 349561 local @@ -48,10 +48,10 @@ - CVE-2010-4531 + CVE-2010-4531 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-18.xml index 2d6fd134b7..98d03fa315 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-18.xml @@ -6,8 +6,8 @@ allowing attackers to execute arbitrary code. opensc - January 21, 2014 - January 21, 2014: 1 + 2014-01-21 + 2014-01-21: 1 349567 local @@ -45,10 +45,10 @@

- CVE-2010-4523 + CVE-2010-4523 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-19.xml index bbc0a8d12d..fc8d2f5eb2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-19.xml @@ -6,8 +6,8 @@ execute arbitrary code or cause a Denial of Service condition. gmime - January 21, 2014 - January 21, 2014: 1 + 2014-01-21 + 2014-01-21: 1 308051 local, remote @@ -67,12 +67,12 @@

- + CVE-2010-0409 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-20.xml index 15ffac9f17..0c6dfbd191 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-20.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or perform XSS attacks. cacti - January 21, 2014 - January 21, 2014: 1 + 2014-01-21 + 2014-01-21: 1 324031 480196 remote @@ -45,29 +45,29 @@ - + CVE-2010-1644 - + CVE-2010-1645 - + CVE-2010-2092 - + CVE-2010-2543 - + CVE-2010-2544 - + CVE-2010-2545 - CVE-2013-1434 - CVE-2013-1435 + CVE-2013-1434 + CVE-2013-1435 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-21.xml index 883af072be..520d559625 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-21.xml @@ -7,8 +7,8 @@ condition. poppler - January 21, 2014 - January 21, 2014: 1 + 2014-01-21 + 2014-01-21: 1 489720 496770 remote @@ -48,10 +48,10 @@ - CVE-2013-4473 - CVE-2013-4474 - CVE-2013-7296 + CVE-2013-4473 + CVE-2013-4474 + CVE-2013-7296 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-22.xml index 31b0de2609..2564bc08ad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-22.xml @@ -6,8 +6,8 @@ inject SQL commands. activerecord - January 21, 2014 - January 21, 2014: 1 + 2014-01-21 + 2014-01-21: 1 449826 remote @@ -46,12 +46,12 @@ - CVE-2012-6496 + CVE-2012-6496 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-23.xml index b7f45bd0a4..dd98240ba3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-23.xml @@ -6,8 +6,8 @@ in privilege escalation. sudo - January 21, 2014 - January 21, 2014: 1 + 2014-01-21 + 2014-01-21: 1 459722 local @@ -54,13 +54,13 @@ - CVE-2013-1775 - CVE-2013-1776 - CVE-2013-2776 - CVE-2013-2777 + CVE-2013-1775 + CVE-2013-1776 + CVE-2013-2776 + CVE-2013-2777 - ackle - + ackle + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-24.xml index ed3b8529df..0c447d6e9e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-24.xml @@ -6,8 +6,8 @@ remote attacker to conduct a man-in-the-middle attack. inn - January 21, 2014 - January 21, 2014: 1 + 2014-01-21 + 2014-01-21: 1 432002 remote @@ -38,10 +38,10 @@ - CVE-2012-3523 + CVE-2012-3523 - craig - + craig + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-25.xml index fd83c2370f..1a329567e6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-25.xml @@ -6,8 +6,8 @@ to execute arbitrary code or cause a Denial of Service condition. ldns - January 21, 2014 - January 21, 2014: 1 + 2014-01-21 + 2014-01-21: 1 384249 remote @@ -53,10 +53,10 @@

- CVE-2011-3581 + CVE-2011-3581 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-26.xml index bf229bd420..cf0f14a692 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-26.xml @@ -6,8 +6,8 @@ arbitrary shell code. zabbix - January 23, 2014 - June 02, 2014: 2 + 2014-01-23 + 2014-06-02: 2 493250 remote @@ -49,10 +49,10 @@ - CVE-2013-6824 + CVE-2013-6824 - Zlogene - + Zlogene + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-27.xml index ef1a40180b..fbf68911db 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-27.xml @@ -6,8 +6,8 @@ escalation. texmacs - January 26, 2014 - January 26, 2014: 2 + 2014-01-26 + 2014-01-26: 2 337532 local @@ -51,12 +51,12 @@ - + CVE-2010-3394 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-28.xml index eaf0e21fd2..dc443ab2fc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-28.xml @@ -4,8 +4,8 @@ Tomboy: Privilege escalation A vulnerability in Tomboy could result in privilege escalation. tomboy - January 26, 2014 - January 26, 2014: 1 + 2014-01-26 + 2014-01-26: 1 356583 local @@ -50,13 +50,13 @@ - CVE-2010-4005 - GLSA + CVE-2010-4005 + GLSA 200711-12 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-29.xml index f9227f6b63..61e1a6b19a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-29.xml @@ -4,8 +4,8 @@ VIPS: Privilege Escalation A vulnerability in VIPS could result in privilege escalation. vips - January 26, 2014 - January 26, 2014: 1 + 2014-01-26 + 2014-01-26: 1 344561 local @@ -46,12 +46,12 @@ - + CVE-2010-3364 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-30.xml index cf7492b9c5..7c2922bbb4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-30.xml @@ -8,8 +8,8 @@ sun-jre-bin sun-jdk oracle-jdk-bin oracle-jre-bin emul-linux-x86-java - January 27, 2014 - January 27, 2014: 1 + 2014-01-27 + 2014-01-27: 1 404071 421073 433094 @@ -105,258 +105,258 @@

- CVE-2011-3563 - CVE-2011-5035 - CVE-2012-0497 - CVE-2012-0498 - CVE-2012-0499 - CVE-2012-0500 - CVE-2012-0501 - CVE-2012-0502 - CVE-2012-0503 - CVE-2012-0504 - CVE-2012-0505 - CVE-2012-0506 - CVE-2012-0507 - CVE-2012-0547 - CVE-2012-1531 - CVE-2012-1532 - CVE-2012-1533 - CVE-2012-1541 - CVE-2012-1682 - CVE-2012-1711 - CVE-2012-1713 - CVE-2012-1716 - CVE-2012-1717 - CVE-2012-1718 - CVE-2012-1719 - CVE-2012-1721 - CVE-2012-1722 - CVE-2012-1723 - CVE-2012-1724 - CVE-2012-1725 - CVE-2012-1726 - CVE-2012-3136 - CVE-2012-3143 - CVE-2012-3159 - CVE-2012-3174 - CVE-2012-3213 - CVE-2012-3216 - CVE-2012-3342 - CVE-2012-4416 - CVE-2012-4681 - CVE-2012-5067 - CVE-2012-5068 - CVE-2012-5069 - CVE-2012-5070 - CVE-2012-5071 - CVE-2012-5072 - CVE-2012-5073 - CVE-2012-5074 - CVE-2012-5075 - CVE-2012-5076 - CVE-2012-5077 - CVE-2012-5079 - CVE-2012-5081 - CVE-2012-5083 - CVE-2012-5084 - CVE-2012-5085 - CVE-2012-5086 - CVE-2012-5087 - CVE-2012-5088 - CVE-2012-5089 - CVE-2013-0169 - CVE-2013-0351 - CVE-2013-0401 - CVE-2013-0402 - CVE-2013-0409 - CVE-2013-0419 - CVE-2013-0422 - CVE-2013-0423 - CVE-2013-0430 - CVE-2013-0437 - CVE-2013-0438 - CVE-2013-0445 - CVE-2013-0446 - CVE-2013-0448 - CVE-2013-0449 - CVE-2013-0809 - CVE-2013-1473 - CVE-2013-1479 - CVE-2013-1481 - CVE-2013-1484 - CVE-2013-1485 - CVE-2013-1486 - CVE-2013-1487 - CVE-2013-1488 - CVE-2013-1491 - CVE-2013-1493 - CVE-2013-1500 - CVE-2013-1518 - CVE-2013-1537 - CVE-2013-1540 - CVE-2013-1557 - CVE-2013-1558 - CVE-2013-1561 - CVE-2013-1563 - CVE-2013-1564 - CVE-2013-1569 - CVE-2013-1571 - CVE-2013-2383 - CVE-2013-2384 - CVE-2013-2394 - CVE-2013-2400 - CVE-2013-2407 - CVE-2013-2412 - CVE-2013-2414 - CVE-2013-2415 - CVE-2013-2416 - CVE-2013-2417 - CVE-2013-2418 - CVE-2013-2419 - CVE-2013-2420 - CVE-2013-2421 - CVE-2013-2422 - CVE-2013-2423 - CVE-2013-2424 - CVE-2013-2425 - CVE-2013-2426 - CVE-2013-2427 - CVE-2013-2428 - CVE-2013-2429 - CVE-2013-2430 - CVE-2013-2431 - CVE-2013-2432 - CVE-2013-2433 - CVE-2013-2434 - CVE-2013-2435 - CVE-2013-2436 - CVE-2013-2437 - CVE-2013-2438 - CVE-2013-2439 - CVE-2013-2440 - CVE-2013-2442 - CVE-2013-2443 - CVE-2013-2444 - CVE-2013-2445 - CVE-2013-2446 - CVE-2013-2447 - CVE-2013-2448 - CVE-2013-2449 - CVE-2013-2450 - CVE-2013-2451 - CVE-2013-2452 - CVE-2013-2453 - CVE-2013-2454 - CVE-2013-2455 - CVE-2013-2456 - CVE-2013-2457 - CVE-2013-2458 - CVE-2013-2459 - CVE-2013-2460 - CVE-2013-2461 - CVE-2013-2462 - CVE-2013-2463 - CVE-2013-2464 - CVE-2013-2465 - CVE-2013-2466 - CVE-2013-2467 - CVE-2013-2468 - CVE-2013-2469 - CVE-2013-2470 - CVE-2013-2471 - CVE-2013-2472 - CVE-2013-2473 - CVE-2013-3743 - CVE-2013-3744 - CVE-2013-3829 - CVE-2013-5772 - CVE-2013-5774 - CVE-2013-5775 - CVE-2013-5776 - CVE-2013-5777 - CVE-2013-5778 - CVE-2013-5780 - CVE-2013-5782 - CVE-2013-5783 - CVE-2013-5784 - CVE-2013-5787 - CVE-2013-5788 - CVE-2013-5789 - CVE-2013-5790 - CVE-2013-5797 - CVE-2013-5800 - CVE-2013-5801 - CVE-2013-5802 - CVE-2013-5803 - CVE-2013-5804 - CVE-2013-5805 - CVE-2013-5806 - CVE-2013-5809 - CVE-2013-5810 - CVE-2013-5812 - CVE-2013-5814 - CVE-2013-5817 - CVE-2013-5818 - CVE-2013-5819 - CVE-2013-5820 - CVE-2013-5823 - CVE-2013-5824 - CVE-2013-5825 - CVE-2013-5829 - CVE-2013-5830 - CVE-2013-5831 - CVE-2013-5832 - CVE-2013-5838 - CVE-2013-5840 - CVE-2013-5842 - CVE-2013-5843 - CVE-2013-5844 - CVE-2013-5846 - CVE-2013-5848 - CVE-2013-5849 - CVE-2013-5850 - CVE-2013-5851 - CVE-2013-5852 - CVE-2013-5854 - CVE-2013-5870 - CVE-2013-5878 - CVE-2013-5887 - CVE-2013-5888 - CVE-2013-5889 - CVE-2013-5893 - CVE-2013-5895 - CVE-2013-5896 - CVE-2013-5898 - CVE-2013-5899 - CVE-2013-5902 - CVE-2013-5904 - CVE-2013-5905 - CVE-2013-5906 - CVE-2013-5907 - CVE-2013-5910 - CVE-2014-0368 - CVE-2014-0373 - CVE-2014-0375 - CVE-2014-0376 - CVE-2014-0382 - CVE-2014-0385 - CVE-2014-0387 - CVE-2014-0403 - CVE-2014-0408 - CVE-2014-0410 - CVE-2014-0411 - CVE-2014-0415 - CVE-2014-0416 - CVE-2014-0417 - CVE-2014-0418 - CVE-2014-0422 - CVE-2014-0423 - CVE-2014-0424 - CVE-2014-0428 + CVE-2011-3563 + CVE-2011-5035 + CVE-2012-0497 + CVE-2012-0498 + CVE-2012-0499 + CVE-2012-0500 + CVE-2012-0501 + CVE-2012-0502 + CVE-2012-0503 + CVE-2012-0504 + CVE-2012-0505 + CVE-2012-0506 + CVE-2012-0507 + CVE-2012-0547 + CVE-2012-1531 + CVE-2012-1532 + CVE-2012-1533 + CVE-2012-1541 + CVE-2012-1682 + CVE-2012-1711 + CVE-2012-1713 + CVE-2012-1716 + CVE-2012-1717 + CVE-2012-1718 + CVE-2012-1719 + CVE-2012-1721 + CVE-2012-1722 + CVE-2012-1723 + CVE-2012-1724 + CVE-2012-1725 + CVE-2012-1726 + CVE-2012-3136 + CVE-2012-3143 + CVE-2012-3159 + CVE-2012-3174 + CVE-2012-3213 + CVE-2012-3216 + CVE-2012-3342 + CVE-2012-4416 + CVE-2012-4681 + CVE-2012-5067 + CVE-2012-5068 + CVE-2012-5069 + CVE-2012-5070 + CVE-2012-5071 + CVE-2012-5072 + CVE-2012-5073 + CVE-2012-5074 + CVE-2012-5075 + CVE-2012-5076 + CVE-2012-5077 + CVE-2012-5079 + CVE-2012-5081 + CVE-2012-5083 + CVE-2012-5084 + CVE-2012-5085 + CVE-2012-5086 + CVE-2012-5087 + CVE-2012-5088 + CVE-2012-5089 + CVE-2013-0169 + CVE-2013-0351 + CVE-2013-0401 + CVE-2013-0402 + CVE-2013-0409 + CVE-2013-0419 + CVE-2013-0422 + CVE-2013-0423 + CVE-2013-0430 + CVE-2013-0437 + CVE-2013-0438 + CVE-2013-0445 + CVE-2013-0446 + CVE-2013-0448 + CVE-2013-0449 + CVE-2013-0809 + CVE-2013-1473 + CVE-2013-1479 + CVE-2013-1481 + CVE-2013-1484 + CVE-2013-1485 + CVE-2013-1486 + CVE-2013-1487 + CVE-2013-1488 + CVE-2013-1491 + CVE-2013-1493 + CVE-2013-1500 + CVE-2013-1518 + CVE-2013-1537 + CVE-2013-1540 + CVE-2013-1557 + CVE-2013-1558 + CVE-2013-1561 + CVE-2013-1563 + CVE-2013-1564 + CVE-2013-1569 + CVE-2013-1571 + CVE-2013-2383 + CVE-2013-2384 + CVE-2013-2394 + CVE-2013-2400 + CVE-2013-2407 + CVE-2013-2412 + CVE-2013-2414 + CVE-2013-2415 + CVE-2013-2416 + CVE-2013-2417 + CVE-2013-2418 + CVE-2013-2419 + CVE-2013-2420 + CVE-2013-2421 + CVE-2013-2422 + CVE-2013-2423 + CVE-2013-2424 + CVE-2013-2425 + CVE-2013-2426 + CVE-2013-2427 + CVE-2013-2428 + CVE-2013-2429 + CVE-2013-2430 + CVE-2013-2431 + CVE-2013-2432 + CVE-2013-2433 + CVE-2013-2434 + CVE-2013-2435 + CVE-2013-2436 + CVE-2013-2437 + CVE-2013-2438 + CVE-2013-2439 + CVE-2013-2440 + CVE-2013-2442 + CVE-2013-2443 + CVE-2013-2444 + CVE-2013-2445 + CVE-2013-2446 + CVE-2013-2447 + CVE-2013-2448 + CVE-2013-2449 + CVE-2013-2450 + CVE-2013-2451 + CVE-2013-2452 + CVE-2013-2453 + CVE-2013-2454 + CVE-2013-2455 + CVE-2013-2456 + CVE-2013-2457 + CVE-2013-2458 + CVE-2013-2459 + CVE-2013-2460 + CVE-2013-2461 + CVE-2013-2462 + CVE-2013-2463 + CVE-2013-2464 + CVE-2013-2465 + CVE-2013-2466 + CVE-2013-2467 + CVE-2013-2468 + CVE-2013-2469 + CVE-2013-2470 + CVE-2013-2471 + CVE-2013-2472 + CVE-2013-2473 + CVE-2013-3743 + CVE-2013-3744 + CVE-2013-3829 + CVE-2013-5772 + CVE-2013-5774 + CVE-2013-5775 + CVE-2013-5776 + CVE-2013-5777 + CVE-2013-5778 + CVE-2013-5780 + CVE-2013-5782 + CVE-2013-5783 + CVE-2013-5784 + CVE-2013-5787 + CVE-2013-5788 + CVE-2013-5789 + CVE-2013-5790 + CVE-2013-5797 + CVE-2013-5800 + CVE-2013-5801 + CVE-2013-5802 + CVE-2013-5803 + CVE-2013-5804 + CVE-2013-5805 + CVE-2013-5806 + CVE-2013-5809 + CVE-2013-5810 + CVE-2013-5812 + CVE-2013-5814 + CVE-2013-5817 + CVE-2013-5818 + CVE-2013-5819 + CVE-2013-5820 + CVE-2013-5823 + CVE-2013-5824 + CVE-2013-5825 + CVE-2013-5829 + CVE-2013-5830 + CVE-2013-5831 + CVE-2013-5832 + CVE-2013-5838 + CVE-2013-5840 + CVE-2013-5842 + CVE-2013-5843 + CVE-2013-5844 + CVE-2013-5846 + CVE-2013-5848 + CVE-2013-5849 + CVE-2013-5850 + CVE-2013-5851 + CVE-2013-5852 + CVE-2013-5854 + CVE-2013-5870 + CVE-2013-5878 + CVE-2013-5887 + CVE-2013-5888 + CVE-2013-5889 + CVE-2013-5893 + CVE-2013-5895 + CVE-2013-5896 + CVE-2013-5898 + CVE-2013-5899 + CVE-2013-5902 + CVE-2013-5904 + CVE-2013-5905 + CVE-2013-5906 + CVE-2013-5907 + CVE-2013-5910 + CVE-2014-0368 + CVE-2014-0373 + CVE-2014-0375 + CVE-2014-0376 + CVE-2014-0382 + CVE-2014-0385 + CVE-2014-0387 + CVE-2014-0403 + CVE-2014-0408 + CVE-2014-0410 + CVE-2014-0411 + CVE-2014-0415 + CVE-2014-0416 + CVE-2014-0417 + CVE-2014-0418 + CVE-2014-0422 + CVE-2014-0423 + CVE-2014-0424 + CVE-2014-0428 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-31.xml index e50e4f05ba..d764b99c08 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-31.xml @@ -4,8 +4,8 @@ CEDET: Privilege escalation A vulnerability in CEDET could result in privilege escalation. cedet - January 27, 2014 - January 27, 2014: 2 + 2014-01-27 + 2014-01-27: 2 398227 local @@ -47,8 +47,8 @@ - CVE-2012-0035 + CVE-2012-0035 - ago - Zlogene + ago + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-32.xml index 18a7112669..c08ff426b3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-32.xml @@ -6,8 +6,8 @@ leading to remote execution of arbitrary code with root privileges. Exim - January 27, 2014 - January 27, 2014: 3 + 2014-01-27 + 2014-01-27: 3 322665 348249 353352 @@ -46,15 +46,15 @@ - CVE-2010-2023 - CVE-2010-2024 - CVE-2010-4344 - CVE-2010-4345 - CVE-2011-0017 - CVE-2011-1407 - CVE-2011-1764 - CVE-2012-5671 + CVE-2010-2023 + CVE-2010-2024 + CVE-2010-4344 + CVE-2010-4345 + CVE-2011-0017 + CVE-2011-1407 + CVE-2011-1764 + CVE-2012-5671 - craig - craig + craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-33.xml index b3c17b3a2d..b55e4c9b69 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-33.xml @@ -6,8 +6,8 @@ allowing remote attackers to execute arbitrary code. digest-base - January 29, 2014 - January 29, 2014: 1 + 2014-01-29 + 2014-01-29: 1 385487 remote @@ -40,12 +40,12 @@ - CVE-2011-3597 + CVE-2011-3597 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-34.xml index 754a7f4ad5..4805c9e72a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201401-34.xml @@ -6,8 +6,8 @@ resulting in Denial of Service. bind - January 29, 2014 - January 29, 2014: 1 + 2014-01-29 + 2014-01-29: 1 437828 446094 453974 @@ -46,14 +46,14 @@ - CVE-2012-5166 - CVE-2012-5688 - CVE-2012-5689 - CVE-2013-2266 - CVE-2013-3919 - CVE-2013-4854 - CVE-2014-0591 + CVE-2012-5166 + CVE-2012-5688 + CVE-2012-5689 + CVE-2013-2266 + CVE-2013-3919 + CVE-2013-4854 + CVE-2014-0591 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-01.xml index 4d1667b2a5..bc7713c4f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-01.xml @@ -6,8 +6,8 @@ worst of which may allow execution of arbitrary code. libmicrohttpd - February 02, 2014 - February 02, 2014: 1 + 2014-02-02 + 2014-02-02: 1 493450 remote @@ -45,9 +45,9 @@ - CVE-2013-7038 - CVE-2013-7039 + CVE-2013-7038 + CVE-2013-7039 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-02.xml index c87f366625..b49c9c6ce5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-02.xml @@ -6,8 +6,8 @@ access the GPU inappropriately, allowing for privilege escalation. nvidia-drivers - February 02, 2014 - March 13, 2014: 3 + 2014-02-02 + 2014-03-13: 3 493448 local @@ -68,13 +68,13 @@ - CVE-2013-5986 - CVE-2013-5987 + CVE-2013-5986 + CVE-2013-5987 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-03.xml index 2a1e83b463..3febc585c9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-03.xml @@ -6,8 +6,8 @@ context-dependent attacker to cause Denial of Service. pixman - February 02, 2014 - February 02, 2014: 1 + 2014-02-02 + 2014-02-02: 1 493292 local, remote @@ -47,10 +47,10 @@

- CVE-2013-6425 + CVE-2013-6425 - Zlogene - + Zlogene + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-04.xml index fa39917a7d..090f73d0f6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-04.xml @@ -6,8 +6,8 @@ of which could allow attackers to execute arbitrary code. libwww-perl - February 04, 2014 - February 04, 2014: 1 + 2014-02-04 + 2014-02-04: 1 329943 386309 remote @@ -53,13 +53,13 @@ - CVE-2010-2253 - CVE-2011-0633 + CVE-2010-2253 + CVE-2011-0633 - + underling - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-05.xml index a972c406ad..c32a25b485 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-05.xml @@ -7,8 +7,8 @@ shared library. banshee - February 05, 2014 - February 05, 2014: 1 + 2014-02-05 + 2014-02-05: 1 345567 local @@ -49,10 +49,10 @@ - CVE-2010-3998 + CVE-2010-3998 - craig - + craig + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-06.xml index 7dde80a160..b9d059a3bd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-06.xml @@ -6,8 +6,8 @@ worst of which could result in execution of arbitrary code. adobe-flash - February 06, 2014 - February 06, 2014: 1 + 2014-02-06 + 2014-02-06: 1 491148 493894 498170 @@ -50,18 +50,18 @@ - CVE-2013-5329 - CVE-2013-5330 - CVE-2013-5331 - CVE-2013-5332 - CVE-2014-0491 - CVE-2014-0492 - CVE-2014-0497 + CVE-2013-5329 + CVE-2013-5330 + CVE-2013-5331 + CVE-2013-5332 + CVE-2014-0491 + CVE-2014-0492 + CVE-2014-0497 - + BlueKnight - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-07.xml index 869b315317..fd5f197ab9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-07.xml @@ -6,8 +6,8 @@ arbitrary code. freeciv - February 06, 2014 - February 06, 2014: 1 + 2014-02-06 + 2014-02-06: 1 329949 remote @@ -47,12 +47,12 @@

- CVE-2010-2445 + CVE-2010-2445 - + underling - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-08.xml index c033017eba..ffacb36e8c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-08.xml @@ -6,8 +6,8 @@ execution of arbitrary code. stunnel - February 06, 2014 - February 07, 2014: 4 + 2014-02-06 + 2014-02-07: 4 460278 remote @@ -47,15 +47,15 @@ - CVE-2013-1762 + CVE-2013-1762 stunnel: CVE-2013-1762 - + creffett - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-09.xml index e6a57fa150..bc7e910a5a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-09.xml @@ -6,8 +6,8 @@ to execute arbitrary code or cause a Denial of Service condition. mod_fcgid - February 07, 2014 - February 07, 2014: 1 + 2014-02-07 + 2014-02-07: 1 487314 remote @@ -44,12 +44,12 @@ - CVE-2013-4365 + CVE-2013-4365 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-10.xml index 95586f4245..37d404f575 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-10.xml @@ -6,8 +6,8 @@ possibly allowing symlink attacks. pulseaudio - February 07, 2014 - February 07, 2014: 1 + 2014-02-07 + 2014-02-07: 1 313329 local @@ -42,8 +42,8 @@ - CVE-2009-1299 + CVE-2009-1299 - craig - Zlogene + craig + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-11.xml index 015678d169..938f4cbbe2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-11.xml @@ -6,8 +6,8 @@ a Denial of Service condition. links - February 07, 2014 - February 07, 2014: 1 + 2014-02-07 + 2014-02-07: 1 493138 remote @@ -40,12 +40,12 @@ - CVE-2013-6050 + CVE-2013-6050 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-12.xml index 0ef0ac8b98..688a0a031b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-12.xml @@ -6,8 +6,8 @@ local attackers to gain access to cleartext credentials. pam_skey - February 09, 2014 - February 09, 2014: 1 + 2014-02-09 + 2014-02-09: 1 482588 local @@ -44,8 +44,8 @@ - CVE-2013-4285 + CVE-2013-4285 - a3li - a3li + a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-13.xml index 14ba013f7c..c219abe019 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-13.xml @@ -6,8 +6,8 @@ or Denial of Service. djvu - February 09, 2014 - February 09, 2014: 1 + 2014-02-09 + 2014-02-09: 1 497088 remote @@ -45,8 +45,8 @@ - CVE-2012-6535 + CVE-2012-6535 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-14.xml index c2a2b939c5..d7d913036e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-14.xml @@ -6,8 +6,8 @@ allow remote attackers to cause a Denial of Service condition. icu - February 10, 2014 - February 10, 2014: 1 + 2014-02-10 + 2014-02-10: 1 460426 486948 remote @@ -50,13 +50,13 @@

- CVE-2013-0900 - CVE-2013-2924 + CVE-2013-0900 + CVE-2013-2924 - + BlueKnight - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-15.xml index afab165b06..96a493f4c3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-15.xml @@ -6,8 +6,8 @@ execution, SQL injection, or reading of arbitrary files. roundcube - February 11, 2014 - February 11, 2014: 1 + 2014-02-11 + 2014-02-11: 1 488954 remote @@ -52,12 +52,12 @@ - CVE-2013-6172 + CVE-2013-6172 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-16.xml index 9c08a94058..0a964ad47e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-16.xml @@ -7,8 +7,8 @@ Denial of Service. freetype - February 11, 2014 - February 11, 2014: 1 + 2014-02-11 + 2014-02-11: 1 448550 local, remote @@ -48,10 +48,10 @@

- CVE-2012-5668 - CVE-2012-5669 - CVE-2012-5670 + CVE-2012-5668 + CVE-2012-5669 + CVE-2012-5670 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-17.xml index 9e1a5183d4..5d7981ad60 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-17.xml @@ -6,8 +6,8 @@ arbitrary code. xpdf - February 17, 2014 - February 17, 2014: 1 + 2014-02-17 + 2014-02-17: 1 386271 local, remote @@ -41,12 +41,12 @@ - CVE-2009-4035 - CVE-2010-3702 - CVE-2010-3704 + CVE-2009-4035 + CVE-2010-3702 + CVE-2010-3704 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-18.xml index aaccff4bd5..8cb7f5eba9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-18.xml @@ -7,8 +7,8 @@ Service. mc - February 20, 2014 - February 20, 2014: 1 + 2014-02-20 + 2014-02-20: 1 436518 remote @@ -42,8 +42,8 @@ - CVE-2012-4463 + CVE-2012-4463 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-19.xml index 8db600ad5a..f2beea0bad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-19.xml @@ -6,8 +6,8 @@ arbitrary code or cause a Denial of Service condition. libtar - February 21, 2014 - February 21, 2014: 1 + 2014-02-21 + 2014-02-21: 1 487420 remote @@ -45,12 +45,12 @@ - CVE-2013-4397 + CVE-2013-4397 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-20.xml index cc74de520d..8425594c47 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-20.xml @@ -6,8 +6,8 @@ which allows remote attackers to execute arbitrary code. kvirc - February 21, 2014 - February 21, 2014: 1 + 2014-02-21 + 2014-02-21: 1 326149 330111 remote @@ -48,12 +48,12 @@

- CVE-2010-2451 - CVE-2010-2452 - CVE-2010-2785 + CVE-2010-2451 + CVE-2010-2452 + CVE-2010-2785 - craig - + craig + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-21.xml index c37af13667..d53792765d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-21.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code or cause Denial of Service. tiff - February 21, 2014 - February 21, 2014: 1 + 2014-02-21 + 2014-02-21: 1 440154 440944 468334 @@ -61,18 +61,18 @@

- CVE-2012-4447 - CVE-2012-4564 - CVE-2013-1960 - CVE-2013-1961 - CVE-2013-4231 - CVE-2013-4232 - CVE-2013-4244 + CVE-2012-4447 + CVE-2012-4564 + CVE-2013-1960 + CVE-2013-1961 + CVE-2013-4231 + CVE-2013-4232 + CVE-2013-4244 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-22.xml index 97599c52a1..9afd8fd4f9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-22.xml @@ -6,8 +6,8 @@ attacker to execute arbitrary code. tcptrack - February 21, 2014 - February 21, 2014: 1 + 2014-02-21 + 2014-02-21: 1 377917 local @@ -51,12 +51,12 @@

- CVE-2011-2903 + CVE-2011-2903 - + underling - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-23.xml index b884a6c758..d7f3c34089 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-23.xml @@ -6,8 +6,8 @@ which allow for local privilege escalation. libxfont - February 21, 2014 - February 21, 2014: 1 + 2014-02-21 + 2014-02-21: 1 378797 497416 local @@ -43,11 +43,11 @@ - CVE-2011-2895 - CVE-2013-6462 + CVE-2011-2895 + CVE-2013-6462 - + underling - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-24.xml index 0420ab5689..8242a94c67 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-24.xml @@ -7,8 +7,8 @@ Service, or the disclosure of private keys. gnupg libgcrypt - February 21, 2014 - August 24, 2016: 3 + 2014-02-21 + 2016-08-24: 3 449546 478184 484836 @@ -78,14 +78,14 @@ - CVE-2012-6085 - CVE-2013-4242 - CVE-2013-4351 - CVE-2013-4402 - Flush+Reload: a High + CVE-2012-6085 + CVE-2013-4242 + CVE-2013-4351 + CVE-2013-4402 + Flush+Reload: a High Resolution, Low Noise, L3 Cache Side-Channel Attack - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-25.xml index 65f974cf29..83010b8155 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-25.xml @@ -6,8 +6,8 @@ result in a Denial of Service condition. openssl - February 21, 2014 - February 21, 2014: 1 + 2014-02-21 + 2014-02-21: 1 497838 remote @@ -45,12 +45,12 @@ - CVE-2013-4353 + CVE-2013-4353 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-26.xml index 60fe74589d..e57e541d9a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-26.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. libssh - February 21, 2014 - February 21, 2014: 1 + 2014-02-21 + 2014-02-21: 1 444147 remote @@ -41,12 +41,12 @@ - CVE-2012-4559 - CVE-2012-4560 - CVE-2012-4561 - CVE-2012-4562 - CVE-2012-6063 + CVE-2012-4559 + CVE-2012-4560 + CVE-2012-4561 + CVE-2012-4562 + CVE-2012-6063 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-27.xml index 711dc1edf8..b6367069fa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-27.xml @@ -6,8 +6,8 @@ execute arbitrary code. pidgin-knotify - February 26, 2014 - February 26, 2014: 1 + 2014-02-26 + 2014-02-26: 1 336916 remote @@ -44,8 +44,8 @@ - CVE-2010-3088 + CVE-2010-3088 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-28.xml index cc7f602129..4aae40a352 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-28.xml @@ -6,8 +6,8 @@ allowing remote attackers to cause a Denial of Service condition. chrony - February 28, 2014 - February 28, 2014: 1 + 2014-02-28 + 2014-02-28: 1 480364 remote @@ -44,13 +44,13 @@ - CVE-2012-4502 - CVE-2012-4503 + CVE-2012-4502 + CVE-2012-4503 - + jaervosz - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-29.xml index 0809642695..716138dfd2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201402-29.xml @@ -6,8 +6,8 @@ ArgyllCMS which could allow attackers to execute arbitrary code. argyllcms - February 28, 2014 - February 28, 2014: 1 + 2014-02-28 + 2014-02-28: 1 437652 remote @@ -44,8 +44,8 @@ - CVE-2012-4405 + CVE-2012-4405 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-01.xml index 0fb960bbdf..12f7da6ad2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-01.xml @@ -6,8 +6,8 @@ worst of which may allow execution of arbitrary code. chromium v8 - March 05, 2014 - March 05, 2014: 1 + 2014-03-05 + 2014-03-05: 1 486742 488148 491128 @@ -68,74 +68,74 @@ - CVE-2013-2906 - CVE-2013-2907 - CVE-2013-2908 - CVE-2013-2909 - CVE-2013-2910 - CVE-2013-2911 - CVE-2013-2912 - CVE-2013-2913 - CVE-2013-2915 - CVE-2013-2916 - CVE-2013-2917 - CVE-2013-2918 - CVE-2013-2919 - CVE-2013-2920 - CVE-2013-2921 - CVE-2013-2922 - CVE-2013-2923 - CVE-2013-2925 - CVE-2013-2926 - CVE-2013-2927 - CVE-2013-2928 - CVE-2013-2931 - CVE-2013-6621 - CVE-2013-6622 - CVE-2013-6623 - CVE-2013-6624 - CVE-2013-6625 - CVE-2013-6626 - CVE-2013-6627 - CVE-2013-6628 - CVE-2013-6632 - CVE-2013-6634 - CVE-2013-6635 - CVE-2013-6636 - CVE-2013-6637 - CVE-2013-6638 - CVE-2013-6639 - CVE-2013-6640 - CVE-2013-6641 - CVE-2013-6643 - CVE-2013-6644 - CVE-2013-6645 - CVE-2013-6646 - CVE-2013-6649 - CVE-2013-6650 - CVE-2013-6652 - CVE-2013-6653 - CVE-2013-6654 - CVE-2013-6655 - CVE-2013-6656 - CVE-2013-6657 - CVE-2013-6658 - CVE-2013-6659 - CVE-2013-6660 - CVE-2013-6661 - CVE-2013-6663 - CVE-2013-6664 - CVE-2013-6665 - CVE-2013-6666 - CVE-2013-6667 - CVE-2013-6668 - CVE-2013-6802 - CVE-2014-1681 + CVE-2013-2906 + CVE-2013-2907 + CVE-2013-2908 + CVE-2013-2909 + CVE-2013-2910 + CVE-2013-2911 + CVE-2013-2912 + CVE-2013-2913 + CVE-2013-2915 + CVE-2013-2916 + CVE-2013-2917 + CVE-2013-2918 + CVE-2013-2919 + CVE-2013-2920 + CVE-2013-2921 + CVE-2013-2922 + CVE-2013-2923 + CVE-2013-2925 + CVE-2013-2926 + CVE-2013-2927 + CVE-2013-2928 + CVE-2013-2931 + CVE-2013-6621 + CVE-2013-6622 + CVE-2013-6623 + CVE-2013-6624 + CVE-2013-6625 + CVE-2013-6626 + CVE-2013-6627 + CVE-2013-6628 + CVE-2013-6632 + CVE-2013-6634 + CVE-2013-6635 + CVE-2013-6636 + CVE-2013-6637 + CVE-2013-6638 + CVE-2013-6639 + CVE-2013-6640 + CVE-2013-6641 + CVE-2013-6643 + CVE-2013-6644 + CVE-2013-6645 + CVE-2013-6646 + CVE-2013-6649 + CVE-2013-6650 + CVE-2013-6652 + CVE-2013-6653 + CVE-2013-6654 + CVE-2013-6655 + CVE-2013-6656 + CVE-2013-6657 + CVE-2013-6658 + CVE-2013-6659 + CVE-2013-6660 + CVE-2013-6661 + CVE-2013-6663 + CVE-2013-6664 + CVE-2013-6665 + CVE-2013-6666 + CVE-2013-6667 + CVE-2013-6668 + CVE-2013-6802 + CVE-2014-1681 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-02.xml index faad0adcbc..12f189d13e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-02.xml @@ -6,8 +6,8 @@ code. libyaml - March 08, 2014 - March 08, 2014: 1 + 2014-03-08 + 2014-03-08: 1 499920 remote @@ -44,10 +44,10 @@ - CVE-2013-6393 + CVE-2013-6393 - Zlogene - + Zlogene + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-03.xml index 799b5f0cfe..ff79983d54 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-03.xml @@ -4,8 +4,8 @@ file: Denial of Service A vulnerability in file could result in Denial of Service. file - March 13, 2014 - March 13, 2014: 1 + 2014-03-13 + 2014-03-13: 1 501574 remote @@ -42,10 +42,10 @@ - CVE-2014-1943 + CVE-2014-1943 - Zlogene - + Zlogene + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-04.xml index 6deb9f2f17..d08ab9d39a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-04.xml @@ -6,8 +6,8 @@ Denial of Service condition. qt-core - March 13, 2014 - March 13, 2014: 1 + 2014-03-13 + 2014-03-13: 1 494728 remote @@ -46,10 +46,10 @@

- CVE-2013-4549 + CVE-2013-4549 - Zlogene - + Zlogene + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-05.xml index 41c1fc2a8b..c7ac714917 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-05.xml @@ -6,8 +6,8 @@ to user-assisted execution of arbitrary code. emacs - March 20, 2014 - March 20, 2014: 1 + 2014-03-20 + 2014-03-20: 1 398239 431178 remote @@ -59,9 +59,9 @@ - CVE-2012-0035 - CVE-2012-3479 + CVE-2012-0035 + CVE-2012-3479 - ago - ackle + ago + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-06.xml index 39a0d6eee7..6f3112195e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-06.xml @@ -6,8 +6,8 @@ arbitrary code. libupnp - March 26, 2014 - March 26, 2014: 1 + 2014-03-26 + 2014-03-26: 1 454570 remote @@ -41,10 +41,10 @@ - CVE-2012-5958 - CVE-2012-5959 - CVE-2012-5960 + CVE-2012-5958 + CVE-2012-5959 + CVE-2012-5960 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-07.xml index 1384a2f023..9760254400 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-07.xml @@ -6,8 +6,8 @@ or Denial of Service. grep - March 26, 2014 - March 26, 2014: 1 + 2014-03-26 + 2014-03-26: 1 448246 local, remote @@ -40,8 +40,8 @@ - CVE-2012-5667 + CVE-2012-5667 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-08.xml index 6c43feeebb..71eba2cbfe 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201403-08.xml @@ -6,8 +6,8 @@ Authentication PlRPC - March 27, 2014 - March 27, 2014: 1 + 2014-03-27 + 2014-03-27: 1 497692 remote @@ -46,12 +46,12 @@ - CVE-2013-7284 + CVE-2013-7284 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-01.xml index 054a83eeeb..7e798f678f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-01.xml @@ -4,8 +4,8 @@ CUPS: Arbitrary file read/write A vulnerability in CUPS may allow for arbitrary file access. cups - April 07, 2014 - April 07, 2014: 1 + 2014-04-07 + 2014-04-07: 1 442926 local @@ -44,12 +44,12 @@ - CVE-2012-5519 + CVE-2012-5519 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-02.xml index cc19f708c2..a27a8d66e3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-02.xml @@ -6,8 +6,8 @@ execute arbitrary code. libproxy - April 07, 2014 - April 07, 2014: 1 + 2014-04-07 + 2014-04-07: 1 438146 remote @@ -42,8 +42,8 @@ - CVE-2012-4504 + CVE-2012-4504 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-03.xml index 0046c98900..93cc7f1ca9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-03.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. optipng - April 07, 2014 - April 07, 2014: 1 + 2014-04-07 + 2014-04-07: 1 435340 remote @@ -44,8 +44,8 @@ - CVE-2012-4432 + CVE-2012-4432 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-04.xml index e5f9cdfbed..698df1581a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-04.xml @@ -6,8 +6,8 @@ arbitrary code. crack - April 07, 2014 - April 07, 2014: 1 + 2014-04-07 + 2014-04-07: 1 460164 remote @@ -42,8 +42,8 @@ - CVE-2013-1800 + CVE-2013-1800 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-05.xml index 1f8eb9697f..75672f637e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-05.xml @@ -6,8 +6,8 @@ can allow attackers to execute arbitrary code openafs - April 07, 2014 - April 07, 2014: 1 + 2014-04-07 + 2014-04-07: 1 265538 355533 460494 @@ -51,19 +51,19 @@ - CVE-2009-1250 - CVE-2009-1251 - CVE-2011-0430 - CVE-2011-0431 - CVE-2013-1794 - CVE-2013-1795 - CVE-2013-4134 - CVE-2013-4135 + CVE-2009-1250 + CVE-2009-1251 + CVE-2011-0430 + CVE-2011-0431 + CVE-2013-1794 + CVE-2013-1795 + CVE-2013-4134 + CVE-2013-4135 - + underling - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-06.xml index eb648cc70f..77084c0da2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-06.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. mesa - April 08, 2014 - April 08, 2014: 1 + 2014-04-08 + 2014-04-08: 1 432400 445916 472280 @@ -45,10 +45,10 @@ - CVE-2012-2864 - CVE-2012-5129 - CVE-2013-1872 + CVE-2012-2864 + CVE-2012-5129 + CVE-2013-1872 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-07.xml index 785480be91..91ca3db1d4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201404-07.xml @@ -6,8 +6,8 @@ remote attackers to obtain sensitive information via various vectors. openssl - April 08, 2014 - June 06, 2015: 4 + 2014-04-08 + 2015-06-06: 4 505278 507074 remote @@ -82,10 +82,10 @@

- CVE-2014-0076 - CVE-2014-0160 + CVE-2014-0076 + CVE-2014-0160 Heartbleed bug website - a3li - a3li + a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-01.xml index 1832314f7f..63128b6093 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-01.xml @@ -7,8 +7,8 @@ cause Denial of Service. udisks - May 02, 2014 - May 02, 2014: 1 + 2014-05-02 + 2014-05-02: 1 504100 local @@ -53,10 +53,10 @@ - CVE-2014-0004 + CVE-2014-0004 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-02.xml index c22f47d55d..909b2e56ac 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-02.xml @@ -6,8 +6,8 @@ condition. libsrtp - May 03, 2014 - May 03, 2014: 1 + 2014-05-03 + 2014-05-03: 1 472302 remote @@ -45,10 +45,10 @@ - CVE-2013-2139 + CVE-2013-2139 - Zlogene - + Zlogene + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-03.xml index 6ef2d33a1e..25782fe5b7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-03.xml @@ -6,8 +6,8 @@ may allow execution of arbitrary code. weechat - May 03, 2014 - May 03, 2014: 1 + 2014-05-03 + 2014-05-03: 1 442600 remote @@ -52,9 +52,9 @@ - CVE-2012-5534 - CVE-2012-5854 + CVE-2012-5534 + CVE-2012-5854 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-04.xml index b8c4f52358..3ab21fb098 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-04.xml @@ -6,8 +6,8 @@ worst of which could result in execution of arbitrary code. adobe-flash - May 03, 2014 - May 03, 2014: 1 + 2014-05-03 + 2014-05-03: 1 501960 504286 507176 @@ -51,21 +51,21 @@ - CVE-2014-0498 - CVE-2014-0499 - CVE-2014-0502 - CVE-2014-0503 - CVE-2014-0504 - CVE-2014-0506 - CVE-2014-0507 - CVE-2014-0508 - CVE-2014-0509 - CVE-2014-0515 + CVE-2014-0498 + CVE-2014-0499 + CVE-2014-0502 + CVE-2014-0503 + CVE-2014-0504 + CVE-2014-0506 + CVE-2014-0507 + CVE-2014-0508 + CVE-2014-0509 + CVE-2014-0515 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-05.xml index e232071f2e..cbf628acbb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-05.xml @@ -6,8 +6,8 @@ to cause a Denial of Service condition. asterisk - May 03, 2014 - May 03, 2014: 1 + 2014-05-03 + 2014-05-03: 1 504180 remote @@ -49,27 +49,27 @@ - + AST-2014-001 - + AST-2014-002 - + AST-2014-003 - + AST-2014-004 - CVE-2014-2286 - CVE-2014-2287 - CVE-2014-2288 - CVE-2014-2289 + CVE-2014-2286 + CVE-2014-2287 + CVE-2014-2288 + CVE-2014-2289 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-06.xml index 9eb428a9d9..cffd32484c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-06.xml @@ -6,8 +6,8 @@ which may allow remote attackers to execute arbitrary code. openssh - May 11, 2014 - May 11, 2014: 1 + 2014-05-11 + 2014-05-11: 1 231292 247466 386307 @@ -56,30 +56,30 @@

- + CVE-2008-5161 - + CVE-2010-4478 - + CVE-2010-4755 - CVE-2010-5107 - + CVE-2010-5107 + CVE-2011-5000 - + CVE-2012-0814 - + CVE-2014-2532 - + keytoaster - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-07.xml index bba1aab875..6d476b0154 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-07.xml @@ -7,8 +7,8 @@ condition. xorg-server - May 15, 2014 - May 15, 2014: 1 + 2014-05-15 + 2014-05-15: 1 466222 471098 487360 @@ -48,43 +48,43 @@ - CVE-2013-1056 - CVE-2013-1940 - CVE-2013-1981 - CVE-2013-1982 - CVE-2013-1983 - CVE-2013-1984 - CVE-2013-1985 - CVE-2013-1986 - CVE-2013-1987 - CVE-2013-1988 - CVE-2013-1989 - CVE-2013-1990 - CVE-2013-1991 - CVE-2013-1992 - CVE-2013-1993 - CVE-2013-1994 - CVE-2013-1995 - CVE-2013-1996 - CVE-2013-1997 - CVE-2013-1998 - CVE-2013-1999 - CVE-2013-2000 - CVE-2013-2001 - CVE-2013-2002 - CVE-2013-2003 - CVE-2013-2004 - CVE-2013-2005 - CVE-2013-2062 - CVE-2013-2063 - CVE-2013-2064 - CVE-2013-2066 - CVE-2013-4396 + CVE-2013-1056 + CVE-2013-1940 + CVE-2013-1981 + CVE-2013-1982 + CVE-2013-1983 + CVE-2013-1984 + CVE-2013-1985 + CVE-2013-1986 + CVE-2013-1987 + CVE-2013-1988 + CVE-2013-1989 + CVE-2013-1990 + CVE-2013-1991 + CVE-2013-1992 + CVE-2013-1993 + CVE-2013-1994 + CVE-2013-1995 + CVE-2013-1996 + CVE-2013-1997 + CVE-2013-1998 + CVE-2013-1999 + CVE-2013-2000 + CVE-2013-2001 + CVE-2013-2002 + CVE-2013-2003 + CVE-2013-2004 + CVE-2013-2005 + CVE-2013-2062 + CVE-2013-2063 + CVE-2013-2064 + CVE-2013-2066 + CVE-2013-4396 - + pinkbyte - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-08.xml index 7daba39a58..fed09416c3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-08.xml @@ -6,8 +6,8 @@ which could lead to arbitrary code execution. clamav - May 16, 2014 - May 16, 2014: 1 + 2014-05-16 + 2014-05-16: 1 462278 467710 remote @@ -45,16 +45,16 @@ - CVE-2013-2020 - CVE-2013-2021 - CVE-2013-7087 - CVE-2013-7088 - CVE-2013-7089 + CVE-2013-2020 + CVE-2013-2021 + CVE-2013-7087 + CVE-2013-7088 + CVE-2013-7089 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-09.xml index e96c26e1da..359a4aad1f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-09.xml @@ -6,8 +6,8 @@ worst of which could lead to arbitrary code execution. imagemagick - May 17, 2014 - May 17, 2014: 1 + 2014-05-17 + 2014-05-17: 1 409431 483032 500988 @@ -52,16 +52,16 @@ - CVE-2012-1185 - CVE-2012-1186 - CVE-2013-4298 - CVE-2014-1947 - CVE-2014-2030 + CVE-2012-1185 + CVE-2012-1186 + CVE-2013-4298 + CVE-2014-1947 + CVE-2014-2030 - + underling - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-10.xml index 1155690582..a4d3f629ad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-10.xml @@ -6,8 +6,8 @@ which allow execution of arbitrary code. rack - May 17, 2014 - May 17, 2014: 1 + 2014-05-17 + 2014-05-17: 1 451620 456176 remote @@ -67,14 +67,14 @@ - CVE-2012-6109 - CVE-2013-0183 - CVE-2013-0184 - CVE-2013-0262 - CVE-2013-0263 + CVE-2012-6109 + CVE-2013-0183 + CVE-2013-0184 + CVE-2013-0262 + CVE-2013-0263 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-11.xml index 89bbb9d39d..8a4744ef42 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-11.xml @@ -6,8 +6,8 @@ sensitive information. bacula - May 17, 2014 - May 17, 2014: 1 + 2014-05-17 + 2014-05-17: 1 434878 remote @@ -39,8 +39,8 @@ - CVE-2012-4430 + CVE-2012-4430 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-12.xml index 8119fbd959..55793389e7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-12.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. ettercap - May 17, 2014 - May 17, 2014: 1 + 2014-05-17 + 2014-05-17: 1 340897 451198 remote @@ -56,10 +56,10 @@ - CVE-2010-3843 - CVE-2010-3844 - CVE-2013-0722 + CVE-2010-3843 + CVE-2010-3844 + CVE-2013-0722 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-13.xml index 2d81f65c8e..4614822a0f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-13.xml @@ -6,8 +6,8 @@ which allow execution of arbitrary code or Denial of Service. pango - May 17, 2014 - May 17, 2014: 1 + 2014-05-17 + 2014-05-17: 1 268976 352087 357067 @@ -54,13 +54,13 @@

- CVE-2009-1194 - CVE-2009-2468 - CVE-2011-0020 - CVE-2011-0064 + CVE-2009-1194 + CVE-2009-2468 + CVE-2011-0020 + CVE-2011-0064 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-14.xml index 0a7df1d468..1ce8546514 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-14.xml @@ -4,8 +4,8 @@ Ruby OpenID: Denial of Service A vulnerability in Ruby OpenID may lead to Denial of Service. ruby-openid - May 17, 2014 - May 17, 2014: 1 + 2014-05-17 + 2014-05-17: 1 460156 remote @@ -39,8 +39,8 @@ - CVE-2013-1812 + CVE-2013-1812 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-15.xml index 4662511a9b..770806e6cd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-15.xml @@ -6,8 +6,8 @@ of which may lead to Denial of Service. util-linux - May 18, 2014 - May 18, 2014: 1 + 2014-05-18 + 2014-05-18: 1 359759 450740 local @@ -45,13 +45,13 @@ - CVE-2011-1675 - CVE-2011-1676 - CVE-2011-1677 - CVE-2013-0157 + CVE-2011-1675 + CVE-2011-1676 + CVE-2011-1677 + CVE-2013-0157 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-16.xml index fecc2bf37d..d7068d5b37 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-16.xml @@ -6,8 +6,8 @@ cause a Denial of Service condition. mono - May 18, 2014 - May 18, 2014: 1 + 2014-05-18 + 2014-05-18: 1 433768 remote @@ -41,8 +41,8 @@ - CVE-2012-3543 + CVE-2012-3543 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-17.xml index 07d1ee4d18..d516e71881 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-17.xml @@ -6,8 +6,8 @@ lead to symlink attacks, file creation, or bypass of security restrictions. munin - May 18, 2014 - May 18, 2014: 1 + 2014-05-18 + 2014-05-18: 1 412881 445250 local, remote @@ -46,10 +46,10 @@ - CVE-2012-2103 - CVE-2012-3512 - CVE-2012-3513 + CVE-2012-2103 + CVE-2012-3512 + CVE-2012-3513 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-18.xml index c6848436e5..ae2642de0e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-18.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. openconnect - May 18, 2014 - May 18, 2014: 1 + 2014-05-18 + 2014-05-18: 1 457068 remote @@ -41,8 +41,8 @@ - CVE-2012-6128 + CVE-2012-6128 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-19.xml index 6525d4724b..8a294d0144 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-19.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. mcrypt - May 18, 2014 - May 18, 2014: 1 + 2014-05-18 + 2014-05-18: 1 434112 440778 remote @@ -51,10 +51,10 @@ - CVE-2012-4409 - CVE-2012-4426 - CVE-2012-4527 + CVE-2012-4409 + CVE-2012-4426 + CVE-2012-4527 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-20.xml index 9e12fa9010..bc50aa606d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-20.xml @@ -6,8 +6,8 @@ attackers to cause a Denial of Service. jbigkit - May 18, 2014 - May 18, 2014: 1 + 2014-05-18 + 2014-05-18: 1 507254 remote @@ -44,10 +44,10 @@ - CVE-2013-6369 + CVE-2013-6369 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-21.xml index e3de4fe48e..03255f8417 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-21.xml @@ -6,8 +6,8 @@ possibly resulting in remote Denial of Service. shadowircd - May 18, 2014 - May 18, 2014: 1 + 2014-05-18 + 2014-05-18: 1 449544 449790 remote @@ -54,10 +54,10 @@ - CVE-2012-6084 + CVE-2012-6084 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-22.xml index a6d72374b2..30051e3a4e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-22.xml @@ -6,8 +6,8 @@ code. pidgin - May 18, 2014 - May 18, 2014: 1 + 2014-05-18 + 2014-05-18: 1 457580 499596 remote @@ -58,24 +58,24 @@ - CVE-2012-6152 - CVE-2013-0271 - CVE-2013-0272 - CVE-2013-0273 - CVE-2013-0274 - CVE-2013-6477 - CVE-2013-6478 - CVE-2013-6479 - CVE-2013-6481 - CVE-2013-6482 - CVE-2013-6483 - CVE-2013-6484 - CVE-2013-6485 - CVE-2013-6487 - CVE-2013-6489 - CVE-2013-6490 - CVE-2014-0020 + CVE-2012-6152 + CVE-2013-0271 + CVE-2013-0272 + CVE-2013-0273 + CVE-2013-0274 + CVE-2013-6477 + CVE-2013-6478 + CVE-2013-6479 + CVE-2013-6481 + CVE-2013-6482 + CVE-2013-6483 + CVE-2013-6484 + CVE-2013-6485 + CVE-2013-6487 + CVE-2013-6489 + CVE-2013-6490 + CVE-2014-0020 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-23.xml index 530320fb64..faf4efffe9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-23.xml @@ -6,8 +6,8 @@ arbitrary code. lib3ds - May 18, 2014 - December 10, 2014: 2 + 2014-05-18 + 2014-12-10: 2 308033 519936 remote @@ -54,8 +54,8 @@

- CVE-2010-0280 + CVE-2010-0280 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-24.xml index 86e88be413..d36976123c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-24.xml @@ -6,8 +6,8 @@ Utility Library could result in Denial of Service. apr apr-util - May 18, 2014 - May 18, 2014: 1 + 2014-05-18 + 2014-05-18: 1 339527 366903 368651 @@ -65,13 +65,13 @@

- CVE-2010-1623 - CVE-2011-0419 - CVE-2011-1928 - CVE-2012-0840 + CVE-2010-1623 + CVE-2011-0419 + CVE-2011-1928 + CVE-2012-0840 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-25.xml index 5896ff81ba..5d9d754348 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-25.xml @@ -6,8 +6,8 @@ arbitrary files. symfony - May 18, 2014 - May 18, 2014: 1 + 2014-05-18 + 2014-05-18: 1 444696 remote @@ -39,10 +39,10 @@ - CVE-2012-5574 + CVE-2012-5574 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-26.xml index daefd49e59..c16762bfed 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-26.xml @@ -6,8 +6,8 @@ X2Go Server. x2go - May 19, 2014 - May 19, 2014: 1 + 2014-05-19 + 2014-05-19: 1 497260 local @@ -38,12 +38,12 @@ - CVE-2013-7383 + CVE-2013-7383 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-27.xml index 3da7cd0879..71c5a242ff 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-27.xml @@ -6,8 +6,8 @@ arbitrary code or cause a Denial of Service condition. libyaml - May 23, 2014 - May 23, 2014: 1 + 2014-05-23 + 2014-05-23: 1 505948 local, remote @@ -47,12 +47,12 @@

- CVE-2014-2525 + CVE-2014-2525 - + BlueKnight - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-28.xml index 1469f3decd..f653d89ea6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201405-28.xml @@ -6,8 +6,8 @@ xmonad-contrib. xmonad-contrib - May 28, 2014 - May 28, 2014: 1 + 2014-05-28 + 2014-05-28: 1 478288 remote @@ -46,12 +46,12 @@ - CVE-2013-1436 + CVE-2013-1436 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-01.xml index 12036147e9..25d2378606 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-01.xml @@ -6,8 +6,8 @@ attackers to gain escalated privileges. dbus - June 01, 2014 - June 01, 2014: 1 + 2014-06-01 + 2014-06-01: 1 436028 local @@ -58,10 +58,10 @@ - CVE-2012-3524 + CVE-2012-3524 - ackle - + ackle + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-02.xml index 6bc6ba8fa0..305941f955 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-02.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. libarchive - June 01, 2014 - June 01, 2014: 1 + 2014-06-01 + 2014-06-01: 1 366687 463632 remote @@ -51,14 +51,14 @@

- CVE-2010-4666 - CVE-2011-1777 - CVE-2011-1778 - CVE-2011-1779 - CVE-2013-0211 + CVE-2010-4666 + CVE-2011-1777 + CVE-2011-1778 + CVE-2011-1779 + CVE-2013-0211 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-03.xml index 416dffa4b7..afb0163914 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-03.xml @@ -6,8 +6,8 @@ which allows remote attackers to cause a Denial of Service condition. fail2ban - June 01, 2014 - June 01, 2014: 1 + 2014-06-01 + 2014-06-01: 1 364883 473118 499802 @@ -50,12 +50,12 @@ - CVE-2009-5023 - CVE-2013-2178 - CVE-2013-7176 + CVE-2009-5023 + CVE-2013-2178 + CVE-2013-7176 - craig - + craig + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-04.xml index b7f6569a55..de00575f61 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-04.xml @@ -6,8 +6,8 @@ a Denial of Service condition. systemtap - June 05, 2014 - June 05, 2014: 1 + 2014-06-05 + 2014-06-05: 1 405345 local @@ -44,12 +44,12 @@ - CVE-2012-0875 + CVE-2012-0875 - + BlueKnight - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-05.xml index 98bacd7c5e..41eccabc63 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-05.xml @@ -6,8 +6,8 @@ arbitrary code or cause a Denial of Service condition. mutt - June 05, 2014 - June 05, 2014: 1 + 2014-06-05 + 2014-06-05: 1 504462 remote @@ -43,12 +43,12 @@ - CVE-2014-0467 + CVE-2014-0467 - + BlueKnight - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-06.xml index 57c3706896..375b242698 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-06.xml @@ -6,8 +6,8 @@ which could lead to arbitrary code execution. mumble - June 06, 2014 - June 06, 2014: 1 + 2014-06-06 + 2014-06-06: 1 500486 510380 remote @@ -57,15 +57,15 @@ - CVE-2014-0044 - CVE-2014-0045 - CVE-2014-3755 - CVE-2014-3756 + CVE-2014-0044 + CVE-2014-0045 + CVE-2014-3755 + CVE-2014-3756 - + BlueKnight - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-07.xml index 0e5e5a1602..b58ef4ff27 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-07.xml @@ -6,8 +6,8 @@ a Denial of Service condition. echoping - June 06, 2014 - June 06, 2014: 1 + 2014-06-06 + 2014-06-06: 1 349569 remote @@ -48,12 +48,12 @@ - CVE-2010-5111 + CVE-2010-5111 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-08.xml index 5d31f555f6..298d06adf7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-08.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - June 10, 2014 - June 10, 2014: 1 + 2014-06-10 + 2014-06-10: 1 510278 remote @@ -46,15 +46,15 @@ - CVE-2014-0510 - CVE-2014-0516 - CVE-2014-0517 - CVE-2014-0518 - CVE-2014-0519 - CVE-2014-0520 + CVE-2014-0510 + CVE-2014-0516 + CVE-2014-0517 + CVE-2014-0518 + CVE-2014-0519 + CVE-2014-0520 - Zlogene - + Zlogene + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-09.xml index 4bf458c8ea..427862c5ea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-09.xml @@ -6,8 +6,8 @@ of which could lead to arbitrary code execution. gnutls - June 13, 2014 - June 13, 2014: 1 + 2014-06-13 + 2014-06-13: 1 501282 503394 511840 @@ -47,13 +47,13 @@ - CVE-2014-0092 - CVE-2014-1959 - CVE-2014-3465 - CVE-2014-3466 + CVE-2014-0092 + CVE-2014-1959 + CVE-2014-3465 + CVE-2014-3466 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-10.xml index efae45e52d..569acafee9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-10.xml @@ -7,8 +7,8 @@ SQL statements. lighttpd - June 13, 2014 - June 13, 2014: 1 + 2014-06-13 + 2014-06-13: 1 392581 444179 490432 @@ -48,13 +48,13 @@ - CVE-2011-4362 - CVE-2012-5533 - CVE-2013-4508 - CVE-2013-4559 - CVE-2013-4560 - CVE-2014-2323 + CVE-2011-4362 + CVE-2012-5533 + CVE-2013-4508 + CVE-2013-4559 + CVE-2013-4560 + CVE-2014-2323 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-11.xml index d661bae522..0399847795 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-11.xml @@ -6,8 +6,8 @@ which allow for local privilege escalation. libXfont - June 14, 2014 - June 14, 2014: 1 + 2014-06-14 + 2014-06-14: 1 510250 local, remote @@ -43,12 +43,12 @@ - CVE-2014-0209 - CVE-2014-0210 - CVE-2014-0211 + CVE-2014-0209 + CVE-2014-0210 + CVE-2014-0211 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-12.xml index 0ab96251c2..9a10f4c95b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-12.xml @@ -6,8 +6,8 @@ or Denial of Service by authenticated users. freeradius - June 15, 2014 - June 15, 2014: 1 + 2014-06-15 + 2014-06-15: 1 501754 remote @@ -43,12 +43,12 @@ - CVE-2014-2015 + CVE-2014-2015 - + BlueKnight - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-13.xml index 016c44c48d..6d01442ad9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-13.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code or cause Denial of Service. memcached - June 15, 2014 - June 15, 2014: 1 + 2014-06-15 + 2014-06-15: 1 279386 452098 467962 @@ -52,17 +52,17 @@ - CVE-2009-2415 - CVE-2013-7239 - CVE-2011-4971 - CVE-2013-0179 - CVE-2013-7290 - CVE-2013-7291 + CVE-2009-2415 + CVE-2013-7239 + CVE-2011-4971 + CVE-2013-0179 + CVE-2013-7290 + CVE-2013-7291 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-14.xml index b1f03d6b4f..81f6718cc3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-14.xml @@ -6,8 +6,8 @@ which may allow remote execution of arbitrary code. opera - June 15, 2014 - June 15, 2014: 1 + 2014-06-15 + 2014-06-15: 1 442044 444040 446096 @@ -50,23 +50,23 @@ - CVE-2012-6461 - CVE-2012-6462 - CVE-2012-6463 - CVE-2012-6464 - CVE-2012-6465 - CVE-2012-6466 - CVE-2012-6467 - CVE-2012-6468 - CVE-2012-6469 - CVE-2012-6470 - CVE-2012-6471 - CVE-2012-6472 - CVE-2013-1618 - CVE-2013-1637 - CVE-2013-1638 - CVE-2013-1639 + CVE-2012-6461 + CVE-2012-6462 + CVE-2012-6463 + CVE-2012-6464 + CVE-2012-6465 + CVE-2012-6466 + CVE-2012-6467 + CVE-2012-6468 + CVE-2012-6469 + CVE-2012-6470 + CVE-2012-6471 + CVE-2012-6472 + CVE-2013-1618 + CVE-2013-1637 + CVE-2013-1638 + CVE-2013-1639 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-15.xml index 55a0300e83..2f0e4744fd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-15.xml @@ -6,8 +6,8 @@ arbitrary shell commands. kdirstat - June 15, 2014 - June 15, 2014: 1 + 2014-06-15 + 2014-06-15: 1 504994 local @@ -42,12 +42,12 @@ - CVE-2014-2527 + CVE-2014-2527 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-16.xml index 648f141df7..dd20018408 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-16.xml @@ -6,8 +6,8 @@ which allows remote attackers to execute arbitrary code. cups-filters - June 16, 2014 - June 16, 2014: 1 + 2014-06-16 + 2014-06-16: 1 504474 506518 508844 @@ -46,14 +46,14 @@ - CVE-2013-6473 - CVE-2013-6474 - CVE-2013-6475 - CVE-2013-6476 - CVE-2014-2707 + CVE-2013-6473 + CVE-2013-6474 + CVE-2013-6475 + CVE-2013-6476 + CVE-2014-2707 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-17.xml index 1bf526d7b5..b23ce4f81a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-17.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - June 17, 2014 - June 17, 2014: 1 + 2014-06-17 + 2014-06-17: 1 512888 remote @@ -47,13 +47,13 @@ - CVE-2014-0531 - CVE-2014-0532 - CVE-2014-0533 - CVE-2014-0534 - CVE-2014-0535 - CVE-2014-0536 + CVE-2014-0531 + CVE-2014-0532 + CVE-2014-0533 + CVE-2014-0534 + CVE-2014-0535 + CVE-2014-0536 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-18.xml index 9c1fb14c1b..e17b2f1bc3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-18.xml @@ -6,8 +6,8 @@ execute arbitrary code. rxvt-unicode - June 19, 2014 - June 19, 2014: 1 + 2014-06-19 + 2014-06-19: 1 509174 remote @@ -43,12 +43,12 @@ - CVE-2014-3121 + CVE-2014-3121 - + BlueKnight - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-19.xml index 515a32e2bf..55e526eb71 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-19.xml @@ -6,8 +6,8 @@ Security Service, the worst of which could lead to Denial of Service. nss - June 21, 2014 - June 21, 2014: 1 + 2014-06-21 + 2014-06-21: 1 455558 486114 491234 @@ -51,16 +51,16 @@

- CVE-2013-1620 - CVE-2013-1739 - CVE-2013-1741 - CVE-2013-2566 - CVE-2013-5605 - CVE-2013-5606 - CVE-2013-5607 + CVE-2013-1620 + CVE-2013-1739 + CVE-2013-1741 + CVE-2013-2566 + CVE-2013-5605 + CVE-2013-5606 + CVE-2013-5607 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-20.xml index 8948d29941..bebb6d089d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-20.xml @@ -6,8 +6,8 @@ of arbitrary code. nginx - June 22, 2014 - June 22, 2014: 1 + 2014-06-22 + 2014-06-22: 1 505018 remote @@ -46,10 +46,10 @@ - CVE-2014-0133 + CVE-2014-0133 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-21.xml index 462ebe44c1..48c4999b1c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-21.xml @@ -6,8 +6,8 @@ which could lead to man-in-the-middle attacks. curl - June 22, 2014 - June 22, 2014: 1 + 2014-06-22 + 2014-06-22: 1 505864 local, remote @@ -46,11 +46,11 @@ - CVE-2014-0138 - CVE-2014-0139 + CVE-2014-0138 + CVE-2014-0139 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-22.xml index 6ae24ef65f..0b30bc081c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-22.xml @@ -6,8 +6,8 @@ the worst of which allows remote attackers to execute arbitrary code. nas - June 25, 2014 - June 25, 2014: 1 + 2014-06-25 + 2014-06-25: 1 484480 local, remote @@ -48,11 +48,11 @@ - CVE-2013-4256 - CVE-2013-4258 + CVE-2013-4256 + CVE-2013-4258 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-23.xml index 5d668f1297..dd457b3219 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-23.xml @@ -6,8 +6,8 @@ create a Denial of Service condition. denyhost - June 25, 2014 - June 25, 2014: 1 + 2014-06-25 + 2014-06-25: 1 495130 remote @@ -44,10 +44,10 @@ - CVE-2013-6890 + CVE-2013-6890 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-24.xml index 87a048b9fc..d316976574 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-24.xml @@ -6,8 +6,8 @@ condition. dnsmasq - June 25, 2014 - June 25, 2014: 1 + 2014-06-25 + 2014-06-25: 1 436894 453170 remote @@ -45,11 +45,11 @@ - CVE-2012-3411 - CVE-2013-0198 + CVE-2012-3411 + CVE-2013-0198 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-25.xml index 9ede4e0ef7..9a72cd1b3d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-25.xml @@ -7,8 +7,8 @@ shell commands. asterisk - June 25, 2014 - June 25, 2014: 2 + 2014-06-25 + 2014-06-25: 2 513102 remote @@ -52,11 +52,11 @@ - CVE-2014-4046 - CVE-2014-4047 + CVE-2014-4046 + CVE-2014-4047 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-26.xml index c975b16ea7..98c3afdfb2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-26.xml @@ -6,8 +6,8 @@ may allow a remote attacker to execute code. django - June 26, 2014 - December 03, 2014: 2 + 2014-06-26 + 2014-12-03: 2 508514 510382 remote @@ -61,15 +61,15 @@ - CVE-2014-0472 - CVE-2014-0473 - CVE-2014-0474 - CVE-2014-1418 + CVE-2014-0472 + CVE-2014-0473 + CVE-2014-0474 + CVE-2014-1418 - + BlueKnight - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-27.xml index b066f411c6..eb4521c659 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-27.xml @@ -6,8 +6,8 @@ escalated privileges. polkit spice-gtk systemd hplip libvirt - June 26, 2014 - June 26, 2014: 1 + 2014-06-26 + 2014-06-26: 1 484486 484488 485420 @@ -92,14 +92,14 @@ - CVE-2013-4288 - CVE-2013-4311 - CVE-2013-4324 - CVE-2013-4325 - CVE-2013-4327 + CVE-2013-4288 + CVE-2013-4311 + CVE-2013-4324 + CVE-2013-4325 + CVE-2013-4327 - ackle - + ackle + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-28.xml index b9c461c061..81d8862a50 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-28.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. libav - June 26, 2014 - June 26, 2014: 1 + 2014-06-26 + 2014-06-26: 1 439052 452202 470734 @@ -50,32 +50,31 @@

- CVE-2012-2772 - CVE-2012-2775 - CVE-2012-2776 - CVE-2012-2777 - CVE-2012-2779 - CVE-2012-2783 - CVE-2012-2784 - CVE-2012-2786 - CVE-2012-2787 - CVE-2012-2788 - CVE-2012-2789 - CVE-2012-2790 - CVE-2012-2791 - CVE-2012-2793 - CVE-2012-2794 - CVE-2012-2796 - CVE-2012-2797 - CVE-2012-2798 - CVE-2012-2800 - CVE-2012-2801 - CVE-2012-2802 - CVE-2012-2803 - CVE-2012-2804 - CVE-2012-5144 + CVE-2012-2772 + CVE-2012-2775 + CVE-2012-2776 + CVE-2012-2777 + CVE-2012-2779 + CVE-2012-2783 + CVE-2012-2784 + CVE-2012-2786 + CVE-2012-2787 + CVE-2012-2788 + CVE-2012-2789 + CVE-2012-2790 + CVE-2012-2791 + CVE-2012-2793 + CVE-2012-2794 + CVE-2012-2796 + CVE-2012-2797 + CVE-2012-2798 + CVE-2012-2800 + CVE-2012-2801 + CVE-2012-2802 + CVE-2012-2803 + CVE-2012-2804 + CVE-2012-5144 -ackle -ackle +ackle +ackle - diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-29.xml index 06761c76dc..e5b4a4b5af 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-29.xml @@ -6,8 +6,8 @@ escalated privileges. spice-gtk - June 26, 2014 - June 26, 2014: 1 + 2014-06-26 + 2014-06-26: 1 435694 remote @@ -41,9 +41,8 @@ - CVE-2012-4425 + CVE-2012-4425 - craig - ackle + craig + ackle - diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-30.xml index 240c04bf19..595d1915cf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-30.xml @@ -6,8 +6,8 @@ gain elevated privileges. sudo - June 27, 2014 - June 27, 2014: 1 + 2014-06-27 + 2014-06-27: 1 503586 local @@ -45,10 +45,10 @@ - CVE-2014-0106 + CVE-2014-0106 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-31.xml index ac904ff151..fcb30f2167 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-31.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. konqueror - June 27, 2014 - June 27, 2014: 1 + 2014-06-27 + 2014-06-27: 1 438452 remote @@ -47,11 +47,11 @@

- CVE-2012-4512 - CVE-2012-4513 - CVE-2012-4514 - CVE-2012-4515 + CVE-2012-4512 + CVE-2012-4513 + CVE-2012-4514 + CVE-2012-4515 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-32.xml index 7f077e2a20..f64277d042 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-32.xml @@ -6,8 +6,8 @@ worst of which could lead to arbitrary code execution. icedtea-bin - June 29, 2014 - April 19, 2016: 2 + 2014-06-29 + 2016-04-19: 2 312297 330205 340819 @@ -69,237 +69,237 @@ - CVE-2009-3555 - CVE-2010-2548 - CVE-2010-2783 - CVE-2010-3541 - CVE-2010-3548 - CVE-2010-3549 - CVE-2010-3551 - CVE-2010-3553 - CVE-2010-3554 - CVE-2010-3557 - CVE-2010-3561 - CVE-2010-3562 - CVE-2010-3564 - CVE-2010-3565 - CVE-2010-3566 - CVE-2010-3567 - CVE-2010-3568 - CVE-2010-3569 - CVE-2010-3573 - CVE-2010-3574 - CVE-2010-3860 - CVE-2010-4351 - CVE-2010-4448 - CVE-2010-4450 - CVE-2010-4465 - CVE-2010-4467 - CVE-2010-4469 - CVE-2010-4470 - CVE-2010-4471 - CVE-2010-4472 - CVE-2010-4476 - CVE-2011-0025 - CVE-2011-0706 - CVE-2011-0815 - CVE-2011-0822 - CVE-2011-0862 - CVE-2011-0864 - CVE-2011-0865 - CVE-2011-0868 - CVE-2011-0869 - CVE-2011-0870 - CVE-2011-0871 - CVE-2011-0872 - CVE-2011-3389 - CVE-2011-3521 - CVE-2011-3544 - CVE-2011-3547 - CVE-2011-3548 - CVE-2011-3551 - CVE-2011-3552 - CVE-2011-3553 - CVE-2011-3554 - CVE-2011-3556 - CVE-2011-3557 - CVE-2011-3558 - CVE-2011-3560 - CVE-2011-3563 - CVE-2011-3571 - CVE-2011-5035 - CVE-2012-0497 - CVE-2012-0501 - CVE-2012-0502 - CVE-2012-0503 - CVE-2012-0505 - CVE-2012-0506 - CVE-2012-0547 - CVE-2012-1711 - CVE-2012-1713 - CVE-2012-1716 - CVE-2012-1717 - CVE-2012-1718 - CVE-2012-1719 - CVE-2012-1723 - CVE-2012-1724 - CVE-2012-1725 - CVE-2012-1726 - CVE-2012-3216 - CVE-2012-3422 - CVE-2012-3423 - CVE-2012-4416 - CVE-2012-4540 - CVE-2012-5068 - CVE-2012-5069 - CVE-2012-5070 - CVE-2012-5071 - CVE-2012-5072 - CVE-2012-5073 - CVE-2012-5074 - CVE-2012-5075 - CVE-2012-5076 - CVE-2012-5077 - CVE-2012-5081 - CVE-2012-5084 - CVE-2012-5085 - CVE-2012-5086 - CVE-2012-5087 - CVE-2012-5089 - CVE-2012-5979 - CVE-2013-0169 - CVE-2013-0401 - CVE-2013-0424 - CVE-2013-0425 - CVE-2013-0426 - CVE-2013-0427 - CVE-2013-0428 - CVE-2013-0429 - CVE-2013-0431 - CVE-2013-0432 - CVE-2013-0433 - CVE-2013-0434 - CVE-2013-0435 - CVE-2013-0440 - CVE-2013-0441 - CVE-2013-0442 - CVE-2013-0443 - CVE-2013-0444 - CVE-2013-0450 - CVE-2013-0809 - CVE-2013-1475 - CVE-2013-1476 - CVE-2013-1478 - CVE-2013-1480 - CVE-2013-1484 - CVE-2013-1485 - CVE-2013-1486 - CVE-2013-1488 - CVE-2013-1493 - CVE-2013-1500 - CVE-2013-1518 - CVE-2013-1537 - CVE-2013-1557 - CVE-2013-1569 - CVE-2013-1571 - CVE-2013-2383 - CVE-2013-2384 - CVE-2013-2407 - CVE-2013-2412 - CVE-2013-2415 - CVE-2013-2417 - CVE-2013-2419 - CVE-2013-2420 - CVE-2013-2421 - CVE-2013-2422 - CVE-2013-2423 - CVE-2013-2424 - CVE-2013-2426 - CVE-2013-2429 - CVE-2013-2430 - CVE-2013-2431 - CVE-2013-2436 - CVE-2013-2443 - CVE-2013-2444 - CVE-2013-2445 - CVE-2013-2446 - CVE-2013-2447 - CVE-2013-2448 - CVE-2013-2449 - CVE-2013-2450 - CVE-2013-2451 - CVE-2013-2452 - CVE-2013-2453 - CVE-2013-2454 - CVE-2013-2455 - CVE-2013-2456 - CVE-2013-2457 - CVE-2013-2458 - CVE-2013-2459 - CVE-2013-2460 - CVE-2013-2461 - CVE-2013-2463 - CVE-2013-2465 - CVE-2013-2469 - CVE-2013-2470 - CVE-2013-2471 - CVE-2013-2472 - CVE-2013-2473 - CVE-2013-3829 - CVE-2013-4002 - CVE-2013-5772 - CVE-2013-5774 - CVE-2013-5778 - CVE-2013-5780 - CVE-2013-5782 - CVE-2013-5783 - CVE-2013-5784 - CVE-2013-5790 - CVE-2013-5797 - CVE-2013-5800 - CVE-2013-5802 - CVE-2013-5803 - CVE-2013-5804 - CVE-2013-5805 - CVE-2013-5806 - CVE-2013-5809 - CVE-2013-5814 - CVE-2013-5817 - CVE-2013-5820 - CVE-2013-5823 - CVE-2013-5825 - CVE-2013-5829 - CVE-2013-5830 - CVE-2013-5840 - CVE-2013-5842 - CVE-2013-5849 - CVE-2013-5850 - CVE-2013-5851 - CVE-2013-6629 - CVE-2013-6954 - CVE-2014-0429 - CVE-2014-0446 - CVE-2014-0451 - CVE-2014-0452 - CVE-2014-0453 - CVE-2014-0456 - CVE-2014-0457 - CVE-2014-0458 - CVE-2014-0459 - CVE-2014-0460 - CVE-2014-0461 - CVE-2014-1876 - CVE-2014-2397 - CVE-2014-2398 - CVE-2014-2403 - CVE-2014-2412 - CVE-2014-2414 - CVE-2014-2421 - CVE-2014-2423 - CVE-2014-2427 + CVE-2009-3555 + CVE-2010-2548 + CVE-2010-2783 + CVE-2010-3541 + CVE-2010-3548 + CVE-2010-3549 + CVE-2010-3551 + CVE-2010-3553 + CVE-2010-3554 + CVE-2010-3557 + CVE-2010-3561 + CVE-2010-3562 + CVE-2010-3564 + CVE-2010-3565 + CVE-2010-3566 + CVE-2010-3567 + CVE-2010-3568 + CVE-2010-3569 + CVE-2010-3573 + CVE-2010-3574 + CVE-2010-3860 + CVE-2010-4351 + CVE-2010-4448 + CVE-2010-4450 + CVE-2010-4465 + CVE-2010-4467 + CVE-2010-4469 + CVE-2010-4470 + CVE-2010-4471 + CVE-2010-4472 + CVE-2010-4476 + CVE-2011-0025 + CVE-2011-0706 + CVE-2011-0815 + CVE-2011-0822 + CVE-2011-0862 + CVE-2011-0864 + CVE-2011-0865 + CVE-2011-0868 + CVE-2011-0869 + CVE-2011-0870 + CVE-2011-0871 + CVE-2011-0872 + CVE-2011-3389 + CVE-2011-3521 + CVE-2011-3544 + CVE-2011-3547 + CVE-2011-3548 + CVE-2011-3551 + CVE-2011-3552 + CVE-2011-3553 + CVE-2011-3554 + CVE-2011-3556 + CVE-2011-3557 + CVE-2011-3558 + CVE-2011-3560 + CVE-2011-3563 + CVE-2011-3571 + CVE-2011-5035 + CVE-2012-0497 + CVE-2012-0501 + CVE-2012-0502 + CVE-2012-0503 + CVE-2012-0505 + CVE-2012-0506 + CVE-2012-0547 + CVE-2012-1711 + CVE-2012-1713 + CVE-2012-1716 + CVE-2012-1717 + CVE-2012-1718 + CVE-2012-1719 + CVE-2012-1723 + CVE-2012-1724 + CVE-2012-1725 + CVE-2012-1726 + CVE-2012-3216 + CVE-2012-3422 + CVE-2012-3423 + CVE-2012-4416 + CVE-2012-4540 + CVE-2012-5068 + CVE-2012-5069 + CVE-2012-5070 + CVE-2012-5071 + CVE-2012-5072 + CVE-2012-5073 + CVE-2012-5074 + CVE-2012-5075 + CVE-2012-5076 + CVE-2012-5077 + CVE-2012-5081 + CVE-2012-5084 + CVE-2012-5085 + CVE-2012-5086 + CVE-2012-5087 + CVE-2012-5089 + CVE-2012-5979 + CVE-2013-0169 + CVE-2013-0401 + CVE-2013-0424 + CVE-2013-0425 + CVE-2013-0426 + CVE-2013-0427 + CVE-2013-0428 + CVE-2013-0429 + CVE-2013-0431 + CVE-2013-0432 + CVE-2013-0433 + CVE-2013-0434 + CVE-2013-0435 + CVE-2013-0440 + CVE-2013-0441 + CVE-2013-0442 + CVE-2013-0443 + CVE-2013-0444 + CVE-2013-0450 + CVE-2013-0809 + CVE-2013-1475 + CVE-2013-1476 + CVE-2013-1478 + CVE-2013-1480 + CVE-2013-1484 + CVE-2013-1485 + CVE-2013-1486 + CVE-2013-1488 + CVE-2013-1493 + CVE-2013-1500 + CVE-2013-1518 + CVE-2013-1537 + CVE-2013-1557 + CVE-2013-1569 + CVE-2013-1571 + CVE-2013-2383 + CVE-2013-2384 + CVE-2013-2407 + CVE-2013-2412 + CVE-2013-2415 + CVE-2013-2417 + CVE-2013-2419 + CVE-2013-2420 + CVE-2013-2421 + CVE-2013-2422 + CVE-2013-2423 + CVE-2013-2424 + CVE-2013-2426 + CVE-2013-2429 + CVE-2013-2430 + CVE-2013-2431 + CVE-2013-2436 + CVE-2013-2443 + CVE-2013-2444 + CVE-2013-2445 + CVE-2013-2446 + CVE-2013-2447 + CVE-2013-2448 + CVE-2013-2449 + CVE-2013-2450 + CVE-2013-2451 + CVE-2013-2452 + CVE-2013-2453 + CVE-2013-2454 + CVE-2013-2455 + CVE-2013-2456 + CVE-2013-2457 + CVE-2013-2458 + CVE-2013-2459 + CVE-2013-2460 + CVE-2013-2461 + CVE-2013-2463 + CVE-2013-2465 + CVE-2013-2469 + CVE-2013-2470 + CVE-2013-2471 + CVE-2013-2472 + CVE-2013-2473 + CVE-2013-3829 + CVE-2013-4002 + CVE-2013-5772 + CVE-2013-5774 + CVE-2013-5778 + CVE-2013-5780 + CVE-2013-5782 + CVE-2013-5783 + CVE-2013-5784 + CVE-2013-5790 + CVE-2013-5797 + CVE-2013-5800 + CVE-2013-5802 + CVE-2013-5803 + CVE-2013-5804 + CVE-2013-5805 + CVE-2013-5806 + CVE-2013-5809 + CVE-2013-5814 + CVE-2013-5817 + CVE-2013-5820 + CVE-2013-5823 + CVE-2013-5825 + CVE-2013-5829 + CVE-2013-5830 + CVE-2013-5840 + CVE-2013-5842 + CVE-2013-5849 + CVE-2013-5850 + CVE-2013-5851 + CVE-2013-6629 + CVE-2013-6954 + CVE-2014-0429 + CVE-2014-0446 + CVE-2014-0451 + CVE-2014-0452 + CVE-2014-0453 + CVE-2014-0456 + CVE-2014-0457 + CVE-2014-0458 + CVE-2014-0459 + CVE-2014-0460 + CVE-2014-0461 + CVE-2014-1876 + CVE-2014-2397 + CVE-2014-2398 + CVE-2014-2403 + CVE-2014-2412 + CVE-2014-2414 + CVE-2014-2421 + CVE-2014-2423 + CVE-2014-2427 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-33.xml index 922f532b12..6647cb576c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-33.xml @@ -6,8 +6,8 @@ which allows remote attackers to execute arbitrary code. wireshark - June 29, 2014 - June 29, 2014: 1 + 2014-06-29 + 2014-06-29: 1 503792 507298 508506 @@ -53,18 +53,18 @@ - CVE-2014-2281 - CVE-2014-2282 - CVE-2014-2283 - CVE-2014-2299 - CVE-2014-2907 - CVE-2014-4020 - CVE-2014-4174 + CVE-2014-2281 + CVE-2014-2282 + CVE-2014-2283 + CVE-2014-2299 + CVE-2014-2907 + CVE-2014-4020 + CVE-2014-4174 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-34.xml index c530ef8bfe..32bca1fdc4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-34.xml @@ -6,8 +6,8 @@ worst of which could lead to man-in-the-middle attacks. kdelibs - June 29, 2014 - June 29, 2014: 1 + 2014-06-29 + 2014-06-29: 1 358025 384227 469140 @@ -50,13 +50,13 @@ - CVE-2011-1094 - CVE-2011-3365 - CVE-2013-2074 - CVE-2014-3494 + CVE-2011-1094 + CVE-2011-3365 + CVE-2013-2074 + CVE-2014-3494 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-35.xml index a5f61126bd..ce63c6c3d1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-35.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-35.xml @@ -6,8 +6,8 @@ which could lead to a Denial of Service condition. openfire - June 30, 2014 - June 30, 2014: 1 + 2014-06-30 + 2014-06-30: 1 266129 507242 remote @@ -43,12 +43,12 @@ - CVE-2009-1595 - CVE-2009-1596 - CVE-2014-2741 + CVE-2009-1595 + CVE-2009-1596 + CVE-2014-2741 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-36.xml index 2d04362ce3..c6ab249f23 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-36.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201406-36.xml @@ -6,8 +6,8 @@ Denial of Service or a man-in-the-middle attack. OpenLDAP - June 30, 2014 - June 30, 2014: 1 + 2014-06-30 + 2014-06-30: 1 290345 323777 355333 @@ -48,18 +48,18 @@ - CVE-2009-3767 - CVE-2010-0211 - CVE-2010-0212 - CVE-2011-1024 - CVE-2011-1025 - CVE-2011-1081 - CVE-2011-4079 - CVE-2012-1164 - CVE-2012-2668 + CVE-2009-3767 + CVE-2010-0211 + CVE-2010-0212 + CVE-2011-1024 + CVE-2011-1025 + CVE-2011-1081 + CVE-2011-4079 + CVE-2012-1164 + CVE-2012-2668 - + keytoaster - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-01.xml index f6601da5d4..8c03385d3c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-01.xml @@ -6,8 +6,8 @@ Denial of Service condition. openttd - July 07, 2014 - July 07, 2014: 1 + 2014-07-07 + 2014-07-07: 1 492876 remote @@ -40,10 +40,10 @@ - CVE-2013-6411 + CVE-2013-6411 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-02.xml index bf039ef94b..00de546260 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-02.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - July 09, 2014 - July 09, 2014: 1 + 2014-07-09 + 2014-07-09: 1 516750 remote @@ -45,10 +45,10 @@ - CVE-2014-0537 - CVE-2014-0539 - CVE-2014-4671 + CVE-2014-0537 + CVE-2014-0539 + CVE-2014-4671 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-03.xml index a28279d4ef..68bf745632 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-03.xml @@ -6,8 +6,8 @@ could lead to arbitrary code execution. xen - July 16, 2014 - July 16, 2014: 1 + 2014-07-16 + 2014-07-16: 1 440768 484478 486354 @@ -105,41 +105,41 @@ - CVE-2013-1442 - CVE-2013-4329 - CVE-2013-4355 - CVE-2013-4356 - CVE-2013-4361 - CVE-2013-4368 - CVE-2013-4369 - CVE-2013-4370 - CVE-2013-4371 - CVE-2013-4375 - CVE-2013-4416 - CVE-2013-4494 - CVE-2013-4551 - CVE-2013-4553 - CVE-2013-4554 - CVE-2013-6375 - CVE-2013-6400 - CVE-2013-6885 - CVE-2013-6885 - CVE-2014-1642 - CVE-2014-1666 - CVE-2014-1891 - CVE-2014-1892 - CVE-2014-1893 - CVE-2014-1894 - CVE-2014-1895 - CVE-2014-1896 - CVE-2014-2599 - CVE-2014-3124 - CVE-2014-4021 + CVE-2013-1442 + CVE-2013-4329 + CVE-2013-4355 + CVE-2013-4356 + CVE-2013-4361 + CVE-2013-4368 + CVE-2013-4369 + CVE-2013-4370 + CVE-2013-4371 + CVE-2013-4375 + CVE-2013-4416 + CVE-2013-4494 + CVE-2013-4551 + CVE-2013-4553 + CVE-2013-4554 + CVE-2013-6375 + CVE-2013-6400 + CVE-2013-6885 + CVE-2013-6885 + CVE-2014-1642 + CVE-2014-1666 + CVE-2014-1891 + CVE-2014-1892 + CVE-2014-1893 + CVE-2014-1894 + CVE-2014-1895 + CVE-2014-1896 + CVE-2014-2599 + CVE-2014-3124 + CVE-2014-4021 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-04.xml index 4c6aae847b..bed6f487da 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-04.xml @@ -4,8 +4,8 @@ GnuPG: Denial of Service A vulnerability in GnuPG can lead to a Denial of Service condition. GnuPG. - July 16, 2014 - July 16, 2014: 1 + 2014-07-16 + 2014-07-16: 1 514718 local, remote @@ -51,8 +51,8 @@ - CVE-2014-4617 + CVE-2014-4617 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-05.xml index 7d7f83ff25..d5b487a678 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201407-05.xml @@ -6,8 +6,8 @@ allowing remote attackers to execute arbitrary code. openssl - July 27, 2014 - June 06, 2015: 2 + 2014-07-27 + 2015-06-06: 2 512506 remote @@ -68,20 +68,20 @@ - CVE-2010-5298 - CVE-2014-0195 - CVE-2014-0198 - CVE-2014-0221 - CVE-2014-0224 - CVE-2014-3470 - OpenSSL + CVE-2010-5298 + CVE-2014-0195 + CVE-2014-0198 + CVE-2014-0221 + CVE-2014-0224 + CVE-2014-3470 + OpenSSL Security Advisory [05 Jun 2014] - + keytoaster - + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-01.xml index 073a414f70..b0cefd19a3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-01.xml @@ -6,8 +6,8 @@ inject SQL commands. ZendFramework - August 04, 2014 - August 04, 2014: 1 + 2014-08-04 + 2014-08-04: 1 369139 remote @@ -50,8 +50,8 @@

- CVE-2011-1939 + CVE-2011-1939 - craig - K_F + craig + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-02.xml index 364a6024cc..b77f91fdfa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-02.xml @@ -6,8 +6,8 @@ code or Denial of Service. freetype - August 09, 2014 - August 09, 2014: 1 + 2014-08-09 + 2014-08-09: 1 504088 remote @@ -45,8 +45,8 @@

- CVE-2014-2240 + CVE-2014-2240 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-03.xml index f3033f3aa7..397b576da1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-03.xml @@ -6,8 +6,8 @@ information. libssh - August 10, 2014 - August 10, 2014: 1 + 2014-08-10 + 2014-08-10: 1 503504 local @@ -42,10 +42,10 @@ - CVE-2014-0017 + CVE-2014-0017 - + keytoaster - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-04.xml index 1e2d7668e6..9ad1498d03 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-04.xml @@ -6,8 +6,8 @@ attackers to escalate their privileges. catfish - August 13, 2014 - August 13, 2014: 1 + 2014-08-13 + 2014-08-13: 1 502536 local @@ -42,13 +42,13 @@ - CVE-2014-2093 - CVE-2014-2094 - CVE-2014-2095 - CVE-2014-2096 + CVE-2014-2093 + CVE-2014-2094 + CVE-2014-2095 + CVE-2014-2096 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-05.xml index 2738284175..a4b0236e36 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-05.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - August 14, 2014 - August 14, 2014: 1 + 2014-08-14 + 2014-08-14: 1 519790 remote @@ -46,14 +46,14 @@ - CVE-2014-0538 - CVE-2014-0540 - CVE-2014-0541 - CVE-2014-0542 - CVE-2014-0543 - CVE-2014-0544 - CVE-2014-0545 + CVE-2014-0538 + CVE-2014-0540 + CVE-2014-0541 + CVE-2014-0542 + CVE-2014-0543 + CVE-2014-0544 + CVE-2014-0545 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-06.xml index ade917ffd5..8b2df195db 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-06.xml @@ -6,8 +6,8 @@ allow a remote attacker to cause a Denial of Service condition. libpng - August 14, 2014 - June 06, 2015: 4 + 2014-08-14 + 2015-06-06: 4 503014 507378 remote @@ -72,14 +72,14 @@

- CVE-2013-7353 - CVE-2013-7354 - CVE-2014-0333 + CVE-2013-7353 + CVE-2013-7354 + CVE-2014-0333 - + BlueKnight - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-07.xml index 0be0b64637..6b0d248a3e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-07.xml @@ -8,8 +8,8 @@ which allows remote attackers to execute arbitrary code. modplug - August 16, 2014 - August 16, 2014: 1 + 2014-08-16 + 2014-08-16: 1 480388 remote @@ -44,11 +44,11 @@ - CVE-2013-4233 - CVE-2013-4234 + CVE-2013-4233 + CVE-2013-4234 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-08.xml index 0b7353f9eb..f76bf5656e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-08.xml @@ -4,8 +4,8 @@ file: Denial of Service A vulnerability in file could result in Denial of Service. file - August 26, 2014 - August 29, 2014: 6 + 2014-08-26 + 2014-08-29: 6 505534 local, remote @@ -43,10 +43,10 @@ - CVE-2013-7345 + CVE-2013-7345 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-09.xml index bd816c0d93..09a59b1c6d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-09.xml @@ -7,8 +7,8 @@ Service condition. libtasn1 - August 29, 2014 - August 29, 2014: 1 + 2014-08-29 + 2014-08-29: 1 511536 local, remote @@ -47,10 +47,10 @@ - CVE-2014-3467 - CVE-2014-3468 - CVE-2014-3469 + CVE-2014-3467 + CVE-2014-3468 + CVE-2014-3469 - K_F - Zlogene + K_F + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-10.xml index bc5f023b32..66cab7ca7f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-10.xml @@ -6,8 +6,8 @@ extract ElGamal private key information. libgcrypt,side-channel,elgamal - August 29, 2014 - August 29, 2014: 1 + 2014-08-29 + 2014-08-29: 1 519396 remote @@ -44,8 +44,8 @@ - CVE-2014-5270 + CVE-2014-5270 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-11.xml index 882adbbe88..21332284d9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-11.xml @@ -6,8 +6,8 @@ which could lead to remote execution of arbitrary code. php - August 29, 2014 - August 22, 2015: 4 + 2014-08-29 + 2015-08-22: 4 459904 472204 472558 @@ -101,37 +101,37 @@ - CVE-2011-4718 - CVE-2013-1635 - CVE-2013-1643 - CVE-2013-1824 - CVE-2013-2110 - CVE-2013-3735 - CVE-2013-4113 - CVE-2013-4248 - CVE-2013-4635 - CVE-2013-4636 - CVE-2013-6420 - CVE-2013-6712 - CVE-2013-7226 - CVE-2013-7327 - CVE-2013-7345 - CVE-2014-0185 - CVE-2014-0237 - CVE-2014-0238 - CVE-2014-1943 - CVE-2014-2270 - CVE-2014-2497 - CVE-2014-3597 - CVE-2014-3981 - CVE-2014-4049 - CVE-2014-4670 - CVE-2014-5120 + CVE-2011-4718 + CVE-2013-1635 + CVE-2013-1643 + CVE-2013-1824 + CVE-2013-2110 + CVE-2013-3735 + CVE-2013-4113 + CVE-2013-4248 + CVE-2013-4635 + CVE-2013-4636 + CVE-2013-6420 + CVE-2013-6712 + CVE-2013-7226 + CVE-2013-7327 + CVE-2013-7345 + CVE-2014-0185 + CVE-2014-0237 + CVE-2014-0238 + CVE-2014-1943 + CVE-2014-2270 + CVE-2014-2497 + CVE-2014-3597 + CVE-2014-3981 + CVE-2014-4049 + CVE-2014-4670 + CVE-2014-5120 - + creffett - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-12.xml index 4dae67c539..b8dcfb7d39 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-12.xml @@ -7,8 +7,8 @@ Denial of Service condition apache,dos,ace - August 29, 2014 - August 29, 2014: 1 + 2014-08-29 + 2014-08-29: 1 504990 507866 517298 @@ -48,12 +48,12 @@ - CVE-2013-6438 - CVE-2014-0098 - CVE-2014-0226 + CVE-2013-6438 + CVE-2014-0098 + CVE-2014-0226 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-13.xml index c9b4c24953..5f85b849ec 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-13.xml @@ -6,8 +6,8 @@ attackers to escalate their privileges. jinja - August 29, 2014 - August 29, 2014: 1 + 2014-08-29 + 2014-08-29: 1 497690 local @@ -42,11 +42,11 @@ - CVE-2014-0012 - CVE-2014-1402 + CVE-2014-0012 + CVE-2014-1402 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-14.xml index 947901950e..bb406e194d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-14.xml @@ -6,8 +6,8 @@ access to private key information. stunnel - August 29, 2014 - August 29, 2014: 1 + 2014-08-29 + 2014-08-29: 1 503506 remote @@ -47,10 +47,10 @@ - CVE-2014-0016 + CVE-2014-0016 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-15.xml index 517ed5c8c6..0ca39d89ca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-15.xml @@ -6,8 +6,8 @@ of which may allow remote Denial of Service. postgresql-server - August 29, 2014 - August 29, 2014: 1 + 2014-08-29 + 2014-08-29: 1 456080 463884 501946 @@ -79,19 +79,19 @@ - CVE-2013-0255 - CVE-2013-1899 - CVE-2013-1900 - CVE-2013-1901 - CVE-2014-0060 - CVE-2014-0061 - CVE-2014-0062 - CVE-2014-0063 - CVE-2014-0064 - CVE-2014-0065 - CVE-2014-0066 - CVE-2014-2669 + CVE-2013-0255 + CVE-2013-1899 + CVE-2013-1900 + CVE-2013-1901 + CVE-2014-0060 + CVE-2014-0061 + CVE-2014-0062 + CVE-2014-0063 + CVE-2014-0064 + CVE-2014-0065 + CVE-2014-0066 + CVE-2014-2669 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-16.xml index 0609f17e63..4bcf43bc62 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-16.xml @@ -6,8 +6,8 @@ which can allow remote attackers to execute arbitrary code. chromium - August 30, 2014 - August 30, 2014: 1 + 2014-08-30 + 2014-08-30: 1 504328 504890 507212 @@ -54,70 +54,70 @@ - + CVE-2014-1741 - CVE-2014-0538 - CVE-2014-1700 - CVE-2014-1701 - CVE-2014-1702 - CVE-2014-1703 - CVE-2014-1704 - CVE-2014-1705 - CVE-2014-1713 - CVE-2014-1714 - CVE-2014-1715 - CVE-2014-1716 - CVE-2014-1717 - CVE-2014-1718 - CVE-2014-1719 - CVE-2014-1720 - CVE-2014-1721 - CVE-2014-1722 - CVE-2014-1723 - CVE-2014-1724 - CVE-2014-1725 - CVE-2014-1726 - CVE-2014-1727 - CVE-2014-1728 - CVE-2014-1729 - CVE-2014-1730 - CVE-2014-1731 - CVE-2014-1732 - CVE-2014-1733 - CVE-2014-1734 - CVE-2014-1735 - CVE-2014-1740 - CVE-2014-1742 - CVE-2014-1743 - CVE-2014-1744 - CVE-2014-1745 - CVE-2014-1746 - CVE-2014-1747 - CVE-2014-1748 - CVE-2014-1749 - CVE-2014-3154 - CVE-2014-3155 - CVE-2014-3156 - CVE-2014-3157 - CVE-2014-3160 - CVE-2014-3162 - CVE-2014-3165 - CVE-2014-3166 - CVE-2014-3167 - CVE-2014-3168 - CVE-2014-3169 - CVE-2014-3170 - CVE-2014-3171 - CVE-2014-3172 - CVE-2014-3173 - CVE-2014-3174 - CVE-2014-3175 - CVE-2014-3176 - CVE-2014-3177 + CVE-2014-0538 + CVE-2014-1700 + CVE-2014-1701 + CVE-2014-1702 + CVE-2014-1703 + CVE-2014-1704 + CVE-2014-1705 + CVE-2014-1713 + CVE-2014-1714 + CVE-2014-1715 + CVE-2014-1716 + CVE-2014-1717 + CVE-2014-1718 + CVE-2014-1719 + CVE-2014-1720 + CVE-2014-1721 + CVE-2014-1722 + CVE-2014-1723 + CVE-2014-1724 + CVE-2014-1725 + CVE-2014-1726 + CVE-2014-1727 + CVE-2014-1728 + CVE-2014-1729 + CVE-2014-1730 + CVE-2014-1731 + CVE-2014-1732 + CVE-2014-1733 + CVE-2014-1734 + CVE-2014-1735 + CVE-2014-1740 + CVE-2014-1742 + CVE-2014-1743 + CVE-2014-1744 + CVE-2014-1745 + CVE-2014-1746 + CVE-2014-1747 + CVE-2014-1748 + CVE-2014-1749 + CVE-2014-3154 + CVE-2014-3155 + CVE-2014-3156 + CVE-2014-3157 + CVE-2014-3160 + CVE-2014-3162 + CVE-2014-3165 + CVE-2014-3166 + CVE-2014-3167 + CVE-2014-3168 + CVE-2014-3169 + CVE-2014-3170 + CVE-2014-3171 + CVE-2014-3172 + CVE-2014-3173 + CVE-2014-3174 + CVE-2014-3175 + CVE-2014-3176 + CVE-2014-3177 - Zlogene - + Zlogene + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-17.xml index b04344577e..048cf72f1e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-17.xml @@ -6,8 +6,8 @@ allows local attackers to execute arbitrary code. qemu - August 30, 2014 - September 02, 2014: 3 + 2014-08-30 + 2014-09-02: 3 201434 486352 505946 @@ -50,25 +50,25 @@ - CVE-2007-6227 - CVE-2013-4377 - CVE-2013-4544 - CVE-2014-0142 - CVE-2014-0143 - CVE-2014-0144 - CVE-2014-0145 - CVE-2014-0146 - CVE-2014-0147 - CVE-2014-0150 - CVE-2014-0222 - CVE-2014-0223 - CVE-2014-2894 - CVE-2014-3461 + CVE-2007-6227 + CVE-2013-4377 + CVE-2013-4544 + CVE-2014-0142 + CVE-2014-0143 + CVE-2014-0144 + CVE-2014-0145 + CVE-2014-0146 + CVE-2014-0147 + CVE-2014-0150 + CVE-2014-0222 + CVE-2014-0223 + CVE-2014-2894 + CVE-2014-3461 - + BlueKnight - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-18.xml index c490581e2f..0e7f53216f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-18.xml @@ -6,8 +6,8 @@ which can allow execution of arbitrary code. nrpe - August 30, 2014 - August 30, 2014: 1 + 2014-08-30 + 2014-08-30: 1 397603 459870 508122 @@ -45,13 +45,13 @@ - CVE-2013-1362 - CVE-2014-2913 + CVE-2013-1362 + CVE-2014-2913 - + underling - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-19.xml index 48eb1150bd..b38a0ff5d8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201408-19.xml @@ -6,8 +6,8 @@ LibreOffice, the worst of which may result in execution of arbitrary code. openoffice - August 31, 2014 - August 31, 2014: 1 + 2014-08-31 + 2014-08-31: 1 283370 305195 320491 @@ -88,33 +88,33 @@ - CVE-2006-4339 - CVE-2009-0200 - CVE-2009-0201 - CVE-2009-0217 - CVE-2009-2949 - CVE-2009-2950 - CVE-2009-3301 - CVE-2009-3302 - CVE-2010-0395 - CVE-2010-2935 - CVE-2010-2936 - CVE-2010-3450 - CVE-2010-3451 - CVE-2010-3452 - CVE-2010-3453 - CVE-2010-3454 - CVE-2010-3689 - CVE-2010-4253 - CVE-2010-4643 - CVE-2011-2713 - CVE-2012-0037 - CVE-2012-1149 - CVE-2012-2149 - CVE-2012-2334 - CVE-2012-2665 - CVE-2014-0247 + CVE-2006-4339 + CVE-2009-0200 + CVE-2009-0201 + CVE-2009-0217 + CVE-2009-2949 + CVE-2009-2950 + CVE-2009-3301 + CVE-2009-3302 + CVE-2010-0395 + CVE-2010-2935 + CVE-2010-2936 + CVE-2010-3450 + CVE-2010-3451 + CVE-2010-3452 + CVE-2010-3453 + CVE-2010-3454 + CVE-2010-3689 + CVE-2010-4253 + CVE-2010-4643 + CVE-2011-2713 + CVE-2012-0037 + CVE-2012-1149 + CVE-2012-2149 + CVE-2012-2334 + CVE-2012-2665 + CVE-2014-0247 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-01.xml index 2f07318be8..7bd0b113b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-01.xml @@ -6,8 +6,8 @@ allow remote attackers to cause Denial of Service. wireshark - September 01, 2014 - September 01, 2014: 1 + 2014-09-01 + 2014-09-01: 1 519014 remote @@ -42,12 +42,12 @@ - CVE-2014-5161 - CVE-2014-5162 - CVE-2014-5163 - CVE-2014-5164 - CVE-2014-5165 + CVE-2014-5161 + CVE-2014-5162 + CVE-2014-5163 + CVE-2014-5164 + CVE-2014-5165 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-02.xml index 39880224e8..457998377b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-02.xml @@ -6,8 +6,8 @@ allow remote attackers to cause Denial of Service. net-snmp - September 01, 2014 - September 01, 2014: 1 + 2014-09-01 + 2014-09-01: 1 431752 493296 502968 @@ -44,13 +44,13 @@ - CVE-2012-2141 - CVE-2012-6151 - CVE-2014-2284 - CVE-2014-2285 + CVE-2012-2141 + CVE-2012-6151 + CVE-2014-2284 + CVE-2014-2285 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-03.xml index 930b2941df..7c73b53ba5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-03.xml @@ -6,8 +6,8 @@ condition. dhcpcd - September 03, 2014 - September 03, 2014: 1 + 2014-09-03 + 2014-09-03: 1 518596 remote @@ -43,8 +43,8 @@ - CVE-2014-6060 + CVE-2014-6060 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-04.xml index 9c23049ba1..0c47a5bd6d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-04.xml @@ -6,8 +6,8 @@ allows local attackers to escalate their privileges. mysql - September 04, 2014 - September 04, 2014: 1 + 2014-09-04 + 2014-09-04: 1 460748 488212 498164 @@ -50,47 +50,47 @@ - CVE-2013-1861 - CVE-2013-2134 - CVE-2013-3839 - CVE-2013-5767 - CVE-2013-5770 - CVE-2013-5786 - CVE-2013-5793 - CVE-2013-5807 - CVE-2013-5860 - CVE-2013-5881 - CVE-2013-5882 - CVE-2013-5891 - CVE-2013-5894 - CVE-2013-5908 - CVE-2014-0001 - CVE-2014-0384 - CVE-2014-0386 - CVE-2014-0393 - CVE-2014-0401 - CVE-2014-0402 - CVE-2014-0412 - CVE-2014-0420 - CVE-2014-0427 - CVE-2014-0430 - CVE-2014-0431 - CVE-2014-0433 - CVE-2014-0437 - CVE-2014-2419 - CVE-2014-2430 - CVE-2014-2431 - CVE-2014-2432 - CVE-2014-2434 - CVE-2014-2435 - CVE-2014-2436 - CVE-2014-2438 - CVE-2014-2440 + CVE-2013-1861 + CVE-2013-2134 + CVE-2013-3839 + CVE-2013-5767 + CVE-2013-5770 + CVE-2013-5786 + CVE-2013-5793 + CVE-2013-5807 + CVE-2013-5860 + CVE-2013-5881 + CVE-2013-5882 + CVE-2013-5891 + CVE-2013-5894 + CVE-2013-5908 + CVE-2014-0001 + CVE-2014-0384 + CVE-2014-0386 + CVE-2014-0393 + CVE-2014-0401 + CVE-2014-0402 + CVE-2014-0412 + CVE-2014-0420 + CVE-2014-0427 + CVE-2014-0430 + CVE-2014-0431 + CVE-2014-0433 + CVE-2014-0437 + CVE-2014-2419 + CVE-2014-2430 + CVE-2014-2431 + CVE-2014-2432 + CVE-2014-2434 + CVE-2014-2435 + CVE-2014-2436 + CVE-2014-2438 + CVE-2014-2440 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-05.xml index fa9d288517..bf6e90125a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-05.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - September 19, 2014 - September 19, 2014: 1 + 2014-09-19 + 2014-09-19: 1 522448 remote @@ -45,19 +45,19 @@ - CVE-2014-0547 - CVE-2014-0548 - CVE-2014-0549 - CVE-2014-0550 - CVE-2014-0551 - CVE-2014-0552 - CVE-2014-0553 - CVE-2014-0554 - CVE-2014-0555 - CVE-2014-0556 - CVE-2014-0557 - CVE-2014-0559 + CVE-2014-0547 + CVE-2014-0548 + CVE-2014-0549 + CVE-2014-0550 + CVE-2014-0551 + CVE-2014-0552 + CVE-2014-0553 + CVE-2014-0554 + CVE-2014-0555 + CVE-2014-0556 + CVE-2014-0557 + CVE-2014-0559 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-06.xml index 3f19a72d84..0219bc18eb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-06.xml @@ -6,8 +6,8 @@ which can allow remote attackers to cause Denial of Service. chromium - September 19, 2014 - September 19, 2014: 1 + 2014-09-19 + 2014-09-19: 1 522484 remote @@ -44,9 +44,9 @@ - CVE-2014-3178 - CVE-2014-3179 + CVE-2014-3178 + CVE-2014-3179 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-07.xml index dc71896b8a..d87503478e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-07.xml @@ -4,8 +4,8 @@ c-icap: Denial of Service A vulnerability in c-icap could result in Denial of Service. c-icap,DoS - September 19, 2014 - September 19, 2014: 1 + 2014-09-19 + 2014-09-19: 1 455324 remote @@ -45,11 +45,11 @@ - CVE-2013-7401 - CVE-2013-7402 + CVE-2013-7401 + CVE-2013-7402 - + keytoaster - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-08.xml index e582cc1f09..2164c92f81 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-08.xml @@ -6,8 +6,8 @@ of Service. libxml2 - September 19, 2014 - September 19, 2014: 1 + 2014-09-19 + 2014-09-19: 1 509834 remote @@ -43,10 +43,10 @@ - CVE-2014-0191 + CVE-2014-0191 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-09.xml index 2cecc3c0b6..d8c558bb9f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-09.xml @@ -6,8 +6,8 @@ allow attackers to inject code. bash - September 24, 2014 - October 04, 2014: 4 + 2014-09-24 + 2014-10-04: 4 523592 local, remote @@ -74,8 +74,8 @@ - CVE-2014-6271 + CVE-2014-6271 - a3li - a3li + a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-10.xml index bfe734fe09..eb699e7565 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201409-10.xml @@ -7,8 +7,8 @@ 201409-09 had an incomplete fix. bash - September 25, 2014 - October 04, 2014: 2 + 2014-09-25 + 2014-10-04: 2 523592 local, remote @@ -80,12 +80,12 @@ - CVE-2014-7169 + CVE-2014-7169 - + keytoaster - + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201410-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201410-01.xml index 41875ec460..b94a392597 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201410-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201410-01.xml @@ -6,8 +6,8 @@ inject code or cause a Denial of Service condition. bash - October 04, 2014 - October 04, 2014: 1 + 2014-10-04 + 2014-10-04: 1 523742 524256 local, remote @@ -80,15 +80,15 @@ - CVE-2014-6277 - CVE-2014-6278 - CVE-2014-7186 - CVE-2014-7187 + CVE-2014-6277 + CVE-2014-6278 + CVE-2014-7186 + CVE-2014-7187 - + keytoaster - + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201410-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201410-02.xml index a0aaef4190..9234024e99 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201410-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201410-02.xml @@ -7,8 +7,8 @@ arbitrary Perl code. Locale-Maketext - October 12, 2014 - December 29, 2014: 2 + 2014-10-12 + 2014-12-29: 2 446376 remote @@ -55,10 +55,10 @@ - CVE-2012-6329 + CVE-2012-6329 - ackle - + ackle + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-01.xml index 81a571549c..a43756487d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-01.xml @@ -6,8 +6,8 @@ could lead to user-assisted execution of arbitrary code. VLC - November 05, 2014 - November 05, 2014: 1 + 2014-11-05 + 2014-11-05: 1 279340 285370 316709 @@ -66,42 +66,42 @@ - CVE-2010-1441 - CVE-2010-1442 - CVE-2010-1443 - CVE-2010-1444 - CVE-2010-1445 - CVE-2010-2062 - CVE-2010-2937 - CVE-2010-3124 - CVE-2010-3275 - CVE-2010-3276 - CVE-2010-3907 - CVE-2011-0021 - CVE-2011-0522 - CVE-2011-0531 - CVE-2011-1087 - CVE-2011-1684 - CVE-2011-2194 - CVE-2011-2587 - CVE-2011-2588 - CVE-2011-3623 - CVE-2012-0023 - CVE-2012-1775 - CVE-2012-1776 - CVE-2012-2396 - CVE-2012-3377 - CVE-2012-5470 - CVE-2012-5855 - CVE-2013-1868 - CVE-2013-1954 - CVE-2013-3245 - CVE-2013-4388 - CVE-2013-6283 - CVE-2013-6934 + CVE-2010-1441 + CVE-2010-1442 + CVE-2010-1443 + CVE-2010-1444 + CVE-2010-1445 + CVE-2010-2062 + CVE-2010-2937 + CVE-2010-3124 + CVE-2010-3275 + CVE-2010-3276 + CVE-2010-3907 + CVE-2011-0021 + CVE-2011-0522 + CVE-2011-0531 + CVE-2011-1087 + CVE-2011-1684 + CVE-2011-2194 + CVE-2011-2587 + CVE-2011-2588 + CVE-2011-3623 + CVE-2012-0023 + CVE-2012-1775 + CVE-2012-1776 + CVE-2012-2396 + CVE-2012-3377 + CVE-2012-5470 + CVE-2012-5855 + CVE-2013-1868 + CVE-2013-1954 + CVE-2013-3245 + CVE-2013-4388 + CVE-2013-6283 + CVE-2013-6934 - a3li - + a3li + underling diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-02.xml index 3d3816d151..655777e729 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-02.xml @@ -6,8 +6,8 @@ possibly allowing attackers to cause unspecified impact. mysql mariadb - November 05, 2014 - November 05, 2014: 1 + 2014-11-05 + 2014-11-05: 1 525504 remote @@ -56,16 +56,16 @@ - CVE-2014-6464 - CVE-2014-6469 - CVE-2014-6491 - CVE-2014-6494 - CVE-2014-6496 - CVE-2014-6500 - CVE-2014-6507 - CVE-2014-6555 - CVE-2014-6559 + CVE-2014-6464 + CVE-2014-6469 + CVE-2014-6491 + CVE-2014-6494 + CVE-2014-6496 + CVE-2014-6500 + CVE-2014-6507 + CVE-2014-6555 + CVE-2014-6559 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-03.xml index 75ea3e56c4..345ce46493 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-03.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. tigervnc - November 05, 2014 - November 05, 2014: 1 + 2014-11-05 + 2014-11-05: 1 505170 remote @@ -43,8 +43,8 @@ - CVE-2014-0011 + CVE-2014-0011 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-04.xml index 5150a70650..41511126b5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-04.xml @@ -6,8 +6,8 @@ which could lead to remote execution of arbitrary code. php - November 09, 2014 - August 22, 2015: 3 + 2014-11-09 + 2015-08-22: 3 525960 remote @@ -76,10 +76,10 @@ - CVE-2014-3668 - CVE-2014-3669 - CVE-2014-3670 + CVE-2014-3668 + CVE-2014-3669 + CVE-2014-3670 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-05.xml index d10aff163b..4d4ad3c2e0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-05.xml @@ -6,8 +6,8 @@ code execution. wget - November 16, 2014 - November 16, 2014: 1 + 2014-11-16 + 2014-11-16: 1 527056 remote @@ -42,8 +42,8 @@ - CVE-2014-4877 + CVE-2014-4877 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-06.xml index 8442421e8e..304bc9b091 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-06.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - November 21, 2014 - November 21, 2014: 2 + 2014-11-21 + 2014-11-21: 2 525430 529088 remote @@ -46,28 +46,28 @@ - CVE-2014-0558 - CVE-2014-0564 - CVE-2014-0569 - CVE-2014-0573 - CVE-2014-0574 - CVE-2014-0576 - CVE-2014-0577 - CVE-2014-0581 - CVE-2014-0582 - CVE-2014-0583 - CVE-2014-0584 - CVE-2014-0585 - CVE-2014-0586 - CVE-2014-0588 - CVE-2014-0589 - CVE-2014-0590 - CVE-2014-8437 - CVE-2014-8438 - CVE-2014-8440 - CVE-2014-8441 - CVE-2014-8442 + CVE-2014-0558 + CVE-2014-0564 + CVE-2014-0569 + CVE-2014-0573 + CVE-2014-0574 + CVE-2014-0576 + CVE-2014-0577 + CVE-2014-0581 + CVE-2014-0582 + CVE-2014-0583 + CVE-2014-0584 + CVE-2014-0585 + CVE-2014-0586 + CVE-2014-0588 + CVE-2014-0589 + CVE-2014-0590 + CVE-2014-8437 + CVE-2014-8438 + CVE-2014-8440 + CVE-2014-8441 + CVE-2014-8442 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-07.xml index 40cbec8c40..2c9829742e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-07.xml @@ -6,8 +6,8 @@ to cause Denial of Service. openswan - November 23, 2014 - November 23, 2014: 1 + 2014-11-23 + 2014-11-23: 1 499870 remote @@ -43,10 +43,10 @@

- CVE-2013-6466 + CVE-2013-6466 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-08.xml index 7ae5a57bc5..97c1b78021 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-08.xml @@ -7,8 +7,8 @@ of Service. aircrack-ng - November 23, 2014 - November 23, 2014: 1 + 2014-11-23 + 2014-11-23: 1 528132 local, remote @@ -46,11 +46,11 @@ - CVE-2014-8321 - CVE-2014-8322 - CVE-2014-8323 - CVE-2014-8324 + CVE-2014-8321 + CVE-2014-8322 + CVE-2014-8323 + CVE-2014-8324 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-09.xml index c0f09a48c9..10d05c3595 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-09.xml @@ -6,8 +6,8 @@ local privilege escalation. ansible - November 23, 2014 - November 23, 2014: 1 + 2014-11-23 + 2014-11-23: 1 516564 517770 local @@ -43,13 +43,13 @@ - CVE-2014-4657 - CVE-2014-4678 - CVE-2014-4966 - CVE-2014-4967 + CVE-2014-4657 + CVE-2014-4678 + CVE-2014-4966 + CVE-2014-4967 - + pinkbyte - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-10.xml index cb9b2b1fb5..a8032537d2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-10.xml @@ -6,8 +6,8 @@ which could lead to Denial of Service. asterisk - November 23, 2014 - November 23, 2014: 1 + 2014-11-23 + 2014-11-23: 1 523216 526208 remote @@ -43,11 +43,11 @@ - CVE-2014-3566 - CVE-2014-6610 + CVE-2014-3566 + CVE-2014-6610 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-11.xml index 5cf8bd3242..6f4b90873e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201411-11.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause a Denial of Service condition. squid - November 27, 2014 - November 27, 2014: 1 + 2014-11-27 + 2014-11-27: 1 504176 522498 remote @@ -45,12 +45,12 @@ - CVE-2014-0128 - CVE-2014-7141 - CVE-2014-7142 + CVE-2014-0128 + CVE-2014-7141 + CVE-2014-7142 - + keytoaster - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-01.xml index 88221fb102..bb0d7f6696 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-01.xml @@ -6,8 +6,8 @@ which allows context dependent attackers to cause Denial of Service. qemu - December 08, 2014 - December 08, 2014: 1 + 2014-12-08 + 2014-12-08: 1 514680 519506 520688 @@ -47,15 +47,15 @@ - CVE-2014-3471 - CVE-2014-3615 - CVE-2014-3640 - CVE-2014-5263 - CVE-2014-5388 - CVE-2014-7815 + CVE-2014-3471 + CVE-2014-3615 + CVE-2014-3640 + CVE-2014-5263 + CVE-2014-5388 + CVE-2014-7815 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-02.xml index 3aabc630bf..74ba30b8a2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-02.xml @@ -6,8 +6,8 @@ access to restricted information. nfs-utils - December 08, 2014 - December 08, 2014: 1 + 2014-12-08 + 2014-12-08: 1 464636 remote @@ -43,10 +43,10 @@ - CVE-2013-1923 + CVE-2013-1923 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-03.xml index 14ce3a70fc..72c37fba4b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-03.xml @@ -6,8 +6,8 @@ a Denial of Service condition. dovecot - December 08, 2014 - December 08, 2014: 1 + 2014-12-08 + 2014-12-08: 1 509954 remote @@ -40,10 +40,10 @@ - CVE-2014-3430 + CVE-2014-3430 - + keytoaster - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-04.xml index 93d1f22292..36094bee2a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-04.xml @@ -6,8 +6,8 @@ allows context-dependent attackers to escalate privileges. libvirt - December 08, 2014 - December 08, 2014: 1 + 2014-12-08 + 2014-12-08: 1 483048 484014 485520 @@ -55,29 +55,29 @@ - CVE-2013-4292 - CVE-2013-4296 - CVE-2013-4297 - CVE-2013-4399 - CVE-2013-4400 - CVE-2013-4401 - CVE-2013-5651 - CVE-2013-6436 - CVE-2013-6456 - CVE-2013-6457 - CVE-2013-6458 - CVE-2013-7336 - CVE-2014-0028 - CVE-2014-0179 - CVE-2014-1447 - CVE-2014-3633 - CVE-2014-5177 - CVE-2014-7823 + CVE-2013-4292 + CVE-2013-4296 + CVE-2013-4297 + CVE-2013-4399 + CVE-2013-4400 + CVE-2013-4401 + CVE-2013-5651 + CVE-2013-6436 + CVE-2013-6456 + CVE-2013-6457 + CVE-2013-6458 + CVE-2013-7336 + CVE-2014-0028 + CVE-2014-0179 + CVE-2014-1447 + CVE-2014-3633 + CVE-2014-5177 + CVE-2014-7823 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-05.xml index 34a06f6c56..8bd382a76f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-05.xml @@ -6,8 +6,8 @@ condition. clamav - December 09, 2014 - December 09, 2014: 2 + 2014-12-09 + 2014-12-09: 2 529728 remote @@ -44,10 +44,10 @@ - CVE-2014-9050 + CVE-2014-9050 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-06.xml index 5983702013..32cfc0341c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-06.xml @@ -4,8 +4,8 @@ libxml2: Denial of Service A vulnerability in libxml2 could result in Denial of Service. libxml2 - December 10, 2014 - December 10, 2014: 1 + 2014-12-10 + 2014-12-10: 1 525656 local, remote @@ -44,8 +44,8 @@

- CVE-2014-3660 + CVE-2014-3660 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-07.xml index 112fac5c4b..9034370995 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-07.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. flash,ACE - December 11, 2014 - December 11, 2014: 1 + 2014-12-11 + 2014-12-11: 1 530692 532074 remote @@ -46,14 +46,14 @@ - CVE-2014-0580 - CVE-2014-0587 - CVE-2014-8439 - CVE-2014-8443 - CVE-2014-9162 - CVE-2014-9163 - CVE-2014-9164 + CVE-2014-0580 + CVE-2014-0587 + CVE-2014-8439 + CVE-2014-8443 + CVE-2014-9162 + CVE-2014-9163 + CVE-2014-9164 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-08.xml index 172c499b2f..c027c3522d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-08.xml @@ -8,9 +8,9 @@ remote code execution. Please see the package list and CVE identifiers below for more information. - - December 11, 2014 - December 11, 2014: 1 + + 2014-12-11 + 2014-12-11: 1 159556 208464 253822 @@ -391,38 +391,38 @@

- CVE-2006-3005 - CVE-2007-2741 - CVE-2008-0553 - CVE-2008-1382 - CVE-2008-5907 - CVE-2008-6218 - CVE-2008-6661 - CVE-2009-0040 - CVE-2009-0360 - CVE-2009-0361 - CVE-2009-0946 - CVE-2009-2042 - CVE-2009-2624 - CVE-2009-3736 - CVE-2009-4029 - CVE-2009-4411 - CVE-2009-4896 - CVE-2010-0001 - CVE-2010-0436 - CVE-2010-0732 - CVE-2010-0829 - CVE-2010-1000 - CVE-2010-1205 - CVE-2010-1511 - CVE-2010-2056 - CVE-2010-2060 - CVE-2010-2192 - CVE-2010-2251 - CVE-2010-2529 - CVE-2010-2809 - CVE-2010-2945 + CVE-2006-3005 + CVE-2007-2741 + CVE-2008-0553 + CVE-2008-1382 + CVE-2008-5907 + CVE-2008-6218 + CVE-2008-6661 + CVE-2009-0040 + CVE-2009-0360 + CVE-2009-0361 + CVE-2009-0946 + CVE-2009-2042 + CVE-2009-2624 + CVE-2009-3736 + CVE-2009-4029 + CVE-2009-4411 + CVE-2009-4896 + CVE-2010-0001 + CVE-2010-0436 + CVE-2010-0732 + CVE-2010-0829 + CVE-2010-1000 + CVE-2010-1205 + CVE-2010-1511 + CVE-2010-2056 + CVE-2010-2060 + CVE-2010-2192 + CVE-2010-2251 + CVE-2010-2529 + CVE-2010-2809 + CVE-2010-2945 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-09.xml index eefa163a8d..ccbe05f2ad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-09.xml @@ -8,9 +8,9 @@ remote code execution. Please see the package list and CVE identifiers below for more information. - - December 11, 2014 - December 11, 2014: 2 + + 2014-12-11 + 2014-12-11: 2 194151 294253 294256 @@ -372,68 +372,68 @@

- CVE-2007-4370 - CVE-2009-4023 - CVE-2009-4111 - CVE-2010-0778 - CVE-2010-1780 - CVE-2010-1782 - CVE-2010-1783 - CVE-2010-1784 - CVE-2010-1785 - CVE-2010-1786 - CVE-2010-1787 - CVE-2010-1788 - CVE-2010-1790 - CVE-2010-1791 - CVE-2010-1792 - CVE-2010-1793 - CVE-2010-1807 - CVE-2010-1812 - CVE-2010-1814 - CVE-2010-1815 - CVE-2010-2526 - CVE-2010-2901 - CVE-2010-3255 - CVE-2010-3257 - CVE-2010-3259 - CVE-2010-3362 - CVE-2010-3374 - CVE-2010-3389 - CVE-2010-3812 - CVE-2010-3813 - CVE-2010-3999 - CVE-2010-4042 - CVE-2010-4197 - CVE-2010-4198 - CVE-2010-4204 - CVE-2010-4206 - CVE-2010-4492 - CVE-2010-4493 - CVE-2010-4577 - CVE-2010-4578 - CVE-2011-0007 - CVE-2011-0465 - CVE-2011-0482 - CVE-2011-0721 - CVE-2011-0727 - CVE-2011-0904 - CVE-2011-0905 - CVE-2011-1072 - CVE-2011-1097 - CVE-2011-1144 - CVE-2011-1425 - CVE-2011-1572 - CVE-2011-1760 - CVE-2011-1951 - CVE-2011-2471 - CVE-2011-2472 - CVE-2011-2473 - CVE-2011-2524 - CVE-2011-3365 - CVE-2011-3366 - CVE-2011-3367 + CVE-2007-4370 + CVE-2009-4023 + CVE-2009-4111 + CVE-2010-0778 + CVE-2010-1780 + CVE-2010-1782 + CVE-2010-1783 + CVE-2010-1784 + CVE-2010-1785 + CVE-2010-1786 + CVE-2010-1787 + CVE-2010-1788 + CVE-2010-1790 + CVE-2010-1791 + CVE-2010-1792 + CVE-2010-1793 + CVE-2010-1807 + CVE-2010-1812 + CVE-2010-1814 + CVE-2010-1815 + CVE-2010-2526 + CVE-2010-2901 + CVE-2010-3255 + CVE-2010-3257 + CVE-2010-3259 + CVE-2010-3362 + CVE-2010-3374 + CVE-2010-3389 + CVE-2010-3812 + CVE-2010-3813 + CVE-2010-3999 + CVE-2010-4042 + CVE-2010-4197 + CVE-2010-4198 + CVE-2010-4204 + CVE-2010-4206 + CVE-2010-4492 + CVE-2010-4493 + CVE-2010-4577 + CVE-2010-4578 + CVE-2011-0007 + CVE-2011-0465 + CVE-2011-0482 + CVE-2011-0721 + CVE-2011-0727 + CVE-2011-0904 + CVE-2011-0905 + CVE-2011-1072 + CVE-2011-1097 + CVE-2011-1144 + CVE-2011-1425 + CVE-2011-1572 + CVE-2011-1760 + CVE-2011-1951 + CVE-2011-2471 + CVE-2011-2472 + CVE-2011-2473 + CVE-2011-2524 + CVE-2011-3365 + CVE-2011-3366 + CVE-2011-3367 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-10.xml index 77e07db4dd..cd3edcdabb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-10.xml @@ -8,9 +8,9 @@ remote code execution. Please see the package list and CVE identifiers below for more information. - - December 11, 2014 - December 11, 2014: 1 + + 2014-12-11 + 2014-12-11: 1 284536 300903 334475 @@ -149,18 +149,18 @@

- CVE-2008-4776 - CVE-2010-2713 - CVE-2010-3313 - CVE-2010-3314 - CVE-2011-0765 - CVE-2011-2198 - CVE-2012-0807 - CVE-2012-0808 - CVE-2012-1620 - CVE-2012-2738 - CVE-2012-3448 + CVE-2008-4776 + CVE-2010-2713 + CVE-2010-3313 + CVE-2010-3314 + CVE-2011-0765 + CVE-2011-2198 + CVE-2012-0807 + CVE-2012-0808 + CVE-2012-1620 + CVE-2012-2738 + CVE-2012-3448 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-11.xml index 81e484fee6..10a8b1b903 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-11.xml @@ -7,8 +7,8 @@ code. emul-linux-x86-baselibs - December 12, 2014 - December 12, 2014: 1 + 2014-12-12 + 2014-12-12: 1 196865 335508 483632 @@ -57,29 +57,29 @@

- CVE-2007-0720 - CVE-2007-1536 - CVE-2007-2026 - CVE-2007-2445 - CVE-2007-2741 - CVE-2007-3108 - CVE-2007-4995 - CVE-2007-5116 - CVE-2007-5135 - CVE-2007-5266 - CVE-2007-5268 - CVE-2007-5269 - CVE-2007-5849 - CVE-2010-1205 - CVE-2013-0338 - CVE-2013-0339 - CVE-2013-1664 - CVE-2013-1969 - CVE-2013-2877 - CVE-2014-0160 + CVE-2007-0720 + CVE-2007-1536 + CVE-2007-2026 + CVE-2007-2445 + CVE-2007-2741 + CVE-2007-3108 + CVE-2007-4995 + CVE-2007-5116 + CVE-2007-5135 + CVE-2007-5266 + CVE-2007-5268 + CVE-2007-5269 + CVE-2007-5849 + CVE-2010-1205 + CVE-2013-0338 + CVE-2013-0339 + CVE-2013-1664 + CVE-2013-1969 + CVE-2013-2877 + CVE-2014-0160 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-12.xml index 59fb651fd2..e7a4bf0885 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-12.xml @@ -6,8 +6,8 @@ resulting in local Denial of Service. dbus - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 512940 516080 522982 @@ -45,18 +45,18 @@ - CVE-2014-3477 - CVE-2014-3532 - CVE-2014-3533 - CVE-2014-3635 - CVE-2014-3636 - CVE-2014-3637 - CVE-2014-3638 - CVE-2014-3639 - CVE-2014-7824 + CVE-2014-3477 + CVE-2014-3532 + CVE-2014-3533 + CVE-2014-3635 + CVE-2014-3636 + CVE-2014-3637 + CVE-2014-3638 + CVE-2014-3639 + CVE-2014-7824 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-13.xml index 40cc91c0d0..4f61da3ca1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-13.xml @@ -6,8 +6,8 @@ which can allow remote attackers to execute arbitrary code. chromium - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 524764 529858 remote @@ -43,32 +43,32 @@ - CVE-2014-3188 - CVE-2014-3189 - CVE-2014-3190 - CVE-2014-3191 - CVE-2014-3192 - CVE-2014-3193 - CVE-2014-3194 - CVE-2014-3195 - CVE-2014-3197 - CVE-2014-3198 - CVE-2014-3199 - CVE-2014-3200 - CVE-2014-7899 - CVE-2014-7900 - CVE-2014-7901 - CVE-2014-7902 - CVE-2014-7903 - CVE-2014-7904 - CVE-2014-7906 - CVE-2014-7907 - CVE-2014-7908 - CVE-2014-7909 - CVE-2014-7910 + CVE-2014-3188 + CVE-2014-3189 + CVE-2014-3190 + CVE-2014-3191 + CVE-2014-3192 + CVE-2014-3193 + CVE-2014-3194 + CVE-2014-3195 + CVE-2014-3197 + CVE-2014-3198 + CVE-2014-3199 + CVE-2014-3200 + CVE-2014-7899 + CVE-2014-7900 + CVE-2014-7901 + CVE-2014-7902 + CVE-2014-7903 + CVE-2014-7904 + CVE-2014-7906 + CVE-2014-7907 + CVE-2014-7908 + CVE-2014-7909 + CVE-2014-7910 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-14.xml index c8e74a0897..059610b640 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-14.xml @@ -6,8 +6,8 @@ execution of arbitrary code or Denial of Service. xfig - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 297379 remote @@ -42,9 +42,9 @@ - CVE-2009-4227 - CVE-2009-4228 + CVE-2009-4227 + CVE-2009-4228 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-15.xml index 5dafa99c09..ee8e27cc8c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-15.xml @@ -6,8 +6,8 @@ which could lead to privilege escalation. mcollective - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 513292 517286 local @@ -53,9 +53,9 @@ - CVE-2014-3248 - CVE-2014-3251 + CVE-2014-3248 + CVE-2014-3251 - K_F - ackle + K_F + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-16.xml index 8279d5f716..6d8cf5f512 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-16.xml @@ -4,8 +4,8 @@ CouchDB: Denial of Service A vulnerability in CouchDB could result in Denial of Service. couchdb - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 506354 remote @@ -47,10 +47,10 @@ - CVE-2014-2668 + CVE-2014-2668 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-17.xml index 349b03ab7a..620382058b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-17.xml @@ -6,8 +6,8 @@ worst of which may allow execution of arbitrary code. ghostscript-gpl - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 264594 300192 332061 @@ -47,16 +47,16 @@ - CVE-2009-0196 - CVE-2009-0792 - CVE-2009-3743 - CVE-2009-4270 - CVE-2009-4897 - CVE-2010-1628 - CVE-2010-2055 - CVE-2010-4054 - CVE-2012-4405 + CVE-2009-0196 + CVE-2009-0792 + CVE-2009-3743 + CVE-2009-4270 + CVE-2009-4897 + CVE-2010-1628 + CVE-2010-2055 + CVE-2010-4054 + CVE-2012-4405 - a3li - ackle + a3li + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-18.xml index 92ddc66cee..797421cdd7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-18.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. freerdp - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 511688 remote @@ -42,8 +42,8 @@ - CVE-2014-0250 + CVE-2014-0250 - K_F - ackle + K_F + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-19.xml index 128b951d4b..2c7f6546ea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-19.xml @@ -6,8 +6,8 @@ sensitive information. ppp - December 13, 2014 - December 13, 2014: 2 + 2014-12-13 + 2014-12-13: 2 519650 local @@ -42,10 +42,10 @@ - CVE-2014-3158 + CVE-2014-3158 - K_F - + K_F + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-20.xml index f4d4eb518b..2e4b6c269e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-20.xml @@ -6,8 +6,8 @@ Service. gnustep-base - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 508370 remote @@ -44,10 +44,10 @@ - CVE-2014-2980 + CVE-2014-2980 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-21.xml index e5610e90c7..5a686582df 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-21.xml @@ -6,8 +6,8 @@ could result in local privilege escalation. mod_wsgi - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 510938 local, remote @@ -48,11 +48,11 @@ - CVE-2014-0240 - CVE-2014-0242 + CVE-2014-0240 + CVE-2014-0242 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-22.xml index bc4797f56e..96232da76d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-22.xml @@ -6,8 +6,8 @@ which may lead to Denial of Service. django - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 521324 remote @@ -57,11 +57,11 @@ - CVE-2014-0480 - CVE-2014-0481 - CVE-2014-0482 - CVE-2014-0483 + CVE-2014-0480 + CVE-2014-0481 + CVE-2014-0482 + CVE-2014-0483 - K_F - ackle + K_F + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-23.xml index 1ae96c7c8e..681a372f12 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-23.xml @@ -6,8 +6,8 @@ which may allow remote code execution. nagios-core - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 447802 495132 501200 @@ -43,10 +43,10 @@ - CVE-2012-6096 - CVE-2013-7108 - CVE-2013-7205 + CVE-2012-6096 + CVE-2013-7108 + CVE-2013-7205 - K_F - ackle + K_F + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-24.xml index 4772a232b1..77fa771a17 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-24.xml @@ -6,8 +6,8 @@ which may result in execution of arbitrary code. openjpeg - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 484802 493662 remote @@ -44,17 +44,17 @@ - CVE-2013-1447 - CVE-2013-4289 - CVE-2013-4290 - CVE-2013-6045 - CVE-2013-6052 - CVE-2013-6053 - CVE-2013-6054 - CVE-2013-6887 + CVE-2013-1447 + CVE-2013-4289 + CVE-2013-4290 + CVE-2013-6045 + CVE-2013-6052 + CVE-2013-6053 + CVE-2013-6054 + CVE-2013-6887 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-25.xml index 3661daf640..36c534d9a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-25.xml @@ -6,8 +6,8 @@ Service. qtgui - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 508984 remote @@ -39,10 +39,10 @@ - CVE-2014-0190 + CVE-2014-0190 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-26.xml index 5d588a5c4c..7e4c451cf9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-26.xml @@ -6,8 +6,8 @@ resulting in Denial of Service or a bypass in authentication restrictions. strongswan - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 507722 509832 remote @@ -43,11 +43,11 @@ - CVE-2014-2338 - CVE-2014-2891 + CVE-2014-2338 + CVE-2014-2891 - + keytoaster - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-27.xml index b895503a00..56adc33465 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-27.xml @@ -6,8 +6,8 @@ context-dependent attackers to cause a Denial of Service condition. Ruby - December 13, 2014 - December 13, 2014: 1 + 2014-12-13 + 2014-12-13: 1 355439 369141 396301 @@ -59,20 +59,20 @@ - CVE-2011-0188 - CVE-2011-1004 - CVE-2011-1005 - CVE-2011-4815 - CVE-2012-4481 - CVE-2012-5371 - CVE-2013-0269 - CVE-2013-1821 - CVE-2013-4164 - CVE-2014-8080 - CVE-2014-8090 + CVE-2011-0188 + CVE-2011-1004 + CVE-2011-1005 + CVE-2011-4815 + CVE-2012-4481 + CVE-2012-5371 + CVE-2013-0269 + CVE-2013-1821 + CVE-2013-4164 + CVE-2014-8080 + CVE-2014-8090 - + underling - craig + craig diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-28.xml index cd049c2a7a..bc7584ff6d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-28.xml @@ -6,8 +6,8 @@ which allowing for execution of arbitrary code. rails - December 14, 2014 - December 14, 2014: 1 + 2014-12-14 + 2014-12-14: 1 354249 379511 386377 @@ -62,28 +62,28 @@

- CVE-2010-3933 - CVE-2011-0446 - CVE-2011-0447 - CVE-2011-0448 - CVE-2011-0449 - CVE-2011-2929 - CVE-2011-2930 - CVE-2011-2931 - CVE-2011-2932 - CVE-2011-3186 - CVE-2013-0155 - CVE-2013-0156 - CVE-2013-0276 - CVE-2013-0277 - CVE-2013-0333 - CVE-2013-1854 - CVE-2013-1855 - CVE-2013-1856 - CVE-2013-1857 + CVE-2010-3933 + CVE-2011-0446 + CVE-2011-0447 + CVE-2011-0448 + CVE-2011-0449 + CVE-2011-2929 + CVE-2011-2930 + CVE-2011-2931 + CVE-2011-2932 + CVE-2011-3186 + CVE-2013-0155 + CVE-2013-0156 + CVE-2013-0276 + CVE-2013-0277 + CVE-2013-0333 + CVE-2013-1854 + CVE-2013-1855 + CVE-2013-1856 + CVE-2013-1857 - craig - + craig + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-29.xml index 9f3aa55b31..d2b922f63d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-29.xml @@ -6,8 +6,8 @@ worst of which may result in Denial of Service. tomcat - December 15, 2014 - March 20, 2016: 2 + 2014-12-15 + 2016-03-20: 2 442014 469434 500600 @@ -62,26 +62,26 @@ - CVE-2012-2733 - CVE-2012-3544 - CVE-2012-3546 - CVE-2012-4431 - CVE-2012-4534 - CVE-2012-5885 - CVE-2012-5886 - CVE-2012-5887 - CVE-2013-2067 - CVE-2013-2071 - CVE-2013-4286 - CVE-2013-4322 - CVE-2013-4590 - CVE-2014-0033 - CVE-2014-0050 - CVE-2014-0075 - CVE-2014-0096 - CVE-2014-0099 - CVE-2014-0119 + CVE-2012-2733 + CVE-2012-3544 + CVE-2012-3546 + CVE-2012-4431 + CVE-2012-4534 + CVE-2012-5885 + CVE-2012-5886 + CVE-2012-5887 + CVE-2013-2067 + CVE-2013-2071 + CVE-2013-4286 + CVE-2013-4322 + CVE-2013-4590 + CVE-2014-0033 + CVE-2014-0050 + CVE-2014-0075 + CVE-2014-0096 + CVE-2014-0099 + CVE-2014-0119 - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-30.xml index 74d686985d..25c7a2baa3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-30.xml @@ -7,8 +7,8 @@ condition. varnish - December 15, 2014 - December 15, 2014: 1 + 2014-12-15 + 2014-12-15: 1 458888 489944 local, remote @@ -45,11 +45,11 @@ - CVE-2013-0345 - CVE-2013-4484 + CVE-2013-0345 + CVE-2013-4484 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-31.xml index e125abbc8c..d7c275fc13 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-31.xml @@ -4,8 +4,8 @@ ZNC: Denial of Service Multiple vulnerabilities in ZNC could lead to Denial of Service. znc - December 19, 2014 - December 19, 2014: 1 + 2014-12-19 + 2014-12-19: 1 471738 507794 remote @@ -39,11 +39,11 @@ - CVE-2013-2130 - CVE-2014-9403 + CVE-2013-2130 + CVE-2014-9403 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-32.xml index 8c1f7a2614..05e7eb2dcf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-32.xml @@ -6,8 +6,8 @@ sensitive information. sendmail - December 22, 2014 - December 22, 2014: 1 + 2014-12-22 + 2014-12-22: 1 511760 local @@ -42,10 +42,10 @@ - CVE-2014-3956 + CVE-2014-3956 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-33.xml index 7c7f0594ab..216978553f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-33.xml @@ -6,8 +6,8 @@ worst of which may allow execution of arbitrary code. pdns-recursor - December 22, 2014 - December 22, 2014: 1 + 2014-12-22 + 2014-12-22: 1 299942 404377 514946 @@ -46,14 +46,14 @@ - CVE-2009-4009 - CVE-2009-4010 - CVE-2012-1193 - CVE-2014-8601 - + CVE-2009-4009 + CVE-2009-4010 + CVE-2012-1193 + CVE-2014-8601 + Related to recent DoS attacks: Recursor configuration file guidance - craig - ackle + craig + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-34.xml index 0e09f84a8b..bbd4379f5c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-34.xml @@ -6,8 +6,8 @@ could result in remote execution of arbitrary code. ntp - December 24, 2014 - December 24, 2014: 2 + 2014-12-24 + 2014-12-24: 2 533076 remote @@ -45,11 +45,11 @@ - CVE-2014-9293 - CVE-2014-9294 - CVE-2014-9295 - CVE-2014-9296 + CVE-2014-9293 + CVE-2014-9294 + CVE-2014-9295 + CVE-2014-9296 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-35.xml index 577ec5ad1e..905248fbe0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-35.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-35.xml @@ -6,8 +6,8 @@ attackers to cause Denial of Service. rsyslog - December 24, 2014 - December 24, 2014: 1 + 2014-12-24 + 2014-12-24: 1 395709 491856 524058 @@ -46,10 +46,10 @@ - CVE-2011-4623 - CVE-2014-3634 - CVE-2014-3683 + CVE-2011-4623 + CVE-2014-3634 + CVE-2014-3683 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-36.xml index 4393c6743e..0e0b03ce8f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-36.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-36.xml @@ -6,8 +6,8 @@ allows context-dependent attackers to cause Denial of Service. libvirt - December 24, 2014 - December 24, 2014: 1 + 2014-12-24 + 2014-12-24: 1 532204 533286 local, remote @@ -41,10 +41,10 @@ - CVE-2014-8131 - CVE-2014-8135 - CVE-2014-8136 + CVE-2014-8131 + CVE-2014-8135 + CVE-2014-8136 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-37.xml index 04b6eef590..bed0bac861 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-37.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-37.xml @@ -6,8 +6,8 @@ which could result in execution of arbitrary code or Denial of Service. qemu - December 24, 2014 - December 24, 2014: 1 + 2014-12-24 + 2014-12-24: 1 528922 529030 531666 @@ -45,14 +45,14 @@ - CVE-2014-3689 - CVE-2014-7840 - CVE-2014-8106 + CVE-2014-3689 + CVE-2014-7840 + CVE-2014-8106 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-38.xml index fa9fb4b14c..b43a44925d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-38.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-38.xml @@ -6,8 +6,8 @@ in privilege escalation or disclosure of information. icecast - December 26, 2014 - December 26, 2014: 1 + 2014-12-26 + 2014-12-26: 1 529956 530784 local, remote @@ -49,11 +49,11 @@ - CVE-2014-9018 - CVE-2014-9091 + CVE-2014-9018 + CVE-2014-9091 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-39.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-39.xml index 394069a817..890867c09d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-39.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-39.xml @@ -6,8 +6,8 @@ which could result in Denial of Service or Man-in-the-Middle attacks. openssl - December 26, 2014 - June 06, 2015: 2 + 2014-12-26 + 2015-06-06: 2 494816 519264 525468 @@ -72,20 +72,20 @@

- CVE-2013-6449 - CVE-2013-6450 - CVE-2014-3505 - CVE-2014-3506 - CVE-2014-3507 - CVE-2014-3509 - CVE-2014-3510 - CVE-2014-3511 - CVE-2014-3512 - CVE-2014-3513 - CVE-2014-3567 - CVE-2014-3568 - CVE-2014-5139 + CVE-2013-6449 + CVE-2013-6450 + CVE-2014-3505 + CVE-2014-3506 + CVE-2014-3507 + CVE-2014-3509 + CVE-2014-3510 + CVE-2014-3511 + CVE-2014-3512 + CVE-2014-3513 + CVE-2014-3567 + CVE-2014-3568 + CVE-2014-5139 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-40.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-40.xml index 10eae87723..6fd8213d27 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-40.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-40.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. flac - December 26, 2014 - December 26, 2014: 1 + 2014-12-26 + 2014-12-26: 1 530288 remote @@ -47,8 +47,8 @@

- CVE-2014-8962 + CVE-2014-8962 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-41.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-41.xml index 96f261ce36..0bd4823929 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-41.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-41.xml @@ -4,8 +4,8 @@ OpenVPN: Denial of Service A vulnerability in OpenVPN could lead to Denial of Service. openvpn - December 26, 2014 - December 26, 2014: 1 + 2014-12-26 + 2014-12-26: 1 531308 remote @@ -39,8 +39,8 @@ - CVE-2014-8104 + CVE-2014-8104 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-42.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-42.xml index 414433f036..154aa2a361 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-42.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-42.xml @@ -6,8 +6,8 @@ in Denial of Service. xen - December 26, 2014 - December 31, 2014: 2 + 2014-12-26 + 2014-12-31: 2 523524 524200 local @@ -49,13 +49,13 @@ - CVE-2014-7154 - CVE-2014-7155 - CVE-2014-7156 - CVE-2014-7188 + CVE-2014-7154 + CVE-2014-7155 + CVE-2014-7156 + CVE-2014-7188 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-43.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-43.xml index bf789027e8..8a7474b999 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-43.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-43.xml @@ -6,8 +6,8 @@ resulting in remote code execution or Denial of Service. mupdf - December 26, 2014 - December 26, 2014: 1 + 2014-12-26 + 2014-12-26: 1 358029 498876 remote @@ -43,13 +43,13 @@ - CVE-2014-2013 - Secunia Research: + CVE-2014-2013 + Secunia Research: MuPDF Two Integer Overflow Vulnerabilities - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-44.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-44.xml index 238abd7056..322a50c133 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-44.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-44.xml @@ -6,8 +6,8 @@ escalation. policycoreutils - December 26, 2014 - December 26, 2014: 1 + 2014-12-26 + 2014-12-26: 1 509896 local @@ -40,10 +40,10 @@ - CVE-2014-3215 + CVE-2014-3215 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-45.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-45.xml index f240371053..1db552f584 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-45.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-45.xml @@ -6,8 +6,8 @@ local privilege escalation. facter - December 26, 2014 - December 26, 2014: 1 + 2014-12-26 + 2014-12-26: 1 514476 local @@ -39,10 +39,10 @@ - CVE-2014-3248 + CVE-2014-3248 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-46.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-46.xml index b9ad0d5e5c..45ae0c058c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-46.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-46.xml @@ -6,8 +6,8 @@ could cause Denial of Service. lcms - December 26, 2014 - December 26, 2014: 1 + 2014-12-26 + 2014-12-26: 1 479874 507788 remote @@ -51,9 +51,9 @@

NOTE: Gentoo has discontinued support for the LittleCMS 1.9 branch.

- CVE-2013-4276 - CVE-2014-0459 + CVE-2013-4276 + CVE-2014-0459 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-47.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-47.xml index 7154eca852..f0c8cfaa53 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-47.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-47.xml @@ -7,8 +7,8 @@ execution. torque - December 26, 2014 - December 26, 2014: 1 + 2014-12-26 + 2014-12-26: 1 372959 378805 390167 @@ -65,15 +65,15 @@

- CVE-2011-2193 - CVE-2011-2907 - CVE-2011-4925 - CVE-2013-4319 - CVE-2013-4495 - CVE-2014-0749 + CVE-2011-2193 + CVE-2011-2907 + CVE-2011-4925 + CVE-2013-4319 + CVE-2013-4495 + CVE-2014-0749 - + underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-48.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-48.xml index f6dad95252..2a79eea762 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-48.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-48.xml @@ -6,8 +6,8 @@ create a Denial of Service condition. file - December 27, 2014 - December 27, 2014: 1 + 2014-12-27 + 2014-12-27: 1 532686 local, remote @@ -42,8 +42,8 @@ - CVE-2014-8117 + CVE-2014-8117 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-49.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-49.xml index 7ffe9d4390..fab26bb23f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-49.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-49.xml @@ -7,8 +7,8 @@ execution. fish - December 28, 2014 - December 28, 2014: 1 + 2014-12-28 + 2014-12-28: 1 509044 local, remote @@ -44,11 +44,11 @@ - CVE-2014-2905 - CVE-2014-2906 - CVE-2014-2914 - CVE-2014-3219 + CVE-2014-2905 + CVE-2014-2906 + CVE-2014-2914 + CVE-2014-3219 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-50.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-50.xml index c5e4cf7f90..15f49a6768 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-50.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-50.xml @@ -6,8 +6,8 @@ remote attackers to obtain sensitive information. getmail - December 28, 2014 - December 28, 2014: 1 + 2014-12-28 + 2014-12-28: 1 524684 remote @@ -44,10 +44,10 @@ - CVE-2014-7273 - CVE-2014-7274 - CVE-2014-7275 + CVE-2014-7273 + CVE-2014-7274 + CVE-2014-7275 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-51.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-51.xml index bfd67d8b3a..2982e71339 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-51.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-51.xml @@ -7,8 +7,8 @@ allow an authenticated user to gain escalated privileges. asterisk,dos,escalated,acl - December 28, 2014 - December 28, 2014: 1 + 2014-12-28 + 2014-12-28: 1 530056 532242 remote @@ -45,12 +45,12 @@ - CVE-2014-8412 - CVE-2014-8414 - CVE-2014-8417 - CVE-2014-8418 - CVE-2014-9374 + CVE-2014-8412 + CVE-2014-8414 + CVE-2014-8417 + CVE-2014-8418 + CVE-2014-9374 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-52.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-52.xml index afbc7e4b59..9ecd83e494 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-52.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-52.xml @@ -6,8 +6,8 @@ allow remote attackers to cause Denial of Service. wireshark - December 28, 2014 - December 28, 2014: 1 + 2014-12-28 + 2014-12-28: 1 522968 529100 remote @@ -43,19 +43,19 @@ - CVE-2014-6421 - CVE-2014-6422 - CVE-2014-6423 - CVE-2014-6424 - CVE-2014-6425 - CVE-2014-6426 - CVE-2014-6427 - CVE-2014-6428 - CVE-2014-6429 - CVE-2014-6430 - CVE-2014-6431 - CVE-2014-6432 + CVE-2014-6421 + CVE-2014-6422 + CVE-2014-6423 + CVE-2014-6424 + CVE-2014-6425 + CVE-2014-6426 + CVE-2014-6427 + CVE-2014-6428 + CVE-2014-6429 + CVE-2014-6430 + CVE-2014-6431 + CVE-2014-6432 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-53.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-53.xml index fe05d50d41..c39db73789 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-53.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201412-53.xml @@ -6,8 +6,8 @@ resulting in arbitrary code execution or a Denial of Service condition. mit-krb5 - December 31, 2014 - December 31, 2014: 1 + 2014-12-31 + 2014-12-31: 1 516334 517936 519518 @@ -47,11 +47,11 @@ - CVE-2014-4341 - CVE-2014-4343 - CVE-2014-4345 - CVE-2014-5351 + CVE-2014-4341 + CVE-2014-4343 + CVE-2014-4345 + CVE-2014-5351 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-01.xml index 6fb19c2e92..1833b8c414 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-01.xml @@ -6,8 +6,8 @@ arbitrary code execution. mpg123 - February 06, 2015 - February 06, 2015: 1 + 2015-02-06 + 2015-02-06: 1 500262 remote @@ -44,12 +44,12 @@ - CVE-2014-9497 + CVE-2014-9497 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-02.xml index 873d4e0144..9cf280e6fb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-02.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - February 06, 2015 - February 06, 2015: 1 + 2015-02-06 + 2015-02-06: 1 536562 537378 537426 @@ -49,35 +49,35 @@ - CVE-2015-0301 - CVE-2015-0302 - CVE-2015-0303 - CVE-2015-0304 - CVE-2015-0305 - CVE-2015-0306 - CVE-2015-0307 - CVE-2015-0308 - CVE-2015-0309 - CVE-2015-0310 - CVE-2015-0311 - CVE-2015-0314 - CVE-2015-0315 - CVE-2015-0316 - CVE-2015-0317 - CVE-2015-0318 - CVE-2015-0319 - CVE-2015-0320 - CVE-2015-0321 - CVE-2015-0322 - CVE-2015-0323 - CVE-2015-0324 - CVE-2015-0325 - CVE-2015-0326 - CVE-2015-0327 - CVE-2015-0328 - CVE-2015-0329 - CVE-2015-0330 + CVE-2015-0301 + CVE-2015-0302 + CVE-2015-0303 + CVE-2015-0304 + CVE-2015-0305 + CVE-2015-0306 + CVE-2015-0307 + CVE-2015-0308 + CVE-2015-0309 + CVE-2015-0310 + CVE-2015-0311 + CVE-2015-0314 + CVE-2015-0315 + CVE-2015-0316 + CVE-2015-0317 + CVE-2015-0318 + CVE-2015-0319 + CVE-2015-0320 + CVE-2015-0321 + CVE-2015-0322 + CVE-2015-0323 + CVE-2015-0324 + CVE-2015-0325 + CVE-2015-0326 + CVE-2015-0327 + CVE-2015-0328 + CVE-2015-0329 + CVE-2015-0330 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-03.xml index af06cfe144..db0ee82514 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-03.xml @@ -7,8 +7,8 @@ denial of service condition. bind - February 07, 2015 - February 07, 2015: 1 + 2015-02-07 + 2015-02-07: 1 531998 remote @@ -43,14 +43,14 @@ - CVE-2014-3214 - CVE-2014-8500 - CVE-2014-8680 + CVE-2014-3214 + CVE-2014-8500 + CVE-2014-8680 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-04.xml index 1a400f1b63..c44424083e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-04.xml @@ -6,8 +6,8 @@ which may allow remote attackers to execute arbitrary code. mediawiki - February 07, 2015 - February 07, 2015: 1 + 2015-02-07 + 2015-02-07: 1 498064 499632 503012 @@ -70,40 +70,40 @@ - CVE-2013-6451 - CVE-2013-6452 - CVE-2013-6453 - CVE-2013-6454 - CVE-2013-6472 - CVE-2014-1610 - CVE-2014-2242 - CVE-2014-2243 - CVE-2014-2244 - CVE-2014-2665 - CVE-2014-2853 - CVE-2014-5241 - CVE-2014-5242 - CVE-2014-5243 - CVE-2014-7199 - CVE-2014-7295 - CVE-2014-9276 - CVE-2014-9277 - CVE-2014-9475 - CVE-2014-9476 - CVE-2014-9477 - CVE-2014-9478 - CVE-2014-9479 - CVE-2014-9480 - CVE-2014-9481 - CVE-2014-9487 - CVE-2014-9507 + CVE-2013-6451 + CVE-2013-6452 + CVE-2013-6453 + CVE-2013-6454 + CVE-2013-6472 + CVE-2014-1610 + CVE-2014-2242 + CVE-2014-2243 + CVE-2014-2244 + CVE-2014-2665 + CVE-2014-2853 + CVE-2014-5241 + CVE-2014-5242 + CVE-2014-5243 + CVE-2014-7199 + CVE-2014-7295 + CVE-2014-9276 + CVE-2014-9277 + CVE-2014-9475 + CVE-2014-9476 + CVE-2014-9477 + CVE-2014-9478 + CVE-2014-9479 + CVE-2014-9480 + CVE-2014-9481 + CVE-2014-9487 + CVE-2014-9507 MediaWiki Security and Maintenance Releases: 1.19.17, 1.21.11, 1.22.8 and 1.23.1 - Zlogene - + Zlogene + sdamashek diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-05.xml index e5918c0127..7f7bc74f24 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-05.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. tcpdump - February 07, 2015 - February 07, 2015: 1 + 2015-02-07 + 2015-02-07: 1 534660 remote @@ -55,11 +55,11 @@ - CVE-2014-8767 - CVE-2014-8768 - CVE-2014-8769 - CVE-2014-9140 + CVE-2014-8767 + CVE-2014-8768 + CVE-2014-8769 + CVE-2014-9140 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-06.xml index bc10035f28..7d0eacb599 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-06.xml @@ -6,8 +6,8 @@ attackers to obtain sensitive information. nginx - February 07, 2015 - February 07, 2015: 1 + 2015-02-07 + 2015-02-07: 1 522994 remote @@ -42,8 +42,8 @@ - CVE-2014-3616 + CVE-2014-3616 - Zlogene - ackle + Zlogene + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-07.xml index 908273bf31..abbde33bbb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-07.xml @@ -6,8 +6,8 @@ execution of arbitrary code or Denial of Service. libevent - February 07, 2015 - February 07, 2015: 1 + 2015-02-07 + 2015-02-07: 1 535774 local, remote @@ -45,8 +45,8 @@ - CVE-2014-6272 + CVE-2014-6272 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-08.xml index 180df60064..e5432f6bcc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-08.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. libav - February 07, 2015 - February 07, 2015: 1 + 2015-02-07 + 2015-02-07: 1 492582 515234 531832 @@ -47,21 +47,21 @@ - CVE-2011-3934 - CVE-2011-3935 - CVE-2011-3946 - CVE-2013-0848 - CVE-2013-0851 - CVE-2013-0852 - CVE-2013-0860 - CVE-2013-0868 - CVE-2013-3672 - CVE-2013-3674 - CVE-2014-4609 + CVE-2011-3934 + CVE-2011-3935 + CVE-2011-3946 + CVE-2013-0848 + CVE-2013-0851 + CVE-2013-0852 + CVE-2013-0860 + CVE-2013-0868 + CVE-2013-3672 + CVE-2013-3674 + CVE-2014-4609 Libav News November 2, 2013 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-09.xml index d4d63b3aca..648bc78c9c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-09.xml @@ -6,8 +6,8 @@ execution of arbitrary code or Denial of Service. antiword - February 07, 2015 - February 07, 2015: 1 + 2015-02-07 + 2015-02-07: 1 531404 remote @@ -40,8 +40,8 @@ - CVE-2014-8123 + CVE-2014-8123 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-10.xml index 0ed4ed4a83..843be6759c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-10.xml @@ -6,8 +6,8 @@ in execution of arbitrary code. libpng - February 15, 2015 - January 03, 2017: 3 + 2015-02-15 + 2017-01-03: 3 531264 533358 local, remote @@ -62,13 +62,13 @@ - CVE-2014-9495 + CVE-2014-9495 libpng 1.6.15 Release Notes - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-11.xml index 54b1202262..42c687d583 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-11.xml @@ -6,8 +6,8 @@ could result in execution of arbitrary code. cpio - February 15, 2015 - February 15, 2015: 1 + 2015-02-15 + 2015-02-15: 1 530512 536010 remote @@ -51,9 +51,9 @@ - CVE-2014-9112 - CVE-2015-1197 + CVE-2014-9112 + CVE-2015-1197 - ackle - ackle + ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-12.xml index 82dc636f45..513a490890 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-12.xml @@ -7,8 +7,8 @@ execution of arbitrary code. oracle jre, oracle jdk - February 15, 2015 - February 15, 2015: 1 + 2015-02-15 + 2015-02-15: 1 507798 508716 517220 @@ -73,90 +73,90 @@ - CVE-2014-0429 - CVE-2014-0432 - CVE-2014-0446 - CVE-2014-0448 - CVE-2014-0449 - CVE-2014-0451 - CVE-2014-0452 - CVE-2014-0453 - CVE-2014-0454 - CVE-2014-0455 - CVE-2014-0456 - CVE-2014-0457 - CVE-2014-0458 - CVE-2014-0459 - CVE-2014-0460 - CVE-2014-0461 - CVE-2014-0463 - CVE-2014-0464 - CVE-2014-2397 - CVE-2014-2398 - CVE-2014-2401 - CVE-2014-2402 - CVE-2014-2403 - CVE-2014-2409 - CVE-2014-2410 - CVE-2014-2412 - CVE-2014-2413 - CVE-2014-2414 - CVE-2014-2420 - CVE-2014-2421 - CVE-2014-2422 - CVE-2014-2423 - CVE-2014-2427 - CVE-2014-2428 - CVE-2014-2483 - CVE-2014-2490 - CVE-2014-4208 - CVE-2014-4209 - CVE-2014-4216 - CVE-2014-4218 - CVE-2014-4219 - CVE-2014-4220 - CVE-2014-4221 - CVE-2014-4223 - CVE-2014-4227 - CVE-2014-4244 - CVE-2014-4247 - CVE-2014-4252 - CVE-2014-4262 - CVE-2014-4263 - CVE-2014-4264 - CVE-2014-4265 - CVE-2014-4266 - CVE-2014-4268 - CVE-2014-4288 - CVE-2014-6456 - CVE-2014-6457 - CVE-2014-6458 - CVE-2014-6466 - CVE-2014-6468 - CVE-2014-6476 - CVE-2014-6485 - CVE-2014-6492 - CVE-2014-6493 - CVE-2014-6502 - CVE-2014-6503 - CVE-2014-6504 - CVE-2014-6506 - CVE-2014-6511 - CVE-2014-6512 - CVE-2014-6513 - CVE-2014-6515 - CVE-2014-6517 - CVE-2014-6519 - CVE-2014-6527 - CVE-2014-6531 - CVE-2014-6532 - CVE-2014-6558 - CVE-2014-6562 + CVE-2014-0429 + CVE-2014-0432 + CVE-2014-0446 + CVE-2014-0448 + CVE-2014-0449 + CVE-2014-0451 + CVE-2014-0452 + CVE-2014-0453 + CVE-2014-0454 + CVE-2014-0455 + CVE-2014-0456 + CVE-2014-0457 + CVE-2014-0458 + CVE-2014-0459 + CVE-2014-0460 + CVE-2014-0461 + CVE-2014-0463 + CVE-2014-0464 + CVE-2014-2397 + CVE-2014-2398 + CVE-2014-2401 + CVE-2014-2402 + CVE-2014-2403 + CVE-2014-2409 + CVE-2014-2410 + CVE-2014-2412 + CVE-2014-2413 + CVE-2014-2414 + CVE-2014-2420 + CVE-2014-2421 + CVE-2014-2422 + CVE-2014-2423 + CVE-2014-2427 + CVE-2014-2428 + CVE-2014-2483 + CVE-2014-2490 + CVE-2014-4208 + CVE-2014-4209 + CVE-2014-4216 + CVE-2014-4218 + CVE-2014-4219 + CVE-2014-4220 + CVE-2014-4221 + CVE-2014-4223 + CVE-2014-4227 + CVE-2014-4244 + CVE-2014-4247 + CVE-2014-4252 + CVE-2014-4262 + CVE-2014-4263 + CVE-2014-4264 + CVE-2014-4265 + CVE-2014-4266 + CVE-2014-4268 + CVE-2014-4288 + CVE-2014-6456 + CVE-2014-6457 + CVE-2014-6458 + CVE-2014-6466 + CVE-2014-6468 + CVE-2014-6476 + CVE-2014-6485 + CVE-2014-6492 + CVE-2014-6493 + CVE-2014-6502 + CVE-2014-6503 + CVE-2014-6504 + CVE-2014-6506 + CVE-2014-6511 + CVE-2014-6512 + CVE-2014-6513 + CVE-2014-6515 + CVE-2014-6517 + CVE-2014-6519 + CVE-2014-6527 + CVE-2014-6531 + CVE-2014-6532 + CVE-2014-6558 + CVE-2014-6562 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-13.xml index 6d140932b6..2196b07f7f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-13.xml @@ -7,8 +7,8 @@ escalated privileges. chromium - February 17, 2015 - February 17, 2015: 1 + 2015-02-17 + 2015-02-17: 1 537366 539094 remote @@ -45,47 +45,47 @@ - CVE-2014-7923 - CVE-2014-7924 - CVE-2014-7925 - CVE-2014-7926 - CVE-2014-7927 - CVE-2014-7928 - CVE-2014-7929 - CVE-2014-7930 - CVE-2014-7931 - CVE-2014-7932 - CVE-2014-7933 - CVE-2014-7934 - CVE-2014-7935 - CVE-2014-7936 - CVE-2014-7937 - CVE-2014-7938 - CVE-2014-7939 - CVE-2014-7940 - CVE-2014-7941 - CVE-2014-7942 - CVE-2014-7943 - CVE-2014-7944 - CVE-2014-7945 - CVE-2014-7946 - CVE-2014-7947 - CVE-2014-7948 - CVE-2014-9646 - CVE-2014-9647 - CVE-2014-9648 - CVE-2015-1205 - CVE-2015-1209 - CVE-2015-1210 - CVE-2015-1211 - CVE-2015-1212 - CVE-2015-1346 - CVE-2015-1359 - CVE-2015-1360 - CVE-2015-1361 + CVE-2014-7923 + CVE-2014-7924 + CVE-2014-7925 + CVE-2014-7926 + CVE-2014-7927 + CVE-2014-7928 + CVE-2014-7929 + CVE-2014-7930 + CVE-2014-7931 + CVE-2014-7932 + CVE-2014-7933 + CVE-2014-7934 + CVE-2014-7935 + CVE-2014-7936 + CVE-2014-7937 + CVE-2014-7938 + CVE-2014-7939 + CVE-2014-7940 + CVE-2014-7941 + CVE-2014-7942 + CVE-2014-7943 + CVE-2014-7944 + CVE-2014-7945 + CVE-2014-7946 + CVE-2014-7947 + CVE-2014-7948 + CVE-2014-9646 + CVE-2014-9647 + CVE-2014-9648 + CVE-2015-1205 + CVE-2015-1209 + CVE-2015-1210 + CVE-2015-1211 + CVE-2015-1212 + CVE-2015-1346 + CVE-2015-1359 + CVE-2015-1360 + CVE-2015-1361 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-14.xml index b268af8c78..621548929b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-14.xml @@ -4,8 +4,8 @@ grep: Denial of Service A vulnerability in grep could result in Denial of Service. grep,dos - February 25, 2015 - February 25, 2015: 1 + 2015-02-25 + 2015-02-25: 1 537046 local @@ -38,10 +38,10 @@ - CVE-2015-1345 + CVE-2015-1345 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-15.xml index dd57e80f99..f65dd09c3c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-15.xml @@ -7,8 +7,8 @@ restrictions, cause a Denial of Service or execute arbitrary code. samba - February 25, 2015 - February 25, 2015: 1 + 2015-02-25 + 2015-02-25: 1 479868 491070 493664 @@ -49,20 +49,20 @@ - CVE-2012-6150 - CVE-2013-4124 - CVE-2013-4408 - CVE-2013-4475 - CVE-2013-4476 - CVE-2013-4496 - CVE-2014-0178 - CVE-2014-0239 - CVE-2014-0244 - CVE-2014-3493 - CVE-2015-0240 + CVE-2012-6150 + CVE-2013-4124 + CVE-2013-4408 + CVE-2013-4475 + CVE-2013-4476 + CVE-2013-4496 + CVE-2014-0178 + CVE-2014-0239 + CVE-2014-0244 + CVE-2014-3493 + CVE-2015-0240 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-01.xml index a52da44a28..bb4fcc4ca2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-01.xml @@ -6,8 +6,8 @@ which could could allow an attacker to execute arbitrary code. jasper - March 06, 2015 - March 06, 2015: 1 + 2015-03-06 + 2015-03-06: 1 531688 533744 537530 @@ -46,12 +46,12 @@ - CVE-2014-8137 - CVE-2014-8138 - CVE-2014-8157 - CVE-2014-8158 - CVE-2014-9029 + CVE-2014-8137 + CVE-2014-8138 + CVE-2014-8157 + CVE-2014-8158 + CVE-2014-9029 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-02.xml index 61eb02b425..9133e2b9f0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-02.xml @@ -6,8 +6,8 @@ local Denial of Service. dbus - March 07, 2015 - March 07, 2015: 1 + 2015-03-07 + 2015-03-07: 1 539482 local @@ -40,10 +40,10 @@ - CVE-2015-0245 + CVE-2015-0245 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-03.xml index bb2b2e6755..e527a11bb4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-03.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to remote execution of arbitrary code. - - March 08, 2015 - August 22, 2015: 2 + + 2015-03-08 + 2015-08-22: 2 530820 532914 533998 @@ -68,15 +68,15 @@

- CVE-2014-3710 - CVE-2014-8142 - CVE-2014-9425 - CVE-2014-9427 - CVE-2015-0231 - CVE-2015-0232 + CVE-2014-3710 + CVE-2014-8142 + CVE-2014-9425 + CVE-2014-9427 + CVE-2015-0231 + CVE-2015-0232 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-04.xml index 1c1d0c557c..59ecc437d2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-04.xml @@ -7,8 +7,8 @@ a Denial of Service . glibc - March 08, 2015 - March 08, 2015: 1 + 2015-03-08 + 2015-03-08: 1 431218 434408 454862 @@ -57,27 +57,27 @@ - CVE-2012-3404 - CVE-2012-3405 - CVE-2012-3406 - CVE-2012-3480 - CVE-2012-4412 - CVE-2012-4424 - CVE-2012-6656 - CVE-2013-0242 - CVE-2013-1914 - CVE-2013-2207 - CVE-2013-4237 - CVE-2013-4332 - CVE-2013-4458 - CVE-2013-4788 - CVE-2014-4043 - CVE-2015-0235 + CVE-2012-3404 + CVE-2012-3405 + CVE-2012-3406 + CVE-2012-3480 + CVE-2012-4412 + CVE-2012-4424 + CVE-2012-6656 + CVE-2013-0242 + CVE-2013-1914 + CVE-2013-2207 + CVE-2013-4237 + CVE-2013-4332 + CVE-2013-4458 + CVE-2013-4788 + CVE-2014-4043 + CVE-2015-0235 - + BlueKnight - + creffett diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-05.xml index bb3443d2fc..2c030d7066 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-05.xml @@ -6,8 +6,8 @@ resulting in Denial of Service. freetype - March 08, 2015 - March 08, 2015: 1 + 2015-03-08 + 2015-03-08: 1 532152 539796 remote @@ -41,29 +41,29 @@ - CVE-2014-9656 - CVE-2014-9657 - CVE-2014-9658 - CVE-2014-9659 - CVE-2014-9660 - CVE-2014-9661 - CVE-2014-9662 - CVE-2014-9663 - CVE-2014-9664 - CVE-2014-9665 - CVE-2014-9666 - CVE-2014-9667 - CVE-2014-9668 - CVE-2014-9669 - CVE-2014-9670 - CVE-2014-9671 - CVE-2014-9672 - CVE-2014-9673 - CVE-2014-9674 - CVE-2014-9675 + CVE-2014-9656 + CVE-2014-9657 + CVE-2014-9658 + CVE-2014-9659 + CVE-2014-9660 + CVE-2014-9661 + CVE-2014-9662 + CVE-2014-9663 + CVE-2014-9664 + CVE-2014-9665 + CVE-2014-9666 + CVE-2014-9667 + CVE-2014-9668 + CVE-2014-9669 + CVE-2014-9670 + CVE-2014-9671 + CVE-2014-9672 + CVE-2014-9673 + CVE-2014-9674 + CVE-2014-9675 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-06.xml index be076ed6ed..6703fa28e4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-06.xml @@ -6,8 +6,8 @@ in Denial of Service. icu - March 14, 2015 - March 14, 2015: 1 + 2015-03-14 + 2015-03-14: 1 537560 539108 remote @@ -43,13 +43,13 @@ - CVE-2014-7923 - CVE-2014-7926 - CVE-2014-7940 - CVE-2014-9654 + CVE-2014-7923 + CVE-2014-7926 + CVE-2014-7940 + CVE-2014-9654 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-07.xml index 4214e35f1c..8ebb9e2968 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-07.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. hivex - March 14, 2015 - March 14, 2015: 1 + 2015-03-14 + 2015-03-14: 1 490990 local, remote @@ -45,10 +45,10 @@ - CVE-2014-9273 + CVE-2014-9273 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-08.xml index 5d2ece8cea..67a1de6b2f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-08.xml @@ -6,8 +6,8 @@ create a Denial of Service condition. file,Dos - March 16, 2015 - March 16, 2015: 1 + 2015-03-16 + 2015-03-16: 1 503582 532768 local, remote @@ -43,12 +43,12 @@ - CVE-2014-2270 - CVE-2014-9620 - CVE-2014-9621 + CVE-2014-2270 + CVE-2014-9620 + CVE-2014-9621 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-09.xml index e485df5d26..564336c21b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-09.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. flash,ACE,DoS - March 16, 2015 - March 16, 2015: 1 + 2015-03-16 + 2015-03-16: 1 543112 remote @@ -46,18 +46,18 @@ - CVE-2015-0332 - CVE-2015-0333 - CVE-2015-0334 - CVE-2015-0335 - CVE-2015-0336 - CVE-2015-0337 - CVE-2015-0338 - CVE-2015-0339 - CVE-2015-0340 - CVE-2015-0341 - CVE-2015-0342 + CVE-2015-0332 + CVE-2015-0333 + CVE-2015-0334 + CVE-2015-0335 + CVE-2015-0336 + CVE-2015-0337 + CVE-2015-0338 + CVE-2015-0339 + CVE-2015-0340 + CVE-2015-0341 + CVE-2015-0342 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-10.xml index d37ba8281c..843b180618 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-10.xml @@ -6,8 +6,8 @@ which could lead to arbitrary code execution. python - March 18, 2015 - June 17, 2015: 2 + 2015-03-18 + 2015-06-17: 2 495224 500518 505068 @@ -63,16 +63,16 @@ - CVE-2013-1752 - CVE-2013-7338 - CVE-2014-1912 - CVE-2014-2667 - CVE-2014-4616 - CVE-2014-7185 - CVE-2014-9365 + CVE-2013-1752 + CVE-2013-7338 + CVE-2014-1912 + CVE-2014-2667 + CVE-2014-4616 + CVE-2014-7185 + CVE-2014-9365 - K_F - + K_F + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-11.xml index 676e30f5ec..8c888d6869 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-11.xml @@ -6,8 +6,8 @@ in either Denial of Service or information disclosure. openssl - March 19, 2015 - June 06, 2015: 2 + 2015-03-19 + 2015-06-06: 2 543552 remote @@ -94,23 +94,23 @@

- CVE-2015-0204 - CVE-2015-0207 - CVE-2015-0208 - CVE-2015-0209 - CVE-2015-0285 - CVE-2015-0287 - CVE-2015-0288 - CVE-2015-0289 - CVE-2015-0290 - CVE-2015-0291 - CVE-2015-0292 - CVE-2015-0293 - CVE-2015-1787 - OpenSSL Security + CVE-2015-0204 + CVE-2015-0207 + CVE-2015-0208 + CVE-2015-0209 + CVE-2015-0285 + CVE-2015-0287 + CVE-2015-0288 + CVE-2015-0289 + CVE-2015-0290 + CVE-2015-0291 + CVE-2015-0292 + CVE-2015-0293 + CVE-2015-1787 + OpenSSL Security Advisory [19 Mar 2015] - a3li - K_F + a3li + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-12.xml index 663d347e4e..348b47a451 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-12.xml @@ -7,8 +7,8 @@ security restrictions. chromimu - March 22, 2015 - March 22, 2015: 1 + 2015-03-22 + 2015-03-22: 1 542090 remote @@ -44,27 +44,27 @@ - CVE-2015-1213 - CVE-2015-1214 - CVE-2015-1215 - CVE-2015-1216 - CVE-2015-1217 - CVE-2015-1218 - CVE-2015-1219 - CVE-2015-1220 - CVE-2015-1221 - CVE-2015-1222 - CVE-2015-1223 - CVE-2015-1224 - CVE-2015-1225 - CVE-2015-1226 - CVE-2015-1227 - CVE-2015-1228 - CVE-2015-1229 - CVE-2015-1230 - CVE-2015-1231 - CVE-2015-1232 + CVE-2015-1213 + CVE-2015-1214 + CVE-2015-1215 + CVE-2015-1216 + CVE-2015-1217 + CVE-2015-1218 + CVE-2015-1219 + CVE-2015-1220 + CVE-2015-1221 + CVE-2015-1222 + CVE-2015-1223 + CVE-2015-1224 + CVE-2015-1225 + CVE-2015-1226 + CVE-2015-1227 + CVE-2015-1228 + CVE-2015-1229 + CVE-2015-1230 + CVE-2015-1231 + CVE-2015-1232 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-13.xml index 7602aa6218..a63167e30d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201503-13.xml @@ -7,8 +7,8 @@ arbitrary files, or cause a Denial of Service condition. busybox - March 29, 2015 - March 29, 2015: 1 + 2015-03-29 + 2015-03-29: 1 515254 537978 local, remote @@ -48,11 +48,11 @@ - CVE-2014-4607 - CVE-2014-9645 + CVE-2014-4607 + CVE-2014-9645 - K_F - + K_F + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-01.xml index 0373a7abe6..7b5e6a6b81 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-01.xml @@ -7,8 +7,8 @@ execution of arbitrary code. firefox thunderbird seamonkey - April 07, 2015 - April 08, 2015: 2 + 2015-04-07 + 2015-04-08: 2 489796 491234 493850 @@ -135,171 +135,170 @@ - CVE-2013-1741 - CVE-2013-2566 - CVE-2013-5590 - CVE-2013-5591 - CVE-2013-5592 - CVE-2013-5593 - CVE-2013-5595 - CVE-2013-5596 - CVE-2013-5597 - CVE-2013-5598 - CVE-2013-5599 - CVE-2013-5600 - CVE-2013-5601 - CVE-2013-5602 - CVE-2013-5603 - CVE-2013-5604 - CVE-2013-5605 - CVE-2013-5606 - CVE-2013-5607 - CVE-2013-5609 - CVE-2013-5610 - CVE-2013-5612 - CVE-2013-5613 - CVE-2013-5614 - CVE-2013-5615 - CVE-2013-5616 - CVE-2013-5618 - CVE-2013-5619 - CVE-2013-6671 - CVE-2013-6672 - CVE-2013-6673 - CVE-2014-1477 - CVE-2014-1478 - CVE-2014-1479 - CVE-2014-1480 - CVE-2014-1481 - CVE-2014-1482 - CVE-2014-1483 - CVE-2014-1485 - CVE-2014-1486 - CVE-2014-1487 - CVE-2014-1488 - CVE-2014-1489 - CVE-2014-1490 - CVE-2014-1491 - CVE-2014-1492 - CVE-2014-1493 - CVE-2014-1494 - CVE-2014-1496 - CVE-2014-1497 - CVE-2014-1498 - CVE-2014-1499 - CVE-2014-1500 - CVE-2014-1502 - CVE-2014-1504 - CVE-2014-1505 - CVE-2014-1508 - CVE-2014-1509 - CVE-2014-1510 - CVE-2014-1511 - CVE-2014-1512 - CVE-2014-1513 - CVE-2014-1514 - CVE-2014-1518 - CVE-2014-1519 - CVE-2014-1520 - CVE-2014-1522 - CVE-2014-1523 - CVE-2014-1524 - CVE-2014-1525 - CVE-2014-1526 - CVE-2014-1529 - CVE-2014-1530 - CVE-2014-1531 - CVE-2014-1532 - CVE-2014-1533 - CVE-2014-1534 - CVE-2014-1536 - CVE-2014-1537 - CVE-2014-1538 - CVE-2014-1539 - CVE-2014-1540 - CVE-2014-1541 - CVE-2014-1542 - CVE-2014-1543 - CVE-2014-1544 - CVE-2014-1545 - CVE-2014-1547 - CVE-2014-1548 - CVE-2014-1549 - CVE-2014-1550 - CVE-2014-1551 - CVE-2014-1552 - CVE-2014-1553 - CVE-2014-1554 - CVE-2014-1555 - CVE-2014-1556 - CVE-2014-1557 - CVE-2014-1558 - CVE-2014-1559 - CVE-2014-1560 - CVE-2014-1561 - CVE-2014-1562 - CVE-2014-1563 - CVE-2014-1564 - CVE-2014-1565 - CVE-2014-1566 - CVE-2014-1567 - CVE-2014-1568 - CVE-2014-1574 - CVE-2014-1575 - CVE-2014-1576 - CVE-2014-1577 - CVE-2014-1578 - CVE-2014-1580 - CVE-2014-1581 - CVE-2014-1582 - CVE-2014-1583 - CVE-2014-1584 - CVE-2014-1585 - CVE-2014-1586 - CVE-2014-1587 - CVE-2014-1588 - CVE-2014-1589 - CVE-2014-1590 - CVE-2014-1591 - CVE-2014-1592 - CVE-2014-1593 - CVE-2014-1594 - CVE-2014-5369 - CVE-2014-8631 - CVE-2014-8632 - CVE-2014-8634 - CVE-2014-8635 - CVE-2014-8636 - CVE-2014-8637 - CVE-2014-8638 - CVE-2014-8639 - CVE-2014-8640 - CVE-2014-8641 - CVE-2014-8642 - CVE-2015-0817 - CVE-2015-0818 - CVE-2015-0819 - CVE-2015-0820 - CVE-2015-0821 - CVE-2015-0822 - CVE-2015-0823 - CVE-2015-0824 - CVE-2015-0825 - CVE-2015-0826 - CVE-2015-0827 - CVE-2015-0828 - CVE-2015-0829 - CVE-2015-0830 - CVE-2015-0831 - CVE-2015-0832 - CVE-2015-0833 - CVE-2015-0834 - CVE-2015-0835 - CVE-2015-0836 + CVE-2013-1741 + CVE-2013-2566 + CVE-2013-5590 + CVE-2013-5591 + CVE-2013-5592 + CVE-2013-5593 + CVE-2013-5595 + CVE-2013-5596 + CVE-2013-5597 + CVE-2013-5598 + CVE-2013-5599 + CVE-2013-5600 + CVE-2013-5601 + CVE-2013-5602 + CVE-2013-5603 + CVE-2013-5604 + CVE-2013-5605 + CVE-2013-5606 + CVE-2013-5607 + CVE-2013-5609 + CVE-2013-5610 + CVE-2013-5612 + CVE-2013-5613 + CVE-2013-5614 + CVE-2013-5615 + CVE-2013-5616 + CVE-2013-5618 + CVE-2013-5619 + CVE-2013-6671 + CVE-2013-6672 + CVE-2013-6673 + CVE-2014-1477 + CVE-2014-1478 + CVE-2014-1479 + CVE-2014-1480 + CVE-2014-1481 + CVE-2014-1482 + CVE-2014-1483 + CVE-2014-1485 + CVE-2014-1486 + CVE-2014-1487 + CVE-2014-1488 + CVE-2014-1489 + CVE-2014-1490 + CVE-2014-1491 + CVE-2014-1492 + CVE-2014-1493 + CVE-2014-1494 + CVE-2014-1496 + CVE-2014-1497 + CVE-2014-1498 + CVE-2014-1499 + CVE-2014-1500 + CVE-2014-1502 + CVE-2014-1504 + CVE-2014-1505 + CVE-2014-1508 + CVE-2014-1509 + CVE-2014-1510 + CVE-2014-1511 + CVE-2014-1512 + CVE-2014-1513 + CVE-2014-1514 + CVE-2014-1518 + CVE-2014-1519 + CVE-2014-1520 + CVE-2014-1522 + CVE-2014-1523 + CVE-2014-1524 + CVE-2014-1525 + CVE-2014-1526 + CVE-2014-1529 + CVE-2014-1530 + CVE-2014-1531 + CVE-2014-1532 + CVE-2014-1533 + CVE-2014-1534 + CVE-2014-1536 + CVE-2014-1537 + CVE-2014-1538 + CVE-2014-1539 + CVE-2014-1540 + CVE-2014-1541 + CVE-2014-1542 + CVE-2014-1543 + CVE-2014-1544 + CVE-2014-1545 + CVE-2014-1547 + CVE-2014-1548 + CVE-2014-1549 + CVE-2014-1550 + CVE-2014-1551 + CVE-2014-1552 + CVE-2014-1553 + CVE-2014-1554 + CVE-2014-1555 + CVE-2014-1556 + CVE-2014-1557 + CVE-2014-1558 + CVE-2014-1559 + CVE-2014-1560 + CVE-2014-1561 + CVE-2014-1562 + CVE-2014-1563 + CVE-2014-1564 + CVE-2014-1565 + CVE-2014-1566 + CVE-2014-1567 + CVE-2014-1568 + CVE-2014-1574 + CVE-2014-1575 + CVE-2014-1576 + CVE-2014-1577 + CVE-2014-1578 + CVE-2014-1580 + CVE-2014-1581 + CVE-2014-1582 + CVE-2014-1583 + CVE-2014-1584 + CVE-2014-1585 + CVE-2014-1586 + CVE-2014-1587 + CVE-2014-1588 + CVE-2014-1589 + CVE-2014-1590 + CVE-2014-1591 + CVE-2014-1592 + CVE-2014-1593 + CVE-2014-1594 + CVE-2014-5369 + CVE-2014-8631 + CVE-2014-8632 + CVE-2014-8634 + CVE-2014-8635 + CVE-2014-8636 + CVE-2014-8637 + CVE-2014-8638 + CVE-2014-8639 + CVE-2014-8640 + CVE-2014-8641 + CVE-2014-8642 + CVE-2015-0817 + CVE-2015-0818 + CVE-2015-0819 + CVE-2015-0820 + CVE-2015-0821 + CVE-2015-0822 + CVE-2015-0823 + CVE-2015-0824 + CVE-2015-0825 + CVE-2015-0826 + CVE-2015-0827 + CVE-2015-0828 + CVE-2015-0829 + CVE-2015-0830 + CVE-2015-0831 + CVE-2015-0832 + CVE-2015-0833 + CVE-2015-0834 + CVE-2015-0835 + CVE-2015-0836 - + BlueKnight - ackle + ackle - diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-02.xml index efce2169cb..32fdd4a46a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-02.xml @@ -6,8 +6,8 @@ arbitrary files or bypass security restrictions. sudo - April 11, 2015 - April 11, 2015: 1 + 2015-04-11 + 2015-04-11: 1 539532 local @@ -42,8 +42,8 @@ - CVE-2014-9680 + CVE-2014-9680 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-03.xml index 9024130b22..b70cb21789 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-03.xml @@ -6,8 +6,8 @@ worst of which could lead to arbitrary code execution. apache - April 11, 2015 - April 19, 2015: 2 + 2015-04-11 + 2015-04-19: 2 535948 remote @@ -44,15 +44,15 @@ - CVE-2013-5704 - CVE-2014-0118 - CVE-2014-0226 - CVE-2014-0231 + CVE-2013-5704 + CVE-2014-0118 + CVE-2014-0226 + CVE-2014-0231 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-04.xml index 6439afb7e3..8b41616362 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-04.xml @@ -6,8 +6,8 @@ can allow remote attackers to cause a Denial of Service condition. xen - April 11, 2015 - April 11, 2015: 1 + 2015-04-11 + 2015-04-11: 1 478280 482138 512294 @@ -59,31 +59,31 @@ - CVE-2013-2212 - CVE-2013-3495 - CVE-2014-3967 - CVE-2014-3968 - CVE-2014-5146 - CVE-2014-5149 - CVE-2014-8594 - CVE-2014-8595 - CVE-2014-8866 - CVE-2014-8867 - CVE-2014-9030 - CVE-2014-9065 - CVE-2014-9066 - CVE-2015-0361 - CVE-2015-2044 - CVE-2015-2045 - CVE-2015-2152 - CVE-2015-2751 - CVE-2015-2752 - CVE-2015-2756 + CVE-2013-2212 + CVE-2013-3495 + CVE-2014-3967 + CVE-2014-3968 + CVE-2014-5146 + CVE-2014-5149 + CVE-2014-8594 + CVE-2014-8595 + CVE-2014-8866 + CVE-2014-8867 + CVE-2014-9030 + CVE-2014-9065 + CVE-2014-9066 + CVE-2015-0361 + CVE-2015-2044 + CVE-2015-2045 + CVE-2015-2152 + CVE-2015-2751 + CVE-2015-2752 + CVE-2015-2756 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-05.xml index 538c65d03c..de1d07ec03 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-05.xml @@ -7,8 +7,8 @@ condition. mysql mariadb - April 11, 2015 - April 11, 2015: 1 + 2015-04-11 + 2015-04-11: 1 537216 537262 remote @@ -58,20 +58,20 @@ - CVE-2014-6568 - CVE-2015-0374 - CVE-2015-0381 - CVE-2015-0382 - CVE-2015-0385 - CVE-2015-0391 - CVE-2015-0409 - CVE-2015-0411 - CVE-2015-0432 + CVE-2014-6568 + CVE-2015-0374 + CVE-2015-0381 + CVE-2015-0382 + CVE-2015-0385 + CVE-2015-0391 + CVE-2015-0409 + CVE-2015-0411 + CVE-2015-0432 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-06.xml index 60dfb6e1dd..7c5681919c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-06.xml @@ -7,8 +7,8 @@ condition. xorg-server - April 17, 2015 - April 17, 2015: 2 + 2015-04-17 + 2015-04-17: 2 532086 539692 remote @@ -46,23 +46,23 @@ - CVE-2014-8091 - CVE-2014-8092 - CVE-2014-8093 - CVE-2014-8094 - CVE-2014-8095 - CVE-2014-8096 - CVE-2014-8097 - CVE-2014-8098 - CVE-2014-8099 - CVE-2014-8100 - CVE-2014-8101 - CVE-2014-8102 - CVE-2014-8103 - CVE-2015-0255 + CVE-2014-8091 + CVE-2014-8092 + CVE-2014-8093 + CVE-2014-8094 + CVE-2014-8095 + CVE-2014-8096 + CVE-2014-8097 + CVE-2014-8098 + CVE-2014-8099 + CVE-2014-8100 + CVE-2014-8101 + CVE-2014-8102 + CVE-2014-8103 + CVE-2015-0255 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-07.xml index ae46af1cc8..1c6d442735 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201504-07.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - April 17, 2015 - April 17, 2015: 1 + 2015-04-17 + 2015-04-17: 1 546706 remote @@ -45,29 +45,29 @@ - CVE-2015-0346 - CVE-2015-0347 - CVE-2015-0348 - CVE-2015-0349 - CVE-2015-0350 - CVE-2015-0351 - CVE-2015-0352 - CVE-2015-0353 - CVE-2015-0354 - CVE-2015-0355 - CVE-2015-0356 - CVE-2015-0357 - CVE-2015-0358 - CVE-2015-0359 - CVE-2015-0360 - CVE-2015-3038 - CVE-2015-3039 - CVE-2015-3040 - CVE-2015-3041 - CVE-2015-3042 - CVE-2015-3043 - CVE-2015-3044 + CVE-2015-0346 + CVE-2015-0347 + CVE-2015-0348 + CVE-2015-0349 + CVE-2015-0350 + CVE-2015-0351 + CVE-2015-0352 + CVE-2015-0353 + CVE-2015-0354 + CVE-2015-0355 + CVE-2015-0356 + CVE-2015-0357 + CVE-2015-0358 + CVE-2015-0359 + CVE-2015-0360 + CVE-2015-3038 + CVE-2015-3039 + CVE-2015-3040 + CVE-2015-3041 + CVE-2015-3042 + CVE-2015-3043 + CVE-2015-3044 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-01.xml index 39ca97310d..63198bec4c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-01.xml @@ -6,8 +6,8 @@ which allows remote attackers to execute arbitrary code. ettercap - May 13, 2015 - May 13, 2015: 1 + 2015-05-13 + 2015-05-13: 1 532764 remote @@ -42,17 +42,17 @@ - CVE-2014-6395 - CVE-2014-6396 - CVE-2014-9376 - CVE-2014-9377 - CVE-2014-9378 - CVE-2014-9379 - CVE-2014-9380 - CVE-2014-9381 + CVE-2014-6395 + CVE-2014-6396 + CVE-2014-9376 + CVE-2014-9377 + CVE-2014-9378 + CVE-2014-9379 + CVE-2014-9380 + CVE-2014-9381 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-02.xml index 7e1d698a88..f70cdee0aa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-02.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - May 31, 2015 - May 31, 2015: 1 + 2015-05-31 + 2015-05-31: 1 549388 remote @@ -46,25 +46,25 @@ - CVE-2015-3044 - CVE-2015-3077 - CVE-2015-3078 - CVE-2015-3079 - CVE-2015-3080 - CVE-2015-3081 - CVE-2015-3082 - CVE-2015-3083 - CVE-2015-3084 - CVE-2015-3085 - CVE-2015-3086 - CVE-2015-3087 - CVE-2015-3088 - CVE-2015-3089 - CVE-2015-3090 - CVE-2015-3091 - CVE-2015-3092 - CVE-2015-3093 + CVE-2015-3044 + CVE-2015-3077 + CVE-2015-3078 + CVE-2015-3079 + CVE-2015-3080 + CVE-2015-3081 + CVE-2015-3082 + CVE-2015-3083 + CVE-2015-3084 + CVE-2015-3085 + CVE-2015-3086 + CVE-2015-3087 + CVE-2015-3088 + CVE-2015-3089 + CVE-2015-3090 + CVE-2015-3091 + CVE-2015-3092 + CVE-2015-3093 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-03.xml index e06a9e460f..50b406c238 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201505-03.xml @@ -6,8 +6,8 @@ of which could lead to arbitrary code execution. phpMyAdmin - May 31, 2015 - May 14, 2016: 2 + 2015-05-31 + 2016-05-14: 2 517858 522844 530054 @@ -65,16 +65,16 @@ - CVE-2014-4986 - CVE-2014-4987 - CVE-2014-6300 - CVE-2014-8958 - CVE-2014-8959 - CVE-2014-8960 - CVE-2014-8961 + CVE-2014-4986 + CVE-2014-4987 + CVE-2014-6300 + CVE-2014-8958 + CVE-2014-8959 + CVE-2014-8960 + CVE-2014-8961 - K_F - + K_F + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-01.xml index ed466e889b..5b2fbfd53e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-01.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. - - June 21, 2015 - June 21, 2015: 1 + + 2015-06-21 + 2015-06-21: 1 551658 remote @@ -46,23 +46,23 @@ - CVE-2015-3096 - CVE-2015-3097 - CVE-2015-3098 - CVE-2015-3099 - CVE-2015-3100 - CVE-2015-3101 - CVE-2015-3102 - CVE-2015-3103 - CVE-2015-3104 - CVE-2015-3105 - CVE-2015-3106 - CVE-2015-3107 - CVE-2015-3108 - CVE-2015-4472 + CVE-2015-3096 + CVE-2015-3097 + CVE-2015-3098 + CVE-2015-3099 + CVE-2015-3100 + CVE-2015-3101 + CVE-2015-3102 + CVE-2015-3103 + CVE-2015-3104 + CVE-2015-3105 + CVE-2015-3106 + CVE-2015-3107 + CVE-2015-3108 + CVE-2015-4472 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-02.xml index a3cd389e0d..9dc01f8251 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-02.xml @@ -6,8 +6,8 @@ in either Denial of Service or information disclosure. dos - June 22, 2015 - February 26, 2016: 2 + 2015-06-22 + 2016-02-26: 2 551832 remote @@ -61,14 +61,14 @@ - CVE-2014-8176 - CVE-2015-1788 - CVE-2015-1789 - CVE-2015-1790 - CVE-2015-1791 - CVE-2015-1792 - CVE-2015-4000 + CVE-2014-8176 + CVE-2015-1788 + CVE-2015-1789 + CVE-2015-1790 + CVE-2015-1791 + CVE-2015-1792 + CVE-2015-4000 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-03.xml index 2419378bef..eb65beca17 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-03.xml @@ -6,8 +6,8 @@ which can cause Denial of Service gnutls - June 22, 2015 - June 22, 2015: 1 + 2015-06-22 + 2015-06-22: 1 546760 548636 local, remote @@ -41,13 +41,13 @@ - CVE-2015-3308 - + CVE-2015-3308 + GNUTLS-SA-2015-2 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-04.xml index 58beb41088..3276535c8b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201506-04.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been fixed in Chromium, the worst of which can cause arbitrary remote code execution. - - June 23, 2015 - June 23, 2015: 1 + + 2015-06-23 + 2015-06-23: 1 545300 546728 548108 @@ -46,39 +46,39 @@ - CVE-2015-1233 - CVE-2015-1234 - CVE-2015-1235 - CVE-2015-1236 - CVE-2015-1237 - CVE-2015-1238 - CVE-2015-1240 - CVE-2015-1241 - CVE-2015-1242 - CVE-2015-1243 - CVE-2015-1244 - CVE-2015-1245 - CVE-2015-1246 - CVE-2015-1247 - CVE-2015-1248 - CVE-2015-1250 - CVE-2015-1251 - CVE-2015-1252 - CVE-2015-1253 - CVE-2015-1254 - CVE-2015-1255 - CVE-2015-1256 - CVE-2015-1257 - CVE-2015-1258 - CVE-2015-1259 - CVE-2015-1260 - CVE-2015-1262 - CVE-2015-1263 - CVE-2015-1264 - CVE-2015-1265 + CVE-2015-1233 + CVE-2015-1234 + CVE-2015-1235 + CVE-2015-1236 + CVE-2015-1237 + CVE-2015-1238 + CVE-2015-1240 + CVE-2015-1241 + CVE-2015-1242 + CVE-2015-1243 + CVE-2015-1244 + CVE-2015-1245 + CVE-2015-1246 + CVE-2015-1247 + CVE-2015-1248 + CVE-2015-1250 + CVE-2015-1251 + CVE-2015-1252 + CVE-2015-1253 + CVE-2015-1254 + CVE-2015-1255 + CVE-2015-1256 + CVE-2015-1257 + CVE-2015-1258 + CVE-2015-1259 + CVE-2015-1260 + CVE-2015-1262 + CVE-2015-1263 + CVE-2015-1264 + CVE-2015-1265 - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-01.xml index 2b6996a540..bf53393b43 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-01.xml @@ -6,8 +6,8 @@ which can cause arbitrary code execution. chrony - July 05, 2015 - July 05, 2015: 1 + 2015-07-05 + 2015-07-05: 1 545918 remote @@ -42,12 +42,12 @@ - CVE-2015-1821 - CVE-2015-1822 - CVE-2015-1853 + CVE-2015-1821 + CVE-2015-1822 + CVE-2015-1853 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-02.xml index 1c042d7141..d14ca08e65 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-02.xml @@ -6,8 +6,8 @@ allow remote attackers to cause a Denial of Service condition. tor - July 06, 2015 - July 06, 2015: 1 + 2015-07-06 + 2015-07-06: 1 545940 remote @@ -45,14 +45,14 @@ - CVE-2015-2928 - CVE-2015-2929 + CVE-2015-2928 + CVE-2015-2929 Upstream announcement - + keytoaster - stanley + stanley diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-03.xml index 1787063c09..3311d81b4b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-03.xml @@ -4,8 +4,8 @@ Exiv2: Denial of Service A vulnerability in Exiv2 could lead to Denial of Service condition. exiv2 - July 07, 2015 - July 07, 2015: 1 + 2015-07-07 + 2015-07-07: 1 534608 remote @@ -42,10 +42,10 @@ - CVE-2014-9449 + CVE-2014-9449 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-04.xml index e0ad92a4fa..959c18c24d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-04.xml @@ -7,8 +7,8 @@ cause a Denial of Service condition. icu - July 07, 2015 - July 07, 2015: 1 + 2015-07-07 + 2015-07-07: 1 546156 remote @@ -49,11 +49,11 @@ - CVE-2014-8146 - CVE-2014-8147 + CVE-2014-8146 + CVE-2014-8147 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-05.xml index 5aceef16fd..169f142500 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-05.xml @@ -6,8 +6,8 @@ context-dependent attackers to cause a Denial of Service condition. sqlite - July 07, 2015 - July 07, 2015: 1 + 2015-07-07 + 2015-07-07: 1 546626 local, remote @@ -42,12 +42,12 @@ - CVE-2015-3414 - CVE-2015-3415 - CVE-2015-3416 + CVE-2015-3414 + CVE-2015-3415 + CVE-2015-3416 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-06.xml index 10b90d0d5d..f71f630ab8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-06.xml @@ -6,8 +6,8 @@ which may result in execution of arbitrary code. unrtf - July 07, 2015 - July 07, 2015: 1 + 2015-07-07 + 2015-07-07: 1 531544 remote @@ -44,11 +44,11 @@ - CVE-2014-9274 - CVE-2014-9275 + CVE-2014-9274 + CVE-2014-9275 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-07.xml index 8ba1c2d66c..24ea32513d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-07.xml @@ -6,8 +6,8 @@ of which could result in execution of arbitrary code or Denial of Service. libvncserver - July 07, 2015 - July 07, 2015: 1 + 2015-07-07 + 2015-07-07: 1 523590 remote @@ -44,14 +44,14 @@ - CVE-2014-6051 - CVE-2014-6052 - CVE-2014-6053 - CVE-2014-6054 - CVE-2014-6055 + CVE-2014-6051 + CVE-2014-6052 + CVE-2014-6053 + CVE-2014-6054 + CVE-2014-6055 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-08.xml index d3e3d76465..c1f7da27b9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-08.xml @@ -6,8 +6,8 @@ of Service. libxml2 - July 07, 2015 - July 07, 2015: 1 + 2015-07-07 + 2015-07-07: 1 546720 remote @@ -42,10 +42,10 @@ - CVE-2015-1819 + CVE-2015-1819 - + keytoaster - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-09.xml index 87c7cb791e..034d759183 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-09.xml @@ -6,8 +6,8 @@ arbitrary code or Denial of Service. pypam - July 09, 2015 - July 09, 2015: 1 + 2015-07-09 + 2015-07-09: 1 407603 remote @@ -42,10 +42,10 @@ - CVE-2012-1502 + CVE-2012-1502 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-10.xml index e34eaac002..3d52c555a5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-10.xml @@ -6,8 +6,8 @@ code or Denial of Service. t1utils - July 10, 2015 - July 10, 2015: 1 + 2015-07-10 + 2015-07-10: 1 548638 remote @@ -42,10 +42,10 @@ - CVE-2015-3905 + CVE-2015-3905 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-11.xml index 5ccf39c541..38af314cab 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-11.xml @@ -6,8 +6,8 @@ Service. perl - July 10, 2015 - July 10, 2015: 1 + 2015-07-10 + 2015-07-10: 1 216671 remote @@ -42,8 +42,8 @@ - CVE-2013-7422 + CVE-2013-7422 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-12.xml index 957562bcef..ed8f63e8f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-12.xml @@ -6,8 +6,8 @@ to cause a Denial of Service condition. libcapsinetwork - July 10, 2015 - July 11, 2015: 2 + 2015-07-10 + 2015-07-11: 2 544324 remote @@ -44,12 +44,12 @@ - CVE-2015-0841 + CVE-2015-0841 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-13.xml index 0a38ae2b50..24d9bff622 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-13.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. ACE,DoS,flash - July 10, 2015 - July 10, 2015: 1 + 2015-07-10 + 2015-07-10: 1 552946 554220 554250 @@ -48,43 +48,43 @@ - CVE-2014-0578 - CVE-2015-3113 - CVE-2015-3114 - CVE-2015-3115 - CVE-2015-3116 - CVE-2015-3117 - CVE-2015-3118 - CVE-2015-3119 - CVE-2015-3120 - CVE-2015-3121 - CVE-2015-3122 - CVE-2015-3123 - CVE-2015-3124 - CVE-2015-3125 - CVE-2015-3126 - CVE-2015-3127 - CVE-2015-3128 - CVE-2015-3129 - CVE-2015-3130 - CVE-2015-3131 - CVE-2015-3132 - CVE-2015-3133 - CVE-2015-3134 - CVE-2015-3135 - CVE-2015-3136 - CVE-2015-3137 - CVE-2015-4428 - CVE-2015-4429 - CVE-2015-4430 - CVE-2015-4431 - CVE-2015-4432 - CVE-2015-4433 - CVE-2015-5116 - CVE-2015-5117 - CVE-2015-5118 - CVE-2015-5119 + CVE-2014-0578 + CVE-2015-3113 + CVE-2015-3114 + CVE-2015-3115 + CVE-2015-3116 + CVE-2015-3117 + CVE-2015-3118 + CVE-2015-3119 + CVE-2015-3120 + CVE-2015-3121 + CVE-2015-3122 + CVE-2015-3123 + CVE-2015-3124 + CVE-2015-3125 + CVE-2015-3126 + CVE-2015-3127 + CVE-2015-3128 + CVE-2015-3129 + CVE-2015-3130 + CVE-2015-3131 + CVE-2015-3132 + CVE-2015-3133 + CVE-2015-3134 + CVE-2015-3135 + CVE-2015-3136 + CVE-2015-3137 + CVE-2015-4428 + CVE-2015-4429 + CVE-2015-4430 + CVE-2015-4431 + CVE-2015-4432 + CVE-2015-4433 + CVE-2015-5116 + CVE-2015-5117 + CVE-2015-5118 + CVE-2015-5119 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-14.xml index 042ead7228..a81c3ef16f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-14.xml @@ -7,8 +7,8 @@ components. oracle-jre oracle-jdk - July 10, 2015 - July 11, 2015: 2 + 2015-07-10 + 2015-07-11: 2 537214 local, remote @@ -74,27 +74,27 @@ - CVE-2014-3566 - CVE-2014-6549 - CVE-2014-6585 - CVE-2014-6587 - CVE-2014-6591 - CVE-2014-6593 - CVE-2014-6601 - CVE-2015-0383 - CVE-2015-0395 - CVE-2015-0400 - CVE-2015-0403 - CVE-2015-0406 - CVE-2015-0407 - CVE-2015-0408 - CVE-2015-0410 - CVE-2015-0412 - CVE-2015-0413 - CVE-2015-0421 + CVE-2014-3566 + CVE-2014-6549 + CVE-2014-6585 + CVE-2014-6587 + CVE-2014-6591 + CVE-2014-6593 + CVE-2014-6601 + CVE-2015-0383 + CVE-2015-0395 + CVE-2015-0400 + CVE-2015-0403 + CVE-2015-0406 + CVE-2015-0407 + CVE-2015-0408 + CVE-2015-0410 + CVE-2015-0412 + CVE-2015-0413 + CVE-2015-0421 - + BlueKnight - stanley + stanley diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-15.xml index b7d24b08d5..4b90e12527 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-15.xml @@ -4,8 +4,8 @@ OpenSSL: Alternate chains certificate forgery Certain checks on untrusted certificates can be bypassed. openssl - July 10, 2015 - February 26, 2016: 3 + 2015-07-10 + 2016-02-26: 3 554172 remote @@ -55,12 +55,12 @@ - CVE-2015-1793 + CVE-2015-1793 - + keytoaster - + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-16.xml index 6949d4bd73..47f3f2e96e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-16.xml @@ -6,8 +6,8 @@ attacker to conduct a man-in-the-middle attack. portage - July 10, 2015 - July 10, 2015: 2 + 2015-07-10 + 2015-07-10: 2 469888 remote @@ -42,8 +42,8 @@ - CVE-2013-2100 + CVE-2013-2100 - K_F - Zlogene + K_F + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-17.xml index ba4833048f..d03dba747a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-17.xml @@ -6,8 +6,8 @@ condition. net-snmp - July 10, 2015 - July 10, 2015: 2 + 2015-07-10 + 2015-07-10: 2 522062 remote @@ -43,8 +43,8 @@ - CVE-2014-3565 + CVE-2014-3565 - K_F - Zlogene + K_F + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-18.xml index 857e5eb5cc..094919127a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-18.xml @@ -6,8 +6,8 @@ remote attackers to bypass security restrictions. chromium - July 10, 2015 - July 10, 2015: 1 + 2015-07-10 + 2015-07-10: 1 552904 remote @@ -41,11 +41,11 @@ - CVE-2015-1266 - CVE-2015-1267 - CVE-2015-1268 - CVE-2015-1269 + CVE-2015-1266 + CVE-2015-1267 + CVE-2015-1268 + CVE-2015-1269 - K_F - Zlogene + K_F + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-19.xml index 7a52329ef7..97018a350e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-19.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. mysql - July 10, 2015 - July 10, 2015: 1 + 2015-07-10 + 2015-07-10: 1 546722 remote @@ -51,30 +51,30 @@ - CVE-2015-0405 - CVE-2015-0423 - CVE-2015-0433 - CVE-2015-0438 - CVE-2015-0439 - CVE-2015-0441 - CVE-2015-0498 - CVE-2015-0499 - CVE-2015-0500 - CVE-2015-0501 - CVE-2015-0503 - CVE-2015-0505 - CVE-2015-0506 - CVE-2015-0507 - CVE-2015-0508 - CVE-2015-0511 - CVE-2015-2566 - CVE-2015-2567 - CVE-2015-2568 - CVE-2015-2571 - CVE-2015-2573 + CVE-2015-0405 + CVE-2015-0423 + CVE-2015-0433 + CVE-2015-0438 + CVE-2015-0439 + CVE-2015-0441 + CVE-2015-0498 + CVE-2015-0499 + CVE-2015-0500 + CVE-2015-0501 + CVE-2015-0503 + CVE-2015-0505 + CVE-2015-0506 + CVE-2015-0507 + CVE-2015-0508 + CVE-2015-0511 + CVE-2015-2566 + CVE-2015-2567 + CVE-2015-2568 + CVE-2015-2571 + CVE-2015-2573 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-20.xml index 602e69c8c2..5a488a8d3e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-20.xml @@ -7,8 +7,8 @@ escalation. postgresql - July 18, 2015 - January 03, 2017: 3 + 2015-07-18 + 2017-01-03: 3 539018 550172 remote @@ -93,17 +93,17 @@ - CVE-2014-8161 - CVE-2015-0241 - CVE-2015-0242 - CVE-2015-0243 - CVE-2015-0244 - CVE-2015-3165 - CVE-2015-3166 - CVE-2015-3167 + CVE-2014-8161 + CVE-2015-0241 + CVE-2015-0242 + CVE-2015-0243 + CVE-2015-0244 + CVE-2015-3165 + CVE-2015-3166 + CVE-2015-3167 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-21.xml index e3e2d10db5..523aabd749 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-21.xml @@ -6,8 +6,8 @@ which could result in execution of arbitrary code or Denial of Service. libXfont - July 22, 2015 - July 22, 2015: 1 + 2015-07-22 + 2015-07-22: 1 543620 remote @@ -50,12 +50,12 @@ - CVE-2015-1802 - CVE-2015-1803 - CVE-2015-1804 + CVE-2015-1802 + CVE-2015-1803 + CVE-2015-1804 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-22.xml index 3537adbc5f..a95d6f4e10 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-22.xml @@ -6,8 +6,8 @@ of arbitrary code. e2fsprogs - July 23, 2015 - July 23, 2015: 1 + 2015-07-23 + 2015-07-23: 1 540536 local @@ -44,8 +44,8 @@ - CVE-2015-1572 + CVE-2015-1572 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-01.xml index 9819660548..767c4cd712 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-01.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. flash,ACE,DoS - August 15, 2015 - August 15, 2015: 1 + 2015-08-15 + 2015-08-15: 1 554882 557342 remote @@ -46,48 +46,48 @@ - CVE-2015-3107 - CVE-2015-5122 - CVE-2015-5123 - CVE-2015-5124 - CVE-2015-5125 - CVE-2015-5127 - CVE-2015-5129 - CVE-2015-5130 - CVE-2015-5131 - CVE-2015-5132 - CVE-2015-5133 - CVE-2015-5134 - CVE-2015-5539 - CVE-2015-5540 - CVE-2015-5541 - CVE-2015-5544 - CVE-2015-5545 - CVE-2015-5546 - CVE-2015-5547 - CVE-2015-5548 - CVE-2015-5549 - CVE-2015-5550 - CVE-2015-5551 - CVE-2015-5552 - CVE-2015-5553 - CVE-2015-5554 - CVE-2015-5555 - CVE-2015-5556 - CVE-2015-5557 - CVE-2015-5558 - CVE-2015-5559 - CVE-2015-5560 - CVE-2015-5561 - CVE-2015-5562 - CVE-2015-5563 - CVE-2015-5564 - CVE-2015-5965 + CVE-2015-3107 + CVE-2015-5122 + CVE-2015-5123 + CVE-2015-5124 + CVE-2015-5125 + CVE-2015-5127 + CVE-2015-5129 + CVE-2015-5130 + CVE-2015-5131 + CVE-2015-5132 + CVE-2015-5133 + CVE-2015-5134 + CVE-2015-5539 + CVE-2015-5540 + CVE-2015-5541 + CVE-2015-5544 + CVE-2015-5545 + CVE-2015-5546 + CVE-2015-5547 + CVE-2015-5548 + CVE-2015-5549 + CVE-2015-5550 + CVE-2015-5551 + CVE-2015-5552 + CVE-2015-5553 + CVE-2015-5554 + CVE-2015-5555 + CVE-2015-5556 + CVE-2015-5557 + CVE-2015-5558 + CVE-2015-5559 + CVE-2015-5560 + CVE-2015-5561 + CVE-2015-5562 + CVE-2015-5563 + CVE-2015-5564 + CVE-2015-5965 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-02.xml index a467ae4ce5..f0a5cb1dc8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-02.xml @@ -6,8 +6,8 @@ which may result in execution of arbitrary code. libgadu - August 15, 2015 - August 15, 2015: 1 + 2015-08-15 + 2015-08-15: 1 490238 505558 510714 @@ -55,12 +55,12 @@ - CVE-2013-4488 - CVE-2013-6487 - CVE-2014-3775 + CVE-2013-4488 + CVE-2013-6487 + CVE-2014-3775 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-03.xml index 30e3a1b02b..2f84388d8f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201508-03.xml @@ -6,8 +6,8 @@ causes a Denial of Service condition. icecast - August 15, 2015 - August 15, 2015: 1 + 2015-08-15 + 2015-08-15: 1 545968 remote @@ -46,8 +46,8 @@ - CVE-2015-3026 + CVE-2015-3026 - K_F - mrueg + K_F + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-01.xml index bcab847fae..ad9a58d9b4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-01.xml @@ -6,8 +6,8 @@ could lead to arbitrary code execution. ntp - September 24, 2015 - September 24, 2015: 1 + 2015-09-24 + 2015-09-24: 1 545836 553682 remote @@ -43,12 +43,12 @@ - CVE-2015-1798 - CVE-2015-1799 - CVE-2015-5146 + CVE-2015-1798 + CVE-2015-1799 + CVE-2015-5146 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-02.xml index af3c3f8f43..ca43baa0da 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-02.xml @@ -6,8 +6,8 @@ which can allow remote attackers to cause Denial of Service condition. curl - September 24, 2015 - September 24, 2015: 1 + 2015-09-24 + 2015-09-24: 1 547376 552618 remote @@ -45,13 +45,13 @@ - CVE-2015-3143 - CVE-2015-3144 - CVE-2015-3145 - CVE-2015-3148 - CVE-2015-3236 - CVE-2015-3237 + CVE-2015-3143 + CVE-2015-3144 + CVE-2015-3145 + CVE-2015-3148 + CVE-2015-3236 + CVE-2015-3237 - Zlogene - mrueg + Zlogene + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-03.xml index a381f43a46..3bd02c1ae6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-03.xml @@ -6,8 +6,8 @@ which could lead to arbitrary code execution. cacti - September 24, 2015 - September 24, 2015: 1 + 2015-09-24 + 2015-09-24: 1 506356 515108 554758 @@ -44,18 +44,18 @@ - CVE-2014-2326 - CVE-2014-2327 - CVE-2014-2328 - CVE-2014-2708 - CVE-2014-2709 - CVE-2014-4002 - CVE-2014-5025 - CVE-2014-5026 - CVE-2015-2967 + CVE-2014-2326 + CVE-2014-2327 + CVE-2014-2328 + CVE-2014-2708 + CVE-2014-2709 + CVE-2014-4002 + CVE-2014-5025 + CVE-2014-5026 + CVE-2015-2967 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-04.xml index c1fdfab325..037f5e0260 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-04.xml @@ -6,8 +6,8 @@ which could lead to arbitrary code execution. libtasn1 - September 24, 2015 - September 24, 2015: 1 + 2015-09-24 + 2015-09-24: 1 544922 548252 remote @@ -43,11 +43,11 @@ - CVE-2015-2806 - CVE-2015-3622 + CVE-2015-2806 + CVE-2015-3622 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-05.xml index 0c1fcdc587..27e87aa7a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-05.xml @@ -6,8 +6,8 @@ cause a Denial of Service condition in IPv6 network stacks. networkmanager - September 24, 2015 - September 24, 2015: 1 + 2015-09-24 + 2015-09-24: 1 545980 remote @@ -46,10 +46,10 @@ - CVE-2015-2924 + CVE-2015-2924 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-06.xml index 9c07e67dbe..680ff6ca71 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-06.xml @@ -6,8 +6,8 @@ in a case-insensitive or case-normalizing filesystem. git - September 24, 2015 - September 24, 2015: 1 + 2015-09-24 + 2015-09-24: 1 532984 remote @@ -63,10 +63,10 @@ - CVE-2014-9390 + CVE-2014-9390 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-07.xml index b2d3ff1679..0a52591576 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201509-07.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. ACE,DoS,flash - September 25, 2015 - September 25, 2015: 1 + 2015-09-25 + 2015-09-25: 1 561076 remote @@ -45,36 +45,36 @@ - CVE-2015-5567 - CVE-2015-5568 - CVE-2015-5570 - CVE-2015-5571 - CVE-2015-5572 - CVE-2015-5573 - CVE-2015-5574 - CVE-2015-5575 - CVE-2015-5576 - CVE-2015-5577 - CVE-2015-5578 - CVE-2015-5579 - CVE-2015-5580 - CVE-2015-5581 - CVE-2015-5582 - CVE-2015-5584 - CVE-2015-5587 - CVE-2015-5588 - CVE-2015-6676 - CVE-2015-6677 - CVE-2015-6678 - CVE-2015-6679 - CVE-2015-6680 - CVE-2015-6681 - CVE-2015-6682 + CVE-2015-5567 + CVE-2015-5568 + CVE-2015-5570 + CVE-2015-5571 + CVE-2015-5572 + CVE-2015-5573 + CVE-2015-5574 + CVE-2015-5575 + CVE-2015-5576 + CVE-2015-5577 + CVE-2015-5578 + CVE-2015-5579 + CVE-2015-5580 + CVE-2015-5581 + CVE-2015-5582 + CVE-2015-5584 + CVE-2015-5587 + CVE-2015-5588 + CVE-2015-6676 + CVE-2015-6677 + CVE-2015-6678 + CVE-2015-6679 + CVE-2015-6680 + CVE-2015-6681 + CVE-2015-6682 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-01.xml index 2f65e1fe51..f22c88f888 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-01.xml @@ -6,8 +6,8 @@ condition. bind - October 18, 2015 - October 18, 2015: 1 + 2015-10-18 + 2015-10-18: 1 540640 553584 556150 @@ -45,12 +45,12 @@ - CVE-2015-1349 - CVE-2015-4620 - CVE-2015-5477 - CVE-2015-5722 - CVE-2015-5986 + CVE-2015-1349 + CVE-2015-4620 + CVE-2015-5477 + CVE-2015-5722 + CVE-2015-5986 - Zlogene - Zlogene + Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-02.xml index 2741780c81..673c0fdfe2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-02.xml @@ -6,8 +6,8 @@ arbitrary code. qemu - October 31, 2015 - October 31, 2015: 1 + 2015-10-31 + 2015-10-31: 1 551752 555680 556050 @@ -43,13 +43,13 @@ - CVE-2015-3209 - CVE-2015-3214 - CVE-2015-5154 - CVE-2015-5158 + CVE-2015-3209 + CVE-2015-3214 + CVE-2015-5154 + CVE-2015-5158 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-03.xml index b9e960ff83..bd2c2671a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-03.xml @@ -6,8 +6,8 @@ attackers to cause Denial of Service condition. wireshark - October 31, 2015 - October 31, 2015: 1 + 2015-10-31 + 2015-10-31: 1 536034 542206 548898 @@ -45,25 +45,25 @@ - CVE-2015-2187 - CVE-2015-2188 - CVE-2015-2189 - CVE-2015-2190 - CVE-2015-2191 - CVE-2015-2192 - CVE-2015-3182 - CVE-2015-3808 - CVE-2015-3809 - CVE-2015-3810 - CVE-2015-3811 - CVE-2015-3812 - CVE-2015-3813 - CVE-2015-3814 - CVE-2015-3815 - CVE-2015-3906 - CVE-2015-4651 - CVE-2015-4652 + CVE-2015-2187 + CVE-2015-2188 + CVE-2015-2189 + CVE-2015-2190 + CVE-2015-2191 + CVE-2015-2192 + CVE-2015-3182 + CVE-2015-3808 + CVE-2015-3809 + CVE-2015-3810 + CVE-2015-3811 + CVE-2015-3812 + CVE-2015-3813 + CVE-2015-3814 + CVE-2015-3815 + CVE-2015-3906 + CVE-2015-4651 + CVE-2015-4652 - K_F - Zlogene + K_F + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-04.xml index 71feec6906..e7b5e6f161 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-04.xml @@ -7,8 +7,8 @@ executive arbitrary code. tcpdump - October 31, 2015 - October 31, 2015: 1 + 2015-10-31 + 2015-10-31: 1 552632 remote @@ -43,13 +43,13 @@ - CVE-2015-0261 - CVE-2015-2153 - CVE-2015-2154 - CVE-2015-2155 + CVE-2015-0261 + CVE-2015-2153 + CVE-2015-2154 + CVE-2015-2155 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-05.xml index 17c6fc896b..1e2467341e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-05.xml @@ -6,8 +6,8 @@ which may allow remote attackers to cause a Denial of Service. mediawiki - October 31, 2015 - October 31, 2015: 1 + 2015-10-31 + 2015-10-31: 1 545944 557844 remote @@ -61,31 +61,31 @@ - CVE-2015-2931 - CVE-2015-2932 - CVE-2015-2933 - CVE-2015-2934 - CVE-2015-2935 - CVE-2015-2936 - CVE-2015-2937 - CVE-2015-2938 - CVE-2015-2939 - CVE-2015-2940 - CVE-2015-2941 - CVE-2015-2942 - CVE-2015-6728 - CVE-2015-6729 - CVE-2015-6730 - CVE-2015-6731 - CVE-2015-6732 - CVE-2015-6733 - CVE-2015-6734 - CVE-2015-6735 - CVE-2015-6736 - CVE-2015-6737 + CVE-2015-2931 + CVE-2015-2932 + CVE-2015-2933 + CVE-2015-2934 + CVE-2015-2935 + CVE-2015-2936 + CVE-2015-2937 + CVE-2015-2938 + CVE-2015-2939 + CVE-2015-2940 + CVE-2015-2941 + CVE-2015-2942 + CVE-2015-6728 + CVE-2015-6729 + CVE-2015-6730 + CVE-2015-6731 + CVE-2015-6732 + CVE-2015-6733 + CVE-2015-6734 + CVE-2015-6735 + CVE-2015-6736 + CVE-2015-6737 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-06.xml index 7e47d69bb6..debbd22f87 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-06.xml @@ -6,8 +6,8 @@ which may allow a remote attacker to cause Denial of Service. django - October 31, 2015 - October 31, 2015: 1 + 2015-10-31 + 2015-10-31: 1 554864 remote @@ -67,12 +67,12 @@ - CVE-2015-5143 - CVE-2015-5144 - CVE-2015-5145 + CVE-2015-5143 + CVE-2015-5144 + CVE-2015-5145 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-07.xml index 1d6dd4c22b..dac649c67e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-07.xml @@ -6,8 +6,8 @@ which could lead to arbitrary code execution. cups - October 31, 2015 - October 31, 2015: 1 + 2015-10-31 + 2015-10-31: 1 551846 remote @@ -42,11 +42,11 @@ - CVE-2015-1158 - CVE-2015-1159 + CVE-2015-1158 + CVE-2015-1159 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-08.xml index 7ffe94efd0..391609dbf1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201510-08.xml @@ -6,8 +6,8 @@ of which could lead to arbitrary code execution. cups-filters - October 31, 2015 - October 31, 2015: 1 + 2015-10-31 + 2015-10-31: 1 553644 553836 remote @@ -44,11 +44,11 @@ - CVE-2015-3258 - CVE-2015-3279 + CVE-2015-3258 + CVE-2015-3279 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201511-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201511-01.xml index 9743c1e24e..1050fd426c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201511-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201511-01.xml @@ -5,9 +5,9 @@ An attacker who already had access to the environment could so append values to parameters passed through programs. - - November 02, 2015 - November 02, 2015: 2 + + 2015-11-02 + 2015-11-02: 2 524414 local @@ -52,6 +52,6 @@ mksh R50c released, security fix - K_F - mrueg + K_F + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201511-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201511-02.xml index 5118dc08b8..e3ff45ff67 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201511-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201511-02.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - November 17, 2015 - November 17, 2015: 1 + 2015-11-17 + 2015-11-17: 1 563014 563172 565318 @@ -48,41 +48,41 @@ - CVE-2015-5569 - CVE-2015-7625 - CVE-2015-7626 - CVE-2015-7627 - CVE-2015-7628 - CVE-2015-7629 - CVE-2015-7630 - CVE-2015-7631 - CVE-2015-7632 - CVE-2015-7633 - CVE-2015-7634 - CVE-2015-7643 - CVE-2015-7644 - CVE-2015-7645 - CVE-2015-7646 - CVE-2015-7647 - CVE-2015-7648 - CVE-2015-7651 - CVE-2015-7652 - CVE-2015-7653 - CVE-2015-7654 - CVE-2015-7655 - CVE-2015-7656 - CVE-2015-7657 - CVE-2015-7658 - CVE-2015-7659 - CVE-2015-7660 - CVE-2015-7661 - CVE-2015-7662 - CVE-2015-7663 - CVE-2015-8042 - CVE-2015-8043 - CVE-2015-8044 - CVE-2015-8046 + CVE-2015-5569 + CVE-2015-7625 + CVE-2015-7626 + CVE-2015-7627 + CVE-2015-7628 + CVE-2015-7629 + CVE-2015-7630 + CVE-2015-7631 + CVE-2015-7632 + CVE-2015-7633 + CVE-2015-7634 + CVE-2015-7643 + CVE-2015-7644 + CVE-2015-7645 + CVE-2015-7646 + CVE-2015-7647 + CVE-2015-7648 + CVE-2015-7651 + CVE-2015-7652 + CVE-2015-7653 + CVE-2015-7654 + CVE-2015-7655 + CVE-2015-7656 + CVE-2015-7657 + CVE-2015-7658 + CVE-2015-7659 + CVE-2015-7660 + CVE-2015-7661 + CVE-2015-7662 + CVE-2015-7663 + CVE-2015-8042 + CVE-2015-8043 + CVE-2015-8044 + CVE-2015-8046 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-01.xml index 2644755f7d..53130fc217 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-01.xml @@ -6,8 +6,8 @@ condition. dnsmasq - December 17, 2015 - December 17, 2015: 1 + 2015-12-17 + 2015-12-17: 1 547966 remote @@ -44,10 +44,10 @@ - CVE-2015-3294 + CVE-2015-3294 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-02.xml index 7e12a0f2e4..3115d9bab8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-02.xml @@ -6,8 +6,8 @@ JavaScript. ipython - December 17, 2015 - December 17, 2015: 1 + 2015-12-17 + 2015-12-17: 1 560708 remote @@ -40,10 +40,10 @@ - CVE-2015-7337 + CVE-2015-7337 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-03.xml index d61b21a43c..74f4618b45 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-03.xml @@ -1,63 +1,63 @@ - - - - GRUB: Authentication bypass - GRUB's authentication prompt can be bypassed by entering a sequence - of backspace characters. - - grub - December 19, 2015 - December 19, 2015: 1 - 568326 - local - - - 2.02_beta2-r8 - 0.97 - 2.02_beta2-r8 - - - -

GNU GRUB is a multiboot boot loader used by most Linux systems.

-
- -

An integer underflow in GRUB’s username/password authentication code - has been discovered. -

-
- -

An attacker with access to the system console may bypass the username - prompt by entering a sequence of backspace characters, allowing them e.g. - to get full access to GRUB’s console or to load a customized kernel. -

-
- -

There is no known workaround at this time.

-
- -

All GRUB 2.x users should upgrade to the latest version:

- - - # emerge --sync - # emerge --ask --oneshot --verbose ">=sys-boot/grub-2.02_beta2-r8" - - -

After upgrading, make sure to run the grub2-install command with options - appropriate for your system. See the GRUB2 Quick Start guide in the - references below for examples. Your system will be vulnerable until this - action is performed. -

-
- - CVE-2015-8370 - GRUB2 Quick - Start guide - - - - keytoaster - - - keytoaster - -
\ No newline at end of file + + + + GRUB: Authentication bypass + GRUB's authentication prompt can be bypassed by entering a sequence + of backspace characters. + + grub + 2015-12-19 + 2015-12-19: 1 + 568326 + local + + + 2.02_beta2-r8 + 0.97 + 2.02_beta2-r8 + + + +

GNU GRUB is a multiboot boot loader used by most Linux systems.

+
+ +

An integer underflow in GRUB’s username/password authentication code + has been discovered. +

+
+ +

An attacker with access to the system console may bypass the username + prompt by entering a sequence of backspace characters, allowing them e.g. + to get full access to GRUB’s console or to load a customized kernel. +

+
+ +

There is no known workaround at this time.

+
+ +

All GRUB 2.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-boot/grub-2.02_beta2-r8" + + +

After upgrading, make sure to run the grub2-install command with options + appropriate for your system. See the GRUB2 Quick Start guide in the + references below for examples. Your system will be vulnerable until this + action is performed. +

+
+ + CVE-2015-8370 + GRUB2 Quick + Start guide + + + + keytoaster + + + keytoaster + +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-04.xml index d50b71bcae..c23dc834e6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-04.xml @@ -7,8 +7,8 @@ condition. openssh - December 20, 2015 - December 21, 2015: 4 + 2015-12-20 + 2015-12-21: 4 553724 555518 557340 @@ -45,12 +45,12 @@ - CVE-2015-5352 - CVE-2015-5600 - CVE-2015-6563 - CVE-2015-6564 - CVE-2015-6565 + CVE-2015-5352 + CVE-2015-5600 + CVE-2015-6563 + CVE-2015-6564 + CVE-2015-6565 - Zlogene - ackle + Zlogene + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-05.xml index 7a650cfade..0911edda25 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-05.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code or cause Denial of Service. gdk-pixbuf - December 21, 2015 - December 21, 2015: 1 + 2015-12-21 + 2015-12-21: 1 556314 562878 562880 @@ -50,12 +50,12 @@

- CVE-2015-4491 - CVE-2015-7673 - CVE-2015-7674 + CVE-2015-4491 + CVE-2015-7673 + CVE-2015-7674 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-06.xml index 11bf2a9bde..f2b3d5066a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-06.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code or cause Denial of Service. mpfr - December 30, 2015 - December 30, 2015: 1 + 2015-12-30 + 2015-12-30: 1 532028 remote @@ -44,10 +44,10 @@ - CVE-2014-9474 + CVE-2014-9474 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-07.xml index 425328a8b8..9507b17fcc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-07.xml @@ -6,8 +6,8 @@ execute arbitrary code or cause Denial of Service. gstreamer - December 30, 2015 - February 09, 2016: 3 + 2015-12-30 + 2016-02-09: 3 553742 remote @@ -49,10 +49,10 @@ - CVE-2015-0797 + CVE-2015-0797 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-08.xml index cdae042505..0c315e3258 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-08.xml @@ -6,8 +6,8 @@ resulting in Denial of Service. clamav - December 30, 2015 - December 30, 2015: 1 + 2015-12-30 + 2015-12-30: 1 538084 548066 local @@ -43,17 +43,17 @@ - CVE-2014-9328 - CVE-2015-1461 - CVE-2015-1462 - CVE-2015-1463 - CVE-2015-2170 - CVE-2015-2221 - CVE-2015-2222 - CVE-2015-2668 + CVE-2014-9328 + CVE-2015-1461 + CVE-2015-1462 + CVE-2015-1463 + CVE-2015-2170 + CVE-2015-2221 + CVE-2015-2222 + CVE-2015-2668 - + BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-09.xml index d1664156d2..cfdfcfb4a6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-09.xml @@ -7,8 +7,8 @@ Denial of Service condition. encfs - December 30, 2015 - December 30, 2015: 1 + 2015-12-30 + 2015-12-30: 1 510290 local @@ -47,8 +47,8 @@ - CVE-2014-3462 + CVE-2014-3462 - K_F - mrueg + K_F + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-10.xml index d05e896bdb..0059fd853a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-10.xml @@ -7,8 +7,8 @@ arbitrary code. thunderbird firefox - December 30, 2015 - December 31, 2015: 2 + 2015-12-30 + 2015-12-31: 2 545232 554036 556942 @@ -86,93 +86,93 @@ - CVE-2015-0798 - CVE-2015-0799 - CVE-2015-0801 - CVE-2015-0802 - CVE-2015-0803 - CVE-2015-0804 - CVE-2015-0805 - CVE-2015-0806 - CVE-2015-0807 - CVE-2015-0808 - CVE-2015-0810 - CVE-2015-0811 - CVE-2015-0812 - CVE-2015-0813 - CVE-2015-0814 - CVE-2015-0815 - CVE-2015-0816 - CVE-2015-2706 - CVE-2015-2721 - CVE-2015-2722 - CVE-2015-2724 - CVE-2015-2725 - CVE-2015-2726 - CVE-2015-2727 - CVE-2015-2728 - CVE-2015-2729 - CVE-2015-2730 - CVE-2015-2731 - CVE-2015-2733 - CVE-2015-2734 - CVE-2015-2735 - CVE-2015-2736 - CVE-2015-2737 - CVE-2015-2738 - CVE-2015-2739 - CVE-2015-2740 - CVE-2015-2741 - CVE-2015-2742 - CVE-2015-2743 - CVE-2015-2808 - CVE-2015-4000 - CVE-2015-4153 - CVE-2015-4495 - CVE-2015-4513 - CVE-2015-4514 - CVE-2015-4515 - CVE-2015-4518 - CVE-2015-7181 - CVE-2015-7182 - CVE-2015-7183 - CVE-2015-7187 - CVE-2015-7188 - CVE-2015-7189 - CVE-2015-7191 - CVE-2015-7192 - CVE-2015-7193 - CVE-2015-7194 - CVE-2015-7195 - CVE-2015-7196 - CVE-2015-7197 - CVE-2015-7198 - CVE-2015-7199 - CVE-2015-7200 - CVE-2015-7201 - CVE-2015-7202 - CVE-2015-7203 - CVE-2015-7204 - CVE-2015-7205 - CVE-2015-7207 - CVE-2015-7208 - CVE-2015-7210 - CVE-2015-7211 - CVE-2015-7212 - CVE-2015-7213 - CVE-2015-7214 - CVE-2015-7215 - CVE-2015-7216 - CVE-2015-7217 - CVE-2015-7218 - CVE-2015-7219 - CVE-2015-7220 - CVE-2015-7221 - CVE-2015-7222 - CVE-2015-7223 + CVE-2015-0798 + CVE-2015-0799 + CVE-2015-0801 + CVE-2015-0802 + CVE-2015-0803 + CVE-2015-0804 + CVE-2015-0805 + CVE-2015-0806 + CVE-2015-0807 + CVE-2015-0808 + CVE-2015-0810 + CVE-2015-0811 + CVE-2015-0812 + CVE-2015-0813 + CVE-2015-0814 + CVE-2015-0815 + CVE-2015-0816 + CVE-2015-2706 + CVE-2015-2721 + CVE-2015-2722 + CVE-2015-2724 + CVE-2015-2725 + CVE-2015-2726 + CVE-2015-2727 + CVE-2015-2728 + CVE-2015-2729 + CVE-2015-2730 + CVE-2015-2731 + CVE-2015-2733 + CVE-2015-2734 + CVE-2015-2735 + CVE-2015-2736 + CVE-2015-2737 + CVE-2015-2738 + CVE-2015-2739 + CVE-2015-2740 + CVE-2015-2741 + CVE-2015-2742 + CVE-2015-2743 + CVE-2015-2808 + CVE-2015-4000 + CVE-2015-4153 + CVE-2015-4495 + CVE-2015-4513 + CVE-2015-4514 + CVE-2015-4515 + CVE-2015-4518 + CVE-2015-7181 + CVE-2015-7182 + CVE-2015-7183 + CVE-2015-7187 + CVE-2015-7188 + CVE-2015-7189 + CVE-2015-7191 + CVE-2015-7192 + CVE-2015-7193 + CVE-2015-7194 + CVE-2015-7195 + CVE-2015-7196 + CVE-2015-7197 + CVE-2015-7198 + CVE-2015-7199 + CVE-2015-7200 + CVE-2015-7201 + CVE-2015-7202 + CVE-2015-7203 + CVE-2015-7204 + CVE-2015-7205 + CVE-2015-7207 + CVE-2015-7208 + CVE-2015-7210 + CVE-2015-7211 + CVE-2015-7212 + CVE-2015-7213 + CVE-2015-7214 + CVE-2015-7215 + CVE-2015-7216 + CVE-2015-7217 + CVE-2015-7218 + CVE-2015-7219 + CVE-2015-7220 + CVE-2015-7221 + CVE-2015-7222 + CVE-2015-7223 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-11.xml index 821694d24e..0d744a8918 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-11.xml @@ -6,8 +6,8 @@ execute arbitrary code. firebird - December 30, 2015 - December 30, 2015: 1 + 2015-12-30 + 2015-12-30: 1 460780 remote @@ -47,12 +47,12 @@

- CVE-2013-2492 + CVE-2013-2492 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-12.xml index e6c9ac71ec..f1302db8e7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-12.xml @@ -6,8 +6,8 @@ escalation. systemsettings - December 30, 2015 - December 30, 2015: 1 + 2015-12-30 + 2015-12-30: 1 528468 local @@ -46,8 +46,8 @@ - CVE-2014-8651 + CVE-2014-8651 - Zlogene - mrueg + Zlogene + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-13.xml index 66778c4d33..888290073c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201512-13.xml @@ -6,8 +6,8 @@ allowing remote attackers to execute arbitrary code. inspircd - December 30, 2015 - December 30, 2015: 1 + 2015-12-30 + 2015-12-30: 1 545034 570244 remote @@ -45,12 +45,12 @@ - CVE-2012-6697 - CVE-2015-6674 - CVE-2015-8702 + CVE-2012-6697 + CVE-2015-6674 + CVE-2015-8702 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-01.xml index f5ce4ed994..bfb1d654af 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-01.xml @@ -6,8 +6,8 @@ attackers to leak client memory to a server, including private keys. openssh - January 16, 2016 - January 16, 2016: 1 + 2016-01-16 + 2016-01-16: 1 571892 remote @@ -58,9 +58,9 @@ - CVE-2016-0777 - CVE-2016-0778 + CVE-2016-0777 + CVE-2016-0778 - a3li - a3li + a3li + a3li diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-02.xml index 962bf0a2fa..2b785f4366 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-02.xml @@ -7,8 +7,8 @@ condition. webkit-gtk - January 26, 2016 - January 26, 2016: 1 + 2016-01-26 + 2016-01-26: 1 536234 remote @@ -51,17 +51,17 @@ - CVE-2014-1344 - CVE-2014-1384 - CVE-2014-1385 - CVE-2014-1386 - CVE-2014-1387 - CVE-2014-1388 - CVE-2014-1389 - CVE-2014-1390 + CVE-2014-1344 + CVE-2014-1384 + CVE-2014-1385 + CVE-2014-1386 + CVE-2014-1387 + CVE-2014-1388 + CVE-2014-1389 + CVE-2014-1390 - + BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-03.xml index 2cc5c4a8d5..bc787b7d29 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-03.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe flash - January 26, 2016 - January 26, 2016: 1 + 2016-01-26 + 2016-01-26: 1 567838 570040 remote @@ -47,106 +47,106 @@ - CVE-2015-8045 - CVE-2015-8047 - CVE-2015-8048 - CVE-2015-8049 - CVE-2015-8050 - CVE-2015-8055 - CVE-2015-8056 - CVE-2015-8057 - CVE-2015-8058 - CVE-2015-8059 - CVE-2015-8060 - CVE-2015-8061 - CVE-2015-8062 - CVE-2015-8063 - CVE-2015-8064 - CVE-2015-8065 - CVE-2015-8066 - CVE-2015-8067 - CVE-2015-8068 - CVE-2015-8069 - CVE-2015-8070 - CVE-2015-8071 - CVE-2015-8401 - CVE-2015-8402 - CVE-2015-8403 - CVE-2015-8404 - CVE-2015-8405 - CVE-2015-8406 - CVE-2015-8407 - CVE-2015-8408 - CVE-2015-8409 - CVE-2015-8410 - CVE-2015-8411 - CVE-2015-8412 - CVE-2015-8413 - CVE-2015-8414 - CVE-2015-8415 - CVE-2015-8416 - CVE-2015-8417 - CVE-2015-8418 - CVE-2015-8419 - CVE-2015-8420 - CVE-2015-8421 - CVE-2015-8422 - CVE-2015-8423 - CVE-2015-8424 - CVE-2015-8425 - CVE-2015-8426 - CVE-2015-8427 - CVE-2015-8428 - CVE-2015-8429 - CVE-2015-8430 - CVE-2015-8431 - CVE-2015-8432 - CVE-2015-8433 - CVE-2015-8434 - CVE-2015-8435 - CVE-2015-8436 - CVE-2015-8437 - CVE-2015-8438 - CVE-2015-8439 - CVE-2015-8440 - CVE-2015-8441 - CVE-2015-8442 - CVE-2015-8443 - CVE-2015-8443 - CVE-2015-8445 - CVE-2015-8446 - CVE-2015-8447 - CVE-2015-8448 - CVE-2015-8449 - CVE-2015-8450 - CVE-2015-8451 - CVE-2015-8452 - CVE-2015-8453 - CVE-2015-8454 - CVE-2015-8455 - CVE-2015-8459 - CVE-2015-8460 - CVE-2015-8635 - CVE-2015-8636 - CVE-2015-8638 - CVE-2015-8639 - CVE-2015-8640 - CVE-2015-8641 - CVE-2015-8642 - CVE-2015-8643 - CVE-2015-8644 - CVE-2015-8645 - CVE-2015-8646 - CVE-2015-8647 - CVE-2015-8648 - CVE-2015-8649 - CVE-2015-8650 - CVE-2015-8651 + CVE-2015-8045 + CVE-2015-8047 + CVE-2015-8048 + CVE-2015-8049 + CVE-2015-8050 + CVE-2015-8055 + CVE-2015-8056 + CVE-2015-8057 + CVE-2015-8058 + CVE-2015-8059 + CVE-2015-8060 + CVE-2015-8061 + CVE-2015-8062 + CVE-2015-8063 + CVE-2015-8064 + CVE-2015-8065 + CVE-2015-8066 + CVE-2015-8067 + CVE-2015-8068 + CVE-2015-8069 + CVE-2015-8070 + CVE-2015-8071 + CVE-2015-8401 + CVE-2015-8402 + CVE-2015-8403 + CVE-2015-8404 + CVE-2015-8405 + CVE-2015-8406 + CVE-2015-8407 + CVE-2015-8408 + CVE-2015-8409 + CVE-2015-8410 + CVE-2015-8411 + CVE-2015-8412 + CVE-2015-8413 + CVE-2015-8414 + CVE-2015-8415 + CVE-2015-8416 + CVE-2015-8417 + CVE-2015-8418 + CVE-2015-8419 + CVE-2015-8420 + CVE-2015-8421 + CVE-2015-8422 + CVE-2015-8423 + CVE-2015-8424 + CVE-2015-8425 + CVE-2015-8426 + CVE-2015-8427 + CVE-2015-8428 + CVE-2015-8429 + CVE-2015-8430 + CVE-2015-8431 + CVE-2015-8432 + CVE-2015-8433 + CVE-2015-8434 + CVE-2015-8435 + CVE-2015-8436 + CVE-2015-8437 + CVE-2015-8438 + CVE-2015-8439 + CVE-2015-8440 + CVE-2015-8441 + CVE-2015-8442 + CVE-2015-8443 + CVE-2015-8443 + CVE-2015-8445 + CVE-2015-8446 + CVE-2015-8447 + CVE-2015-8448 + CVE-2015-8449 + CVE-2015-8450 + CVE-2015-8451 + CVE-2015-8452 + CVE-2015-8453 + CVE-2015-8454 + CVE-2015-8455 + CVE-2015-8459 + CVE-2015-8460 + CVE-2015-8635 + CVE-2015-8636 + CVE-2015-8638 + CVE-2015-8639 + CVE-2015-8640 + CVE-2015-8641 + CVE-2015-8642 + CVE-2015-8643 + CVE-2015-8644 + CVE-2015-8645 + CVE-2015-8646 + CVE-2015-8647 + CVE-2015-8648 + CVE-2015-8649 + CVE-2015-8650 + CVE-2015-8651 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-04.xml index 8d4f797987..3245242a0e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-04.xml @@ -6,8 +6,8 @@ allowing remote attackers to execute arbitrary code. opensmtpd - January 27, 2016 - January 27, 2016: 1 + 2016-01-27 + 2016-01-27: 1 562034 562290 remote @@ -44,6 +44,6 @@ - mrueg - mrueg + mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-05.xml index 69223e829d..e84d2b1c82 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201601-05.xml @@ -7,8 +7,8 @@ handshakes. openssl - January 29, 2016 - February 26, 2016: 3 + 2016-01-29 + 2016-02-26: 3 572854 remote @@ -60,21 +60,21 @@ - CVE-2015-1794 - CVE-2015-3193 - CVE-2015-3194 - CVE-2015-3195 - CVE-2015-3196 - CVE-2015-3197 - CVE-2016-0701 - OpenSSL Security + CVE-2015-1794 + CVE-2015-3193 + CVE-2015-3194 + CVE-2015-3195 + CVE-2015-3196 + CVE-2015-3197 + CVE-2016-0701 + OpenSSL Security Advisory [28th Jan 2016] - + keytoaster - + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-01.xml index c23826c70d..f9c6b14aa1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-01.xml @@ -7,8 +7,8 @@ elevated privileges from a guest VM. qemu - February 04, 2016 - February 04, 2016: 1 + 2016-02-04 + 2016-02-04: 1 544328 549404 557206 @@ -63,31 +63,31 @@ - CVE-2015-1779 - CVE-2015-3456 - CVE-2015-5225 - CVE-2015-5278 - CVE-2015-5279 - CVE-2015-5745 - CVE-2015-6815 - CVE-2015-6855 - CVE-2015-7295 - CVE-2015-7504 - CVE-2015-7512 - CVE-2015-7549 - CVE-2015-8345 - CVE-2015-8504 - CVE-2015-8556 - CVE-2015-8558 - CVE-2015-8567 - CVE-2015-8568 - CVE-2015-8666 - CVE-2015-8701 - CVE-2015-8743 - CVE-2015-8744 - CVE-2015-8745 - CVE-2016-1568 + CVE-2015-1779 + CVE-2015-3456 + CVE-2015-5225 + CVE-2015-5278 + CVE-2015-5279 + CVE-2015-5745 + CVE-2015-6815 + CVE-2015-6855 + CVE-2015-7295 + CVE-2015-7504 + CVE-2015-7512 + CVE-2015-7549 + CVE-2015-8345 + CVE-2015-8504 + CVE-2015-8556 + CVE-2015-8558 + CVE-2015-8567 + CVE-2015-8568 + CVE-2015-8666 + CVE-2015-8701 + CVE-2015-8743 + CVE-2015-8744 + CVE-2015-8745 + CVE-2016-1568 - K_F - K_F + K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-02.xml index 2336c9d4da..15fc874dc5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-02.xml @@ -6,8 +6,8 @@ worst allowing for remote execution of arbitrary code. glibc - February 17, 2016 - February 17, 2016: 1 + 2016-02-17 + 2016-02-17: 1 516884 517082 521932 @@ -88,29 +88,29 @@

- CVE-2013-7423 - CVE-2014-0475 - CVE-2014-0475 - CVE-2014-5119 - CVE-2014-6040 - CVE-2014-7817 - CVE-2014-8121 - CVE-2014-9402 - CVE-2015-1472 - CVE-2015-1781 - CVE-2015-7547 - CVE-2015-8776 - CVE-2015-8778 - CVE-2015-8779 + CVE-2013-7423 + CVE-2014-0475 + CVE-2014-0475 + CVE-2014-5119 + CVE-2014-6040 + CVE-2014-7817 + CVE-2014-8121 + CVE-2014-9402 + CVE-2015-1472 + CVE-2015-1781 + CVE-2015-7547 + CVE-2015-8776 + CVE-2015-8778 + CVE-2015-8779 Google Online Security Blog: "CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow" - + keytoaster - + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-03.xml index bf7e97ac3d..669fafe4d5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201602-03.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in libwmf allowing remote attackers to execute arbitrary code or cause Denial of Service. - - February 27, 2016 - February 27, 2016: 3 + + 2016-02-27 + 2016-02-27: 3 551144 553818 remote @@ -41,21 +41,21 @@ - + CVE-2015-0848 - + CVE-2015-4588 - + CVE-2015-4695 - + CVE-2015-4696 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-01.xml index db97228982..32c5d76385 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-01.xml @@ -6,8 +6,8 @@ in the execution of arbitrary code or Denial of Service. gimp - March 06, 2016 - May 04, 2016: 2 + 2016-03-06 + 2016-05-04: 2 434582 493372 remote @@ -49,14 +49,14 @@ - CVE-2012-4245 - + CVE-2012-4245 + CVE-2013-1913 - + CVE-2013-1978 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-02.xml index 5463f57ab2..1d2216a529 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-02.xml @@ -3,9 +3,9 @@ OSC: Shell command injection OSC is vulnerable to the remote execution of arbitrary code. - - March 06, 2016 - March 06, 2016: 1 + + 2016-03-06 + 2016-03-06: 1 553606 remote @@ -39,10 +39,10 @@ - CVE-2015-0778 + CVE-2015-0778 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-03.xml index d3beb902ce..656bfbeb9d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-03.xml @@ -7,8 +7,8 @@ scripts, and perform cross-site scripting (XSS). roundcube - March 09, 2016 - March 09, 2016: 1 + 2016-03-09 + 2016-03-09: 1 554866 564476 570336 @@ -48,13 +48,13 @@ - + CVE-2015-8105 - + CVE-2015-8770 - K_F - b-man + K_F + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-04.xml index 9415916f96..476185733d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-04.xml @@ -9,8 +9,8 @@ user to overwrite arbitrary files. fuse - March 09, 2016 - March 09, 2016: 1 + 2016-03-09 + 2016-03-09: 1 550152 local @@ -48,12 +48,12 @@ - + CVE-2015-3202 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-05.xml index 1d39ac04a3..32a4f5605d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-05.xml @@ -6,9 +6,9 @@ OpenOffice allowing remote attackers to execute arbitrary code or cause Denial of Service. - - March 09, 2016 - March 09, 2016: 1 + + 2016-03-09 + 2016-03-09: 1 521136 522060 528438 @@ -85,16 +85,16 @@ - CVE-2014-3524 - CVE-2014-3575 - CVE-2014-3693 - CVE-2014-9093 - CVE-2015-1774 - CVE-2015-4551 - CVE-2015-5212 - CVE-2015-5213 - CVE-2015-5214 + CVE-2014-3524 + CVE-2014-3575 + CVE-2014-3693 + CVE-2014-9093 + CVE-2015-1774 + CVE-2015-4551 + CVE-2015-5212 + CVE-2015-5213 + CVE-2015-5214 - K_F - b-man + K_F + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-06.xml index 64b0718465..718b5faf8e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-06.xml @@ -7,8 +7,8 @@ condition. ffmpeg - March 12, 2016 - March 12, 2016: 1 + 2016-03-12 + 2016-03-12: 1 485228 486692 488052 @@ -55,70 +55,70 @@ - CVE-2013-0860 - CVE-2013-0861 - CVE-2013-0862 - CVE-2013-0863 - CVE-2013-0864 - CVE-2013-0865 - CVE-2013-0866 - CVE-2013-0867 - CVE-2013-0868 - CVE-2013-0872 - CVE-2013-0873 - CVE-2013-0874 - CVE-2013-0875 - CVE-2013-0876 - CVE-2013-0877 - CVE-2013-0878 - CVE-2013-4263 - CVE-2013-4264 - CVE-2013-4265 - CVE-2013-7008 - CVE-2013-7009 - CVE-2013-7010 - CVE-2013-7011 - CVE-2013-7012 - CVE-2013-7013 - CVE-2013-7014 - CVE-2013-7015 - CVE-2013-7016 - CVE-2013-7017 - CVE-2013-7018 - CVE-2013-7019 - CVE-2013-7020 - CVE-2013-7021 - CVE-2013-7022 - CVE-2013-7023 - CVE-2013-7024 - CVE-2014-2097 - CVE-2014-2098 - CVE-2014-2263 - CVE-2014-5271 - CVE-2014-5272 - CVE-2014-7937 - CVE-2014-8541 - CVE-2014-8542 - CVE-2014-8543 - CVE-2014-8544 - CVE-2014-8545 - CVE-2014-8546 - CVE-2014-8547 - CVE-2014-8548 - CVE-2014-8549 - CVE-2014-9316 - CVE-2014-9317 - CVE-2014-9318 - CVE-2014-9319 - CVE-2014-9602 - CVE-2014-9603 - CVE-2014-9604 - CVE-2015-3395 + CVE-2013-0860 + CVE-2013-0861 + CVE-2013-0862 + CVE-2013-0863 + CVE-2013-0864 + CVE-2013-0865 + CVE-2013-0866 + CVE-2013-0867 + CVE-2013-0868 + CVE-2013-0872 + CVE-2013-0873 + CVE-2013-0874 + CVE-2013-0875 + CVE-2013-0876 + CVE-2013-0877 + CVE-2013-0878 + CVE-2013-4263 + CVE-2013-4264 + CVE-2013-4265 + CVE-2013-7008 + CVE-2013-7009 + CVE-2013-7010 + CVE-2013-7011 + CVE-2013-7012 + CVE-2013-7013 + CVE-2013-7014 + CVE-2013-7015 + CVE-2013-7016 + CVE-2013-7017 + CVE-2013-7018 + CVE-2013-7019 + CVE-2013-7020 + CVE-2013-7021 + CVE-2013-7022 + CVE-2013-7023 + CVE-2013-7024 + CVE-2014-2097 + CVE-2014-2098 + CVE-2014-2263 + CVE-2014-5271 + CVE-2014-5272 + CVE-2014-7937 + CVE-2014-8541 + CVE-2014-8542 + CVE-2014-8543 + CVE-2014-8544 + CVE-2014-8545 + CVE-2014-8546 + CVE-2014-8547 + CVE-2014-8548 + CVE-2014-8549 + CVE-2014-9316 + CVE-2014-9317 + CVE-2014-9318 + CVE-2014-9319 + CVE-2014-9602 + CVE-2014-9603 + CVE-2014-9604 + CVE-2015-3395 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-07.xml index 0e607902ac..2ef7387515 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-07.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. - - March 12, 2016 - March 12, 2016: 1 + + 2016-03-12 + 2016-03-12: 1 574284 576980 remote @@ -45,52 +45,52 @@ - CVE-2016-0960 - CVE-2016-0961 - CVE-2016-0962 - CVE-2016-0963 - CVE-2016-0964 - CVE-2016-0965 - CVE-2016-0966 - CVE-2016-0967 - CVE-2016-0968 - CVE-2016-0969 - CVE-2016-0970 - CVE-2016-0971 - CVE-2016-0972 - CVE-2016-0973 - CVE-2016-0974 - CVE-2016-0975 - CVE-2016-0976 - CVE-2016-0977 - CVE-2016-0978 - CVE-2016-0979 - CVE-2016-0980 - CVE-2016-0981 - CVE-2016-0982 - CVE-2016-0983 - CVE-2016-0984 - CVE-2016-0985 - CVE-2016-0986 - CVE-2016-0987 - CVE-2016-0988 - CVE-2016-0989 - CVE-2016-0990 - CVE-2016-0991 - CVE-2016-0992 - CVE-2016-0993 - CVE-2016-0994 - CVE-2016-0995 - CVE-2016-0996 - CVE-2016-0997 - CVE-2016-0998 - CVE-2016-0999 - CVE-2016-1000 - CVE-2016-1001 - CVE-2016-1002 - CVE-2016-1005 - CVE-2016-1010 + CVE-2016-0960 + CVE-2016-0961 + CVE-2016-0962 + CVE-2016-0963 + CVE-2016-0964 + CVE-2016-0965 + CVE-2016-0966 + CVE-2016-0967 + CVE-2016-0968 + CVE-2016-0969 + CVE-2016-0970 + CVE-2016-0971 + CVE-2016-0972 + CVE-2016-0973 + CVE-2016-0974 + CVE-2016-0975 + CVE-2016-0976 + CVE-2016-0977 + CVE-2016-0978 + CVE-2016-0979 + CVE-2016-0980 + CVE-2016-0981 + CVE-2016-0982 + CVE-2016-0983 + CVE-2016-0984 + CVE-2016-0985 + CVE-2016-0986 + CVE-2016-0987 + CVE-2016-0988 + CVE-2016-0989 + CVE-2016-0990 + CVE-2016-0991 + CVE-2016-0992 + CVE-2016-0993 + CVE-2016-0994 + CVE-2016-0995 + CVE-2016-0996 + CVE-2016-0997 + CVE-2016-0998 + CVE-2016-0999 + CVE-2016-1000 + CVE-2016-1001 + CVE-2016-1002 + CVE-2016-1005 + CVE-2016-1010 - K_F - b-man + K_F + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-08.xml index 26391272f4..45603eb355 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-08.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in VLC allowing remote attackers to execute arbitrary code or cause Denial of Service. - - March 12, 2016 - March 12, 2016: 1 + + 2016-03-12 + 2016-03-12: 1 534532 537154 542222 @@ -44,49 +44,49 @@ - CVE-2014-1684 - + CVE-2014-1684 + CVE-2014-6440 - + CVE-2014-9597 - + CVE-2014-9598 - + CVE-2014-9625 - + CVE-2014-9626 - + CVE-2014-9627 - + CVE-2014-9628 - + CVE-2014-9629 - + CVE-2014-9630 - + CVE-2015-1202 - + CVE-2015-1203 - + CVE-2015-5949 - + CVE-2015-5949 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-09.xml index 3d90e1d8b2..2fc031e292 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-09.xml @@ -6,9 +6,9 @@ browser, the worst of which allows remote attackers to execute arbitrary code. - - March 12, 2016 - March 12, 2016: 1 + + 2016-03-12 + 2016-03-12: 1 555640 559384 561448 @@ -58,111 +58,111 @@ - CVE-2015-1270 - CVE-2015-1271 - CVE-2015-1272 - CVE-2015-1273 - CVE-2015-1274 - CVE-2015-1275 - CVE-2015-1276 - CVE-2015-1277 - CVE-2015-1278 - CVE-2015-1279 - CVE-2015-1280 - CVE-2015-1281 - CVE-2015-1282 - CVE-2015-1283 - CVE-2015-1284 - CVE-2015-1285 - CVE-2015-1286 - CVE-2015-1287 - CVE-2015-1288 - CVE-2015-1289 - CVE-2015-1291 - CVE-2015-1292 - CVE-2015-1293 - CVE-2015-1294 - CVE-2015-1295 - CVE-2015-1296 - CVE-2015-1297 - CVE-2015-1298 - CVE-2015-1299 - CVE-2015-1300 - CVE-2015-1302 - CVE-2015-1303 - CVE-2015-1304 - CVE-2015-6755 - CVE-2015-6756 - CVE-2015-6757 - CVE-2015-6758 - CVE-2015-6759 - CVE-2015-6760 - CVE-2015-6761 - CVE-2015-6762 - CVE-2015-6763 - CVE-2015-6764 - CVE-2015-6765 - CVE-2015-6766 - CVE-2015-6767 - CVE-2015-6768 - CVE-2015-6769 - CVE-2015-6770 - CVE-2015-6771 - CVE-2015-6772 - CVE-2015-6773 - CVE-2015-6774 - CVE-2015-6775 - CVE-2015-6776 - CVE-2015-6777 - CVE-2015-6778 - CVE-2015-6779 - CVE-2015-6780 - CVE-2015-6781 - CVE-2015-6782 - CVE-2015-6783 - CVE-2015-6784 - CVE-2015-6785 - CVE-2015-6786 - CVE-2015-6787 - CVE-2015-6788 - CVE-2015-6789 - CVE-2015-6790 - CVE-2015-6791 - CVE-2015-6792 - CVE-2015-8126 - CVE-2016-1612 - CVE-2016-1613 - CVE-2016-1614 - CVE-2016-1615 - CVE-2016-1616 - CVE-2016-1617 - CVE-2016-1618 - CVE-2016-1619 - CVE-2016-1620 - CVE-2016-1621 - CVE-2016-1622 - CVE-2016-1623 - CVE-2016-1624 - CVE-2016-1625 - CVE-2016-1626 - CVE-2016-1627 - CVE-2016-1628 - CVE-2016-1629 - CVE-2016-1630 - CVE-2016-1631 - CVE-2016-1632 - CVE-2016-1633 - CVE-2016-1634 - CVE-2016-1635 - CVE-2016-1636 - CVE-2016-1637 - CVE-2016-1638 - CVE-2016-1639 - CVE-2016-1640 - CVE-2016-1641 + CVE-2015-1270 + CVE-2015-1271 + CVE-2015-1272 + CVE-2015-1273 + CVE-2015-1274 + CVE-2015-1275 + CVE-2015-1276 + CVE-2015-1277 + CVE-2015-1278 + CVE-2015-1279 + CVE-2015-1280 + CVE-2015-1281 + CVE-2015-1282 + CVE-2015-1283 + CVE-2015-1284 + CVE-2015-1285 + CVE-2015-1286 + CVE-2015-1287 + CVE-2015-1288 + CVE-2015-1289 + CVE-2015-1291 + CVE-2015-1292 + CVE-2015-1293 + CVE-2015-1294 + CVE-2015-1295 + CVE-2015-1296 + CVE-2015-1297 + CVE-2015-1298 + CVE-2015-1299 + CVE-2015-1300 + CVE-2015-1302 + CVE-2015-1303 + CVE-2015-1304 + CVE-2015-6755 + CVE-2015-6756 + CVE-2015-6757 + CVE-2015-6758 + CVE-2015-6759 + CVE-2015-6760 + CVE-2015-6761 + CVE-2015-6762 + CVE-2015-6763 + CVE-2015-6764 + CVE-2015-6765 + CVE-2015-6766 + CVE-2015-6767 + CVE-2015-6768 + CVE-2015-6769 + CVE-2015-6770 + CVE-2015-6771 + CVE-2015-6772 + CVE-2015-6773 + CVE-2015-6774 + CVE-2015-6775 + CVE-2015-6776 + CVE-2015-6777 + CVE-2015-6778 + CVE-2015-6779 + CVE-2015-6780 + CVE-2015-6781 + CVE-2015-6782 + CVE-2015-6783 + CVE-2015-6784 + CVE-2015-6785 + CVE-2015-6786 + CVE-2015-6787 + CVE-2015-6788 + CVE-2015-6789 + CVE-2015-6790 + CVE-2015-6791 + CVE-2015-6792 + CVE-2015-8126 + CVE-2016-1612 + CVE-2016-1613 + CVE-2016-1614 + CVE-2016-1615 + CVE-2016-1616 + CVE-2016-1617 + CVE-2016-1618 + CVE-2016-1619 + CVE-2016-1620 + CVE-2016-1621 + CVE-2016-1622 + CVE-2016-1623 + CVE-2016-1624 + CVE-2016-1625 + CVE-2016-1626 + CVE-2016-1627 + CVE-2016-1628 + CVE-2016-1629 + CVE-2016-1630 + CVE-2016-1631 + CVE-2016-1632 + CVE-2016-1633 + CVE-2016-1634 + CVE-2016-1635 + CVE-2016-1636 + CVE-2016-1637 + CVE-2016-1638 + CVE-2016-1639 + CVE-2016-1640 + CVE-2016-1641 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-10.xml index 60f735d519..a680da42bf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-10.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in QtGui allowing remote attackers to execute arbitrary code or cause Denial of Service. - - March 12, 2016 - March 12, 2016: 2 + + 2016-03-12 + 2016-03-12: 2 546174 remote @@ -53,12 +53,12 @@ - CVE-2015-1858 - CVE-2015-1859 - CVE-2015-1860 + CVE-2015-1858 + CVE-2015-1859 + CVE-2015-1860 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-11.xml index 7be2e078d7..5a20f623a7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-11.xml @@ -6,9 +6,9 @@ software suites allowing remote attackers to remotely execute arbitrary code, obtain information, and cause Denial of Service. - - March 12, 2016 - March 12, 2016: 1 + + 2016-03-12 + 2016-03-12: 1 525472 540054 546678 @@ -65,97 +65,97 @@ - CVE-2015-0437 - CVE-2015-0437 - CVE-2015-0458 - CVE-2015-0459 - CVE-2015-0460 - CVE-2015-0469 - CVE-2015-0470 - CVE-2015-0477 - CVE-2015-0478 - CVE-2015-0480 - CVE-2015-0484 - CVE-2015-0486 - CVE-2015-0488 - CVE-2015-0491 - CVE-2015-0492 - CVE-2015-2590 - CVE-2015-2601 - CVE-2015-2613 - CVE-2015-2619 - CVE-2015-2621 - CVE-2015-2625 - CVE-2015-2627 - CVE-2015-2628 - CVE-2015-2632 - CVE-2015-2637 - CVE-2015-2638 - CVE-2015-2659 - CVE-2015-2664 - CVE-2015-4000 - CVE-2015-4729 - CVE-2015-4731 - CVE-2015-4732 - CVE-2015-4733 - CVE-2015-4734 - CVE-2015-4734 - CVE-2015-4736 - CVE-2015-4748 - CVE-2015-4760 - CVE-2015-4803 - CVE-2015-4803 - CVE-2015-4805 - CVE-2015-4805 - CVE-2015-4806 - CVE-2015-4806 - CVE-2015-4810 - CVE-2015-4810 - CVE-2015-4835 - CVE-2015-4835 - CVE-2015-4840 - CVE-2015-4840 - CVE-2015-4842 - CVE-2015-4842 - CVE-2015-4843 - CVE-2015-4843 - CVE-2015-4844 - CVE-2015-4844 - CVE-2015-4860 - CVE-2015-4860 - CVE-2015-4868 - CVE-2015-4868 - CVE-2015-4871 - CVE-2015-4871 - CVE-2015-4872 - CVE-2015-4872 - CVE-2015-4881 - CVE-2015-4881 - CVE-2015-4882 - CVE-2015-4882 - CVE-2015-4883 - CVE-2015-4883 - CVE-2015-4893 - CVE-2015-4893 - CVE-2015-4901 - CVE-2015-4901 - CVE-2015-4902 - CVE-2015-4902 - CVE-2015-4903 - CVE-2015-4903 - CVE-2015-4906 - CVE-2015-4906 - CVE-2015-4908 - CVE-2015-4908 - CVE-2015-4911 - CVE-2015-4911 - CVE-2015-4916 - CVE-2015-4916 - CVE-2015-7840 - CVE-2015-7840 + CVE-2015-0437 + CVE-2015-0437 + CVE-2015-0458 + CVE-2015-0459 + CVE-2015-0460 + CVE-2015-0469 + CVE-2015-0470 + CVE-2015-0477 + CVE-2015-0478 + CVE-2015-0480 + CVE-2015-0484 + CVE-2015-0486 + CVE-2015-0488 + CVE-2015-0491 + CVE-2015-0492 + CVE-2015-2590 + CVE-2015-2601 + CVE-2015-2613 + CVE-2015-2619 + CVE-2015-2621 + CVE-2015-2625 + CVE-2015-2627 + CVE-2015-2628 + CVE-2015-2632 + CVE-2015-2637 + CVE-2015-2638 + CVE-2015-2659 + CVE-2015-2664 + CVE-2015-4000 + CVE-2015-4729 + CVE-2015-4731 + CVE-2015-4732 + CVE-2015-4733 + CVE-2015-4734 + CVE-2015-4734 + CVE-2015-4736 + CVE-2015-4748 + CVE-2015-4760 + CVE-2015-4803 + CVE-2015-4803 + CVE-2015-4805 + CVE-2015-4805 + CVE-2015-4806 + CVE-2015-4806 + CVE-2015-4810 + CVE-2015-4810 + CVE-2015-4835 + CVE-2015-4835 + CVE-2015-4840 + CVE-2015-4840 + CVE-2015-4842 + CVE-2015-4842 + CVE-2015-4843 + CVE-2015-4843 + CVE-2015-4844 + CVE-2015-4844 + CVE-2015-4860 + CVE-2015-4860 + CVE-2015-4868 + CVE-2015-4868 + CVE-2015-4871 + CVE-2015-4871 + CVE-2015-4872 + CVE-2015-4872 + CVE-2015-4881 + CVE-2015-4881 + CVE-2015-4882 + CVE-2015-4882 + CVE-2015-4883 + CVE-2015-4883 + CVE-2015-4893 + CVE-2015-4893 + CVE-2015-4901 + CVE-2015-4901 + CVE-2015-4902 + CVE-2015-4902 + CVE-2015-4903 + CVE-2015-4903 + CVE-2015-4906 + CVE-2015-4906 + CVE-2015-4908 + CVE-2015-4908 + CVE-2015-4911 + CVE-2015-4911 + CVE-2015-4916 + CVE-2015-4916 + CVE-2015-7840 + CVE-2015-7840 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-12.xml index 02adf0d45a..5f05efe4d8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-12.xml @@ -7,8 +7,8 @@ arbitrary code. flightgear, simgear - March 12, 2016 - March 12, 2016: 1 + 2016-03-12 + 2016-03-12: 1 426502 468106 remote @@ -67,11 +67,11 @@ - CVE-2012-2090 - CVE-2012-2091 + CVE-2012-2090 + CVE-2012-2091 - + pinkbyte - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-13.xml index 03a3682cd7..412d0c413f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-13.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in libreSwan possibly resulting in Denial of Service. - - March 12, 2016 - March 12, 2016: 1 + + 2016-03-12 + 2016-03-12: 1 550974 558692 remote @@ -47,11 +47,11 @@ - CVE-2015-3204 - CVE-2015-3240 + CVE-2015-3204 + CVE-2015-3240 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-14.xml index 2778a8b214..18283c7a01 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-14.xml @@ -6,9 +6,9 @@ attackers to affect confidentiality, integrity, and availability through various vectors. - - March 12, 2016 - April 19, 2016: 2 + + 2016-03-12 + 2016-04-19: 2 537940 559532 565842 @@ -84,54 +84,54 @@ - CVE-2014-6585 - CVE-2014-6587 - CVE-2014-6591 - CVE-2014-6593 - CVE-2014-6601 - CVE-2015-0383 - CVE-2015-0395 - CVE-2015-0400 - CVE-2015-0407 - CVE-2015-0408 - CVE-2015-0412 - CVE-2015-2590 - CVE-2015-2601 - CVE-2015-2613 - CVE-2015-2621 - CVE-2015-2625 - CVE-2015-2628 - CVE-2015-2632 - CVE-2015-4731 - CVE-2015-4732 - CVE-2015-4733 - CVE-2015-4734 - CVE-2015-4748 - CVE-2015-4749 - CVE-2015-4760 - CVE-2015-4803 - CVE-2015-4805 - CVE-2015-4806 - CVE-2015-4835 - CVE-2015-4840 - CVE-2015-4842 - CVE-2015-4843 - CVE-2015-4844 - CVE-2015-4860 - CVE-2015-4871 - CVE-2015-4872 - CVE-2015-4881 - CVE-2015-4882 - CVE-2015-4883 - CVE-2015-4893 - CVE-2015-4903 - CVE-2015-4911 - CVE-2016-0402 - CVE-2016-0448 - CVE-2016-0466 - CVE-2016-0483 - CVE-2016-0494 + CVE-2014-6585 + CVE-2014-6587 + CVE-2014-6591 + CVE-2014-6593 + CVE-2014-6601 + CVE-2015-0383 + CVE-2015-0395 + CVE-2015-0400 + CVE-2015-0407 + CVE-2015-0408 + CVE-2015-0412 + CVE-2015-2590 + CVE-2015-2601 + CVE-2015-2613 + CVE-2015-2621 + CVE-2015-2625 + CVE-2015-2628 + CVE-2015-2632 + CVE-2015-4731 + CVE-2015-4732 + CVE-2015-4733 + CVE-2015-4734 + CVE-2015-4748 + CVE-2015-4749 + CVE-2015-4760 + CVE-2015-4803 + CVE-2015-4805 + CVE-2015-4806 + CVE-2015-4835 + CVE-2015-4840 + CVE-2015-4842 + CVE-2015-4843 + CVE-2015-4844 + CVE-2015-4860 + CVE-2015-4871 + CVE-2015-4872 + CVE-2015-4881 + CVE-2015-4882 + CVE-2015-4883 + CVE-2015-4893 + CVE-2015-4903 + CVE-2015-4911 + CVE-2016-0402 + CVE-2016-0448 + CVE-2016-0466 + CVE-2016-0483 + CVE-2016-0494 - K_F - b-man + K_F + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-15.xml index f2f0afd685..e4cd79876f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-15.xml @@ -6,8 +6,8 @@ allowing remote attackers to decrypt TLS sessions. openssl - March 20, 2016 - March 20, 2016: 1 + 2016-03-20 + 2016-03-20: 1 575548 remote @@ -63,19 +63,19 @@

- CVE-2016-0702 - CVE-2016-0703 - CVE-2016-0704 - CVE-2016-0705 - CVE-2016-0797 - CVE-2016-0798 - CVE-2016-0799 - CVE-2016-0800 + CVE-2016-0702 + CVE-2016-0703 + CVE-2016-0704 + CVE-2016-0705 + CVE-2016-0797 + CVE-2016-0798 + CVE-2016-0799 + CVE-2016-0800 - + keytoaster - + keytoaster diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-01.xml index 568ca4e21f..a22d9018ee 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-01.xml @@ -7,8 +7,8 @@ condition. QEMU - April 02, 2016 - April 02, 2016: 1 + 2016-04-02 + 2016-04-02: 1 569118 569300 571560 @@ -53,17 +53,17 @@ - CVE-2015-8613 - CVE-2015-8619 - CVE-2016-1714 - CVE-2016-1922 - CVE-2016-1981 - CVE-2016-2197 - CVE-2016-2198 - CVE-2016-2392 - CVE-2016-2538 - CVE-2016-2858 + CVE-2015-8613 + CVE-2015-8619 + CVE-2016-1714 + CVE-2016-1922 + CVE-2016-1981 + CVE-2016-2197 + CVE-2016-2198 + CVE-2016-2392 + CVE-2016-2538 + CVE-2016-2858 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-02.xml index e73c072d47..a485d7a4e2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-02.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code and load arbitrary classes. xalan-java - April 02, 2016 - April 02, 2016: 1 + 2016-04-02 + 2016-04-02: 1 505602 remote @@ -47,8 +47,8 @@ - CVE-2014-0107 + CVE-2014-0107 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-03.xml index f593a0f557..d6730d0c1e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-03.xml @@ -6,8 +6,8 @@ cause a Denial of Service. xen - April 05, 2016 - April 05, 2016: 1 + 2016-04-05 + 2016-04-05: 1 445254 513832 547202 @@ -101,59 +101,59 @@ - CVE-2012-3494 - CVE-2012-3495 - CVE-2012-3496 - CVE-2012-3497 - CVE-2012-3498 - CVE-2012-3515 - CVE-2012-4411 - CVE-2012-4535 - CVE-2012-4536 - CVE-2012-4537 - CVE-2012-4538 - CVE-2012-4539 - CVE-2012-6030 - CVE-2012-6031 - CVE-2012-6032 - CVE-2012-6033 - CVE-2012-6034 - CVE-2012-6035 - CVE-2012-6036 - CVE-2015-2151 - CVE-2015-3209 - CVE-2015-3259 - CVE-2015-3340 - CVE-2015-3456 - CVE-2015-4103 - CVE-2015-4104 - CVE-2015-4105 - CVE-2015-4106 - CVE-2015-4163 - CVE-2015-4164 - CVE-2015-5154 - CVE-2015-7311 - CVE-2015-7504 - CVE-2015-7812 - CVE-2015-7813 - CVE-2015-7814 - CVE-2015-7835 - CVE-2015-7871 - CVE-2015-7969 - CVE-2015-7970 - CVE-2015-7971 - CVE-2015-7972 - CVE-2015-8339 - CVE-2015-8340 - CVE-2015-8341 - CVE-2015-8550 - CVE-2015-8551 - CVE-2015-8552 - CVE-2015-8554 - CVE-2015-8555 - CVE-2016-2270 - CVE-2016-2271 + CVE-2012-3494 + CVE-2012-3495 + CVE-2012-3496 + CVE-2012-3497 + CVE-2012-3498 + CVE-2012-3515 + CVE-2012-4411 + CVE-2012-4535 + CVE-2012-4536 + CVE-2012-4537 + CVE-2012-4538 + CVE-2012-4539 + CVE-2012-6030 + CVE-2012-6031 + CVE-2012-6032 + CVE-2012-6033 + CVE-2012-6034 + CVE-2012-6035 + CVE-2012-6036 + CVE-2015-2151 + CVE-2015-3209 + CVE-2015-3259 + CVE-2015-3340 + CVE-2015-3456 + CVE-2015-4103 + CVE-2015-4104 + CVE-2015-4105 + CVE-2015-4106 + CVE-2015-4163 + CVE-2015-4164 + CVE-2015-5154 + CVE-2015-7311 + CVE-2015-7504 + CVE-2015-7812 + CVE-2015-7813 + CVE-2015-7814 + CVE-2015-7835 + CVE-2015-7871 + CVE-2015-7969 + CVE-2015-7970 + CVE-2015-7971 + CVE-2015-7972 + CVE-2015-8339 + CVE-2015-8340 + CVE-2015-8341 + CVE-2015-8550 + CVE-2015-8551 + CVE-2015-8552 + CVE-2015-8554 + CVE-2015-8555 + CVE-2016-2270 + CVE-2016-2271 - K_F - b-man + K_F + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-04.xml index 0c61a70b85..fa674db4ca 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-04.xml @@ -7,8 +7,8 @@ overflows. libksba - April 26, 2016 - April 26, 2016: 1 + 2016-04-26 + 2016-04-26: 1 546464 remote @@ -53,8 +53,8 @@ Integer overflow in the DN decoder src/dn.c - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-05.xml index 5293801892..9f2069111d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201604-05.xml @@ -6,9 +6,9 @@ local attackers to escalate privileges and remote attackers to cause Denial of Service. - - April 26, 2016 - April 26, 2016: 1 + + 2016-04-26 + 2016-04-26: 1 570564 575780 local, remote @@ -43,51 +43,51 @@ - CVE-2015-8711 - CVE-2015-8712 - CVE-2015-8713 - CVE-2015-8714 - CVE-2015-8715 - CVE-2015-8716 - CVE-2015-8717 - CVE-2015-8718 - CVE-2015-8719 - CVE-2015-8720 - CVE-2015-8721 - CVE-2015-8722 - CVE-2015-8723 - CVE-2015-8724 - CVE-2015-8725 - CVE-2015-8726 - CVE-2015-8727 - CVE-2015-8728 - CVE-2015-8729 - CVE-2015-8730 - CVE-2015-8731 - CVE-2015-8732 - CVE-2015-8733 - CVE-2015-8734 - CVE-2015-8735 - CVE-2015-8736 - CVE-2015-8737 - CVE-2015-8738 - CVE-2015-8739 - CVE-2015-8740 - CVE-2015-8741 - CVE-2015-8742 - CVE-2016-2521 - CVE-2016-2522 - CVE-2016-2523 - CVE-2016-2524 - CVE-2016-2525 - CVE-2016-2526 - CVE-2016-2527 - CVE-2016-2528 - CVE-2016-2529 - CVE-2016-2530 - CVE-2016-2531 - CVE-2016-2532 + CVE-2015-8711 + CVE-2015-8712 + CVE-2015-8713 + CVE-2015-8714 + CVE-2015-8715 + CVE-2015-8716 + CVE-2015-8717 + CVE-2015-8718 + CVE-2015-8719 + CVE-2015-8720 + CVE-2015-8721 + CVE-2015-8722 + CVE-2015-8723 + CVE-2015-8724 + CVE-2015-8725 + CVE-2015-8726 + CVE-2015-8727 + CVE-2015-8728 + CVE-2015-8729 + CVE-2015-8730 + CVE-2015-8731 + CVE-2015-8732 + CVE-2015-8733 + CVE-2015-8734 + CVE-2015-8735 + CVE-2015-8736 + CVE-2015-8737 + CVE-2015-8738 + CVE-2015-8739 + CVE-2015-8740 + CVE-2015-8741 + CVE-2015-8742 + CVE-2016-2521 + CVE-2016-2522 + CVE-2016-2523 + CVE-2016-2524 + CVE-2016-2525 + CVE-2016-2526 + CVE-2016-2527 + CVE-2016-2528 + CVE-2016-2529 + CVE-2016-2530 + CVE-2016-2531 + CVE-2016-2532 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-01.xml index 343e5b0dc1..dfccde7c9a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-01.xml @@ -5,9 +5,9 @@ Git contains multiple vulnerabilities that allow for the remote execution of arbitrary code. - - May 02, 2016 - May 02, 2016: 1 + + 2016-05-02 + 2016-05-02: 1 562884 577482 remote @@ -51,16 +51,16 @@ Buffer overflow in all git versions before 2.7.1 - CVE-2015-7545 - + CVE-2015-7545 + CVE-2016-2315 - + CVE-2016-2324 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-02.xml index a2a670edae..48b35e6884 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-02.xml @@ -6,9 +6,9 @@ browser, the worst of which allows remote attackers to execute arbitrary code. - - May 14, 2016 - May 14, 2016: 1 + + 2016-05-14 + 2016-05-14: 1 578200 579954 581524 @@ -49,35 +49,35 @@ - CVE-2016-1646 - CVE-2016-1647 - CVE-2016-1648 - CVE-2016-1649 - CVE-2016-1650 - CVE-2016-1651 - CVE-2016-1652 - CVE-2016-1653 - CVE-2016-1654 - CVE-2016-1655 - CVE-2016-1656 - CVE-2016-1657 - CVE-2016-1658 - CVE-2016-1659 - CVE-2016-1660 - CVE-2016-1661 - CVE-2016-1662 - CVE-2016-1663 - CVE-2016-1664 - CVE-2016-1665 - CVE-2016-1666 - + CVE-2016-1646 + CVE-2016-1647 + CVE-2016-1648 + CVE-2016-1649 + CVE-2016-1650 + CVE-2016-1651 + CVE-2016-1652 + CVE-2016-1653 + CVE-2016-1654 + CVE-2016-1655 + CVE-2016-1656 + CVE-2016-1657 + CVE-2016-1658 + CVE-2016-1659 + CVE-2016-1660 + CVE-2016-1661 + CVE-2016-1662 + CVE-2016-1663 + CVE-2016-1664 + CVE-2016-1665 + CVE-2016-1666 + CVE-2016-1667 - CVE-2016-1668 - CVE-2016-1669 - CVE-2016-1670 - CVE-2016-1671 + CVE-2016-1668 + CVE-2016-1669 + CVE-2016-1670 + CVE-2016-1671 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-03.xml index d8be23ebd6..be29f33c3b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-03.xml @@ -6,8 +6,8 @@ allows remote attackers to cause a Denial of Service. libfpx - May 30, 2016 - May 30, 2016: 1 + 2016-05-30 + 2016-05-30: 1 395367 remote @@ -46,8 +46,8 @@

- CVE-2012-0025 + CVE-2012-0025 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-04.xml index b568f84a94..501217687f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-04.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in rsync, the worst of which could allow remote attackers to write arbitrary files. - - May 30, 2016 - May 30, 2016: 1 + + 2016-05-30 + 2016-05-30: 1 519108 540000 569140 @@ -41,11 +41,11 @@ - CVE-2014-8242 - CVE-2014-9512 + CVE-2014-8242 + CVE-2014-9512 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-05.xml index f27dedd727..f8277faee3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-05.xml @@ -6,8 +6,8 @@ remote attackers to bypass the auth process and cause Denial of Service. pam - May 31, 2016 - May 31, 2016: 1 + 2016-05-31 + 2016-05-31: 1 493432 505604 553302 @@ -47,13 +47,13 @@ - CVE-2013-7041 - CVE-2014-2583 - CVE-2015-3238 - CVE-2015-3238 + CVE-2013-7041 + CVE-2014-2583 + CVE-2015-3238 + CVE-2015-3238 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-06.xml index e456fb64f7..ae11c27354 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-06.xml @@ -118,194 +118,194 @@ - CVE-2015-2708 - CVE-2015-2708 - CVE-2015-2709 - CVE-2015-2709 - CVE-2015-2710 - CVE-2015-2710 - CVE-2015-2711 - CVE-2015-2711 - CVE-2015-2712 - CVE-2015-2712 - CVE-2015-2713 - CVE-2015-2713 - CVE-2015-2714 - CVE-2015-2714 - CVE-2015-2715 - CVE-2015-2715 - CVE-2015-2716 - CVE-2015-2716 - CVE-2015-2717 - CVE-2015-2717 - CVE-2015-2718 - CVE-2015-2718 - CVE-2015-2721 - CVE-2015-4000 - CVE-2015-4473 - CVE-2015-4473 - CVE-2015-4474 - CVE-2015-4474 - CVE-2015-4475 - CVE-2015-4475 - CVE-2015-4477 - CVE-2015-4477 - CVE-2015-4478 - CVE-2015-4478 - CVE-2015-4479 - CVE-2015-4479 - CVE-2015-4480 - CVE-2015-4480 - CVE-2015-4481 - CVE-2015-4481 - CVE-2015-4482 - CVE-2015-4482 - CVE-2015-4483 - CVE-2015-4483 - CVE-2015-4484 - CVE-2015-4484 - CVE-2015-4485 - CVE-2015-4485 - CVE-2015-4486 - CVE-2015-4486 - CVE-2015-4487 - CVE-2015-4487 - CVE-2015-4488 - CVE-2015-4488 - CVE-2015-4489 - CVE-2015-4489 - CVE-2015-4490 - CVE-2015-4490 - CVE-2015-4491 - CVE-2015-4491 - CVE-2015-4492 - CVE-2015-4492 - CVE-2015-4493 - CVE-2015-4493 - CVE-2015-7181 - CVE-2015-7182 - CVE-2015-7183 - CVE-2015-7575 - CVE-2016-1523 - CVE-2016-1523 - CVE-2016-1930 - CVE-2016-1930 - CVE-2016-1931 - CVE-2016-1931 - CVE-2016-1933 - CVE-2016-1933 - CVE-2016-1935 - CVE-2016-1935 - CVE-2016-1937 - CVE-2016-1937 - CVE-2016-1938 - CVE-2016-1938 - CVE-2016-1939 - CVE-2016-1939 - CVE-2016-1940 - CVE-2016-1940 - CVE-2016-1941 - CVE-2016-1941 - CVE-2016-1942 - CVE-2016-1942 - CVE-2016-1943 - CVE-2016-1943 - CVE-2016-1944 - CVE-2016-1944 - CVE-2016-1945 - CVE-2016-1945 - CVE-2016-1946 - CVE-2016-1946 - CVE-2016-1947 - CVE-2016-1947 - CVE-2016-1948 - CVE-2016-1948 - CVE-2016-1949 - CVE-2016-1949 - CVE-2016-1950 - CVE-2016-1950 - CVE-2016-1952 - CVE-2016-1952 - CVE-2016-1953 - CVE-2016-1953 - CVE-2016-1954 - CVE-2016-1954 - CVE-2016-1955 - CVE-2016-1955 - CVE-2016-1956 - CVE-2016-1956 - CVE-2016-1957 - CVE-2016-1957 - CVE-2016-1958 - CVE-2016-1958 - CVE-2016-1959 - CVE-2016-1959 - CVE-2016-1960 - CVE-2016-1960 - CVE-2016-1961 - CVE-2016-1961 - CVE-2016-1962 - CVE-2016-1962 - CVE-2016-1963 - CVE-2016-1963 - CVE-2016-1964 - CVE-2016-1964 - CVE-2016-1965 - CVE-2016-1965 - CVE-2016-1966 - CVE-2016-1966 - CVE-2016-1967 - CVE-2016-1967 - CVE-2016-1968 - CVE-2016-1968 - CVE-2016-1969 - CVE-2016-1969 - CVE-2016-1970 - CVE-2016-1970 - CVE-2016-1971 - CVE-2016-1971 - CVE-2016-1972 - CVE-2016-1972 - CVE-2016-1973 - CVE-2016-1973 - CVE-2016-1974 - CVE-2016-1974 - CVE-2016-1975 - CVE-2016-1975 - CVE-2016-1976 - CVE-2016-1976 - CVE-2016-1977 - CVE-2016-1977 - CVE-2016-1978 - CVE-2016-1978 - CVE-2016-1979 - CVE-2016-1979 - CVE-2016-2790 - CVE-2016-2790 - CVE-2016-2791 - CVE-2016-2791 - CVE-2016-2792 - CVE-2016-2792 - CVE-2016-2793 - CVE-2016-2793 - CVE-2016-2794 - CVE-2016-2794 - CVE-2016-2795 - CVE-2016-2795 - CVE-2016-2796 - CVE-2016-2796 - CVE-2016-2797 - CVE-2016-2797 - CVE-2016-2798 - CVE-2016-2798 - CVE-2016-2799 - CVE-2016-2799 - CVE-2016-2800 - CVE-2016-2800 - CVE-2016-2801 - CVE-2016-2801 - CVE-2016-2802 - CVE-2016-2802 + CVE-2015-2708 + CVE-2015-2708 + CVE-2015-2709 + CVE-2015-2709 + CVE-2015-2710 + CVE-2015-2710 + CVE-2015-2711 + CVE-2015-2711 + CVE-2015-2712 + CVE-2015-2712 + CVE-2015-2713 + CVE-2015-2713 + CVE-2015-2714 + CVE-2015-2714 + CVE-2015-2715 + CVE-2015-2715 + CVE-2015-2716 + CVE-2015-2716 + CVE-2015-2717 + CVE-2015-2717 + CVE-2015-2718 + CVE-2015-2718 + CVE-2015-2721 + CVE-2015-4000 + CVE-2015-4473 + CVE-2015-4473 + CVE-2015-4474 + CVE-2015-4474 + CVE-2015-4475 + CVE-2015-4475 + CVE-2015-4477 + CVE-2015-4477 + CVE-2015-4478 + CVE-2015-4478 + CVE-2015-4479 + CVE-2015-4479 + CVE-2015-4480 + CVE-2015-4480 + CVE-2015-4481 + CVE-2015-4481 + CVE-2015-4482 + CVE-2015-4482 + CVE-2015-4483 + CVE-2015-4483 + CVE-2015-4484 + CVE-2015-4484 + CVE-2015-4485 + CVE-2015-4485 + CVE-2015-4486 + CVE-2015-4486 + CVE-2015-4487 + CVE-2015-4487 + CVE-2015-4488 + CVE-2015-4488 + CVE-2015-4489 + CVE-2015-4489 + CVE-2015-4490 + CVE-2015-4490 + CVE-2015-4491 + CVE-2015-4491 + CVE-2015-4492 + CVE-2015-4492 + CVE-2015-4493 + CVE-2015-4493 + CVE-2015-7181 + CVE-2015-7182 + CVE-2015-7183 + CVE-2015-7575 + CVE-2016-1523 + CVE-2016-1523 + CVE-2016-1930 + CVE-2016-1930 + CVE-2016-1931 + CVE-2016-1931 + CVE-2016-1933 + CVE-2016-1933 + CVE-2016-1935 + CVE-2016-1935 + CVE-2016-1937 + CVE-2016-1937 + CVE-2016-1938 + CVE-2016-1938 + CVE-2016-1939 + CVE-2016-1939 + CVE-2016-1940 + CVE-2016-1940 + CVE-2016-1941 + CVE-2016-1941 + CVE-2016-1942 + CVE-2016-1942 + CVE-2016-1943 + CVE-2016-1943 + CVE-2016-1944 + CVE-2016-1944 + CVE-2016-1945 + CVE-2016-1945 + CVE-2016-1946 + CVE-2016-1946 + CVE-2016-1947 + CVE-2016-1947 + CVE-2016-1948 + CVE-2016-1948 + CVE-2016-1949 + CVE-2016-1949 + CVE-2016-1950 + CVE-2016-1950 + CVE-2016-1952 + CVE-2016-1952 + CVE-2016-1953 + CVE-2016-1953 + CVE-2016-1954 + CVE-2016-1954 + CVE-2016-1955 + CVE-2016-1955 + CVE-2016-1956 + CVE-2016-1956 + CVE-2016-1957 + CVE-2016-1957 + CVE-2016-1958 + CVE-2016-1958 + CVE-2016-1959 + CVE-2016-1959 + CVE-2016-1960 + CVE-2016-1960 + CVE-2016-1961 + CVE-2016-1961 + CVE-2016-1962 + CVE-2016-1962 + CVE-2016-1963 + CVE-2016-1963 + CVE-2016-1964 + CVE-2016-1964 + CVE-2016-1965 + CVE-2016-1965 + CVE-2016-1966 + CVE-2016-1966 + CVE-2016-1967 + CVE-2016-1967 + CVE-2016-1968 + CVE-2016-1968 + CVE-2016-1969 + CVE-2016-1969 + CVE-2016-1970 + CVE-2016-1970 + CVE-2016-1971 + CVE-2016-1971 + CVE-2016-1972 + CVE-2016-1972 + CVE-2016-1973 + CVE-2016-1973 + CVE-2016-1974 + CVE-2016-1974 + CVE-2016-1975 + CVE-2016-1975 + CVE-2016-1976 + CVE-2016-1976 + CVE-2016-1977 + CVE-2016-1977 + CVE-2016-1978 + CVE-2016-1978 + CVE-2016-1979 + CVE-2016-1979 + CVE-2016-2790 + CVE-2016-2790 + CVE-2016-2791 + CVE-2016-2791 + CVE-2016-2792 + CVE-2016-2792 + CVE-2016-2793 + CVE-2016-2793 + CVE-2016-2794 + CVE-2016-2794 + CVE-2016-2795 + CVE-2016-2795 + CVE-2016-2796 + CVE-2016-2796 + CVE-2016-2797 + CVE-2016-2797 + CVE-2016-2798 + CVE-2016-2798 + CVE-2016-2799 + CVE-2016-2799 + CVE-2016-2800 + CVE-2016-2800 + CVE-2016-2801 + CVE-2016-2801 + CVE-2016-2802 + CVE-2016-2802 BlueKnight b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-01.xml index a06cdb60a8..fb5646bcc9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-01.xml @@ -6,9 +6,9 @@ which could lead to arbitrary code execution, or cause a Denial of Service condition. - - June 05, 2016 - June 05, 2016: 2 + + 2016-06-05 + 2016-06-05: 2 565080 576524 remote @@ -45,11 +45,11 @@ - CVE-2015-5309 - CVE-2016-2563 + CVE-2015-5309 + CVE-2016-2563 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-02.xml index c2d4bbc0b2..d3c9bf5c93 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-02.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in Puppet Server and Agent, the worst of which could lead to arbitrary code execution. - - June 05, 2016 - June 05, 2016: 3 + + 2016-06-05 + 2016-06-05: 3 577450 581372 remote @@ -56,9 +56,9 @@ - CVE-2016-2785 - CVE-2016-2786 + CVE-2016-2785 + CVE-2016-2786 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-03.xml index 09e90db955..41a3ca825d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-03.xml @@ -7,8 +7,8 @@ information. libjpeg-turbo - June 05, 2016 - June 05, 2016: 2 + 2016-06-05 + 2016-06-05: 2 491150 531418 remote @@ -45,11 +45,11 @@ - CVE-2013-6629 - CVE-2013-6630 + CVE-2013-6629 + CVE-2013-6630 - + BlueKnight - mrueg + mrueg diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-04.xml index c1a28955be..b9ab5c44fc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-04.xml @@ -7,8 +7,8 @@ information. gnupg - June 05, 2016 - June 10, 2016: 2 + 2016-06-05 + 2016-06-10: 2 534110 541564 541568 @@ -69,11 +69,11 @@ - CVE-2014-3591 - CVE-2015-0837 + CVE-2014-3591 + CVE-2015-0837 - + BlueKnight - stanley + stanley diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-05.xml index 057c5fd281..c83207b925 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-05.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in spice, the worst of which may result in the remote execution of arbitrary code. - - June 16, 2016 - June 16, 2016: 1 + + 2016-06-16 + 2016-06-16: 1 560006 562890 584126 @@ -46,15 +46,15 @@ - CVE-2015-5260 - CVE-2015-5260 - CVE-2015-5261 - CVE-2015-5261 - CVE-2016-0749 - CVE-2016-2150 + CVE-2015-5260 + CVE-2015-5260 + CVE-2015-5261 + CVE-2015-5261 + CVE-2016-0749 + CVE-2016-2150 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-06.xml index a9cd5355ac..012478a938 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-06.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in nginx, the worst of which may allow a remote attacker to cause a Denial of Service. - - June 17, 2016 - June 17, 2016: 1 + + 2016-06-17 + 2016-06-17: 1 560854 573046 584744 @@ -45,15 +45,15 @@ - + CVE-2013-3587 - CVE-2016-0742 - CVE-2016-0746 - CVE-2016-0747 - CVE-2016-4450 - CVE-2016-4450 + CVE-2016-0742 + CVE-2016-0746 + CVE-2016-0747 + CVE-2016-4450 + CVE-2016-4450 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-07.xml index c589b40def..d17e4f6a69 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-07.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in dhcpcd allowing remote attackers to possibly execute arbitrary code or cause a Denial of Service. - - June 18, 2016 - June 18, 2016: 2 + + 2016-06-18 + 2016-06-18: 2 571152 remote @@ -43,9 +43,9 @@ - CVE-2016-1503 - CVE-2016-1504 + CVE-2016-1503 + CVE-2016-1504 - K_F - b-man + K_F + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-08.xml index 8824cfd36f..57de58c66a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-08.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. - - June 18, 2016 - June 18, 2016: 1 + + 2016-06-18 + 2016-06-18: 1 579166 582670 586044 @@ -46,23 +46,23 @@ - CVE-2016-1019 - CVE-2016-1019 - CVE-2016-1019 - CVE-2016-4117 - CVE-2016-4117 - CVE-2016-4120 - CVE-2016-4120 - CVE-2016-4120 - CVE-2016-4121 - CVE-2016-4160 - CVE-2016-4161 - CVE-2016-4162 - CVE-2016-4163 - CVE-2016-4171 - CVE-2016-4171 - CVE-2016-4171 + CVE-2016-1019 + CVE-2016-1019 + CVE-2016-1019 + CVE-2016-4117 + CVE-2016-4117 + CVE-2016-4120 + CVE-2016-4120 + CVE-2016-4120 + CVE-2016-4121 + CVE-2016-4160 + CVE-2016-4161 + CVE-2016-4162 + CVE-2016-4163 + CVE-2016-4171 + CVE-2016-4171 + CVE-2016-4171 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-09.xml index 46661c8205..9da90fcc9c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-09.xml @@ -6,9 +6,9 @@ which could lead to arbitrary code execution or Denial of Service condition. - - June 18, 2016 - June 18, 2016: 1 + + 2016-06-18 + 2016-06-18: 1 528554 553732 571868 @@ -47,16 +47,16 @@ - CVE-2014-9676 - CVE-2016-1897 - CVE-2016-1898 - CVE-2016-2213 - CVE-2016-2326 - CVE-2016-2327 - CVE-2016-2328 - CVE-2016-2329 - CVE-2016-2330 + CVE-2014-9676 + CVE-2016-1897 + CVE-2016-1898 + CVE-2016-2213 + CVE-2016-2326 + CVE-2016-2327 + CVE-2016-2328 + CVE-2016-2329 + CVE-2016-2330 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-10.xml index 16f5d40e2e..bc040e51a5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-10.xml @@ -7,8 +7,8 @@ condition. php - June 19, 2016 - June 19, 2016: 2 + 2016-06-19 + 2016-06-19: 2 537586 541098 544186 @@ -80,41 +80,41 @@ - CVE-2013-6501 - CVE-2014-9705 - CVE-2014-9709 - CVE-2015-0231 - CVE-2015-0273 - CVE-2015-1351 - CVE-2015-1352 - CVE-2015-2301 - CVE-2015-2348 - CVE-2015-2783 - CVE-2015-2787 - CVE-2015-3329 - CVE-2015-3330 - CVE-2015-4021 - CVE-2015-4022 - CVE-2015-4025 - CVE-2015-4026 - CVE-2015-4147 - CVE-2015-4148 - CVE-2015-4642 - CVE-2015-4643 - CVE-2015-4644 - CVE-2015-6831 - CVE-2015-6832 - CVE-2015-6833 - CVE-2015-6834 - CVE-2015-6835 - CVE-2015-6836 - CVE-2015-6837 - CVE-2015-6838 - CVE-2015-7803 - CVE-2015-7804 + CVE-2013-6501 + CVE-2014-9705 + CVE-2014-9709 + CVE-2015-0231 + CVE-2015-0273 + CVE-2015-1351 + CVE-2015-1352 + CVE-2015-2301 + CVE-2015-2348 + CVE-2015-2783 + CVE-2015-2787 + CVE-2015-3329 + CVE-2015-3330 + CVE-2015-4021 + CVE-2015-4022 + CVE-2015-4025 + CVE-2015-4026 + CVE-2015-4147 + CVE-2015-4148 + CVE-2015-4642 + CVE-2015-4643 + CVE-2015-4644 + CVE-2015-6831 + CVE-2015-6832 + CVE-2015-6833 + CVE-2015-6834 + CVE-2015-6835 + CVE-2015-6836 + CVE-2015-6837 + CVE-2015-6838 + CVE-2015-7803 + CVE-2015-7804 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-11.xml index fbe5dfb4ac..6659a531d4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-11.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in claws-mail, particularly in the default SSL implementation. - - June 26, 2016 - June 26, 2016: 1 + + 2016-06-26 + 2016-06-26: 1 525588 569010 570692 @@ -43,14 +43,14 @@ - CVE-2014-3566 - CVE-2015-8614 - CVE-2015-8614 - CVE-2015-8708 - CVE-2015-8708 + CVE-2014-3566 + CVE-2015-8614 + CVE-2015-8614 + CVE-2015-8708 + CVE-2015-8708 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-12.xml index 385fd4f80f..a28afbb917 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-12.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in libssh and libssh2, the worst of which allows remote attackers to cause Denial of Service. - - June 26, 2016 - June 26, 2016: 1 + + 2016-06-26 + 2016-06-26: 1 533366 575474 575484 @@ -67,12 +67,12 @@ - CVE-2014-8132 - CVE-2016-0739 - CVE-2016-0787 + CVE-2014-8132 + CVE-2016-0739 + CVE-2016-0787 - + keytoaster - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-13.xml index d4c5d26f38..7872cea25c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-13.xml @@ -5,7 +5,7 @@ sudo is vulnerable to an escalation of privileges via a symlink attack. - + 2016-06-26 2017-04-17: 2 564774 @@ -45,7 +45,7 @@ - + CVE-2015-5602 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-14.xml index 2969b2382c..3fea6158d7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-14.xml @@ -6,8 +6,8 @@ overflows and possible Denials of Service. imagemagick - June 26, 2016 - June 26, 2016: 1 + 2016-06-26 + 2016-06-26: 1 534106 562892 remote @@ -60,8 +60,8 @@ Integer and Buffer overflow in coders/icon.c
- + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-15.xml index 6360f80856..cb91811525 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-15.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in FreeXL, allowing remote attackers to executive arbitrary code or cause Denial of Service. - - June 26, 2016 - June 26, 2016: 1 + + 2016-06-26 + 2016-06-26: 1 544426 remote @@ -44,10 +44,10 @@ - CVE-2015-2753 - CVE-2015-2754 - CVE-2015-2776 + CVE-2015-2753 + CVE-2015-2754 + CVE-2015-2776 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-16.xml index 0e44793870..5392a5a990 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-16.xml @@ -5,9 +5,9 @@ A buffer overflow in PLIB might allow remote attackers to execute arbitrary code. - - June 26, 2016 - June 26, 2016: 1 + + 2016-06-26 + 2016-06-26: 1 395553 remote @@ -45,8 +45,8 @@ - CVE-2011-4620 + CVE-2011-4620 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-17.xml index 3884cf1e74..fb537b3353 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-17.xml @@ -7,8 +7,8 @@ cause Denial of Service. wpa_supplicant - June 27, 2016 - June 27, 2016: 1 + 2016-06-27 + 2016-06-27: 1 524928 547492 548742 @@ -62,16 +62,16 @@ - CVE-2014-3686 - CVE-2014-3686 - CVE-2015-1863 - CVE-2015-4141 - CVE-2015-4142 - CVE-2015-4143 - CVE-2015-4144 - CVE-2015-4145 - CVE-2015-4146 + CVE-2014-3686 + CVE-2014-3686 + CVE-2015-1863 + CVE-2015-4141 + CVE-2015-4142 + CVE-2015-4143 + CVE-2015-4144 + CVE-2015-4145 + CVE-2015-4146 - K_F - b-man + K_F + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml index 343d7bb036..5ff82f4c01 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml @@ -6,9 +6,9 @@ attackers to affect confidentiality, integrity, and availability through various vectors. - - June 27, 2016 - June 27, 2016: 1 + + 2016-06-27 + 2016-06-27: 1 578300 578788 581028 @@ -68,17 +68,17 @@ - CVE-2016-0636 - CVE-2016-0636 - CVE-2016-0686 - CVE-2016-0687 - CVE-2016-0695 - CVE-2016-3422 - CVE-2016-3425 - CVE-2016-3427 - CVE-2016-3443 - CVE-2016-3449 + CVE-2016-0636 + CVE-2016-0636 + CVE-2016-0686 + CVE-2016-0687 + CVE-2016-0695 + CVE-2016-3422 + CVE-2016-3425 + CVE-2016-3427 + CVE-2016-3443 + CVE-2016-3449 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-19.xml index 4bf0399fec..4092b0febd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-19.xml @@ -4,8 +4,8 @@ kwalletd: Information disclosure Kwalletd password stores are vulnerable to codebook attacks. kwalletd - June 27, 2016 - June 27, 2016: 1 + 2016-06-27 + 2016-06-27: 1 496768 local @@ -40,8 +40,8 @@ - CVE-2013-7252 + CVE-2013-7252 - K_F - b-man + K_F + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-01.xml index 14bd98ee49..ec9197b479 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-01.xml @@ -6,9 +6,9 @@ which could lead to arbitrary code execution, or cause a Denial of Service condition. - - July 09, 2016 - July 09, 2016: 1 + + 2016-07-09 + 2016-07-09: 1 536276 575542 578970 @@ -50,29 +50,29 @@ - CVE-2014-6270 - CVE-2014-6270 - CVE-2016-2569 - CVE-2016-2569 - CVE-2016-2570 - CVE-2016-2570 - CVE-2016-2571 - CVE-2016-2571 - CVE-2016-2572 - CVE-2016-2572 - CVE-2016-3947 - CVE-2016-3948 - CVE-2016-4051 - CVE-2016-4052 - CVE-2016-4053 - CVE-2016-4054 - CVE-2016-4553 - CVE-2016-4554 - CVE-2016-4555 - CVE-2016-4556 + CVE-2014-6270 + CVE-2014-6270 + CVE-2016-2569 + CVE-2016-2569 + CVE-2016-2570 + CVE-2016-2570 + CVE-2016-2571 + CVE-2016-2571 + CVE-2016-2572 + CVE-2016-2572 + CVE-2016-3947 + CVE-2016-3948 + CVE-2016-4051 + CVE-2016-4052 + CVE-2016-4053 + CVE-2016-4054 + CVE-2016-4553 + CVE-2016-4554 + CVE-2016-4555 + CVE-2016-4556 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-02.xml index 3b1c38fec8..00adac250b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-02.xml @@ -6,9 +6,9 @@ which could lead to arbitrary code execution, or cause a Denial of Service condition. - - July 09, 2016 - July 09, 2016: 1 + + 2016-07-09 + 2016-07-09: 1 529952 551240 553300 @@ -48,31 +48,31 @@ - CVE-2014-8964 - CVE-2014-8964 - CVE-2015-5073 - CVE-2015-5073 - CVE-2015-5073 - CVE-2015-8380 - CVE-2015-8381 - CVE-2015-8383 - CVE-2015-8384 - CVE-2015-8385 - CVE-2015-8386 - CVE-2015-8387 - CVE-2015-8388 - CVE-2015-8389 - CVE-2015-8390 - CVE-2015-8391 - CVE-2015-8392 - CVE-2015-8393 - CVE-2015-8394 - CVE-2015-8395 - CVE-2016-1283 - CVE-2016-1283 + CVE-2014-8964 + CVE-2014-8964 + CVE-2015-5073 + CVE-2015-5073 + CVE-2015-5073 + CVE-2015-8380 + CVE-2015-8381 + CVE-2015-8383 + CVE-2015-8384 + CVE-2015-8385 + CVE-2015-8386 + CVE-2015-8387 + CVE-2015-8388 + CVE-2015-8389 + CVE-2015-8390 + CVE-2015-8391 + CVE-2015-8392 + CVE-2015-8393 + CVE-2015-8394 + CVE-2015-8395 + CVE-2016-1283 + CVE-2016-1283 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-03.xml index ee94c2cae8..3c6929bd4c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-03.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. - - July 13, 2016 - July 13, 2016: 2 + + 2016-07-13 + 2016-07-13: 2 588738 remote @@ -44,40 +44,40 @@ - CVE-2016-4217 - CVE-2016-4218 - CVE-2016-4219 - CVE-2016-4220 - CVE-2016-4221 - CVE-2016-4222 - CVE-2016-4223 - CVE-2016-4224 - CVE-2016-4225 - CVE-2016-4226 - CVE-2016-4227 - CVE-2016-4228 - CVE-2016-4229 - CVE-2016-4230 - CVE-2016-4231 - CVE-2016-4232 - CVE-2016-4233 - CVE-2016-4234 - CVE-2016-4235 - CVE-2016-4236 - CVE-2016-4237 - CVE-2016-4238 - CVE-2016-4239 - CVE-2016-4240 - CVE-2016-4241 - CVE-2016-4242 - CVE-2016-4243 - CVE-2016-4244 - CVE-2016-4245 - CVE-2016-4246 - CVE-2016-4247 - CVE-2016-4248 - CVE-2016-4249 + CVE-2016-4217 + CVE-2016-4218 + CVE-2016-4219 + CVE-2016-4220 + CVE-2016-4221 + CVE-2016-4222 + CVE-2016-4223 + CVE-2016-4224 + CVE-2016-4225 + CVE-2016-4226 + CVE-2016-4227 + CVE-2016-4228 + CVE-2016-4229 + CVE-2016-4230 + CVE-2016-4231 + CVE-2016-4232 + CVE-2016-4233 + CVE-2016-4234 + CVE-2016-4235 + CVE-2016-4236 + CVE-2016-4237 + CVE-2016-4238 + CVE-2016-4239 + CVE-2016-4240 + CVE-2016-4241 + CVE-2016-4242 + CVE-2016-4243 + CVE-2016-4244 + CVE-2016-4245 + CVE-2016-4246 + CVE-2016-4247 + CVE-2016-4248 + CVE-2016-4249 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-04.xml index f52915c354..fcd734f2c8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-04.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in GD, the worst of which allows remote attackers to execute arbitrary code. - - July 16, 2016 - July 16, 2016: 1 + + 2016-07-16 + 2016-07-16: 1 504872 538686 581942 @@ -43,16 +43,16 @@ - + CVE-2014-2497 - + CVE-2014-9709 - CVE-2016-3074 + CVE-2016-3074 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-05.xml index c5c22623d8..64da85913f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-05.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in Cacti, the worst of which could lead to the remote execution of arbitrary code. - - July 16, 2016 - July 16, 2016: 1 + + 2016-07-16 + 2016-07-16: 1 519900 568400 570984 @@ -46,17 +46,17 @@ - CVE-2014-5261 - CVE-2014-5262 - CVE-2015-8369 - CVE-2015-8377 - CVE-2015-8604 - CVE-2016-2313 - CVE-2016-3172 - CVE-2016-3659 + CVE-2014-5261 + CVE-2014-5262 + CVE-2015-8369 + CVE-2015-8377 + CVE-2015-8604 + CVE-2016-2313 + CVE-2016-3172 + CVE-2016-3659 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-06.xml index ece3869dc5..c6d4cce21d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-06.xml @@ -5,9 +5,9 @@ A buffer overflow in CUPS might allow remote attackers to execute arbitrary code. - - July 16, 2016 - July 16, 2016: 1 + + 2016-07-16 + 2016-07-16: 1 539582 remote @@ -41,8 +41,8 @@ - CVE-2014-9679 + CVE-2014-9679 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-07.xml index ba6017d172..b1b4393732 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-07.xml @@ -6,9 +6,9 @@ browser, the worst of which allows remote attackers to execute arbitrary code. - - July 16, 2016 - July 16, 2016: 1 + + 2016-07-16 + 2016-07-16: 1 584310 586704 remote @@ -47,31 +47,31 @@ - CVE-2016-1672 - CVE-2016-1673 - CVE-2016-1674 - CVE-2016-1675 - CVE-2016-1676 - CVE-2016-1677 - CVE-2016-1678 - CVE-2016-1679 - CVE-2016-1680 - CVE-2016-1681 - CVE-2016-1682 - CVE-2016-1683 - CVE-2016-1684 - CVE-2016-1685 - CVE-2016-1686 - CVE-2016-1687 - CVE-2016-1688 - CVE-2016-1689 - CVE-2016-1690 - CVE-2016-1691 - CVE-2016-1692 - CVE-2016-1693 - CVE-2016-1694 - CVE-2016-1695 + CVE-2016-1672 + CVE-2016-1673 + CVE-2016-1674 + CVE-2016-1675 + CVE-2016-1676 + CVE-2016-1677 + CVE-2016-1678 + CVE-2016-1679 + CVE-2016-1680 + CVE-2016-1681 + CVE-2016-1682 + CVE-2016-1683 + CVE-2016-1684 + CVE-2016-1685 + CVE-2016-1686 + CVE-2016-1687 + CVE-2016-1688 + CVE-2016-1689 + CVE-2016-1690 + CVE-2016-1691 + CVE-2016-1692 + CVE-2016-1693 + CVE-2016-1694 + CVE-2016-1695 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-08.xml index 144c5e53cd..635491a7b3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-08.xml @@ -5,9 +5,9 @@ A vulnerability has been found in Dropbear, which allows remote authenticated users to bypass intended shell-command restrictions. - - July 20, 2016 - July 20, 2016: 1 + + 2016-07-20 + 2016-07-20: 1 577050 remote @@ -42,8 +42,8 @@ - CVE-2016-3116 + CVE-2016-3116 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-09.xml index 214bff4b77..b772c03d94 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-09.xml @@ -6,8 +6,8 @@ property, which could lead to the remote execution of arbitrary code. commons-beanutils - July 20, 2016 - July 20, 2016: 1 + 2016-07-20 + 2016-07-20: 1 534498 remote @@ -45,8 +45,8 @@ - CVE-2014-0114 + CVE-2014-0114 - Zlogene - b-man + Zlogene + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-10.xml index d3640d8930..28fc94c6fa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-10.xml @@ -5,9 +5,9 @@ Improper input validation in Varnish allows remote attackers to conduct HTTP smuggling attacks, and possibly trigger a buffer overflow. - - July 20, 2016 - July 20, 2016: 1 + + 2016-07-20 + 2016-07-20: 1 542886 remote @@ -42,8 +42,8 @@ - CVE-2015-8852 + CVE-2015-8852 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-11.xml index 66a4c0918a..7b8c6f1080 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-11.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in Bugzilla, the worst of which could lead to the escalation of privileges. - - July 20, 2016 - July 20, 2016: 1 + + 2016-07-20 + 2016-07-20: 1 524316 537448 560406 @@ -53,16 +53,16 @@ - + CVE-2014-1572 - + CVE-2014-1573 - CVE-2014-8630 + CVE-2014-8630 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-12.xml index a8ba395b4d..2106141c31 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-12.xml @@ -6,8 +6,8 @@ unsanitized data to a data source or escalate privileges. exim - July 20, 2016 - July 20, 2016: 1 + 2016-07-20 + 2016-07-20: 1 517934 576582 local @@ -46,10 +46,10 @@ - CVE-2014-2972 + CVE-2014-2972 - + keytoaster - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-13.xml index 5ac0fc4466..6e8193cf9d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-13.xml @@ -5,9 +5,9 @@ A buffer overflow in libbsd might allow remote attackers to execute arbitrary code. - - July 20, 2016 - July 20, 2016: 1 + + 2016-07-20 + 2016-07-20: 1 573160 remote @@ -47,8 +47,8 @@ - CVE-2016-2090 + CVE-2016-2090 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-14.xml index cf90babd7a..0698d5a0bb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-14.xml @@ -6,8 +6,8 @@ escalated privileges or write arbitrary files. ansible - July 20, 2016 - July 20, 2016: 2 + 2016-07-20 + 2016-07-20: 2 578814 local @@ -50,8 +50,8 @@ - CVE-2016-3096 + CVE-2016-3096 - b-man - ackle + b-man + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-15.xml index 41bcc4b862..62f1f9503d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-15.xml @@ -6,8 +6,8 @@ could lead to Denial of Service. ntp - July 20, 2016 - July 20, 2016: 1 + 2016-07-20 + 2016-07-20: 1 563774 572452 581528 @@ -42,50 +42,50 @@ - CVE-2015-7691 - CVE-2015-7692 - CVE-2015-7701 - CVE-2015-7702 - CVE-2015-7703 - CVE-2015-7704 - CVE-2015-7705 - CVE-2015-7848 - CVE-2015-7849 - CVE-2015-7850 - CVE-2015-7851 - CVE-2015-7852 - CVE-2015-7853 - CVE-2015-7854 - CVE-2015-7855 - CVE-2015-7871 - CVE-2015-7973 - CVE-2015-7974 - CVE-2015-7975 - CVE-2015-7976 - CVE-2015-7977 - CVE-2015-7978 - CVE-2015-7979 - CVE-2015-8138 - CVE-2015-8139 - CVE-2015-8140 - CVE-2015-8158 - CVE-2016-1547 - CVE-2016-1548 - CVE-2016-1549 - CVE-2016-1550 - CVE-2016-1551 - CVE-2016-2516 - CVE-2016-2517 - CVE-2016-2518 - CVE-2016-2519 - CVE-2016-4953 - CVE-2016-4954 - CVE-2016-4955 - CVE-2016-4956 - CVE-2016-4957 + CVE-2015-7691 + CVE-2015-7692 + CVE-2015-7701 + CVE-2015-7702 + CVE-2015-7703 + CVE-2015-7704 + CVE-2015-7705 + CVE-2015-7848 + CVE-2015-7849 + CVE-2015-7850 + CVE-2015-7851 + CVE-2015-7852 + CVE-2015-7853 + CVE-2015-7854 + CVE-2015-7855 + CVE-2015-7871 + CVE-2015-7973 + CVE-2015-7974 + CVE-2015-7975 + CVE-2015-7976 + CVE-2015-7977 + CVE-2015-7978 + CVE-2015-7979 + CVE-2015-8138 + CVE-2015-8139 + CVE-2015-8140 + CVE-2015-8158 + CVE-2016-1547 + CVE-2016-1548 + CVE-2016-1549 + CVE-2016-1550 + CVE-2016-1551 + CVE-2016-2516 + CVE-2016-2517 + CVE-2016-2518 + CVE-2016-2519 + CVE-2016-4953 + CVE-2016-4954 + CVE-2016-4955 + CVE-2016-4956 + CVE-2016-4957 - K_F - + K_F + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-16.xml index 1bfeb7b367..422afe5390 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-16.xml @@ -3,9 +3,9 @@ arpwatch: Privilege escalation arpwatch is vulnerable to the escalation of privileges. - - July 20, 2016 - July 20, 2016: 1 + + 2016-07-20 + 2016-07-20: 1 419375 local, remote @@ -39,10 +39,10 @@ - + CVE-2012-2653 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-17.xml index 9608edf5ea..2a41ef9447 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201607-17.xml @@ -5,9 +5,9 @@ BeanShell is vulnerable to the remote execution of arbitrary code via Java serialization or XStream from an untrusted source. - - July 30, 2016 - July 30, 2016: 1 + + 2016-07-30 + 2016-07-30: 1 575482 remote @@ -49,6 +49,6 @@ CVE-2016-2510
- b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201608-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201608-01.xml index f4c378ca61..91a1ebee4a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201608-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201608-01.xml @@ -6,9 +6,9 @@ which could lead to the remote execution of arbitrary code, or cause a Denial of Service condition. - - August 11, 2016 - August 11, 2016: 1 + + 2016-08-11 + 2016-08-11: 1 561882 579030 remote @@ -46,10 +46,10 @@ - CVE-2016-2191 - CVE-2016-3981 - CVE-2016-3982 + CVE-2016-2191 + CVE-2016-3981 + CVE-2016-3982 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201609-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201609-01.xml index 6f4c6eeabc..9336662903 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201609-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201609-01.xml @@ -7,8 +7,8 @@ condition. qemu - September 25, 2016 - September 26, 2016: 2 + 2016-09-25 + 2016-09-26: 2 573816 579734 580040 @@ -67,32 +67,32 @@ - CVE-2016-2841 - CVE-2016-4001 - CVE-2016-4002 - CVE-2016-4020 - CVE-2016-4439 - CVE-2016-4441 - CVE-2016-4453 - CVE-2016-4454 - CVE-2016-4964 - CVE-2016-5106 - CVE-2016-5107 - CVE-2016-5126 - CVE-2016-5238 - CVE-2016-5337 - CVE-2016-5338 - CVE-2016-6490 - CVE-2016-6833 - CVE-2016-6834 - CVE-2016-6836 - CVE-2016-6888 - CVE-2016-7116 - CVE-2016-7156 - CVE-2016-7157 - CVE-2016-7421 - CVE-2016-7422 + CVE-2016-2841 + CVE-2016-4001 + CVE-2016-4002 + CVE-2016-4020 + CVE-2016-4439 + CVE-2016-4441 + CVE-2016-4453 + CVE-2016-4454 + CVE-2016-4964 + CVE-2016-5106 + CVE-2016-5107 + CVE-2016-5126 + CVE-2016-5238 + CVE-2016-5337 + CVE-2016-5338 + CVE-2016-6490 + CVE-2016-6833 + CVE-2016-6834 + CVE-2016-6836 + CVE-2016-6888 + CVE-2016-7116 + CVE-2016-7156 + CVE-2016-7157 + CVE-2016-7421 + CVE-2016-7422 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201609-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201609-02.xml index 6478422b0f..397ea52a31 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201609-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201609-02.xml @@ -6,8 +6,8 @@ arbitrary code via the gem installation process. bundler - September 26, 2016 - September 26, 2016: 1 + 2016-09-26 + 2016-09-26: 1 523798 remote @@ -43,10 +43,10 @@ - CVE-2013-0334 + CVE-2013-0334 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-01.xml index c7907aba64..3cc08c165d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-01.xml @@ -6,8 +6,8 @@ java serialization is used. groovy - October 06, 2016 - October 06, 2016: 1 + 2016-10-06 + 2016-10-06: 1 555470 remote @@ -44,8 +44,8 @@ - CVE-2015-3253 + CVE-2015-3253 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-02.xml index f891844478..704998eadf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-02.xml @@ -6,9 +6,9 @@ which could allow HTTP request smuggling attacks or a Denial of Service condition. - - October 06, 2016 - October 13, 2016: 2 + + 2016-10-06 + 2016-10-13: 2 524680 536684 554948 @@ -50,13 +50,13 @@ - CVE-2014-3581 - CVE-2015-3183 - CVE-2016-1546 - CVE-2016-4979 + CVE-2014-3581 + CVE-2015-3183 + CVE-2016-1546 + CVE-2016-4979 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-03.xml index 0689a54158..86ff1c6664 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-03.xml @@ -6,8 +6,8 @@ arbitrary code. quagga - October 10, 2016 - October 10, 2016: 1 + 2016-10-10 + 2016-10-10: 1 577156 remote @@ -46,12 +46,12 @@ - CVE-2016-2342 + CVE-2016-2342 - + pinkbyte - + pinkbyte diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-04.xml index d3d4aee45d..a98a2c7298 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-04.xml @@ -6,8 +6,8 @@ which results in predictable output from the random number generator. libgcrypt - October 10, 2016 - October 10, 2016: 1 + 2016-10-10 + 2016-10-10: 1 541564 559942 574268 @@ -49,16 +49,16 @@ - CVE-2014-3591 - CVE-2015-0837 - CVE-2015-7511 - CVE-2016-6313 + CVE-2014-3591 + CVE-2015-0837 + CVE-2015-7511 + CVE-2016-6313 Factoring RSA Keys With TLS Perfect Forward Secrecy - + BlueKnight - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-05.xml index ecd5b43e07..c81a3a4e32 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-05.xml @@ -6,8 +6,8 @@ the worst of which could lead to execution of arbitrary code. subversion serf - October 11, 2016 - October 11, 2016: 2 + 2016-10-11 + 2016-10-11: 2 500482 518716 519202 @@ -71,19 +71,19 @@ - CVE-2014-0032 - CVE-2014-3504 - CVE-2014-3522 - CVE-2014-3528 - CVE-2015-0202 - CVE-2015-0248 - CVE-2015-0251 - CVE-2015-3184 - CVE-2015-3187 - CVE-2015-5259 - CVE-2016-2167 - CVE-2016-2168 + CVE-2014-0032 + CVE-2014-3504 + CVE-2014-3522 + CVE-2014-3528 + CVE-2015-0202 + CVE-2015-0248 + CVE-2015-0251 + CVE-2015-3184 + CVE-2015-3187 + CVE-2015-5259 + CVE-2016-2167 + CVE-2016-2168 - K_F - b-man + K_F + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-06.xml index 1054eaa871..0d6055b502 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-06.xml @@ -6,9 +6,9 @@ worst of which could allow remote attackers to cause a Denial of Service condition or obtain sensitive information. - - October 11, 2016 - October 11, 2016: 1 + + 2016-10-11 + 2016-10-11: 1 546724 555478 555480 @@ -69,26 +69,26 @@ - CVE-2015-2582 - CVE-2015-2611 - CVE-2015-2617 - CVE-2015-2620 - CVE-2015-2639 - CVE-2015-2641 - CVE-2015-2643 - CVE-2015-2648 - CVE-2015-2661 - CVE-2015-4737 - CVE-2015-4752 - CVE-2015-4756 - CVE-2015-4757 - CVE-2015-4767 - CVE-2015-4769 - CVE-2015-4771 - CVE-2015-4772 + CVE-2015-2582 + CVE-2015-2611 + CVE-2015-2617 + CVE-2015-2620 + CVE-2015-2639 + CVE-2015-2641 + CVE-2015-2643 + CVE-2015-2648 + CVE-2015-2661 + CVE-2015-4737 + CVE-2015-4752 + CVE-2015-4756 + CVE-2015-4757 + CVE-2015-4767 + CVE-2015-4769 + CVE-2015-4771 + CVE-2015-4772 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-07.xml index 0af9c589fa..42afd62a00 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-07.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in BIND, the worst of which could cause a Denial of Service condition. - - October 11, 2016 - October 11, 2016: 1 + + 2016-10-11 + 2016-10-11: 1 572414 576902 588652 @@ -45,15 +45,15 @@ - CVE-2015-8704 - CVE-2015-8705 - CVE-2016-1285 - CVE-2016-1286 - CVE-2016-2088 - CVE-2016-2775 - CVE-2016-2776 - CVE-2016-6170 + CVE-2015-8704 + CVE-2015-8705 + CVE-2016-1285 + CVE-2016-1286 + CVE-2016-2088 + CVE-2016-2775 + CVE-2016-2776 + CVE-2016-6170 - b-man - Zlogene + b-man + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-08.xml index 6bc3904e79..a419216926 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-08.xml @@ -7,8 +7,8 @@ code, obtain information, and cause Denial of Service. java - October 15, 2016 - October 15, 2016: 1 + 2016-10-15 + 2016-10-15: 1 578160 580608 589208 @@ -60,29 +60,29 @@ - CVE-2016-0402 - CVE-2016-0448 - CVE-2016-0466 - CVE-2016-0475 - CVE-2016-0483 - CVE-2016-0494 - CVE-2016-0603 - CVE-2016-0636 - CVE-2016-3426 - CVE-2016-3458 - CVE-2016-3485 - CVE-2016-3498 - CVE-2016-3500 - CVE-2016-3503 - CVE-2016-3508 - CVE-2016-3511 - CVE-2016-3550 - CVE-2016-3552 - CVE-2016-3587 - CVE-2016-3598 - CVE-2016-3606 - CVE-2016-3610 + CVE-2016-0402 + CVE-2016-0448 + CVE-2016-0466 + CVE-2016-0475 + CVE-2016-0483 + CVE-2016-0494 + CVE-2016-0603 + CVE-2016-0636 + CVE-2016-3426 + CVE-2016-3458 + CVE-2016-3485 + CVE-2016-3498 + CVE-2016-3500 + CVE-2016-3503 + CVE-2016-3508 + CVE-2016-3511 + CVE-2016-3550 + CVE-2016-3552 + CVE-2016-3587 + CVE-2016-3598 + CVE-2016-3606 + CVE-2016-3610 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-09.xml index 1aba37c275..2a41c47fd9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-09.xml @@ -6,9 +6,9 @@ browser, the worst of which allows remote attackers to execute arbitrary code. - - October 29, 2016 - October 29, 2016: 1 + + 2016-10-29 + 2016-10-29: 1 589278 590420 592630 @@ -51,72 +51,72 @@ - CVE-2016-5127 - CVE-2016-5128 - CVE-2016-5129 - CVE-2016-5130 - CVE-2016-5131 - CVE-2016-5132 - CVE-2016-5133 - CVE-2016-5134 - CVE-2016-5135 - CVE-2016-5136 - CVE-2016-5137 - CVE-2016-5138 - CVE-2016-5139 - CVE-2016-5140 - CVE-2016-5141 - CVE-2016-5142 - CVE-2016-5143 - CVE-2016-5144 - CVE-2016-5145 - CVE-2016-5146 - CVE-2016-5147 - CVE-2016-5148 - CVE-2016-5149 - CVE-2016-5150 - CVE-2016-5151 - CVE-2016-5152 - CVE-2016-5153 - CVE-2016-5154 - CVE-2016-5155 - CVE-2016-5156 - CVE-2016-5157 - CVE-2016-5158 - CVE-2016-5159 - CVE-2016-5160 - CVE-2016-5161 - CVE-2016-5162 - CVE-2016-5163 - CVE-2016-5164 - CVE-2016-5165 - CVE-2016-5166 - CVE-2016-5167 - CVE-2016-5170 - CVE-2016-5171 - CVE-2016-5172 - CVE-2016-5173 - CVE-2016-5174 - CVE-2016-5175 - CVE-2016-5177 - CVE-2016-5178 - CVE-2016-5181 - CVE-2016-5182 - CVE-2016-5183 - CVE-2016-5184 - CVE-2016-5185 - CVE-2016-5186 - CVE-2016-5187 - CVE-2016-5188 - CVE-2016-5189 - CVE-2016-5190 - CVE-2016-5191 - CVE-2016-5192 - CVE-2016-5193 - CVE-2016-5194 + CVE-2016-5127 + CVE-2016-5128 + CVE-2016-5129 + CVE-2016-5130 + CVE-2016-5131 + CVE-2016-5132 + CVE-2016-5133 + CVE-2016-5134 + CVE-2016-5135 + CVE-2016-5136 + CVE-2016-5137 + CVE-2016-5138 + CVE-2016-5139 + CVE-2016-5140 + CVE-2016-5141 + CVE-2016-5142 + CVE-2016-5143 + CVE-2016-5144 + CVE-2016-5145 + CVE-2016-5146 + CVE-2016-5147 + CVE-2016-5148 + CVE-2016-5149 + CVE-2016-5150 + CVE-2016-5151 + CVE-2016-5152 + CVE-2016-5153 + CVE-2016-5154 + CVE-2016-5155 + CVE-2016-5156 + CVE-2016-5157 + CVE-2016-5158 + CVE-2016-5159 + CVE-2016-5160 + CVE-2016-5161 + CVE-2016-5162 + CVE-2016-5163 + CVE-2016-5164 + CVE-2016-5165 + CVE-2016-5166 + CVE-2016-5167 + CVE-2016-5170 + CVE-2016-5171 + CVE-2016-5172 + CVE-2016-5173 + CVE-2016-5174 + CVE-2016-5175 + CVE-2016-5177 + CVE-2016-5178 + CVE-2016-5181 + CVE-2016-5182 + CVE-2016-5183 + CVE-2016-5184 + CVE-2016-5185 + CVE-2016-5186 + CVE-2016-5187 + CVE-2016-5188 + CVE-2016-5189 + CVE-2016-5190 + CVE-2016-5191 + CVE-2016-5192 + CVE-2016-5193 + CVE-2016-5194 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-10.xml index 693f22fc5b..50a2526f98 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-10.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. - - October 29, 2016 - November 01, 2016: 2 + + 2016-10-29 + 2016-11-01: 2 593684 596896 598152 @@ -59,49 +59,49 @@ - CVE-2016-4182 - CVE-2016-4271 - CVE-2016-4272 - CVE-2016-4273 - CVE-2016-4274 - CVE-2016-4275 - CVE-2016-4276 - CVE-2016-4277 - CVE-2016-4278 - CVE-2016-4279 - CVE-2016-4280 - CVE-2016-4281 - CVE-2016-4282 - CVE-2016-4283 - CVE-2016-4284 - CVE-2016-4285 - CVE-2016-4286 - CVE-2016-4287 - CVE-2016-6921 - CVE-2016-6922 - CVE-2016-6923 - CVE-2016-6924 - CVE-2016-6925 - CVE-2016-6926 - CVE-2016-6927 - CVE-2016-6929 - CVE-2016-6930 - CVE-2016-6931 - CVE-2016-6932 - CVE-2016-6981 - CVE-2016-6982 - CVE-2016-6983 - CVE-2016-6984 - CVE-2016-6985 - CVE-2016-6986 - CVE-2016-6987 - CVE-2016-6989 - CVE-2016-6990 - CVE-2016-6992 - CVE-2016-7855 + CVE-2016-4182 + CVE-2016-4271 + CVE-2016-4272 + CVE-2016-4273 + CVE-2016-4274 + CVE-2016-4275 + CVE-2016-4276 + CVE-2016-4277 + CVE-2016-4278 + CVE-2016-4279 + CVE-2016-4280 + CVE-2016-4281 + CVE-2016-4282 + CVE-2016-4283 + CVE-2016-4284 + CVE-2016-4285 + CVE-2016-4286 + CVE-2016-4287 + CVE-2016-6921 + CVE-2016-6922 + CVE-2016-6923 + CVE-2016-6924 + CVE-2016-6925 + CVE-2016-6926 + CVE-2016-6927 + CVE-2016-6929 + CVE-2016-6930 + CVE-2016-6931 + CVE-2016-6932 + CVE-2016-6981 + CVE-2016-6982 + CVE-2016-6983 + CVE-2016-6984 + CVE-2016-6985 + CVE-2016-6986 + CVE-2016-6987 + CVE-2016-6989 + CVE-2016-6990 + CVE-2016-6992 + CVE-2016-7855 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-11.xml index 2339916fde..8bbceac440 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-11.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in Wget, the worst of which could lead to the remote execution of arbitrary code. - - October 29, 2016 - October 29, 2016: 1 + + 2016-10-29 + 2016-10-29: 1 560418 585926 remote @@ -44,8 +44,8 @@ - CVE-2016-4971 + CVE-2016-4971 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-01.xml index 348fe8da15..3ff503315f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-01.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in UnZip allowing remote attackers to execute arbitrary code and cause Denial of Service. - - November 01, 2016 - November 01, 2016: 1 + + 2016-11-01 + 2016-11-01: 1 528082 533748 537424 @@ -46,11 +46,11 @@ - CVE-2014-8139 - CVE-2014-8140 - CVE-2014-8141 - CVE-2014-9636 + CVE-2014-8139 + CVE-2014-8140 + CVE-2014-8141 + CVE-2014-9636 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-02.xml index 4cbaa7a494..72ad5ffaa8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-02.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in OpenVPN, the worst of which allows remote attackers to read encrypted traffic. - - November 01, 2016 - November 01, 2016: 1 + + 2016-11-01 + 2016-11-01: 1 582902 592070 remote @@ -42,10 +42,10 @@ - CVE-2016-6329 + CVE-2016-6329 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-03.xml index 628df56682..9dc5e87b0b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-03.xml @@ -6,7 +6,7 @@ OpenOffice, the worst of which allows for the remote execution of arbitrary code. - + 2016-11-04 2017-04-17: 2 565026 @@ -70,19 +70,19 @@ - + CVE-2015-4551 - + CVE-2015-5212 - + CVE-2015-5213 - + CVE-2015-5214 - CVE-2016-4324 + CVE-2016-4324 BlueKnight b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-04.xml index 4cc41969a2..e622336eff 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-04.xml @@ -6,9 +6,9 @@ software suites allowing remote attackers to remotely execute arbitrary code, obtain information, and cause Denial of Service. - - November 04, 2016 - November 04, 2016: 1 + + 2016-11-04 + 2016-11-04: 1 597516 remote @@ -60,14 +60,14 @@ - CVE-2016-5542 - CVE-2016-5554 - CVE-2016-5556 - CVE-2016-5568 - CVE-2016-5573 - CVE-2016-5582 - CVE-2016-5597 + CVE-2016-5542 + CVE-2016-5554 + CVE-2016-5556 + CVE-2016-5568 + CVE-2016-5573 + CVE-2016-5582 + CVE-2016-5597 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-05.xml index c8facf0bc8..2138850c7d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-05.xml @@ -6,8 +6,8 @@ specified. tnftp - November 15, 2016 - November 15, 2016: 1 + 2016-11-15 + 2016-11-15: 1 527302 remote @@ -41,10 +41,10 @@ - CVE-2014-8517 + CVE-2014-8517 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-06.xml index e1f5beb052..61ef0e94fe 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-06.xml @@ -4,8 +4,8 @@ xinetd: Privilege escalation A vulnerability in xinetd could lead to privilege escalation. xinetd - November 15, 2016 - November 15, 2016: 1 + 2016-11-15 + 2016-11-15: 1 488158 remote @@ -37,10 +37,10 @@ - CVE-2013-4342 + CVE-2013-4342 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-07.xml index c469fb986c..316bef1e78 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-07.xml @@ -4,8 +4,8 @@ polkit: Heap-corruption on duplicate IDs polkit is vulnerable to local privilege escalation. polkit - November 15, 2016 - November 15, 2016: 1 + 2016-11-15 + 2016-11-15: 1 555666 local @@ -40,10 +40,10 @@ - CVE-2015-3255 + CVE-2015-3255 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-08.xml index ae2cd49faa..a1e0ba353c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-08.xml @@ -6,8 +6,8 @@ which may allow remote attackers to cause Denial of Service. libpng - November 15, 2016 - November 15, 2016: 1 + 2016-11-15 + 2016-11-15: 1 564244 565678 568216 @@ -62,14 +62,14 @@ - CVE-2015-7981 - CVE-2015-8126 - + CVE-2015-7981 + CVE-2015-8126 + CVE-2015-8540 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-09.xml index 5d88bac90d..5d330ae7fa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-09.xml @@ -6,8 +6,8 @@ allows gaining of privileges on the host system. xen - November 15, 2016 - November 15, 2016: 1 + 2016-11-15 + 2016-11-15: 1 588780 593198 594850 @@ -57,14 +57,14 @@ - CVE-2016-6258 - CVE-2016-7092 - CVE-2016-7093 - CVE-2016-7094 - CVE-2016-7777 + CVE-2016-6258 + CVE-2016-7092 + CVE-2016-7093 + CVE-2016-7094 + CVE-2016-7777 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-10.xml index 86d1fc1c58..9cdacea8e2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-10.xml @@ -3,9 +3,9 @@ libuv: Privilege escalation A vulnerability in libuv could lead to privilege escalation. - - November 17, 2016 - November 17, 2016: 1 + + 2016-11-17 + 2016-11-17: 1 540826 local, remote @@ -43,8 +43,8 @@ - CVE-2015-0278 + CVE-2015-0278 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-11.xml index e26c96b0c0..d314d8815a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-11.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in QEMU, the worst of which could cause a Denial of Service condition. - - November 18, 2016 - January 02, 2017: 2 + + 2016-11-18 + 2017-01-02: 2 594368 594520 595192 @@ -54,28 +54,28 @@ - + CVE-2016-10029 - CVE-2016-7161 - CVE-2016-7423 - CVE-2016-7466 - CVE-2016-7907 - CVE-2016-7908 - CVE-2016-7909 - CVE-2016-7994 - CVE-2016-8576 - CVE-2016-8577 - CVE-2016-8578 - CVE-2016-8668 - CVE-2016-8669 - CVE-2016-8909 - CVE-2016-8910 - CVE-2016-9102 - CVE-2016-9103 - CVE-2016-9104 - CVE-2016-9105 + CVE-2016-7161 + CVE-2016-7423 + CVE-2016-7466 + CVE-2016-7907 + CVE-2016-7908 + CVE-2016-7909 + CVE-2016-7994 + CVE-2016-8576 + CVE-2016-8577 + CVE-2016-8578 + CVE-2016-8668 + CVE-2016-8669 + CVE-2016-8909 + CVE-2016-8910 + CVE-2016-9102 + CVE-2016-9103 + CVE-2016-9104 + CVE-2016-9105 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-12.xml index 4967a676c5..e339fd3058 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-12.xml @@ -6,8 +6,8 @@ which allows for the remote execution of arbitrary code. imlib2 - November 20, 2016 - November 20, 2016: 1 + 2016-11-20 + 2016-11-20: 1 572884 578810 580038 @@ -48,11 +48,11 @@ - CVE-2014-9762 - CVE-2014-9763 - CVE-2014-9764 - CVE-2016-4024 + CVE-2014-9762 + CVE-2014-9763 + CVE-2014-9764 + CVE-2016-4024 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-13.xml index b714e29859..5633941b07 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-13.xml @@ -6,8 +6,8 @@ condition. mongodb - November 20, 2016 - November 20, 2016: 1 + 2016-11-20 + 2016-11-20: 1 542880 remote @@ -43,8 +43,8 @@ - CVE-2015-1609 + CVE-2015-1609 - K_F - b-man + K_F + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-14.xml index cb039edc60..fa8b2cbf1f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-14.xml @@ -6,8 +6,8 @@ the worst of which may allow remote attackers to cause Denial of Service. mit-krb5 - November 20, 2016 - November 20, 2016: 1 + 2016-11-20 + 2016-11-20: 1 564304 remote @@ -41,12 +41,12 @@ - CVE-2015-2695 - CVE-2015-2696 - CVE-2015-2697 + CVE-2015-2695 + CVE-2015-2696 + CVE-2015-2697 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-15.xml index 4a3c457cb7..1ba5ff394f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-15.xml @@ -6,8 +6,8 @@ which allows remote attackers to execute arbitrary code. poppler - November 22, 2016 - November 22, 2016: 3 + 2016-11-22 + 2016-11-22: 3 542220 579752 remote @@ -44,12 +44,12 @@ - + CVE-2015-8868 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-16.xml index 25b56ead1e..c199ce74ea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-16.xml @@ -7,8 +7,8 @@ code. chromium - November 22, 2016 - November 22, 2016: 3 + 2016-11-22 + 2016-11-22: 3 599416 remote @@ -46,11 +46,11 @@ - CVE-2016-5199 - CVE-2016-5200 - CVE-2016-5201 - CVE-2016-5202 + CVE-2016-5199 + CVE-2016-5200 + CVE-2016-5201 + CVE-2016-5202 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-17.xml index 57fe7d0ad9..608418dcda 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-17.xml @@ -6,8 +6,8 @@ a Denial of Service. rpcbind - November 22, 2016 - November 22, 2016: 2 + 2016-11-22 + 2016-11-22: 2 560990 remote @@ -42,10 +42,10 @@ - CVE-2015-7236 + CVE-2015-7236 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-18.xml index dd1f7342ee..0438e1d279 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-18.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - November 22, 2016 - November 22, 2016: 2 + 2016-11-22 + 2016-11-22: 2 599204 remote @@ -53,16 +53,16 @@ - CVE-2016-7857 - CVE-2016-7858 - CVE-2016-7859 - CVE-2016-7860 - CVE-2016-7861 - CVE-2016-7862 - CVE-2016-7863 - CVE-2016-7864 - CVE-2016-7865 + CVE-2016-7857 + CVE-2016-7858 + CVE-2016-7859 + CVE-2016-7860 + CVE-2016-7861 + CVE-2016-7862 + CVE-2016-7863 + CVE-2016-7864 + CVE-2016-7865 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-19.xml index c615310c31..e44b7c07bb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-19.xml @@ -6,8 +6,8 @@ arbitrary code. tar - November 22, 2016 - November 22, 2016: 2 + 2016-11-22 + 2016-11-22: 2 598334 remote @@ -47,8 +47,8 @@ - CVE-2016-6321 + CVE-2016-6321 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-20.xml index fdace5c7bc..0107493100 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-20.xml @@ -6,8 +6,8 @@ execute arbitrary code. testdisk - November 22, 2016 - November 22, 2016: 2 + 2016-11-22 + 2016-11-22: 2 548258 local, remote @@ -52,6 +52,6 @@ TestDisk check_OS2MB Stack Buffer overflow - K_F - b-man + K_F + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-21.xml index 5dc51fe796..d532b1f26b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-21.xml @@ -6,8 +6,8 @@ of which allows remote attackers to execute arbitrary code. imagemagick - November 30, 2016 - November 30, 2016: 1 + 2016-11-30 + 2016-11-30: 1 581990 593526 593530 @@ -49,17 +49,17 @@ - CVE-2016-3714 - CVE-2016-3715 - CVE-2016-3716 - CVE-2016-3717 - CVE-2016-3718 - CVE-2016-5010 - CVE-2016-5842 - CVE-2016-6491 - CVE-2016-7799 - CVE-2016-7906 + CVE-2016-3714 + CVE-2016-3715 + CVE-2016-3716 + CVE-2016-3717 + CVE-2016-3718 + CVE-2016-5010 + CVE-2016-5842 + CVE-2016-6491 + CVE-2016-7799 + CVE-2016-7906 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-22.xml index c3199e4dca..888ff9ce55 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-22.xml @@ -7,8 +7,8 @@ condition. php - November 30, 2016 - November 30, 2016: 1 + 2016-11-30 + 2016-11-30: 1 578734 581834 584204 @@ -51,47 +51,47 @@ - CVE-2015-8865 - CVE-2016-3074 - CVE-2016-4071 - CVE-2016-4072 - CVE-2016-4073 - CVE-2016-4537 - CVE-2016-4538 - CVE-2016-4539 - CVE-2016-4540 - CVE-2016-4541 - CVE-2016-4542 - CVE-2016-4543 - CVE-2016-4544 - CVE-2016-5385 - CVE-2016-6289 - CVE-2016-6290 - CVE-2016-6291 - CVE-2016-6292 - CVE-2016-6294 - CVE-2016-6295 - CVE-2016-6296 - CVE-2016-6297 - CVE-2016-7124 - CVE-2016-7125 - CVE-2016-7126 - CVE-2016-7127 - CVE-2016-7128 - CVE-2016-7129 - CVE-2016-7130 - CVE-2016-7131 - CVE-2016-7132 - CVE-2016-7133 - CVE-2016-7134 - CVE-2016-7411 - CVE-2016-7412 - CVE-2016-7413 - CVE-2016-7414 - CVE-2016-7416 - CVE-2016-7417 - CVE-2016-7418 + CVE-2015-8865 + CVE-2016-3074 + CVE-2016-4071 + CVE-2016-4072 + CVE-2016-4073 + CVE-2016-4537 + CVE-2016-4538 + CVE-2016-4539 + CVE-2016-4540 + CVE-2016-4541 + CVE-2016-4542 + CVE-2016-4543 + CVE-2016-4544 + CVE-2016-5385 + CVE-2016-6289 + CVE-2016-6290 + CVE-2016-6291 + CVE-2016-6292 + CVE-2016-6294 + CVE-2016-6295 + CVE-2016-6296 + CVE-2016-6297 + CVE-2016-7124 + CVE-2016-7125 + CVE-2016-7126 + CVE-2016-7127 + CVE-2016-7128 + CVE-2016-7129 + CVE-2016-7130 + CVE-2016-7131 + CVE-2016-7132 + CVE-2016-7133 + CVE-2016-7134 + CVE-2016-7411 + CVE-2016-7412 + CVE-2016-7413 + CVE-2016-7414 + CVE-2016-7416 + CVE-2016-7417 + CVE-2016-7418 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-01.xml index eb26bb565e..e2d2ffa174 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-01.xml @@ -6,8 +6,8 @@ (RNG) is predictable. gnupg - December 02, 2016 - December 02, 2016: 1 + 2016-12-02 + 2016-12-02: 1 591536 local @@ -59,12 +59,12 @@ - CVE-2016-6313 + CVE-2016-6313 Entropy Loss and Output Predictability in the Libgcrypt PRNG - GLSA 201610-04 + GLSA 201610-04 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-02.xml index 22806cf13b..e3782917cd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-02.xml @@ -6,8 +6,8 @@ privileges. davfs2 - December 02, 2016 - December 02, 2016: 1 + 2016-12-02 + 2016-12-02: 1 485232 local @@ -55,10 +55,10 @@ - CVE-2013-4362 + CVE-2013-4362 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-03.xml index 79c38fcb38..8535ebbce0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-03.xml @@ -6,8 +6,8 @@ of which might allow remote attackers to execute arbitrary code. libsndfile - December 03, 2016 - December 03, 2016: 1 + 2016-12-03 + 2016-12-03: 1 533750 566682 local, remote @@ -45,11 +45,11 @@ - CVE-2014-9496 - CVE-2015-7805 + CVE-2014-9496 + CVE-2015-7805 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-04.xml index f13661b1c9..ab102ec5a2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-04.xml @@ -6,8 +6,8 @@ which allows remote attackers to execute arbitrary code. busybox - December 04, 2016 - December 04, 2016: 1 + 2016-12-04 + 2016-12-04: 1 564246 577610 local, remote @@ -49,11 +49,11 @@ - CVE-2016-2147 - CVE-2016-2148 + CVE-2016-2147 + CVE-2016-2148 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-05.xml index be917ecd12..97513c6e73 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-05.xml @@ -6,8 +6,8 @@ allowed to specify the font name. pygments - December 04, 2016 - December 04, 2016: 1 + 2016-12-04 + 2016-12-04: 1 564478 remote @@ -44,12 +44,12 @@ - + CVE-2015-8557 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-06.xml index c3cb0a54f9..622ca21573 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-06.xml @@ -6,8 +6,8 @@ handling code. nghttp2 - December 04, 2016 - December 04, 2016: 1 + 2016-12-04 + 2016-12-04: 1 569518 remote @@ -41,10 +41,10 @@ - CVE-2015-8659 + CVE-2015-8659 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-07.xml index 53a9f09ba6..1cc9d1d843 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-07.xml @@ -6,8 +6,8 @@ to arbitrary code execution. dpkg - December 04, 2016 - December 04, 2016: 1 + 2016-12-04 + 2016-12-04: 1 567258 local, remote @@ -43,10 +43,10 @@ - CVE-2015-0860 + CVE-2015-0860 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-08.xml index bff22bab0f..a1caf1d169 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-08.xml @@ -6,8 +6,8 @@ allow remote attackers to have an unspecified impact via unknown vectors. cifs-utils - December 04, 2016 - December 04, 2016: 1 + 2016-12-04 + 2016-12-04: 1 552634 remote @@ -46,10 +46,10 @@ - CVE-2014-2830 + CVE-2014-2830 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-09.xml index bdd4036149..b8616d3b74 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-09.xml @@ -6,8 +6,8 @@ allows remote attackers to execute arbitrary code. gd - December 04, 2016 - December 04, 2016: 1 + 2016-12-04 + 2016-12-04: 1 587662 587968 592720 @@ -44,12 +44,12 @@ - CVE-2016-5766 - CVE-2016-6128 - CVE-2016-6132 - CVE-2016-6207 - CVE-2016-7568 + CVE-2016-5766 + CVE-2016-6128 + CVE-2016-6132 + CVE-2016-6207 + CVE-2016-7568 - b-man - whissi + b-man + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-10.xml index 8717429ac7..155d5df48a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-10.xml @@ -6,8 +6,8 @@ Control Lists (ACL). libvirt - December 04, 2016 - December 04, 2016: 1 + 2016-12-04 + 2016-12-04: 1 568870 local @@ -53,10 +53,10 @@ - CVE-2015-5313 + CVE-2015-5313 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-11.xml index e2146ef371..cdba7e8230 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-11.xml @@ -7,8 +7,8 @@ code. chromium - December 05, 2016 - December 05, 2016: 1 + 2016-12-05 + 2016-12-05: 1 601486 remote @@ -46,35 +46,35 @@ - CVE-2016-5203 - CVE-2016-5204 - CVE-2016-5205 - CVE-2016-5206 - CVE-2016-5207 - CVE-2016-5208 - CVE-2016-5209 - CVE-2016-5210 - CVE-2016-5211 - CVE-2016-5212 - CVE-2016-5213 - CVE-2016-5214 - CVE-2016-5215 - CVE-2016-5217 - CVE-2016-5218 - CVE-2016-5219 - CVE-2016-5220 - CVE-2016-5221 - CVE-2016-5222 - CVE-2016-5223 - CVE-2016-5224 - CVE-2016-5225 - CVE-2016-5226 - CVE-2016-9650 - CVE-2016-9651 - CVE-2016-9652 + CVE-2016-5203 + CVE-2016-5204 + CVE-2016-5205 + CVE-2016-5206 + CVE-2016-5207 + CVE-2016-5208 + CVE-2016-5209 + CVE-2016-5210 + CVE-2016-5211 + CVE-2016-5212 + CVE-2016-5213 + CVE-2016-5214 + CVE-2016-5215 + CVE-2016-5217 + CVE-2016-5218 + CVE-2016-5219 + CVE-2016-5220 + CVE-2016-5221 + CVE-2016-5222 + CVE-2016-5223 + CVE-2016-5224 + CVE-2016-5225 + CVE-2016-5226 + CVE-2016-9650 + CVE-2016-9651 + CVE-2016-9652 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-12.xml index 8abe387e43..fb99408e4f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-12.xml @@ -6,8 +6,8 @@ condition. patch - December 05, 2016 - December 05, 2016: 1 + 2016-12-05 + 2016-12-05: 1 538658 local @@ -46,8 +46,8 @@ - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-13.xml index f482089e56..6829274bec 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-13.xml @@ -4,8 +4,8 @@ nghttp2: Denial of Service Nghttp2 is vulnerable to a Denial of Service attack. nghttp2 - December 05, 2016 - December 05, 2016: 1 + 2016-12-05 + 2016-12-05: 1 574780 remote @@ -41,8 +41,8 @@ - CVE-2016-1544 + CVE-2016-1544 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-14.xml index a6f07494c6..a165809145 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-14.xml @@ -6,8 +6,8 @@ potentially lead to the execution of arbitrary code. util-linux - December 06, 2016 - December 06, 2016: 1 + 2016-12-06 + 2016-12-06: 1 530844 local @@ -48,8 +48,8 @@ - CVE-2014-9114 + CVE-2014-9114 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-15.xml index 39d087b3a1..ecf6028631 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-15.xml @@ -6,8 +6,8 @@ may allow attackers to execute arbitrary code. arj - December 06, 2016 - December 06, 2016: 1 + 2016-12-06 + 2016-12-06: 1 535708 541500 local, remote @@ -43,10 +43,10 @@ - CVE-2015-0556 - CVE-2015-0557 - CVE-2015-2782 + CVE-2015-0556 + CVE-2015-0557 + CVE-2015-2782 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-16.xml index bc7d206bad..fa8e1ecd85 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-16.xml @@ -6,8 +6,8 @@ which allows attackers to conduct a time based side-channel attack. openssl - December 07, 2016 - December 07, 2016: 1 + 2016-12-07 + 2016-12-07: 1 581234 585142 585276 @@ -55,26 +55,26 @@ - CVE-2016-2105 - CVE-2016-2106 - CVE-2016-2107 - CVE-2016-2108 - CVE-2016-2109 - CVE-2016-2176 - CVE-2016-2177 - CVE-2016-2178 - CVE-2016-2180 - CVE-2016-2183 - CVE-2016-6304 - CVE-2016-6305 - CVE-2016-6306 - CVE-2016-7052 - Make Sure DSA Signing + CVE-2016-2105 + CVE-2016-2106 + CVE-2016-2107 + CVE-2016-2108 + CVE-2016-2109 + CVE-2016-2176 + CVE-2016-2177 + CVE-2016-2178 + CVE-2016-2180 + CVE-2016-2183 + CVE-2016-6304 + CVE-2016-6305 + CVE-2016-6306 + CVE-2016-7052 + Make Sure DSA Signing Exponentiations Really are Constant-Time - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-17.xml index 51e0c94308..bbaa254398 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-17.xml @@ -6,8 +6,8 @@ execute arbitrary code. pecl_http - December 07, 2016 - December 07, 2016: 1 + 2016-12-07 + 2016-12-07: 1 587466 remote @@ -44,8 +44,8 @@ - CVE-2016-5873 + CVE-2016-5873 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-18.xml index e6d11b5b9b..23c0a5b7f1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-18.xml @@ -5,9 +5,9 @@ Multiple vulnerabilities have been found in OpenSSH, the worst of which allows remote attackers to cause Denial of Service. - - December 07, 2016 - December 07, 2016: 1 + + 2016-12-07 + 2016-12-07: 1 576954 580410 589088 @@ -48,14 +48,14 @@ - CVE-2015-8325 - CVE-2016-1908 - CVE-2016-3115 - CVE-2016-6210 - CVE-2016-8858 + CVE-2015-8325 + CVE-2016-1908 + CVE-2016-3115 + CVE-2016-6210 + CVE-2016-8858 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-19.xml index 00550c7e4e..1a68035bc0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-19.xml @@ -6,8 +6,8 @@ which could lead to the remote execution of arbitrary code. mercurial - December 07, 2016 - December 07, 2016: 1 + 2016-12-07 + 2016-12-07: 1 533008 544332 578546 @@ -45,15 +45,15 @@ - CVE-2014-9390 - CVE-2014-9462 - CVE-2016-3068 - CVE-2016-3069 - CVE-2016-3105 - CVE-2016-3630 + CVE-2014-9390 + CVE-2014-9462 + CVE-2016-3068 + CVE-2016-3069 + CVE-2016-3105 + CVE-2016-3630 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-20.xml index cc31888da5..28e9a34258 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-20.xml @@ -6,8 +6,8 @@ arbitrary code. jq - December 08, 2016 - December 08, 2016: 1 + 2016-12-08 + 2016-12-08: 1 580606 remote @@ -43,10 +43,10 @@ - + CVE-2015-8863 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-21.xml index 1e5603e1a4..f55dff0bb5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-21.xml @@ -6,8 +6,8 @@ may allow execution of arbitrary code. sqlite - December 08, 2016 - December 08, 2016: 1 + 2016-12-08 + 2016-12-08: 1 549258 574420 remote @@ -43,13 +43,13 @@ - + CVE-2015-7036 - + Two invalid read errors / heap overflows in SQLite (TFPA 006/2015) - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-22.xml index b0c9f471fa..89854571a0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-22.xml @@ -6,8 +6,8 @@ arbitrary code or a Denial of Service condition. coreutils - December 08, 2016 - December 08, 2016: 1 + 2016-12-08 + 2016-12-08: 1 530514 local, remote @@ -44,8 +44,8 @@ - CVE-2014-9471 + CVE-2014-9471 - b-man - whissi + b-man + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-23.xml index aba9f4d1e4..e86398f200 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-23.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. socat - December 08, 2016 - December 08, 2016: 1 + 2016-12-08 + 2016-12-08: 1 573602 remote @@ -51,6 +51,6 @@ Socat security advisory 8 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-24.xml index 04ef17ed62..a16db62e04 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-24.xml @@ -6,8 +6,8 @@ may allow execution of arbitrary code. binutils - December 08, 2016 - December 08, 2016: 1 + 2016-12-08 + 2016-12-08: 1 526626 local, remote @@ -46,15 +46,15 @@ - CVE-2014-8484 - CVE-2014-8485 - CVE-2014-8501 - CVE-2014-8502 - CVE-2014-8503 - CVE-2014-8504 - CVE-2014-8737 - CVE-2014-8738 + CVE-2014-8484 + CVE-2014-8485 + CVE-2014-8501 + CVE-2014-8502 + CVE-2014-8503 + CVE-2014-8504 + CVE-2014-8737 + CVE-2014-8738 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-25.xml index 72a1e6bee7..15a4a3d5f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-25.xml @@ -6,8 +6,8 @@ arbitrary code. cracklib - December 08, 2016 - December 08, 2016: 1 + 2016-12-08 + 2016-12-08: 1 591456 local @@ -45,10 +45,10 @@ - CVE-2016-6318 + CVE-2016-6318 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-26.xml index 29273b9b9f..5755d0b227 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-26.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. openjpeg - December 08, 2016 - December 08, 2016: 1 + 2016-12-08 + 2016-12-08: 1 560632 572430 577608 @@ -48,14 +48,14 @@ - CVE-2015-8871 - CVE-2016-1923 - CVE-2016-1924 - CVE-2016-3181 - CVE-2016-3182 - CVE-2016-3183 - CVE-2016-7445 + CVE-2015-8871 + CVE-2016-1923 + CVE-2016-1924 + CVE-2016-3181 + CVE-2016-3182 + CVE-2016-3183 + CVE-2016-7445 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-27.xml index f4fd7f646d..095a71321e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-27.xml @@ -6,8 +6,8 @@ of which allows local users to escalate privileges. virtualbox - December 11, 2016 - December 11, 2016: 2 + 2016-12-11 + 2016-12-11: 2 505274 537218 550964 @@ -55,21 +55,21 @@ - CVE-2014-0981 - CVE-2014-0983 - CVE-2014-6588 - CVE-2014-6589 - CVE-2014-6590 - CVE-2014-6595 - CVE-2015-0377 - CVE-2015-0418 - CVE-2015-0427 - CVE-2015-3456 - CVE-2016-5608 - CVE-2016-5610 - CVE-2016-5611 - CVE-2016-5613 + CVE-2014-0981 + CVE-2014-0983 + CVE-2014-6588 + CVE-2014-6589 + CVE-2014-6590 + CVE-2014-6595 + CVE-2015-0377 + CVE-2015-0418 + CVE-2015-0427 + CVE-2015-3456 + CVE-2016-5608 + CVE-2016-5610 + CVE-2016-5611 + CVE-2016-5613 - whissi - b-man + whissi + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-28.xml index 6b944e4c30..468381d59a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-28.xml @@ -5,9 +5,9 @@ A vulnerability in Docker could lead to the escalation of privileges. - - December 11, 2016 - December 11, 2016: 1 + + 2016-12-11 + 2016-12-11: 1 581236 remote @@ -39,8 +39,8 @@ - CVE-2016-3697 + CVE-2016-3697 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-29.xml index a5f95961fb..09b19c255c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-29.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code. libmms - December 11, 2016 - December 11, 2016: 1 + 2016-12-11 + 2016-12-11: 1 507822 remote @@ -44,8 +44,8 @@ - CVE-2014-2892 + CVE-2014-2892 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-30.xml index f64bf35d55..8b8e841b50 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-30.xml @@ -6,8 +6,8 @@ execute arbitrary code. sox - December 11, 2016 - December 11, 2016: 1 + 2016-12-11 + 2016-12-11: 1 533296 remote @@ -45,10 +45,10 @@ - + CVE-2014-8145 - whissi - b-man + whissi + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-31.xml index 3328cc0df4..a5b6f068ad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-31.xml @@ -5,9 +5,9 @@ Two vulnerabilities have been found in exFAT allowing remote attackers to execute arbitrary code or cause Denial of Service. - - December 12, 2016 - December 12, 2016: 1 + + 2016-12-12 + 2016-12-12: 1 563936 remote @@ -41,13 +41,13 @@ - CVE-2015-8026 - + CVE-2015-8026 + Heap overflow and endless loop in exfatfsck / exfat-utils - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-32.xml index 1d75ea1e19..3f920b958a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-32.xml @@ -6,8 +6,8 @@ remote attackers to execute arbitrary code. elfutils - December 13, 2016 - December 13, 2016: 2 + 2016-12-13 + 2016-12-13: 2 507246 remote @@ -44,8 +44,8 @@ - CVE-2014-0172 + CVE-2014-0172 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-33.xml index f6bece071b..8f0f258922 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-33.xml @@ -6,8 +6,8 @@ to execute arbitrary code. ghostscript-gpl - December 13, 2016 - December 13, 2016: 2 + 2016-12-13 + 2016-12-13: 2 556316 remote @@ -42,8 +42,8 @@ - CVE-2015-3228 + CVE-2015-3228 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-34.xml index 20b5a3cecb..69a25a6547 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-34.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. systemd - December 13, 2016 - December 13, 2016: 2 + 2016-12-13 + 2016-12-13: 2 486904 local, remote @@ -42,10 +42,10 @@ - CVE-2013-4391 - CVE-2013-4393 - CVE-2013-4394 + CVE-2013-4391 + CVE-2013-4393 + CVE-2013-4394 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-35.xml index adb930ee57..f72075129d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-35.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-35.xml @@ -6,8 +6,8 @@ arbitrary code. xstream - December 13, 2016 - December 13, 2016: 2 + 2016-12-13 + 2016-12-13: 2 497652 remote @@ -42,8 +42,8 @@ - CVE-2013-7285 + CVE-2013-7285 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-36.xml index d6f4b40b34..756e2df7e3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-36.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-36.xml @@ -7,8 +7,8 @@ arbitrary code. tigervnc - December 13, 2016 - December 13, 2016: 2 + 2016-12-13 + 2016-12-13: 2 534714 remote @@ -44,9 +44,9 @@ - CVE-2014-6051 - CVE-2014-8240 + CVE-2014-6051 + CVE-2014-8240 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-37.xml index bb1b9944d5..b5bfe47079 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-37.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-37.xml @@ -6,8 +6,8 @@ arbitrary code. pixman - December 13, 2016 - December 13, 2016: 2 + 2016-12-13 + 2016-12-13: 2 561526 remote @@ -41,12 +41,12 @@ - + Pixman 0.32.8 Release Notes - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-38.xml index e03177a6fd..7d78338462 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-38.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-38.xml @@ -6,8 +6,8 @@ which allows remote attackers to execute arbitrary code. botan - December 13, 2016 - December 13, 2016: 2 + 2016-12-13 + 2016-12-13: 2 574034 remote @@ -41,9 +41,9 @@ - CVE-2016-2194 - CVE-2016-2195 + CVE-2016-2194 + CVE-2016-2195 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-39.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-39.xml index 73380626dc..e4a5292a48 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-39.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-39.xml @@ -6,8 +6,8 @@ execution. bash - December 13, 2016 - December 13, 2016: 2 + 2016-12-13 + 2016-12-13: 2 594496 remote @@ -44,10 +44,10 @@ - CVE-2016-0634 + CVE-2016-0634 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-40.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-40.xml index a82fde227b..d9d1eafd00 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-40.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-40.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. squashfs-tools - December 13, 2016 - December 14, 2016: 3 + 2016-12-13 + 2016-12-14: 3 427356 remote @@ -48,9 +48,9 @@ - CVE-2012-4024 - CVE-2012-4025 + CVE-2012-4024 + CVE-2012-4025 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-41.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-41.xml index 30e31e81bc..d152691518 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-41.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-41.xml @@ -6,8 +6,8 @@ of which may allow execution of arbitrary code. webkit-gtk - December 13, 2016 - December 13, 2016: 3 + 2016-12-13 + 2016-12-13: 3 570034 remote @@ -50,10 +50,10 @@ - CVE-2014-4412 - CVE-2014-4413 - CVE-2014-4414 + CVE-2014-4412 + CVE-2014-4413 + CVE-2014-4414 - b-man - whissi + b-man + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-42.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-42.xml index 88d846c838..9dd2338a14 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-42.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-42.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. zabbix - December 13, 2016 - December 13, 2016: 1 + 2016-12-13 + 2016-12-13: 1 582536 598762 remote @@ -42,11 +42,11 @@ - CVE-2016-4338 - CVE-2016-9140 + CVE-2016-4338 + CVE-2016-9140 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-43.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-43.xml index a1668a6f16..571cd30ceb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-43.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-43.xml @@ -6,8 +6,8 @@ which can allow remote attackers to cause Denial of Service conditions. nodejs - December 13, 2016 - December 13, 2016: 1 + 2016-12-13 + 2016-12-13: 1 568900 586084 595256 @@ -53,13 +53,13 @@ - CVE-2015-8027 - CVE-2016-2086 - CVE-2016-2216 - CVE-2016-5325 + CVE-2015-8027 + CVE-2016-2086 + CVE-2016-2216 + CVE-2016-5325 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-44.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-44.xml index 5e87434fed..bd983d9e40 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-44.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-44.xml @@ -6,8 +6,8 @@ code execution. roundcube - December 24, 2016 - December 24, 2016: 1 + 2016-12-24 + 2016-12-24: 1 601410 remote @@ -46,8 +46,8 @@ - CVE-2016-9920 + CVE-2016-9920 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-45.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-45.xml index 4ef88625ff..cdb19a9908 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-45.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-45.xml @@ -6,8 +6,8 @@ could allow remote attackers to cause a Denial of Service condition. tor - December 24, 2016 - December 24, 2016: 1 + 2016-12-24 + 2016-12-24: 1 591008 597394 597524 @@ -43,11 +43,11 @@ - CVE-2016-8860 + CVE-2016-8860 Tor 0.2.8.9 Change Log - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-46.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-46.xml index 5a12cc0646..584362007b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-46.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-46.xml @@ -6,8 +6,8 @@ of which may allow remote attackers to execute arbitrary code. xerces-c - December 24, 2016 - December 24, 2016: 1 + 2016-12-24 + 2016-12-24: 1 575700 584506 local, remote @@ -45,9 +45,9 @@ - CVE-2016-0729 - CVE-2016-2099 + CVE-2016-0729 + CVE-2016-2099 - b-man - whissi + b-man + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-47.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-47.xml index c56e4fb829..9c16ff51ea 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-47.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-47.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code with root privileges. samba - December 24, 2016 - December 24, 2016: 1 + 2016-12-24 + 2016-12-24: 1 568432 578004 local, remote @@ -44,21 +44,21 @@ - CVE-2015-3223 - CVE-2015-5252 - CVE-2015-5296 - CVE-2015-5299 - CVE-2015-5330 - CVE-2015-7540 - CVE-2015-8467 - CVE-2016-2110 - CVE-2016-2111 - CVE-2016-2112 - CVE-2016-2113 - CVE-2016-2114 - CVE-2016-2115 - CVE-2016-2118 + CVE-2015-3223 + CVE-2015-5252 + CVE-2015-5296 + CVE-2015-5299 + CVE-2015-5330 + CVE-2015-7540 + CVE-2015-8467 + CVE-2016-2110 + CVE-2016-2111 + CVE-2016-2112 + CVE-2016-2113 + CVE-2016-2114 + CVE-2016-2115 + CVE-2016-2118 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-48.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-48.xml index e396e98fab..d57ba28bce 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-48.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-48.xml @@ -6,8 +6,8 @@ worst of which may allow bypassing of sandbox protection. firejail - December 27, 2016 - December 27, 2016: 1 + 2016-12-27 + 2016-12-27: 1 601994 local, remote @@ -60,6 +60,6 @@ Firejail Release Notes - b-man - whissi + b-man + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-49.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-49.xml index 624084e3f8..37e57f823d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-49.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-49.xml @@ -4,8 +4,8 @@ mod_wsgi: Privilege escalation A vulnerability in mod_wsgi could lead to privilege escalation. mod_wsgi - December 30, 2016 - December 30, 2016: 1 + 2016-12-30 + 2016-12-30: 1 536270 local, remote @@ -40,8 +40,8 @@ - CVE-2014-8583 + CVE-2014-8583 - whissi - b-man + whissi + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-50.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-50.xml index e6bc9029a6..beb69dd13d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-50.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-50.xml @@ -6,8 +6,8 @@ which could lead to privilege escalation. openfire - December 31, 2016 - December 31, 2016: 1 + 2016-12-31 + 2016-12-31: 1 603604 remote @@ -45,10 +45,10 @@ - CVE-2015-6972 - CVE-2015-6973 - CVE-2015-7707 + CVE-2015-6972 + CVE-2015-6973 + CVE-2015-7707 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-51.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-51.xml index c37baa1ba6..223aa72f98 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-51.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-51.xml @@ -4,8 +4,8 @@ Icinga: Privilege escalation A vulnerability in Icinga could lead to privilege escalation. icinga - December 31, 2016 - December 31, 2016: 1 + 2016-12-31 + 2016-12-31: 1 603534 local @@ -42,8 +42,8 @@ - CVE-2016-9566 + CVE-2016-9566 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-52.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-52.xml index a11910851e..4b82b26e0c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-52.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-52.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. pillow - December 31, 2016 - December 31, 2016: 1 + 2016-12-31 + 2016-12-31: 1 507982 573958 599608 @@ -50,17 +50,17 @@ - CVE-2014-1932 - CVE-2014-1933 - CVE-2016-0740 - CVE-2016-0775 - CVE-2016-2533 - CVE-2016-4009 - CVE-2016-9189 - CVE-2016-9190 + CVE-2014-1932 + CVE-2014-1933 + CVE-2016-0740 + CVE-2016-0775 + CVE-2016-2533 + CVE-2016-4009 + CVE-2016-9189 + CVE-2016-9190 - + keytoaster - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-53.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-53.xml index dcc094c1ae..f048b5ad56 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-53.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-53.xml @@ -6,8 +6,8 @@ which may allow attackers to execute arbitrary code. cyassl - December 31, 2016 - December 31, 2016: 1 + 2016-12-31 + 2016-12-31: 1 507418 local, remote @@ -45,12 +45,12 @@ - CVE-2014-2896 - CVE-2014-2897 - CVE-2014-2898 - CVE-2014-2899 - CVE-2014-2900 + CVE-2014-2896 + CVE-2014-2897 + CVE-2014-2898 + CVE-2014-2899 + CVE-2014-2900 - whissi - b-man + whissi + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-54.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-54.xml index e4b8d2c965..938744a398 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-54.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-54.xml @@ -6,8 +6,8 @@ which allows remote attackers to execute arbitrary code. chicken - December 31, 2016 - December 31, 2016: 1 + 2016-12-31 + 2016-12-31: 1 467966 486350 510712 @@ -45,14 +45,14 @@ - CVE-2013-2024 - CVE-2013-4385 - CVE-2014-3776 - CVE-2014-9651 - CVE-2015-4556 + CVE-2013-2024 + CVE-2013-4385 + CVE-2014-3776 + CVE-2014-9651 + CVE-2015-4556 - + BlueKnight - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-55.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-55.xml index 70bb09e01b..d2050d6de3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-55.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-55.xml @@ -6,8 +6,8 @@ to execute arbitrary code. libjpeg-turbo - December 31, 2016 - December 31, 2016: 1 + 2016-12-31 + 2016-12-31: 1 585782 remote @@ -54,6 +54,6 @@ Prevent overread when decoding malformed JPEG - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-56.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-56.xml index 3d8a5ee137..ee20e9bbfe 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-56.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-56.xml @@ -6,8 +6,8 @@ could lead to the execution of arbitrary code on the host system. xen - December 31, 2016 - January 03, 2017: 2 + 2016-12-31 + 2017-01-03: 2 600382 600662 601248 @@ -71,26 +71,26 @@ - + CVE-2016-10024 - CVE-2016-9377 - CVE-2016-9378 - CVE-2016-9379 - CVE-2016-9380 - CVE-2016-9381 - CVE-2016-9382 - CVE-2016-9383 - CVE-2016-9384 - CVE-2016-9385 - CVE-2016-9386 - CVE-2016-9637 - CVE-2016-9815 - CVE-2016-9816 - CVE-2016-9817 - CVE-2016-9818 - CVE-2016-9932 + CVE-2016-9377 + CVE-2016-9378 + CVE-2016-9379 + CVE-2016-9380 + CVE-2016-9381 + CVE-2016-9382 + CVE-2016-9383 + CVE-2016-9384 + CVE-2016-9385 + CVE-2016-9386 + CVE-2016-9637 + CVE-2016-9815 + CVE-2016-9816 + CVE-2016-9817 + CVE-2016-9818 + CVE-2016-9932 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-01.xml index 9b51efed5b..185bab8928 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-01.xml @@ -6,8 +6,8 @@ worst of which could lead to the remote execution of arbitrary code. mysql, mariadb - January 01, 2017 - January 01, 2017: 2 + 2017-01-01 + 2017-01-01: 2 593584 593608 593614 @@ -59,33 +59,33 @@ - CVE-2016-3492 - CVE-2016-3495 - CVE-2016-5507 - CVE-2016-5584 - CVE-2016-5609 - CVE-2016-5612 - CVE-2016-5625 - CVE-2016-5626 - CVE-2016-5627 - CVE-2016-5628 - CVE-2016-5629 - CVE-2016-5630 - CVE-2016-5631 - CVE-2016-5632 - CVE-2016-5633 - CVE-2016-5634 - CVE-2016-5635 - CVE-2016-6652 - CVE-2016-6662 - CVE-2016-8283 - CVE-2016-8284 - CVE-2016-8286 - CVE-2016-8287 - CVE-2016-8288 - CVE-2016-8289 - CVE-2016-8290 + CVE-2016-3492 + CVE-2016-3495 + CVE-2016-5507 + CVE-2016-5584 + CVE-2016-5609 + CVE-2016-5612 + CVE-2016-5625 + CVE-2016-5626 + CVE-2016-5627 + CVE-2016-5628 + CVE-2016-5629 + CVE-2016-5630 + CVE-2016-5631 + CVE-2016-5632 + CVE-2016-5633 + CVE-2016-5634 + CVE-2016-5635 + CVE-2016-6652 + CVE-2016-6662 + CVE-2016-8283 + CVE-2016-8284 + CVE-2016-8286 + CVE-2016-8287 + CVE-2016-8288 + CVE-2016-8289 + CVE-2016-8290 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-02.xml index 7ad55118b8..d06a75886a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-02.xml @@ -6,8 +6,8 @@ allow execution of arbitrary code. bash - January 01, 2017 - January 01, 2017: 1 + 2017-01-01 + 2017-01-01: 1 595268 600174 local @@ -42,9 +42,9 @@ - CVE-2016-7543 - CVE-2016-9401 + CVE-2016-7543 + CVE-2016-9401 - b-man - whissi + b-man + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-03.xml index c3c714b20a..bf039ace61 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-03.xml @@ -6,8 +6,8 @@ of which allows for the remote execution of arbitrary code. libarchive - January 01, 2017 - January 01, 2017: 1 + 2017-01-01 + 2017-01-01: 1 548110 552646 582526 @@ -52,40 +52,40 @@ - CVE-2015-2304 - CVE-2015-8915 - CVE-2015-8916 - CVE-2015-8917 - CVE-2015-8918 - CVE-2015-8919 - CVE-2015-8920 - CVE-2015-8921 - CVE-2015-8922 - CVE-2015-8923 - CVE-2015-8924 - CVE-2015-8925 - CVE-2015-8926 - CVE-2015-8927 - CVE-2015-8928 - CVE-2015-8929 - CVE-2015-8930 - CVE-2015-8931 - CVE-2015-8932 - CVE-2015-8933 - CVE-2015-8934 - CVE-2016-1541 - CVE-2016-4300 - CVE-2016-4301 - CVE-2016-4302 - CVE-2016-4809 - CVE-2016-5418 - CVE-2016-5844 - CVE-2016-6250 - CVE-2016-7166 - CVE-2016-8687 - CVE-2016-8688 - CVE-2016-8689 + CVE-2015-2304 + CVE-2015-8915 + CVE-2015-8916 + CVE-2015-8917 + CVE-2015-8918 + CVE-2015-8919 + CVE-2015-8920 + CVE-2015-8921 + CVE-2015-8922 + CVE-2015-8923 + CVE-2015-8924 + CVE-2015-8925 + CVE-2015-8926 + CVE-2015-8927 + CVE-2015-8928 + CVE-2015-8929 + CVE-2015-8930 + CVE-2015-8931 + CVE-2015-8932 + CVE-2015-8933 + CVE-2015-8934 + CVE-2016-1541 + CVE-2016-4300 + CVE-2016-4301 + CVE-2016-4302 + CVE-2016-4809 + CVE-2016-5418 + CVE-2016-5844 + CVE-2016-6250 + CVE-2016-7166 + CVE-2016-8687 + CVE-2016-8688 + CVE-2016-8689 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-04.xml index d7998ddfd0..c552a2d5d5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-04.xml @@ -6,8 +6,8 @@ to cause a Denial of Service condition. mutt - January 01, 2017 - January 01, 2017: 1 + 2017-01-01 + 2017-01-01: 1 530842 remote @@ -39,8 +39,8 @@ - CVE-2014-9116 + CVE-2014-9116 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-05.xml index fa7db24639..bcba592f9e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-05.xml @@ -6,8 +6,8 @@ Denial of Service condition. busybox - January 01, 2017 - January 01, 2017: 1 + 2017-01-01 + 2017-01-01: 1 590478 remote @@ -46,8 +46,8 @@ - CVE-2016-6301 + CVE-2016-6301 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-06.xml index 6da62bac85..944068757d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-06.xml @@ -6,8 +6,8 @@ attackers to execute arbitrary code. e2fsprogs - January 01, 2017 - January 01, 2017: 1 + 2017-01-01 + 2017-01-01: 1 538930 local, remote @@ -45,8 +45,8 @@ - CVE-2015-0247 + CVE-2015-0247 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-07.xml index 63992a1139..a303cddb61 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-07.xml @@ -6,8 +6,8 @@ execute arbitrary code. openvswitch - January 01, 2017 - January 01, 2017: 2 + 2017-01-01 + 2017-01-01: 2 577568 remote @@ -39,10 +39,10 @@ - + CVE-2016-2074 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-08.xml index d2e6fc3fd3..192d507c4f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-08.xml @@ -6,8 +6,8 @@ could lead to the execution of arbitrary code. w3m - January 01, 2017 - January 01, 2017: 1 + 2017-01-01 + 2017-01-01: 1 579312 600176 remote @@ -43,28 +43,28 @@ - CVE-2016-9422 - CVE-2016-9423 - CVE-2016-9424 - CVE-2016-9425 - CVE-2016-9426 - CVE-2016-9428 - CVE-2016-9429 - CVE-2016-9430 - CVE-2016-9431 - CVE-2016-9432 - CVE-2016-9433 - CVE-2016-9434 - CVE-2016-9435 - CVE-2016-9436 - CVE-2016-9437 - CVE-2016-9438 - CVE-2016-9439 - CVE-2016-9440 - CVE-2016-9441 - CVE-2016-9442 - CVE-2016-9443 + CVE-2016-9422 + CVE-2016-9423 + CVE-2016-9424 + CVE-2016-9425 + CVE-2016-9426 + CVE-2016-9428 + CVE-2016-9429 + CVE-2016-9430 + CVE-2016-9431 + CVE-2016-9432 + CVE-2016-9433 + CVE-2016-9434 + CVE-2016-9435 + CVE-2016-9436 + CVE-2016-9437 + CVE-2016-9438 + CVE-2016-9439 + CVE-2016-9440 + CVE-2016-9441 + CVE-2016-9442 + CVE-2016-9443 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-09.xml index f837927716..bb7a61f74c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-09.xml @@ -6,8 +6,8 @@ execution of arbitrary code. xdg-utils - January 01, 2017 - January 01, 2017: 1 + 2017-01-01 + 2017-01-01: 1 472888 local, remote @@ -41,8 +41,8 @@ - CVE-2014-9622 + CVE-2014-9622 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-10.xml index e27e10e1c9..8920b83578 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-10.xml @@ -6,8 +6,8 @@ allowing remote attackers to execute arbitrary code. libotr, pidgin-otr - January 02, 2017 - January 02, 2017: 1 + 2017-01-02 + 2017-01-02: 1 576914 576916 remote @@ -57,9 +57,9 @@ - CVE-2015-8833 - CVE-2016-2851 + CVE-2015-8833 + CVE-2016-2851 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-11.xml index b2e8ed5236..3159e10d2d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-11.xml @@ -6,8 +6,8 @@ arbitrary code. musl - January 02, 2017 - January 02, 2017: 1 + 2017-01-02 + 2017-01-02: 1 597498 local, remote @@ -46,8 +46,8 @@ - CVE-2016-8859 + CVE-2016-8859 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-12.xml index e8494cb973..24dc452ef6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-12.xml @@ -6,8 +6,8 @@ lead to the remote execution of arbitrary code. memcached - January 02, 2017 - January 02, 2017: 1 + 2017-01-02 + 2017-01-02: 1 598836 remote @@ -44,19 +44,19 @@ - CVE-2016-8704 - CVE-2016-8705 - CVE-2016-8706 - + CVE-2016-8704 + CVE-2016-8705 + CVE-2016-8706 + TALOS-2016-0219 - + TALOS-2016-0220 - + TALOS-2016-0221 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-13.xml index 7484a5b4f0..646eb834f4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-13.xml @@ -6,8 +6,8 @@ to the arbitrary execution of code. hdf5 - January 02, 2017 - January 02, 2017: 1 + 2017-01-02 + 2017-01-02: 1 601404 601408 601414 @@ -46,11 +46,11 @@ - CVE-2016-4330 - CVE-2016-4331 - CVE-2016-4332 - CVE-2016-4333 + CVE-2016-4330 + CVE-2016-4331 + CVE-2016-4332 + CVE-2016-4333 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-14.xml index 9810594fe3..0fed1ef14b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-14.xml @@ -6,8 +6,8 @@ arbitrary code or cause a Denial of Service condition. lzo - January 02, 2017 - January 02, 2017: 1 + 2017-01-02 + 2017-01-02: 1 515238 remote @@ -45,12 +45,12 @@ - CVE-2014-4607 + CVE-2014-4607 - + BlueKnight - + BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-15.xml index 5209b61727..0d6e503a53 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-15.xml @@ -7,8 +7,8 @@ code. firefox, thunderbird - January 03, 2017 - January 04, 2017: 2 + 2017-01-03 + 2017-01-04: 2 581326 590330 594616 @@ -88,82 +88,82 @@ - CVE-2016-2804 - CVE-2016-2805 - CVE-2016-2806 - CVE-2016-2807 - CVE-2016-2808 - CVE-2016-2809 - CVE-2016-2810 - CVE-2016-2811 - CVE-2016-2812 - CVE-2016-2813 - CVE-2016-2814 - CVE-2016-2816 - CVE-2016-2817 - CVE-2016-2820 - CVE-2016-2827 - CVE-2016-2830 - CVE-2016-2835 - CVE-2016-2836 - CVE-2016-2837 - CVE-2016-2838 - CVE-2016-2839 - CVE-2016-5250 - CVE-2016-5251 - CVE-2016-5252 - CVE-2016-5253 - CVE-2016-5254 - CVE-2016-5255 - CVE-2016-5256 - CVE-2016-5257 - CVE-2016-5258 - CVE-2016-5259 - CVE-2016-5260 - CVE-2016-5261 - CVE-2016-5262 - CVE-2016-5263 - CVE-2016-5264 - CVE-2016-5265 - CVE-2016-5266 - CVE-2016-5267 - CVE-2016-5268 - CVE-2016-5270 - CVE-2016-5271 - CVE-2016-5272 - CVE-2016-5273 - CVE-2016-5274 - CVE-2016-5275 - CVE-2016-5276 - CVE-2016-5277 - CVE-2016-5278 - CVE-2016-5279 - CVE-2016-5280 - CVE-2016-5281 - CVE-2016-5282 - CVE-2016-5283 - CVE-2016-5284 - CVE-2016-5290 - CVE-2016-5291 - CVE-2016-5293 - CVE-2016-5294 - CVE-2016-5296 - CVE-2016-5297 - CVE-2016-9064 - CVE-2016-9066 - CVE-2016-9074 - CVE-2016-9079 - CVE-2016-9893 - CVE-2016-9895 - CVE-2016-9897 - CVE-2016-9898 - CVE-2016-9899 - CVE-2016-9900 - CVE-2016-9901 - CVE-2016-9902 - CVE-2016-9904 - CVE-2016-9905 + CVE-2016-2804 + CVE-2016-2805 + CVE-2016-2806 + CVE-2016-2807 + CVE-2016-2808 + CVE-2016-2809 + CVE-2016-2810 + CVE-2016-2811 + CVE-2016-2812 + CVE-2016-2813 + CVE-2016-2814 + CVE-2016-2816 + CVE-2016-2817 + CVE-2016-2820 + CVE-2016-2827 + CVE-2016-2830 + CVE-2016-2835 + CVE-2016-2836 + CVE-2016-2837 + CVE-2016-2838 + CVE-2016-2839 + CVE-2016-5250 + CVE-2016-5251 + CVE-2016-5252 + CVE-2016-5253 + CVE-2016-5254 + CVE-2016-5255 + CVE-2016-5256 + CVE-2016-5257 + CVE-2016-5258 + CVE-2016-5259 + CVE-2016-5260 + CVE-2016-5261 + CVE-2016-5262 + CVE-2016-5263 + CVE-2016-5264 + CVE-2016-5265 + CVE-2016-5266 + CVE-2016-5267 + CVE-2016-5268 + CVE-2016-5270 + CVE-2016-5271 + CVE-2016-5272 + CVE-2016-5273 + CVE-2016-5274 + CVE-2016-5275 + CVE-2016-5276 + CVE-2016-5277 + CVE-2016-5278 + CVE-2016-5279 + CVE-2016-5280 + CVE-2016-5281 + CVE-2016-5282 + CVE-2016-5283 + CVE-2016-5284 + CVE-2016-5290 + CVE-2016-5291 + CVE-2016-5293 + CVE-2016-5294 + CVE-2016-5296 + CVE-2016-5297 + CVE-2016-9064 + CVE-2016-9066 + CVE-2016-9074 + CVE-2016-9079 + CVE-2016-9893 + CVE-2016-9895 + CVE-2016-9897 + CVE-2016-9898 + CVE-2016-9899 + CVE-2016-9900 + CVE-2016-9901 + CVE-2016-9902 + CVE-2016-9904 + CVE-2016-9905 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-16.xml index 69174de786..446048c75a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-16.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. tiff - January 09, 2017 - January 09, 2017: 2 + 2017-01-09 + 2017-01-09: 2 484542 534108 538318 @@ -52,60 +52,60 @@ - CVE-2013-4243 - CVE-2014-8127 - CVE-2014-8128 - CVE-2014-8129 - CVE-2014-8130 - CVE-2014-9330 - CVE-2014-9655 - CVE-2015-1547 - CVE-2015-7313 - CVE-2015-7554 - CVE-2015-8665 - CVE-2015-8668 - CVE-2015-8683 - CVE-2015-8781 - CVE-2015-8782 - CVE-2015-8783 - CVE-2015-8784 - CVE-2016-3186 - CVE-2016-3619 - CVE-2016-3620 - CVE-2016-3621 - CVE-2016-3622 - CVE-2016-3623 - CVE-2016-3624 - CVE-2016-3625 - CVE-2016-3631 - CVE-2016-3632 - CVE-2016-3633 - CVE-2016-3634 - CVE-2016-3658 - CVE-2016-3945 - CVE-2016-3990 - CVE-2016-3991 - CVE-2016-5102 - CVE-2016-5314 - CVE-2016-5315 - CVE-2016-5316 - CVE-2016-5317 - CVE-2016-5318 - CVE-2016-5319 - CVE-2016-5320 - CVE-2016-5321 - CVE-2016-5322 - CVE-2016-5323 - CVE-2016-5652 - CVE-2016-5875 - CVE-2016-6223 - CVE-2016-8331 - CVE-2016-9273 - CVE-2016-9297 - CVE-2016-9448 - CVE-2016-9453 - CVE-2016-9532 + CVE-2013-4243 + CVE-2014-8127 + CVE-2014-8128 + CVE-2014-8129 + CVE-2014-8130 + CVE-2014-9330 + CVE-2014-9655 + CVE-2015-1547 + CVE-2015-7313 + CVE-2015-7554 + CVE-2015-8665 + CVE-2015-8668 + CVE-2015-8683 + CVE-2015-8781 + CVE-2015-8782 + CVE-2015-8783 + CVE-2015-8784 + CVE-2016-3186 + CVE-2016-3619 + CVE-2016-3620 + CVE-2016-3621 + CVE-2016-3622 + CVE-2016-3623 + CVE-2016-3624 + CVE-2016-3625 + CVE-2016-3631 + CVE-2016-3632 + CVE-2016-3633 + CVE-2016-3634 + CVE-2016-3658 + CVE-2016-3945 + CVE-2016-3990 + CVE-2016-3991 + CVE-2016-5102 + CVE-2016-5314 + CVE-2016-5315 + CVE-2016-5316 + CVE-2016-5317 + CVE-2016-5318 + CVE-2016-5319 + CVE-2016-5320 + CVE-2016-5321 + CVE-2016-5322 + CVE-2016-5323 + CVE-2016-5652 + CVE-2016-5875 + CVE-2016-6223 + CVE-2016-8331 + CVE-2016-9273 + CVE-2016-9297 + CVE-2016-9448 + CVE-2016-9453 + CVE-2016-9532 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-17.xml index 51d85c4049..7393d5c83d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-17.xml @@ -6,8 +6,8 @@ worst of which allows remote attackers to execute arbitrary code. adobe-flash - January 10, 2017 - January 10, 2017: 1 + 2017-01-10 + 2017-01-10: 1 602546 remote @@ -48,24 +48,24 @@ APSB16-39 - CVE-2016-7867 - CVE-2016-7868 - CVE-2016-7869 - CVE-2016-7870 - CVE-2016-7871 - CVE-2016-7872 - CVE-2016-7873 - CVE-2016-7874 - CVE-2016-7875 - CVE-2016-7876 - CVE-2016-7877 - CVE-2016-7878 - CVE-2016-7879 - CVE-2016-7880 - CVE-2016-7881 - CVE-2016-7890 - CVE-2016-7892 + CVE-2016-7867 + CVE-2016-7868 + CVE-2016-7869 + CVE-2016-7870 + CVE-2016-7871 + CVE-2016-7872 + CVE-2016-7873 + CVE-2016-7874 + CVE-2016-7875 + CVE-2016-7876 + CVE-2016-7877 + CVE-2016-7878 + CVE-2016-7879 + CVE-2016-7880 + CVE-2016-7881 + CVE-2016-7890 + CVE-2016-7892 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-18.xml index 1885e30aa0..41eb8081e4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-18.xml @@ -64,8 +64,8 @@ - CVE-2016-0772 - CVE-2016-5636 + CVE-2016-0772 + CVE-2016-5636 b-man whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-19.xml index d80778d086..7e2eba8f73 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-19.xml @@ -6,8 +6,8 @@ privileges. ntfs3g - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 550970 local @@ -45,11 +45,11 @@ - CVE-2015-3202 + CVE-2015-3202 GLSA 201603-04 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-20.xml index a6f49ee828..bde89f1982 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-20.xml @@ -6,8 +6,8 @@ local Denial of Service. dbus - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 596772 local @@ -56,6 +56,6 @@ GLSA-201503-02 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-21.xml index e17ca4872d..5b20a7f386 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-21.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. expat - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 458742 555642 577928 @@ -47,15 +47,15 @@ - CVE-2012-6702 - CVE-2013-0340 - CVE-2015-1283 - CVE-2016-0718 - CVE-2016-4472 - CVE-2016-5300 + CVE-2012-6702 + CVE-2013-0340 + CVE-2015-1283 + CVE-2016-0718 + CVE-2016-4472 + CVE-2016-5300 - + BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-22.xml index 8853a74581..4614faf3ee 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-22.xml @@ -6,8 +6,8 @@ to the way log files are handled. nginx - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 605008 local @@ -47,12 +47,12 @@ - CVE-2016-1247 + CVE-2016-1247 DSA-3701 Technical analysis - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-23.xml index 255d0dca15..c0802a92b0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-23.xml @@ -6,8 +6,8 @@ which might allow remote attackers to obtain ECDSA secret keys. botan - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 581324 remote @@ -41,9 +41,9 @@ - CVE-2016-2849 - CVE-2016-2850 + CVE-2016-2849 + CVE-2016-2850 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-24.xml index 90a33c7402..8288b2826b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-24.xml @@ -6,8 +6,8 @@ which may allow an attacker to bypass authentication. pgbouncer - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 550124 600184 remote @@ -44,9 +44,9 @@ - CVE-2015-4054 - CVE-2015-6817 + CVE-2015-4054 + CVE-2015-6817 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-25.xml index d7af4d7091..c5ab53e691 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-25.xml @@ -6,8 +6,8 @@ which may allow remote attackers to inject arbitrary web script or HTML. phpBB - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 538360 remote @@ -46,9 +46,9 @@

- CVE-2015-1431 - CVE-2015-1432 + CVE-2015-1431 + CVE-2015-1432 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-26.xml index bf8f1bd641..616ef6d134 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-26.xml @@ -6,8 +6,8 @@ Denial of Service condition. bind - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 598750 remote @@ -42,8 +42,8 @@ - CVE-2016-8864 + CVE-2016-8864 - b-man - whissi + b-man + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-27.xml index 604624ab6f..f3cbbe48f3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-27.xml @@ -6,8 +6,8 @@ which may allow execution of arbitrary code. 7zip - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 582832 remote @@ -45,9 +45,9 @@ - CVE-2016-2334 - CVE-2016-2335 + CVE-2016-2334 + CVE-2016-2335 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-28.xml index 705cb7c7d6..df6c758b97 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-28.xml @@ -6,8 +6,8 @@ to cause a Denial of Service condition. c-ares - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 595536 remote @@ -45,8 +45,8 @@ - CVE-2016-5180 + CVE-2016-5180 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-29.xml index fe20830585..aa84589e7f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-29.xml @@ -6,8 +6,8 @@ certain modeline options are treated. vim, gvim - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 600650 remote @@ -58,8 +58,8 @@ - CVE-2016-1248 + CVE-2016-1248 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-30.xml index f157c7d8a7..9d9da36aba 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-30.xml @@ -6,8 +6,8 @@ ploop containers. vzctl - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 560522 local, remote @@ -47,8 +47,8 @@ - CVE-2015-6927 + CVE-2015-6927 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-31.xml index 542858851b..dff98ff152 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-31.xml @@ -6,8 +6,8 @@ using such scanners vulnerable to the execution of arbitrary code. flex - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 589820 remote @@ -54,8 +54,8 @@ - CVE-2016-6354 + CVE-2016-6354 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-32.xml index 1e77c325a1..5e59bc4e91 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-32.xml @@ -6,8 +6,8 @@ of which could lead to arbitrary code execution. phpMyAdmin - January 11, 2017 - January 11, 2017: 1 + 2017-01-11 + 2017-01-11: 1 586964 593582 600814 @@ -48,70 +48,70 @@ - CVE-2016-4412 - CVE-2016-5097 - CVE-2016-5098 - CVE-2016-5099 - CVE-2016-5701 - CVE-2016-5702 - CVE-2016-5703 - CVE-2016-5704 - CVE-2016-5705 - CVE-2016-5706 - CVE-2016-5730 - CVE-2016-5731 - CVE-2016-5732 - CVE-2016-5733 - CVE-2016-5734 - CVE-2016-5739 - CVE-2016-6606 - CVE-2016-6607 - CVE-2016-6608 - CVE-2016-6609 - CVE-2016-6610 - CVE-2016-6611 - CVE-2016-6612 - CVE-2016-6613 - CVE-2016-6614 - CVE-2016-6615 - CVE-2016-6616 - CVE-2016-6617 - CVE-2016-6618 - CVE-2016-6619 - CVE-2016-6620 - CVE-2016-6622 - CVE-2016-6623 - CVE-2016-6624 - CVE-2016-6625 - CVE-2016-6626 - CVE-2016-6627 - CVE-2016-6628 - CVE-2016-6629 - CVE-2016-6630 - CVE-2016-6631 - CVE-2016-6632 - CVE-2016-6633 - CVE-2016-9847 - CVE-2016-9848 - CVE-2016-9849 - CVE-2016-9850 - CVE-2016-9851 - CVE-2016-9852 - CVE-2016-9853 - CVE-2016-9854 - CVE-2016-9855 - CVE-2016-9856 - CVE-2016-9857 - CVE-2016-9858 - CVE-2016-9859 - CVE-2016-9860 - CVE-2016-9861 - CVE-2016-9862 - CVE-2016-9863 - CVE-2016-9864 - CVE-2016-9865 - CVE-2016-9866 + CVE-2016-4412 + CVE-2016-5097 + CVE-2016-5098 + CVE-2016-5099 + CVE-2016-5701 + CVE-2016-5702 + CVE-2016-5703 + CVE-2016-5704 + CVE-2016-5705 + CVE-2016-5706 + CVE-2016-5730 + CVE-2016-5731 + CVE-2016-5732 + CVE-2016-5733 + CVE-2016-5734 + CVE-2016-5739 + CVE-2016-6606 + CVE-2016-6607 + CVE-2016-6608 + CVE-2016-6609 + CVE-2016-6610 + CVE-2016-6611 + CVE-2016-6612 + CVE-2016-6613 + CVE-2016-6614 + CVE-2016-6615 + CVE-2016-6616 + CVE-2016-6617 + CVE-2016-6618 + CVE-2016-6619 + CVE-2016-6620 + CVE-2016-6622 + CVE-2016-6623 + CVE-2016-6624 + CVE-2016-6625 + CVE-2016-6626 + CVE-2016-6627 + CVE-2016-6628 + CVE-2016-6629 + CVE-2016-6630 + CVE-2016-6631 + CVE-2016-6632 + CVE-2016-6633 + CVE-2016-9847 + CVE-2016-9848 + CVE-2016-9849 + CVE-2016-9850 + CVE-2016-9851 + CVE-2016-9852 + CVE-2016-9853 + CVE-2016-9854 + CVE-2016-9855 + CVE-2016-9856 + CVE-2016-9857 + CVE-2016-9858 + CVE-2016-9859 + CVE-2016-9860 + CVE-2016-9861 + CVE-2016-9862 + CVE-2016-9863 + CVE-2016-9864 + CVE-2016-9865 + CVE-2016-9866 - whissi - whissi + whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-33.xml index 544b766798..a481c57c88 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-33.xml @@ -7,8 +7,8 @@ escalation. postgres - January 12, 2017 - January 12, 2017: 4 + 2017-01-12 + 2017-01-12: 4 562586 574456 602130 @@ -79,13 +79,13 @@ - CVE-2015-5288 - CVE-2015-5289 - CVE-2016-0766 - CVE-2016-0773 - CVE-2016-5423 - CVE-2016-5424 + CVE-2015-5288 + CVE-2015-5289 + CVE-2016-0766 + CVE-2016-0773 + CVE-2016-5423 + CVE-2016-5424 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-34.xml index 022a03cc1c..8a01672292 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-34.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-34.xml @@ -4,8 +4,8 @@ runC: Privilege escalation A vulnerability in runC could lead to privilege escalation. runc - January 12, 2017 - January 12, 2017: 1 + 2017-01-12 + 2017-01-12: 1 605378 remote @@ -43,8 +43,8 @@ - CVE-2016-9962 + CVE-2016-9962 - b-man - b-man + b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-35.xml index 293cdc8a40..c1a46851ee 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-35.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-35.xml @@ -59,15 +59,15 @@ - CVE-2016-1521 - CVE-2016-1521 - CVE-2016-1522 - CVE-2016-1522 - CVE-2016-1523 - CVE-2016-1523 - CVE-2016-1526 - CVE-2016-1526 - CVE-2016-9079 + CVE-2016-1521 + CVE-2016-1521 + CVE-2016-1522 + CVE-2016-1522 + CVE-2016-1523 + CVE-2016-1523 + CVE-2016-1526 + CVE-2016-1526 + CVE-2016-9079 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-36.xml index 379d9ec58d..53a4e2e9b6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-36.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-36.xml @@ -52,12 +52,12 @@ Apache Software Foundation Projects and "httpoxy" CERT VU #797896 - CVE-2014-3583 - CVE-2016-0736 - CVE-2016-2161 - CVE-2016-5387 - CVE-2016-8740 - CVE-2016-8743 + CVE-2014-3583 + CVE-2016-0736 + CVE-2016-2161 + CVE-2016-5387 + CVE-2016-8740 + CVE-2016-8743 HTTPoxy Website BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-37.xml index 4d6574d9f4..7dd4606942 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-37.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-37.xml @@ -57,27 +57,27 @@ - CVE-2015-1819 - CVE-2015-5312 - CVE-2015-7497 - CVE-2015-7498 - CVE-2015-7499 - CVE-2015-7500 - CVE-2015-7941 - CVE-2015-7942 - CVE-2015-8035 - CVE-2015-8242 - CVE-2015-8806 - CVE-2016-1836 - CVE-2016-1838 - CVE-2016-1839 - CVE-2016-1840 - CVE-2016-2073 - CVE-2016-3627 - CVE-2016-3705 - CVE-2016-4483 - CVE-2016-4658 - CVE-2016-5131 + CVE-2015-1819 + CVE-2015-5312 + CVE-2015-7497 + CVE-2015-7498 + CVE-2015-7499 + CVE-2015-7500 + CVE-2015-7941 + CVE-2015-7942 + CVE-2015-8035 + CVE-2015-8242 + CVE-2015-8806 + CVE-2016-1836 + CVE-2016-1838 + CVE-2016-1839 + CVE-2016-1840 + CVE-2016-2073 + CVE-2016-3627 + CVE-2016-3705 + CVE-2016-4483 + CVE-2016-4658 + CVE-2016-5131 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-38.xml index 2e52d08533..3a497e8de4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-38.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-38.xml @@ -43,26 +43,26 @@ - + CVE-2016-1000030 - CVE-2016-2365 - CVE-2016-2366 - CVE-2016-2367 - CVE-2016-2368 - CVE-2016-2369 - CVE-2016-2370 - CVE-2016-2371 - CVE-2016-2372 - CVE-2016-2373 - CVE-2016-2374 - CVE-2016-2375 - CVE-2016-2376 - CVE-2016-2377 - CVE-2016-2378 - CVE-2016-2379 - CVE-2016-2380 - CVE-2016-4323 + CVE-2016-2365 + CVE-2016-2366 + CVE-2016-2367 + CVE-2016-2368 + CVE-2016-2369 + CVE-2016-2370 + CVE-2016-2371 + CVE-2016-2372 + CVE-2016-2373 + CVE-2016-2374 + CVE-2016-2375 + CVE-2016-2376 + CVE-2016-2377 + CVE-2016-2378 + CVE-2016-2379 + CVE-2016-2380 + CVE-2016-4323 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-39.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-39.xml index 83f18d0882..8300800022 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-39.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-39.xml @@ -42,7 +42,7 @@ - CVE-2016-5108 + CVE-2016-5108 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-40.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-40.xml index c02081bf4b..eb502930f0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-40.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-40.xml @@ -44,7 +44,7 @@ - + CVE-2014-9765 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-41.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-41.xml index 906c448e7e..0a9ddd6a32 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-41.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-41.xml @@ -41,7 +41,7 @@ - CVE-2014-3985 + CVE-2014-3985 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-42.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-42.xml index 6251724186..2f337fd45e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-42.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-42.xml @@ -48,10 +48,10 @@ - CVE-2014-3710 - CVE-2014-9652 - CVE-2014-9653 - CVE-2015-8865 + CVE-2014-3710 + CVE-2014-9652 + CVE-2014-9653 + CVE-2015-8865 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-43.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-43.xml index 2fb4ac9ec6..75c5d8b2cb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-43.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-43.xml @@ -58,21 +58,21 @@ - CVE-2016-3458 - CVE-2016-3485 - CVE-2016-3500 - CVE-2016-3508 - CVE-2016-3550 - CVE-2016-3587 - CVE-2016-3598 - CVE-2016-3606 - CVE-2016-3610 - CVE-2016-5542 - CVE-2016-5554 - CVE-2016-5568 - CVE-2016-5573 - CVE-2016-5582 - CVE-2016-5597 + CVE-2016-3458 + CVE-2016-3485 + CVE-2016-3500 + CVE-2016-3508 + CVE-2016-3550 + CVE-2016-3587 + CVE-2016-3598 + CVE-2016-3606 + CVE-2016-3610 + CVE-2016-5542 + CVE-2016-5554 + CVE-2016-5568 + CVE-2016-5573 + CVE-2016-5582 + CVE-2016-5597 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-44.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-44.xml index 6836a1c70b..653d4ce773 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-44.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-44.xml @@ -45,7 +45,7 @@ - CVE-2012-0804 + CVE-2012-0804 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-45.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-45.xml index 62625cae4e..8282b54286 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-45.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-45.xml @@ -41,10 +41,10 @@ - CVE-2017-5193 - CVE-2017-5194 - CVE-2017-5195 - CVE-2017-5196 + CVE-2017-5193 + CVE-2017-5194 + CVE-2017-5195 + CVE-2017-5196 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-46.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-46.xml index f20c8f2c34..152bd8941e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-46.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-46.xml @@ -46,14 +46,14 @@ - CVE-2015-2721 - CVE-2015-4000 - CVE-2015-7575 - CVE-2016-1938 - CVE-2016-5285 - CVE-2016-8635 - CVE-2016-9074 - SLOTH Attack Technical + CVE-2015-2721 + CVE-2015-4000 + CVE-2015-7575 + CVE-2016-1938 + CVE-2016-5285 + CVE-2016-8635 + CVE-2016-9074 + SLOTH Attack Technical Paper diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-47.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-47.xml index 13ef6a00be..395f6320f5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-47.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-47.xml @@ -52,28 +52,28 @@ - CVE-2014-8150 - CVE-2014-8151 - CVE-2016-0755 - CVE-2016-3739 - CVE-2016-5419 - CVE-2016-5420 - CVE-2016-5421 - CVE-2016-7141 - CVE-2016-7167 - CVE-2016-8615 - CVE-2016-8616 - CVE-2016-8617 - CVE-2016-8618 - CVE-2016-8619 - CVE-2016-8620 - CVE-2016-8621 - CVE-2016-8622 - CVE-2016-8623 - CVE-2016-8624 - CVE-2016-8625 - CVE-2016-9586 - CVE-2016-9594 + CVE-2014-8150 + CVE-2014-8151 + CVE-2016-0755 + CVE-2016-3739 + CVE-2016-5419 + CVE-2016-5420 + CVE-2016-5421 + CVE-2016-7141 + CVE-2016-7167 + CVE-2016-8615 + CVE-2016-8616 + CVE-2016-8617 + CVE-2016-8618 + CVE-2016-8619 + CVE-2016-8620 + CVE-2016-8621 + CVE-2016-8622 + CVE-2016-8623 + CVE-2016-8624 + CVE-2016-8625 + CVE-2016-9586 + CVE-2016-9594 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-48.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-48.xml index c4c6e8a03b..c96b85b889 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-48.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-48.xml @@ -46,8 +46,8 @@ - CVE-2016-1245 - CVE-2016-4049 + CVE-2016-1245 + CVE-2016-4049 pinkbyte whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-49.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-49.xml index 7879ff8d59..b5749bf9c4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-49.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-49.xml @@ -52,23 +52,23 @@ - + CVE-2016-10028 - CVE-2016-9101 - CVE-2016-9776 - CVE-2016-9845 - CVE-2016-9846 - CVE-2016-9907 - CVE-2016-9908 - CVE-2016-9911 - CVE-2016-9912 - CVE-2016-9913 - CVE-2016-9914 - CVE-2016-9915 - CVE-2016-9916 - CVE-2016-9921 - CVE-2016-9923 + CVE-2016-9101 + CVE-2016-9776 + CVE-2016-9845 + CVE-2016-9846 + CVE-2016-9907 + CVE-2016-9908 + CVE-2016-9911 + CVE-2016-9912 + CVE-2016-9913 + CVE-2016-9914 + CVE-2016-9915 + CVE-2016-9916 + CVE-2016-9921 + CVE-2016-9923 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-50.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-50.xml index 5cee7984eb..0c461ad37d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-50.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-50.xml @@ -39,7 +39,7 @@ - CVE-2015-3310 + CVE-2015-3310 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-51.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-51.xml index 4835710404..3b4ca79b38 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-51.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-51.xml @@ -44,10 +44,10 @@ - CVE-2015-8949 - CVE-2016-1246 - CVE-2016-1249 - CVE-2016-1251 + CVE-2015-8949 + CVE-2016-1246 + CVE-2016-1249 + CVE-2016-1251 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-52.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-52.xml index 140c40fc66..91eede3967 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-52.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-52.xml @@ -42,8 +42,8 @@ - CVE-2016-6255 - CVE-2016-8863 + CVE-2016-6255 + CVE-2016-8863 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-53.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-53.xml index 5dac963bc2..85a4c30953 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-53.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-53.xml @@ -46,7 +46,7 @@ - CVE-2014-5461 + CVE-2014-5461 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-54.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-54.xml index 6a1c4c21cc..1cb8d785fe 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-54.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-54.xml @@ -39,7 +39,7 @@ - CVE-2015-3885 + CVE-2015-3885 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-55.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-55.xml index 618bc533c6..f5669454c8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-55.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-55.xml @@ -43,8 +43,8 @@ - CVE-2014-2977 - CVE-2014-2978 + CVE-2014-2977 + CVE-2014-2978 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-56.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-56.xml index 5e954de111..3cd908a397 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-56.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-56.xml @@ -41,10 +41,10 @@ - CVE-2016-9840 - CVE-2016-9841 - CVE-2016-9842 - CVE-2016-9843 + CVE-2016-9840 + CVE-2016-9841 + CVE-2016-9842 + CVE-2016-9843 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-57.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-57.xml index d653fddf97..3495ac7874 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-57.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-57.xml @@ -42,13 +42,13 @@ - CVE-2010-2642 - CVE-2011-0433 - CVE-2011-0764 - CVE-2011-1552 - CVE-2011-1553 - CVE-2011-1554 - CVE-2011-5244 + CVE-2010-2642 + CVE-2011-0433 + CVE-2011-0764 + CVE-2011-1552 + CVE-2011-1553 + CVE-2011-1554 + CVE-2011-5244 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-58.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-58.xml index dad26e863a..d0982f2b91 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-58.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-58.xml @@ -50,9 +50,9 @@ - CVE-2015-2632 - CVE-2016-6293 - CVE-2016-7415 + CVE-2015-2632 + CVE-2016-6293 + CVE-2016-7415 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-59.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-59.xml index 6841f0f18f..4e6646d9a9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-59.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-59.xml @@ -43,8 +43,8 @@ - CVE-2016-4855 - CVE-2016-7405 + CVE-2016-4855 + CVE-2016-7405 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-60.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-60.xml index 6ce4f6c84c..847905cc23 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-60.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-60.xml @@ -44,9 +44,9 @@ - CVE-2015-3885 - CVE-2015-8366 - CVE-2015-8367 + CVE-2015-3885 + CVE-2015-8366 + CVE-2015-8367 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-61.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-61.xml index cfac3b1409..d97ed75788 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-61.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-61.xml @@ -42,7 +42,7 @@ - CVE-2016-9085 + CVE-2016-9085 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-62.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-62.xml index e3c9c3e841..2bfdf8cf60 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-62.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-62.xml @@ -55,9 +55,9 @@ - CVE-2017-5180 - CVE-2017-5206 - CVE-2017-5207 + CVE-2017-5180 + CVE-2017-5206 + CVE-2017-5207 b-man whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-63.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-63.xml index 82e8f8eed4..f193a72e63 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-63.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-63.xml @@ -45,24 +45,24 @@ - CVE-2016-1521 - CVE-2016-1522 - CVE-2016-1523 - CVE-2016-1526 - CVE-2016-1977 - CVE-2016-2790 - CVE-2016-2791 - CVE-2016-2792 - CVE-2016-2793 - CVE-2016-2794 - CVE-2016-2795 - CVE-2016-2796 - CVE-2016-2797 - CVE-2016-2798 - CVE-2016-2799 - CVE-2016-2800 - CVE-2016-2801 - CVE-2016-2802 + CVE-2016-1521 + CVE-2016-1522 + CVE-2016-1523 + CVE-2016-1526 + CVE-2016-1977 + CVE-2016-2790 + CVE-2016-2791 + CVE-2016-2792 + CVE-2016-2793 + CVE-2016-2794 + CVE-2016-2795 + CVE-2016-2796 + CVE-2016-2797 + CVE-2016-2798 + CVE-2016-2799 + CVE-2016-2800 + CVE-2016-2801 + CVE-2016-2802 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-64.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-64.xml index d70eea6633..8a53cfd87a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-64.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-64.xml @@ -46,9 +46,9 @@ - CVE-2013-6424 - CVE-2015-3164 - CVE-2015-3418 + CVE-2013-6424 + CVE-2015-3164 + CVE-2015-3418 X.Org/Wayland Security Advisory: Missing authentication in XWayland diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-65.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-65.xml index fca9268f0e..713317d4b9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-65.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-65.xml @@ -61,24 +61,24 @@ - CVE-2016-2183 - CVE-2016-5546 - CVE-2016-5547 - CVE-2016-5548 - CVE-2016-5549 - CVE-2016-5552 - CVE-2016-8328 - CVE-2017-3231 - CVE-2017-3241 - CVE-2017-3252 - CVE-2017-3253 - CVE-2017-3259 - CVE-2017-3260 - CVE-2017-3261 - CVE-2017-3262 - CVE-2017-3272 - CVE-2017-3289 - + CVE-2016-2183 + CVE-2016-5546 + CVE-2016-5547 + CVE-2016-5548 + CVE-2016-5549 + CVE-2016-5552 + CVE-2016-8328 + CVE-2017-3231 + CVE-2017-3241 + CVE-2017-3252 + CVE-2017-3253 + CVE-2017-3259 + CVE-2017-3260 + CVE-2017-3261 + CVE-2017-3262 + CVE-2017-3272 + CVE-2017-3289 + Oracle Critical Patch Update Advisory - January 2017 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-66.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-66.xml index 7edf7d6013..82067959fd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-66.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-66.xml @@ -47,27 +47,27 @@ - CVE-2017-5006 - CVE-2017-5007 - CVE-2017-5008 - CVE-2017-5009 - CVE-2017-5010 - CVE-2017-5011 - CVE-2017-5012 - CVE-2017-5013 - CVE-2017-5014 - CVE-2017-5015 - CVE-2017-5016 - CVE-2017-5017 - CVE-2017-5018 - CVE-2017-5019 - CVE-2017-5020 - CVE-2017-5021 - CVE-2017-5022 - CVE-2017-5023 - CVE-2017-5024 - CVE-2017-5025 - CVE-2017-5026 + CVE-2017-5006 + CVE-2017-5007 + CVE-2017-5008 + CVE-2017-5009 + CVE-2017-5010 + CVE-2017-5011 + CVE-2017-5012 + CVE-2017-5013 + CVE-2017-5014 + CVE-2017-5015 + CVE-2017-5016 + CVE-2017-5017 + CVE-2017-5018 + CVE-2017-5019 + CVE-2017-5020 + CVE-2017-5021 + CVE-2017-5022 + CVE-2017-5023 + CVE-2017-5024 + CVE-2017-5025 + CVE-2017-5026 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-67.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-67.xml index c88f32dd54..291841a5a2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-67.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-67.xml @@ -40,7 +40,7 @@ - CVE-2014-0466 + CVE-2014-0466 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-68.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-68.xml index 08fa57fe40..7dc063032a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-68.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-68.xml @@ -46,8 +46,8 @@ - CVE-2015-0852 - CVE-2016-5684 + CVE-2015-0852 + CVE-2016-5684 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-69.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-69.xml index 0d034abbd4..3dd82eaecc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-69.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-69.xml @@ -47,7 +47,7 @@ - CVE-2017-5330 + CVE-2017-5330 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-70.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-70.xml index aba6fd5368..8ffcf0f786 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-70.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-70.xml @@ -47,7 +47,7 @@ - CVE-2016-5410 + CVE-2016-5410 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-71.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-71.xml index 1d55b382c5..a758c35b7c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-71.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-71.xml @@ -43,13 +43,13 @@ - CVE-2016-7122 - CVE-2016-7450 - CVE-2016-7502 - CVE-2016-7555 - CVE-2016-7562 - CVE-2016-7785 - CVE-2016-7905 + CVE-2016-7122 + CVE-2016-7450 + CVE-2016-7502 + CVE-2016-7555 + CVE-2016-7562 + CVE-2016-7785 + CVE-2016-7905 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-72.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-72.xml index d0c052d546..521693e0f3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-72.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-72.xml @@ -46,7 +46,7 @@ - + CVE-2016-10164 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-73.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-73.xml index e8cbde4b71..2cf658257c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-73.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-73.xml @@ -47,8 +47,8 @@ - CVE-2015-4645 - CVE-2015-4646 + CVE-2015-4645 + CVE-2015-4646 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-74.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-74.xml index 69fd1fdb3d..c72bc9ff83 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-74.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-74.xml @@ -63,7 +63,7 @@ - + CVE-2016-10087 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-75.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-75.xml index d4de61e9a5..2d59364ef0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-75.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-75.xml @@ -51,11 +51,11 @@

- CVE-2015-8607 - CVE-2015-8853 - CVE-2016-1238 - CVE-2016-2381 - CVE-2016-6185 + CVE-2015-8607 + CVE-2015-8853 + CVE-2016-1238 + CVE-2016-2381 + CVE-2016-6185 Gentoo Wiki: How to upgrade Perl diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-76.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-76.xml index c5e51f9b81..ebe27219f4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-76.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-76.xml @@ -41,8 +41,8 @@ - CVE-2015-8947 - CVE-2016-2052 + CVE-2015-8947 + CVE-2016-2052 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-77.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-77.xml index 7f445efe19..e70f0e6f1e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-77.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-77.xml @@ -52,7 +52,7 @@ - CVE-2016-9587 + CVE-2016-9587 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-01.xml index f4ac29e435..574a1ba75e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-01.xml @@ -50,7 +50,7 @@ - + CVE-2016-10109 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-03.xml index 5a9e9a39d3..a2e0199505 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-03.xml @@ -56,7 +56,7 @@ - CVE-2017-5940 + CVE-2017-5940 Firejail Release Notes diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-04.xml index e4dfe1c235..47918d9346 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-04.xml @@ -44,10 +44,10 @@ - CVE-2017-5334 - CVE-2017-5335 - CVE-2017-5336 - CVE-2017-5337 + CVE-2017-5334 + CVE-2017-5335 + CVE-2017-5336 + CVE-2017-5337 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-05.xml index 4fa1682e62..fbb7d90b41 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-05.xml @@ -40,7 +40,7 @@ - CVE-2014-8990 + CVE-2014-8990 b-man whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-06.xml index ba184707d6..78ceefb534 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-06.xml @@ -42,9 +42,9 @@ - CVE-2014-0978 - CVE-2014-1235 - CVE-2014-1236 + CVE-2014-0978 + CVE-2014-1235 + CVE-2014-1236 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-07.xml index aef31154b9..a065dfd267 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-07.xml @@ -45,10 +45,10 @@ - CVE-2016-7055 - CVE-2017-3730 - CVE-2017-3731 - CVE-2017-3732 + CVE-2016-7055 + CVE-2017-3730 + CVE-2017-3731 + CVE-2017-3732 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-08.xml index 6e25cc50df..acd38bb2ce 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-08.xml @@ -42,10 +42,10 @@ - CVE-2016-5545 - CVE-2017-3290 - CVE-2017-3316 - CVE-2017-3332 + CVE-2016-5545 + CVE-2017-3290 + CVE-2017-3316 + CVE-2017-3332 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-09.xml index 307978df58..e5033cc479 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-09.xml @@ -45,22 +45,22 @@ - + CVE-2016-10144 - + CVE-2016-10145 - + CVE-2016-10146 - CVE-2016-9298 - CVE-2017-5506 - CVE-2017-5507 - CVE-2017-5508 - CVE-2017-5509 - CVE-2017-5510 - CVE-2017-5511 + CVE-2016-9298 + CVE-2017-5506 + CVE-2017-5507 + CVE-2017-5508 + CVE-2017-5509 + CVE-2017-5510 + CVE-2017-5511 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-10.xml index fb897b8ac2..8d98b2c5c4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-10.xml @@ -49,7 +49,7 @@ - CVE-2017-0358 + CVE-2017-0358 GLSA-201603-04 GLSA-201701-19 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-11.xml index 985ae38e33..06b17eed4d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-11.xml @@ -49,14 +49,14 @@ - CVE-2014-9761 - CVE-2015-5277 - CVE-2015-8776 - CVE-2015-8777 - CVE-2015-8778 - CVE-2015-8779 - CVE-2016-1234 - CVE-2016-3075 + CVE-2014-9761 + CVE-2015-5277 + CVE-2015-8776 + CVE-2015-8777 + CVE-2015-8778 + CVE-2015-8779 + CVE-2016-1234 + CVE-2016-3075 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-12.xml index 4825141ffa..a2459fc935 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-12.xml @@ -46,9 +46,9 @@ - CVE-2016-6265 - CVE-2016-6525 - CVE-2017-5896 + CVE-2016-6265 + CVE-2016-6525 + CVE-2017-5896 b-man whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-13.xml index a4eb178f19..52e6b51881 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-13.xml @@ -58,14 +58,14 @@ - CVE-2017-5373 - CVE-2017-5375 - CVE-2017-5376 - CVE-2017-5378 - CVE-2017-5380 - CVE-2017-5383 - CVE-2017-5390 - CVE-2017-5396 + CVE-2017-5373 + CVE-2017-5375 + CVE-2017-5376 + CVE-2017-5378 + CVE-2017-5380 + CVE-2017-5383 + CVE-2017-5390 + CVE-2017-5396 Mozilla Foundation Security Advisory 2017-03 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-14.xml index a4a873eae7..723fea7bc5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-14.xml @@ -45,7 +45,7 @@ - CVE-2013-7459 + CVE-2013-7459 b-man whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-15.xml index 4fd879865b..a7eb0bd92e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-15.xml @@ -59,7 +59,7 @@ - CVE-2015-8869 + CVE-2015-8869 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-16.xml index ff922abe2d..672a49a04d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-16.xml @@ -54,9 +54,9 @@ - CVE-2015-4335 - CVE-2015-8080 - CVE-2016-8339 + CVE-2015-4335 + CVE-2015-8080 + CVE-2016-8339 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-17.xml index 4e34e47d9a..d2ed6076e4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-17.xml @@ -44,24 +44,24 @@ - CVE-2016-8318 - CVE-2016-8327 - CVE-2017-3238 - CVE-2017-3243 - CVE-2017-3244 - CVE-2017-3251 - CVE-2017-3256 - CVE-2017-3257 - CVE-2017-3258 - CVE-2017-3265 - CVE-2017-3273 - CVE-2017-3291 - CVE-2017-3312 - CVE-2017-3313 - CVE-2017-3317 - CVE-2017-3318 - CVE-2017-3319 - CVE-2017-3320 + CVE-2016-8318 + CVE-2016-8327 + CVE-2017-3238 + CVE-2017-3243 + CVE-2017-3244 + CVE-2017-3251 + CVE-2017-3256 + CVE-2017-3257 + CVE-2017-3258 + CVE-2017-3265 + CVE-2017-3273 + CVE-2017-3291 + CVE-2017-3312 + CVE-2017-3313 + CVE-2017-3317 + CVE-2017-3318 + CVE-2017-3319 + CVE-2017-3320 Oracle Critical Patch Update Advisory - January 2017 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-18.xml index 3378018f62..f0ab3c6961 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-18.xml @@ -42,17 +42,17 @@ - CVE-2016-6664 - CVE-2017-3238 - CVE-2017-3243 - CVE-2017-3244 - CVE-2017-3257 - CVE-2017-3258 - CVE-2017-3265 - CVE-2017-3291 - CVE-2017-3312 - CVE-2017-3317 - CVE-2017-3318 + CVE-2016-6664 + CVE-2017-3238 + CVE-2017-3243 + CVE-2017-3244 + CVE-2017-3257 + CVE-2017-3258 + CVE-2017-3265 + CVE-2017-3291 + CVE-2017-3312 + CVE-2017-3317 + CVE-2017-3318 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-19.xml index e797b5a375..0a3c0fcc10 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-19.xml @@ -42,7 +42,7 @@ - CVE-2017-5581 + CVE-2017-5581 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-20.xml index c1e13ce421..73ca0dd69c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-20.xml @@ -45,32 +45,32 @@ - CVE-2017-2925 - CVE-2017-2926 - CVE-2017-2927 - CVE-2017-2928 - CVE-2017-2930 - CVE-2017-2931 - CVE-2017-2932 - CVE-2017-2933 - CVE-2017-2934 - CVE-2017-2935 - CVE-2017-2936 - CVE-2017-2937 - CVE-2017-2938 - CVE-2017-2982 - CVE-2017-2984 - CVE-2017-2985 - CVE-2017-2986 - CVE-2017-2987 - CVE-2017-2988 - CVE-2017-2990 - CVE-2017-2991 - CVE-2017-2992 - CVE-2017-2993 - CVE-2017-2994 - CVE-2017-2995 - CVE-2017-2996 + CVE-2017-2925 + CVE-2017-2926 + CVE-2017-2927 + CVE-2017-2928 + CVE-2017-2930 + CVE-2017-2931 + CVE-2017-2932 + CVE-2017-2933 + CVE-2017-2934 + CVE-2017-2935 + CVE-2017-2936 + CVE-2017-2937 + CVE-2017-2938 + CVE-2017-2982 + CVE-2017-2984 + CVE-2017-2985 + CVE-2017-2986 + CVE-2017-2987 + CVE-2017-2988 + CVE-2017-2990 + CVE-2017-2991 + CVE-2017-2992 + CVE-2017-2993 + CVE-2017-2994 + CVE-2017-2995 + CVE-2017-2996 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-21.xml index 68f1a9b4c5..24f3ab7293 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-21.xml @@ -58,7 +58,7 @@ - CVE-2017-0381 + CVE-2017-0381 Debian Bug 851612 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-22.xml index b18c72c2aa..4cb137bc9a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-22.xml @@ -56,15 +56,15 @@ - CVE-2017-5373 - CVE-2017-5375 - CVE-2017-5376 - CVE-2017-5378 - CVE-2017-5380 - CVE-2017-5383 - CVE-2017-5386 - CVE-2017-5390 - CVE-2017-5396 + CVE-2017-5373 + CVE-2017-5375 + CVE-2017-5376 + CVE-2017-5378 + CVE-2017-5380 + CVE-2017-5383 + CVE-2017-5386 + CVE-2017-5390 + CVE-2017-5396 Mozilla Foundation Security Advisory 2017-02 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-23.xml index 4eae1027c5..9fe21292ec 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-23.xml @@ -51,10 +51,10 @@ - CVE-2016-7406 - CVE-2016-7407 - CVE-2016-7408 - CVE-2016-7409 + CVE-2016-7406 + CVE-2016-7407 + CVE-2016-7408 + CVE-2016-7409 b-man whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-24.xml index 1e92964d19..51946bf05e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-24.xml @@ -49,8 +49,8 @@ - CVE-2016-9941 - CVE-2016-9942 + CVE-2016-9941 + CVE-2016-9942 b-man whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-25.xml index 0cedc9ab6a..3824c1d4d4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-25.xml @@ -43,10 +43,10 @@ - CVE-2016-7969 - CVE-2016-7970 - CVE-2016-7971 - CVE-2016-7972 + CVE-2016-7969 + CVE-2016-7970 + CVE-2016-7971 + CVE-2016-7972 b-man whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-26.xml index fc86cf20f8..5dfa551d33 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-26.xml @@ -48,11 +48,11 @@ - CVE-2008-4796 - CVE-2008-7313 - CVE-2016-8641 - CVE-2016-9565 - CVE-2016-9566 + CVE-2008-4796 + CVE-2008-7313 + CVE-2016-8641 + CVE-2016-9565 + CVE-2016-9566 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-27.xml index e65aec7e17..b09594b361 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-27.xml @@ -56,7 +56,7 @@ - CVE-2017-2615 + CVE-2017-2615 XSA-207 XSA-208 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-28.xml index dc8de74927..b7f5136176 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-28.xml @@ -53,19 +53,19 @@ - + CVE-2016-10155 - CVE-2017-2615 - CVE-2017-5525 - CVE-2017-5552 - CVE-2017-5578 - CVE-2017-5579 - CVE-2017-5667 - CVE-2017-5856 - CVE-2017-5857 - CVE-2017-5898 - CVE-2017-5931 + CVE-2017-2615 + CVE-2017-5525 + CVE-2017-5552 + CVE-2017-5578 + CVE-2017-5579 + CVE-2017-5667 + CVE-2017-5856 + CVE-2017-5857 + CVE-2017-5898 + CVE-2017-5931 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-29.xml index d6e26f8aa7..e5fbed59bc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-29.xml @@ -45,19 +45,19 @@ - + CVE-2016-10158 - + CVE-2016-10159 - + CVE-2016-10160 - + CVE-2016-10161 - CVE-2016-9935 + CVE-2016-9935 b-man whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-30.xml index 6c9705d56c..f831214f95 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-30.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-30.xml @@ -42,47 +42,47 @@ - CVE-2016-7922 - CVE-2016-7923 - CVE-2016-7924 - CVE-2016-7925 - CVE-2016-7926 - CVE-2016-7927 - CVE-2016-7928 - CVE-2016-7929 - CVE-2016-7930 - CVE-2016-7931 - CVE-2016-7932 - CVE-2016-7933 - CVE-2016-7934 - CVE-2016-7935 - CVE-2016-7936 - CVE-2016-7937 - CVE-2016-7938 - CVE-2016-7939 - CVE-2016-7940 - CVE-2016-7973 - CVE-2016-7974 - CVE-2016-7975 - CVE-2016-7983 - CVE-2016-7984 - CVE-2016-7985 - CVE-2016-7986 - CVE-2016-7992 - CVE-2016-7993 - CVE-2016-8574 - CVE-2016-8575 - CVE-2017-5202 - CVE-2017-5203 - CVE-2017-5204 - CVE-2017-5205 - CVE-2017-5341 - CVE-2017-5342 - CVE-2017-5482 - CVE-2017-5483 - CVE-2017-5484 - CVE-2017-5485 - CVE-2017-5486 + CVE-2016-7922 + CVE-2016-7923 + CVE-2016-7924 + CVE-2016-7925 + CVE-2016-7926 + CVE-2016-7927 + CVE-2016-7928 + CVE-2016-7929 + CVE-2016-7930 + CVE-2016-7931 + CVE-2016-7932 + CVE-2016-7933 + CVE-2016-7934 + CVE-2016-7935 + CVE-2016-7936 + CVE-2016-7937 + CVE-2016-7938 + CVE-2016-7939 + CVE-2016-7940 + CVE-2016-7973 + CVE-2016-7974 + CVE-2016-7975 + CVE-2016-7983 + CVE-2016-7984 + CVE-2016-7985 + CVE-2016-7986 + CVE-2016-7992 + CVE-2016-7993 + CVE-2016-8574 + CVE-2016-8575 + CVE-2017-5202 + CVE-2017-5203 + CVE-2017-5204 + CVE-2017-5205 + CVE-2017-5341 + CVE-2017-5342 + CVE-2017-5482 + CVE-2017-5483 + CVE-2017-5484 + CVE-2017-5485 + CVE-2017-5486 b-man whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-31.xml index f0a1547804..80178bb59e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-31.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-31.xml @@ -50,11 +50,11 @@ - CVE-2016-7976 - CVE-2016-7977 - CVE-2016-7978 - CVE-2016-7979 - CVE-2016-8602 + CVE-2016-7976 + CVE-2016-7977 + CVE-2016-7978 + CVE-2016-7979 + CVE-2016-8602 GLSA-201612-26 whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-32.xml index 6baab55ce2..38c9a049f9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-32.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-32.xml @@ -48,7 +48,7 @@ - + CVE-2016-10173 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-01.xml index 49601e9952..1a54814750 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-01.xml @@ -46,8 +46,8 @@ - CVE-2016-1513 - + CVE-2016-1513 + TALOS-2016-0051 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-02.xml index 06cb24e4b6..1894cc549e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-02.xml @@ -48,13 +48,13 @@ APSB17-07 - CVE-2017-2997 - CVE-2017-2998 - CVE-2017-2999 - CVE-2017-3000 - CVE-2017-3001 - CVE-2017-3002 - CVE-2017-3003 + CVE-2017-2997 + CVE-2017-2998 + CVE-2017-2999 + CVE-2017-3000 + CVE-2017-3001 + CVE-2017-3002 + CVE-2017-3003 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-03.xml index 8d4c2a9252..e9c4576149 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-03.xml @@ -45,7 +45,7 @@ - CVE-2017-6542 + CVE-2017-6542 BlueKnight BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-04.xml index 0ca2ad31f7..f62acea4f6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-04.xml @@ -53,7 +53,7 @@ - CVE-2017-2629 + CVE-2017-2629 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-05.xml index 27d2040bb1..c817f87bd1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-05.xml @@ -44,7 +44,7 @@ - CVE-2016-4008 + CVE-2016-4008 b-man whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-06.xml index 8459b1341e..1ff9b93da8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-06.xml @@ -42,7 +42,7 @@ - CVE-2017-7178 + CVE-2017-7178 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-07.xml index de0af87a65..fd22590378 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-07.xml @@ -56,7 +56,7 @@ - CVE-2017-2620 + CVE-2017-2620 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-01.xml index a06e4cbc03..8a63051e63 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-01.xml @@ -51,13 +51,13 @@ - CVE-2016-9602 - CVE-2017-2620 - CVE-2017-2630 - CVE-2017-5973 - CVE-2017-5987 - CVE-2017-6058 - CVE-2017-6505 + CVE-2016-9602 + CVE-2017-2620 + CVE-2017-2630 + CVE-2017-5973 + CVE-2017-5987 + CVE-2017-6058 + CVE-2017-6505 BlueKnight BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-02.xml index 345a6f2993..5c5a804c45 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-02.xml @@ -46,28 +46,28 @@ - CVE-2017-5030 - CVE-2017-5031 - CVE-2017-5032 - CVE-2017-5033 - CVE-2017-5034 - CVE-2017-5035 - CVE-2017-5036 - CVE-2017-5037 - CVE-2017-5038 - CVE-2017-5039 - CVE-2017-5040 - CVE-2017-5041 - CVE-2017-5042 - CVE-2017-5043 - CVE-2017-5044 - CVE-2017-5045 - CVE-2017-5046 - CVE-2017-5052 - CVE-2017-5053 - CVE-2017-5054 - CVE-2017-5055 - CVE-2017-5056 + CVE-2017-5030 + CVE-2017-5031 + CVE-2017-5032 + CVE-2017-5033 + CVE-2017-5034 + CVE-2017-5035 + CVE-2017-5036 + CVE-2017-5037 + CVE-2017-5038 + CVE-2017-5039 + CVE-2017-5040 + CVE-2017-5041 + CVE-2017-5042 + CVE-2017-5043 + CVE-2017-5044 + CVE-2017-5045 + CVE-2017-5046 + CVE-2017-5052 + CVE-2017-5053 + CVE-2017-5054 + CVE-2017-5055 + CVE-2017-5056 BlueKnight BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-03.xml index b8e18bb3da..d37b9e4543 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-03.xml @@ -124,20 +124,20 @@ - CVE-2016-5407 - CVE-2016-7942 - CVE-2016-7943 - CVE-2016-7944 - CVE-2016-7945 - CVE-2016-7946 - CVE-2016-7947 - CVE-2016-7948 - CVE-2016-7949 - CVE-2016-7950 - CVE-2016-7953 - CVE-2017-2624 - CVE-2017-2625 - CVE-2017-2626 + CVE-2016-5407 + CVE-2016-7942 + CVE-2016-7943 + CVE-2016-7944 + CVE-2016-7945 + CVE-2016-7946 + CVE-2016-7947 + CVE-2016-7948 + CVE-2016-7949 + CVE-2016-7950 + CVE-2016-7953 + CVE-2017-2624 + CVE-2017-2625 + CVE-2017-2626 whissi BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-04.xml index 874fbb53e9..bb245d684c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201704-04.xml @@ -45,13 +45,13 @@ - CVE-2017-3058 - CVE-2017-3059 - CVE-2017-3060 - CVE-2017-3061 - CVE-2017-3062 - CVE-2017-3063 - CVE-2017-3064 + CVE-2017-3058 + CVE-2017-3059 + CVE-2017-3060 + CVE-2017-3061 + CVE-2017-3062 + CVE-2017-3063 + CVE-2017-3064 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-01.xml index a0e2962bee..d1213affbb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-01.xml @@ -44,13 +44,13 @@ - + CVE-2016-10195 - + CVE-2016-10196 - + CVE-2016-10197 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-02.xml index 2816380e43..59a9c801db 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-02.xml @@ -47,18 +47,18 @@ - CVE-2017-5057 - CVE-2017-5058 - CVE-2017-5059 - CVE-2017-5060 - CVE-2017-5061 - CVE-2017-5062 - CVE-2017-5063 - CVE-2017-5064 - CVE-2017-5065 - CVE-2017-5066 - CVE-2017-5067 - CVE-2017-5069 + CVE-2017-5057 + CVE-2017-5058 + CVE-2017-5059 + CVE-2017-5060 + CVE-2017-5061 + CVE-2017-5062 + CVE-2017-5063 + CVE-2017-5064 + CVE-2017-5065 + CVE-2017-5066 + CVE-2017-5067 + CVE-2017-5069 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-03.xml index 34124fe984..7420037b5d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-03.xml @@ -61,14 +61,14 @@ - CVE-2017-3509 - CVE-2017-3511 - CVE-2017-3512 - CVE-2017-3514 - CVE-2017-3526 - CVE-2017-3533 - CVE-2017-3539 - CVE-2017-3544 + CVE-2017-3509 + CVE-2017-3511 + CVE-2017-3512 + CVE-2017-3514 + CVE-2017-3526 + CVE-2017-3533 + CVE-2017-3539 + CVE-2017-3544 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-04.xml index d924eb640b..65c6aee498 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-04.xml @@ -47,8 +47,8 @@ - CVE-2017-5461 - CVE-2017-5462 + CVE-2017-5461 + CVE-2017-5462 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-05.xml index 91858eb0f8..e8cb5bdd2b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-05.xml @@ -62,8 +62,8 @@ - CVE-2017-5024 - CVE-2017-5025 + CVE-2017-5024 + CVE-2017-5025 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-06.xml index 821d1a35cd..ef54bb21ce 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-06.xml @@ -57,15 +57,15 @@ - CVE-2017-5398 - CVE-2017-5400 - CVE-2017-5401 - CVE-2017-5402 - CVE-2017-5404 - CVE-2017-5405 - CVE-2017-5407 - CVE-2017-5408 - CVE-2017-5410 + CVE-2017-5398 + CVE-2017-5400 + CVE-2017-5401 + CVE-2017-5402 + CVE-2017-5404 + CVE-2017-5405 + CVE-2017-5407 + CVE-2017-5408 + CVE-2017-5410 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-07.xml index 10f7c6fafb..f050b1d4ec 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-07.xml @@ -60,15 +60,15 @@ - CVE-2017-5398 - CVE-2017-5400 - CVE-2017-5401 - CVE-2017-5402 - CVE-2017-5404 - CVE-2017-5405 - CVE-2017-5407 - CVE-2017-5408 - CVE-2017-5410 + CVE-2017-5398 + CVE-2017-5400 + CVE-2017-5401 + CVE-2017-5402 + CVE-2017-5404 + CVE-2017-5405 + CVE-2017-5407 + CVE-2017-5408 + CVE-2017-5410 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-08.xml index 1f598eebf2..1ed0ff1fb5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-08.xml @@ -49,12 +49,12 @@ - CVE-2015-3395 - CVE-2015-3417 - CVE-2016-1897 - CVE-2016-1898 - CVE-2016-2326 - CVE-2016-3062 + CVE-2015-3395 + CVE-2015-3417 + CVE-2016-1897 + CVE-2016-1898 + CVE-2016-2326 + CVE-2016-3062 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-09.xml index 5ea908a81c..11ea71c14d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-09.xml @@ -63,20 +63,20 @@ - CVE-2015-5174 - CVE-2015-5345 - CVE-2015-5346 - CVE-2015-5351 - CVE-2016-0706 - CVE-2016-0714 - CVE-2016-0763 - CVE-2016-1240 - CVE-2016-3092 - CVE-2016-8745 - CVE-2017-5647 - CVE-2017-5648 - CVE-2017-5650 - CVE-2017-5651 + CVE-2015-5174 + CVE-2015-5345 + CVE-2015-5346 + CVE-2015-5351 + CVE-2016-0706 + CVE-2016-0714 + CVE-2016-0763 + CVE-2016-1240 + CVE-2016-3092 + CVE-2016-8745 + CVE-2017-5647 + CVE-2017-5648 + CVE-2017-5650 + CVE-2017-5651 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-10.xml index 727cf07cf0..c54cbb1525 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-10.xml @@ -83,37 +83,37 @@ - + CVE-2016-10198 - + CVE-2016-10199 - CVE-2016-9445 - CVE-2016-9446 - CVE-2016-9447 - CVE-2016-9634 - CVE-2016-9635 - CVE-2016-9636 - CVE-2016-9807 - CVE-2016-9808 - CVE-2016-9809 - CVE-2016-9810 - CVE-2016-9811 - CVE-2016-9812 - CVE-2016-9813 - CVE-2017-5837 - CVE-2017-5838 - CVE-2017-5839 - CVE-2017-5840 - CVE-2017-5841 - CVE-2017-5842 - CVE-2017-5843 - CVE-2017-5844 - CVE-2017-5845 - CVE-2017-5846 - CVE-2017-5847 - CVE-2017-5848 + CVE-2016-9445 + CVE-2016-9446 + CVE-2016-9447 + CVE-2016-9634 + CVE-2016-9635 + CVE-2016-9636 + CVE-2016-9807 + CVE-2016-9808 + CVE-2016-9809 + CVE-2016-9810 + CVE-2016-9811 + CVE-2016-9812 + CVE-2016-9813 + CVE-2017-5837 + CVE-2017-5838 + CVE-2017-5839 + CVE-2017-5840 + CVE-2017-5841 + CVE-2017-5842 + CVE-2017-5843 + CVE-2017-5844 + CVE-2017-5845 + CVE-2017-5846 + CVE-2017-5847 + CVE-2017-5848 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-11.xml index 1984fe580d..0575962f83 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-11.xml @@ -66,9 +66,9 @@ - CVE-2017-8903 - CVE-2017-8904 - CVE-2017-8905 + CVE-2017-8903 + CVE-2017-8904 + CVE-2017-8905 BlueKnight BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-12.xml index a9b7a5846f..8b8fc3da4c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-12.xml @@ -46,13 +46,13 @@ - CVE-2017-3068 - CVE-2017-3069 - CVE-2017-3070 - CVE-2017-3071 - CVE-2017-3072 - CVE-2017-3073 - CVE-2017-3074 + CVE-2017-3068 + CVE-2017-3069 + CVE-2017-3070 + CVE-2017-3071 + CVE-2017-3072 + CVE-2017-3073 + CVE-2017-3074 BlueKnight BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-13.xml index f807980a36..b7df66ba55 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-13.xml @@ -44,7 +44,7 @@ - CVE-2016-9400 + CVE-2016-9400 BlueKnight BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-14.xml index d41d227e92..e1ed975a15 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-14.xml @@ -42,7 +42,7 @@ - CVE-2017-8849 + CVE-2017-8849 BlueKnight BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml index 688fe87ccf..a7507152a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml @@ -48,7 +48,7 @@ - + CVE-2017-1000367 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-02.xml index 97ad98dfe0..e1d3f85898 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-02.xml @@ -43,8 +43,8 @@ - CVE-2016-6252 - CVE-2017-2616 + CVE-2016-6252 + CVE-2017-2616 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-03.xml index d23c13f5ea..7c718080c4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-03.xml @@ -56,20 +56,20 @@ - CVE-2016-9603 - CVE-2017-7377 - CVE-2017-7471 - CVE-2017-7493 - CVE-2017-7718 - CVE-2017-7980 - CVE-2017-8086 - CVE-2017-8112 - CVE-2017-8309 - CVE-2017-8379 - CVE-2017-8380 - CVE-2017-9060 - CVE-2017-9310 - CVE-2017-9330 + CVE-2016-9603 + CVE-2017-7377 + CVE-2017-7471 + CVE-2017-7493 + CVE-2017-7718 + CVE-2017-7980 + CVE-2017-8086 + CVE-2017-8112 + CVE-2017-8309 + CVE-2017-8379 + CVE-2017-8380 + CVE-2017-9060 + CVE-2017-9310 + CVE-2017-9330 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-04.xml index 33dbc80b44..d2ba84a532 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-04.xml @@ -45,7 +45,7 @@ - CVE-2017-8386 + CVE-2017-8386 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-06.xml index 900a24ba63..2664a3209a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-06.xml @@ -46,15 +46,15 @@ - CVE-2017-7452 - CVE-2017-7453 - CVE-2017-7454 - CVE-2017-7939 - CVE-2017-7940 - CVE-2017-7962 - CVE-2017-8325 - CVE-2017-8326 - CVE-2017-8327 + CVE-2017-7452 + CVE-2017-7453 + CVE-2017-7454 + CVE-2017-7939 + CVE-2017-7940 + CVE-2017-7962 + CVE-2017-8325 + CVE-2017-8326 + CVE-2017-8327 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-07.xml index 738142005b..b6a3b62513 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-07.xml @@ -57,7 +57,7 @@ - CVE-2017-8779 + CVE-2017-8779 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-08.xml index a57a37f043..e996de2194 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-08.xml @@ -46,11 +46,11 @@ - + CVE-2016-10221 - CVE-2017-5991 - CVE-2017-6060 + CVE-2017-5991 + CVE-2017-6060 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-09.xml index f6f851c717..79c6f3affa 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-09.xml @@ -44,7 +44,7 @@ - CVE-2017-6542 + CVE-2017-6542 GLSA 201703-03 whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-10.xml index f694d03813..b1e971eb9d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-10.xml @@ -45,7 +45,7 @@ - CVE-2017-2640 + CVE-2017-2640 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-11.xml index fc7b750346..a8d394f8a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-11.xml @@ -45,7 +45,7 @@ - CVE-2017-6004 + CVE-2017-6004 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-12.xml index 960b5cb8a8..4e3a08e531 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-12.xml @@ -44,13 +44,13 @@ - CVE-2017-6014 - CVE-2017-7700 - CVE-2017-7701 - CVE-2017-7702 - CVE-2017-7703 - CVE-2017-7704 - CVE-2017-7705 + CVE-2017-6014 + CVE-2017-7700 + CVE-2017-7701 + CVE-2017-7702 + CVE-2017-7703 + CVE-2017-7704 + CVE-2017-7705 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-13.xml index eadd50981f..a93bb37e27 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-13.xml @@ -43,7 +43,7 @@ - CVE-2017-7467 + CVE-2017-7467 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-14.xml index 67f67bb4db..6a208aaa4e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-14.xml @@ -44,17 +44,17 @@ - + CVE-2016-10244 - + CVE-2016-10328 - CVE-2017-7857 - CVE-2017-7858 - CVE-2017-7864 - CVE-2017-8105 - CVE-2017-8287 + CVE-2017-7857 + CVE-2017-7858 + CVE-2017-7864 + CVE-2017-8105 + CVE-2017-8287 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-15.xml index d7c2f08d8a..7543eef709 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-15.xml @@ -47,105 +47,105 @@ - CVE-2015-2330 - CVE-2015-7096 - CVE-2015-7098 - CVE-2016-1723 - CVE-2016-1724 - CVE-2016-1725 - CVE-2016-1726 - CVE-2016-1727 - CVE-2016-1728 - CVE-2016-4692 - CVE-2016-4743 - CVE-2016-7586 - CVE-2016-7587 - CVE-2016-7589 - CVE-2016-7592 - CVE-2016-7598 - CVE-2016-7599 - CVE-2016-7610 - CVE-2016-7611 - CVE-2016-7623 - CVE-2016-7632 - CVE-2016-7635 - CVE-2016-7639 - CVE-2016-7640 - CVE-2016-7641 - CVE-2016-7642 - CVE-2016-7645 - CVE-2016-7646 - CVE-2016-7648 - CVE-2016-7649 - CVE-2016-7652 - CVE-2016-7654 - CVE-2016-7656 - CVE-2016-9642 - CVE-2016-9643 - CVE-2017-2350 - CVE-2017-2354 - CVE-2017-2355 - CVE-2017-2356 - CVE-2017-2362 - CVE-2017-2363 - CVE-2017-2364 - CVE-2017-2365 - CVE-2017-2366 - CVE-2017-2367 - CVE-2017-2369 - CVE-2017-2371 - CVE-2017-2373 - CVE-2017-2376 - CVE-2017-2377 - CVE-2017-2386 - CVE-2017-2392 - CVE-2017-2394 - CVE-2017-2395 - CVE-2017-2396 - CVE-2017-2405 - CVE-2017-2415 - CVE-2017-2419 - CVE-2017-2433 - CVE-2017-2442 - CVE-2017-2445 - CVE-2017-2446 - CVE-2017-2447 - CVE-2017-2454 - CVE-2017-2455 - CVE-2017-2457 - CVE-2017-2459 - CVE-2017-2460 - CVE-2017-2464 - CVE-2017-2465 - CVE-2017-2466 - CVE-2017-2468 - CVE-2017-2469 - CVE-2017-2470 - CVE-2017-2471 - CVE-2017-2475 - CVE-2017-2476 - CVE-2017-2481 - CVE-2017-2496 - CVE-2017-2504 - CVE-2017-2505 - CVE-2017-2506 - CVE-2017-2508 - CVE-2017-2510 - CVE-2017-2514 - CVE-2017-2515 - CVE-2017-2521 - CVE-2017-2525 - CVE-2017-2526 - CVE-2017-2528 - CVE-2017-2530 - CVE-2017-2531 - CVE-2017-2536 - CVE-2017-2539 - CVE-2017-2544 - CVE-2017-2547 - CVE-2017-2549 - CVE-2017-6980 - CVE-2017-6984 + CVE-2015-2330 + CVE-2015-7096 + CVE-2015-7098 + CVE-2016-1723 + CVE-2016-1724 + CVE-2016-1725 + CVE-2016-1726 + CVE-2016-1727 + CVE-2016-1728 + CVE-2016-4692 + CVE-2016-4743 + CVE-2016-7586 + CVE-2016-7587 + CVE-2016-7589 + CVE-2016-7592 + CVE-2016-7598 + CVE-2016-7599 + CVE-2016-7610 + CVE-2016-7611 + CVE-2016-7623 + CVE-2016-7632 + CVE-2016-7635 + CVE-2016-7639 + CVE-2016-7640 + CVE-2016-7641 + CVE-2016-7642 + CVE-2016-7645 + CVE-2016-7646 + CVE-2016-7648 + CVE-2016-7649 + CVE-2016-7652 + CVE-2016-7654 + CVE-2016-7656 + CVE-2016-9642 + CVE-2016-9643 + CVE-2017-2350 + CVE-2017-2354 + CVE-2017-2355 + CVE-2017-2356 + CVE-2017-2362 + CVE-2017-2363 + CVE-2017-2364 + CVE-2017-2365 + CVE-2017-2366 + CVE-2017-2367 + CVE-2017-2369 + CVE-2017-2371 + CVE-2017-2373 + CVE-2017-2376 + CVE-2017-2377 + CVE-2017-2386 + CVE-2017-2392 + CVE-2017-2394 + CVE-2017-2395 + CVE-2017-2396 + CVE-2017-2405 + CVE-2017-2415 + CVE-2017-2419 + CVE-2017-2433 + CVE-2017-2442 + CVE-2017-2445 + CVE-2017-2446 + CVE-2017-2447 + CVE-2017-2454 + CVE-2017-2455 + CVE-2017-2457 + CVE-2017-2459 + CVE-2017-2460 + CVE-2017-2464 + CVE-2017-2465 + CVE-2017-2466 + CVE-2017-2468 + CVE-2017-2469 + CVE-2017-2470 + CVE-2017-2471 + CVE-2017-2475 + CVE-2017-2476 + CVE-2017-2481 + CVE-2017-2496 + CVE-2017-2504 + CVE-2017-2505 + CVE-2017-2506 + CVE-2017-2508 + CVE-2017-2510 + CVE-2017-2514 + CVE-2017-2515 + CVE-2017-2521 + CVE-2017-2525 + CVE-2017-2526 + CVE-2017-2528 + CVE-2017-2530 + CVE-2017-2531 + CVE-2017-2536 + CVE-2017-2539 + CVE-2017-2544 + CVE-2017-2547 + CVE-2017-2549 + CVE-2017-6980 + CVE-2017-6984 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-16.xml index f6944b12de..6c72435eb2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-16.xml @@ -45,7 +45,7 @@ - CVE-2017-6508 + CVE-2017-6508 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-17.xml index 5b704e20ec..7909b2b48f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-17.xml @@ -51,8 +51,8 @@ - CVE-2015-3885 - CVE-2017-8314 + CVE-2015-3885 + CVE-2017-8314 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-18.xml index 79e77936af..c527af9f36 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-18.xml @@ -47,9 +47,9 @@ - CVE-2015-5291 - CVE-2015-7575 - CVE-2017-2784 + CVE-2015-5291 + CVE-2015-7575 + CVE-2017-2784 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-19.xml index 6869b02f42..537ce903b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-19.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-19.xml @@ -47,9 +47,9 @@ - CVE-2015-5180 - CVE-2016-6323 - + CVE-2015-5180 + CVE-2016-6323 + CVE-2017-1000366 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-20.xml index e649e4f7ee..e4f6e71c76 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-20.xml @@ -49,27 +49,27 @@ - CVE-2017-5068 - CVE-2017-5070 - CVE-2017-5071 - CVE-2017-5072 - CVE-2017-5073 - CVE-2017-5074 - CVE-2017-5075 - CVE-2017-5076 - CVE-2017-5077 - CVE-2017-5078 - CVE-2017-5079 - CVE-2017-5080 - CVE-2017-5081 - CVE-2017-5082 - CVE-2017-5083 - CVE-2017-5084 - CVE-2017-5085 - CVE-2017-5086 - CVE-2017-5087 - CVE-2017-5088 - CVE-2017-5089 + CVE-2017-5068 + CVE-2017-5070 + CVE-2017-5071 + CVE-2017-5072 + CVE-2017-5073 + CVE-2017-5074 + CVE-2017-5075 + CVE-2017-5076 + CVE-2017-5077 + CVE-2017-5078 + CVE-2017-5079 + CVE-2017-5080 + CVE-2017-5081 + CVE-2017-5082 + CVE-2017-5083 + CVE-2017-5084 + CVE-2017-5085 + CVE-2017-5086 + CVE-2017-5087 + CVE-2017-5088 + CVE-2017-5089 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-21.xml index 99ca39f1be..630365e6a5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-21.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-21.xml @@ -50,7 +50,7 @@ - CVE-2016-6489 + CVE-2016-6489 Cache Attacks Enable Bulk Key Recovery on the Cloud diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-22.xml index be211ab846..613cd43ba5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-22.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-22.xml @@ -49,7 +49,7 @@ - CVE-2016-4579 + CVE-2016-4579 Upstream report BlueKnight diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-23.xml index fa5e549d76..572f924a5f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-23.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-23.xml @@ -46,10 +46,10 @@ - CVE-2011-1412 - CVE-2011-2764 - CVE-2011-3012 - CVE-2012-3345 + CVE-2011-1412 + CVE-2011-2764 + CVE-2011-3012 + CVE-2012-3345 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-24.xml index c10f37565d..71b4cf5dcf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-24.xml @@ -47,7 +47,7 @@ - CVE-2016-9601 + CVE-2016-9601 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-25.xml index 7d91e61ddf..e05213392a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-25.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-25.xml @@ -44,7 +44,7 @@ - CVE-2017-5436 + CVE-2017-5436 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-26.xml index c7746a751c..815c661e71 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-26.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-26.xml @@ -57,9 +57,9 @@ - CVE-2017-5953 - CVE-2017-6349 - CVE-2017-6350 + CVE-2017-5953 + CVE-2017-6349 + CVE-2017-6350 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-27.xml index 5fb7503dc1..197bd34308 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-27.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-27.xml @@ -48,7 +48,7 @@ - CVE-2017-9148 + CVE-2017-9148 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-28.xml index 2673741587..8f891d743d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-28.xml @@ -57,10 +57,10 @@ - + CVE-2016-10327 - CVE-2017-7870 + CVE-2017-7870 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-29.xml index 32e43c22d9..736ad4df2f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-29.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-29.xml @@ -60,7 +60,7 @@ - CVE-2017-8422 + CVE-2017-8422 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-01.xml index 0e8127a8cd..93ce074461 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-01.xml @@ -63,28 +63,28 @@ - CVE-2016-2183 - CVE-2016-5546 - CVE-2016-5547 - CVE-2016-5548 - CVE-2016-5549 - CVE-2016-5552 - CVE-2017-3231 - CVE-2017-3241 - CVE-2017-3252 - CVE-2017-3253 - CVE-2017-3260 - CVE-2017-3261 - CVE-2017-3272 - CVE-2017-3289 - CVE-2017-3509 - CVE-2017-3511 - CVE-2017-3512 - CVE-2017-3514 - CVE-2017-3526 - CVE-2017-3533 - CVE-2017-3539 - CVE-2017-3544 + CVE-2016-2183 + CVE-2016-5546 + CVE-2016-5547 + CVE-2016-5548 + CVE-2016-5549 + CVE-2016-5552 + CVE-2017-3231 + CVE-2017-3241 + CVE-2017-3252 + CVE-2017-3253 + CVE-2017-3260 + CVE-2017-3261 + CVE-2017-3272 + CVE-2017-3289 + CVE-2017-3509 + CVE-2017-3511 + CVE-2017-3512 + CVE-2017-3514 + CVE-2017-3526 + CVE-2017-3533 + CVE-2017-3539 + CVE-2017-3544 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml index a4b3619c55..4778cde3f1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml @@ -45,11 +45,11 @@ - CVE-2016-9957 - CVE-2016-9958 - CVE-2016-9959 - CVE-2016-9960 - CVE-2016-9961 + CVE-2016-9957 + CVE-2016-9958 + CVE-2016-9959 + CVE-2016-9960 + CVE-2016-9961 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml index 56c18c13a0..3f22c0a87d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml @@ -45,10 +45,10 @@ - CVE-2017-7585 - CVE-2017-7586 - CVE-2017-7741 - CVE-2017-7742 + CVE-2017-7585 + CVE-2017-7586 + CVE-2017-7741 + CVE-2017-7742 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml index 0cb33cdece..8409a8589b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml @@ -47,10 +47,10 @@ - CVE-2010-3609 - CVE-2012-4428 - CVE-2016-4912 - CVE-2016-7567 + CVE-2010-3609 + CVE-2012-4428 + CVE-2016-4912 + CVE-2016-7567 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml index d0e10b87ae..768c54d4ad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml @@ -53,22 +53,22 @@ - + CVE-2016-10163 - + CVE-2016-10214 - CVE-2017-5580 - CVE-2017-5956 - CVE-2017-5957 - CVE-2017-5993 - CVE-2017-5994 - CVE-2017-6209 - CVE-2017-6210 - CVE-2017-6317 - CVE-2017-6355 - CVE-2017-6386 + CVE-2017-5580 + CVE-2017-5956 + CVE-2017-5957 + CVE-2017-5993 + CVE-2017-5994 + CVE-2017-6209 + CVE-2017-6210 + CVE-2017-6317 + CVE-2017-6355 + CVE-2017-6386 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml index 3883bc8dff..2fb929cc05 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml @@ -48,10 +48,10 @@ - CVE-2015-5203 - CVE-2015-8751 - CVE-2016-9262 - CVE-2016-9591 + CVE-2015-5203 + CVE-2015-8751 + CVE-2016-9262 + CVE-2016-9591 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml index e995761da1..7e1bd106be 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml @@ -44,7 +44,7 @@ - CVE-2017-7875 + CVE-2017-7875 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml index 50abfa74d7..bb1e20056c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml @@ -46,7 +46,7 @@ - CVE-2017-6590 + CVE-2017-6590 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-10.xml index e2edaa0007..d2d9c613f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-10.xml @@ -42,10 +42,10 @@ - CVE-2017-8310 - CVE-2017-8311 - CVE-2017-8312 - CVE-2017-8313 + CVE-2017-8310 + CVE-2017-8311 + CVE-2017-8312 + CVE-2017-8313 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-11.xml index 033caea6e7..ddb1ee86a5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-11.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-11.xml @@ -42,7 +42,7 @@ - CVE-2017-8114 + CVE-2017-8114 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml index caa2d69882..bbedad24a7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml @@ -44,7 +44,7 @@ - CVE-2015-1336 + CVE-2015-1336 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml index 1b3fb1d53a..5c6785905c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml @@ -42,8 +42,8 @@ - CVE-2017-7960 - CVE-2017-7961 + CVE-2017-7960 + CVE-2017-7961 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-14.xml index 47f06c0368..98a8fcfa4d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-14.xml @@ -42,7 +42,7 @@ - + CVE-2016-10376 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-15.xml index a70694e589..83b4156ee3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-15.xml @@ -45,18 +45,18 @@ - CVE-2017-3075 - CVE-2017-3076 - CVE-2017-3077 - CVE-2017-3078 - CVE-2017-3079 - CVE-2017-3080 - CVE-2017-3081 - CVE-2017-3082 - CVE-2017-3083 - CVE-2017-3084 - CVE-2017-3099 - CVE-2017-3100 + CVE-2017-3075 + CVE-2017-3076 + CVE-2017-3077 + CVE-2017-3078 + CVE-2017-3079 + CVE-2017-3080 + CVE-2017-3081 + CVE-2017-3082 + CVE-2017-3083 + CVE-2017-3084 + CVE-2017-3099 + CVE-2017-3100 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-01.xml index a3b2606f44..edbd0a9979 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-01.xml @@ -45,16 +45,16 @@ - CVE-2016-9131 - CVE-2016-9147 - CVE-2016-9444 - CVE-2016-9778 - CVE-2017-3135 - CVE-2017-3136 - CVE-2017-3137 - CVE-2017-3138 - CVE-2017-3140 - CVE-2017-3141 + CVE-2016-9131 + CVE-2016-9147 + CVE-2016-9444 + CVE-2016-9778 + CVE-2017-3135 + CVE-2017-3136 + CVE-2017-3137 + CVE-2017-3138 + CVE-2017-3140 + CVE-2017-3141 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-02.xml index 3c99f7323b..4364855a2b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-02.xml @@ -46,11 +46,11 @@ - CVE-2017-6307 - CVE-2017-6308 - CVE-2017-6309 - CVE-2017-6310 - CVE-2017-8911 + CVE-2017-6307 + CVE-2017-6308 + CVE-2017-6309 + CVE-2017-6310 + CVE-2017-8911 BlueKnight whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-04.xml index 70915b9814..ef51b76215 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-04.xml @@ -42,7 +42,7 @@ - CVE-2017-8296 + CVE-2017-8296 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-05.xml index 72e79c5cc7..da12d4e199 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-05.xml @@ -58,7 +58,7 @@ - CVE-2012-6706 + CVE-2012-6706 whissi b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-06.xml index 916c67fcc2..7ec22131fd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-06.xml @@ -48,16 +48,16 @@ - + CVE-2016-10219 - + CVE-2016-10220 - CVE-2017-5951 - CVE-2017-6196 - CVE-2017-7207 - CVE-2017-8291 + CVE-2017-5951 + CVE-2017-6196 + CVE-2017-7207 + CVE-2017-8291 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-08.xml index 3cc37835c8..0484af4b6a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-08.xml @@ -46,7 +46,7 @@ - CVE-2016-3189 + CVE-2016-3189 whissi whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-09.xml index 8a4b54e0c2..b2956f4442 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-09.xml @@ -42,8 +42,8 @@ - CVE-2016-7392 - CVE-2017-9153 + CVE-2016-7392 + CVE-2017-9153 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-10.xml index a65b1b12d8..b901b3c112 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-10.xml @@ -46,9 +46,9 @@ - CVE-2017-7885 - CVE-2017-7975 - CVE-2017-7976 + CVE-2017-7885 + CVE-2017-7975 + CVE-2017-7976 BlueKnight ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-01.xml index 3aa8b6e95c..385529096e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-01.xml @@ -44,7 +44,7 @@ - CVE-2017-2292 + CVE-2017-2292 Zlogene b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-13.xml index 65d0d96e6e..74eb4cdfb8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-13.xml @@ -43,7 +43,7 @@ - CVE-2017-7692 + CVE-2017-7692 b-man b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-14.xml index 17ac2965f5..4ad84f00b9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-14.xml @@ -45,17 +45,17 @@ - + CVE-2017-1000099 - + CVE-2017-1000100 - + CVE-2017-1000101 - CVE-2017-7407 - CVE-2017-7468 + CVE-2017-7407 + CVE-2017-7468 BlueKnight b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-15.xml new file mode 100644 index 0000000000..d22fe0ca8c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-15.xml @@ -0,0 +1,146 @@ + + + + Chromium: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium, the worst of + which could result in the execution of arbitrary code. + + chromium + 2017-09-24 + 2017-09-24: 1 + 626382 + 630068 + remote + + + 61.0.3163.79 + 61.0.3163.79 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+ +
+ +

Multiple vulnerabilities have been discovered in Chromium. Please review + the referenced CVE identifiers for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, obtain + sensitive information, bypass security restrictions, or spoof content. +

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-61.0.3163.79" + +
+ + + CVE-2017-5091 + + + CVE-2017-5092 + + + CVE-2017-5093 + + + CVE-2017-5094 + + + CVE-2017-5095 + + + CVE-2017-5096 + + + CVE-2017-5097 + + + CVE-2017-5098 + + + CVE-2017-5099 + + + CVE-2017-5100 + + + CVE-2017-5101 + + + CVE-2017-5102 + + + CVE-2017-5103 + + + CVE-2017-5104 + + + CVE-2017-5105 + + + CVE-2017-5106 + + + CVE-2017-5107 + + + CVE-2017-5108 + + + CVE-2017-5109 + + + CVE-2017-5110 + + + CVE-2017-5111 + + + CVE-2017-5112 + + + CVE-2017-5113 + + + CVE-2017-5114 + + + CVE-2017-5115 + + + CVE-2017-5116 + + + CVE-2017-5117 + + + CVE-2017-5118 + + + CVE-2017-5119 + + + CVE-2017-5120 + + + CVE-2017-7000 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-16.xml new file mode 100644 index 0000000000..417d37bed9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-16.xml @@ -0,0 +1,64 @@ + + + + Adobe Flash Player: Multiple vulnerabilities + Multiple vulnerabilities have been found in Adobe Flash Player, the + worst of which allows remote attackers to execute arbitrary code. + + adobe-flash + 2017-09-24 + 2017-09-24: 1 + 627336 + 630964 + remote + + + 27.0.0.130-r1 + 27.0.0.130-r1 + + + +

The Adobe Flash Player is a renderer for the SWF file format, which is + commonly used to provide interactive websites. +

+
+ +

Multiple vulnerabilities have been discovered in Adobe Flash Player. + Please review the referenced CVE identifiers for details. +

+ +
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or bypass security restrictions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Adobe Flash Player users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-26.0.0.151" + +
+ + + CVE-2017-11281 + + + CVE-2017-11282 + + + CVE-2017-3085 + + + CVE-2017-3106 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-17.xml new file mode 100644 index 0000000000..403eda337d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-17.xml @@ -0,0 +1,54 @@ + + + + CVS: Command injection + A command injection vulnerability in CVS may allow remote attackers + to execute arbitrary code. + + cvs + 2017-09-24 + 2017-09-24: 1 + 627498 + remote + + + 1.12.12-r12 + 1.12.12-r12 + + + +

CVS (Concurrent Versions System) is an open-source network-transparent + version control system. It contains both a client utility and a server. +

+
+ +

It was discovered that when CVS is configured to use SSH for remote + repositories it allows remote attackers to execute arbitrary code through + a repository URL with a specially crafted hostname. +

+
+ +

A remote attacker, by enticing a user to clone a specially crafted + repository, could possibly execute arbitrary code with the privileges of + the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All CVS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-vcs/cvs-1.12.12-r12" + +
+ + + CVE-2017-12836 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-18.xml new file mode 100644 index 0000000000..b5a70c99d2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-18.xml @@ -0,0 +1,59 @@ + + + + Mercurial: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mercurial, the worst of + which could lead to the remote execution of arbitrary code. + + mercurial + 2017-09-24 + 2017-09-24: 1 + 621068 + 627484 + remote + + + 4.3 + 4.3 + + + +

Mercurial is a distributed source control management system.

+ +
+ +

Multiple vulnerabilities have been discovered in Mercurial. Please + review the referenced CVE identifiers for details. +

+ +
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All Mercurial users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-vcs/mercurial-4.3" + +
+ + + CVE-2017-1000115 + + + CVE-2017-1000116 + + + CVE-2017-9462 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-19.xml new file mode 100644 index 0000000000..6f7bb814c3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-19.xml @@ -0,0 +1,53 @@ + + + + Exim: Local privilege escalation + A vulnerability in Exim may allow local users to gain root + privileges. + + + exim + 2017-09-24 + 2017-09-24: 1 + 622212 + local + + + 4.89-r1 + 4.89-r1 + + + +

Exim is a message transfer agent (MTA) developed at the University of + Cambridge for use on Unix systems connected to the Internet. +

+
+ +

Exim supports the use of multiple “-p” command line arguments + causing a memory leak. This could lead to a stack-clash in user-space and + as result the attacker can, “clash” or “smash” the stack or + another memory region, or “jump” over the stack guard-page. +

+
+ +

A local attacker could obtain root privileges.

+
+ +

There is no known workaround at this time.

+
+ +

All Exim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-mta/exim-4.89-r1" + +
+ + + CVE-2017-1000369 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-20.xml new file mode 100644 index 0000000000..2a5880076a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-20.xml @@ -0,0 +1,53 @@ + + + + Postfix: Privilege escalation + A vulnerability in Postfix may allow local users to gain root + privileges. + + + postfix + 2017-09-24 + 2017-09-24: 1 + 621882 + local + + + 3.1.6 + 3.1.6 + + + +

Postfix is a mail server and an alternative to the widely-used Sendmail + program. +

+
+ +

By default, Berkeley DB reads a DB_CONFIG configuration file from the + current working directory. This is an undocumented behavior. +

+
+ +

A local attacker, by using a specially crafted DG_CONFIG file, could + possibly escalate privileges to the root group. +

+
+ +

There is no known workaround at this time.

+
+ +

All Postfix users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-mta/postfix-3.1.6" + +
+ + Postfix + Official Announce + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-21.xml new file mode 100644 index 0000000000..222dce25f4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-21.xml @@ -0,0 +1,69 @@ + + + + PHP: Multiple vulnerabilities + Multiple vulnerabilities have been found in PHP, the worst of which + could result in the execution of arbitrary code. + + php + 2017-09-24 + 2017-09-25: 2 + 624054 + 626460 + 629452 + remote + + + 5.6.31 + 7.0.23 + 5.6.31 + 7.0.23 + + + +

PHP is an open source general-purpose scripting language that is + especially suited for web development. +

+
+ +

Multiple vulnerabilities have been discovered in PHP. Please review the + referenced CVE identifiers for details. +

+
+ +

A remote attacker could execute arbitrary code with the privileges of + the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All PHP 5.6.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.6.31" + + +

All PHP 7.0.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.0.23" + +
+ + + CVE-2017-11362 + + + CVE-2017-11628 + + + CVE-2017-12932 + + + b-man + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-22.xml new file mode 100644 index 0000000000..07d405d01e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-22.xml @@ -0,0 +1,187 @@ + + + + Oracle JDK/JRE, IcedTea: Multiple vulnerabilities + Multiple vulnerabilities have been found in Oracle's JRE and JDK + software suites, and IcedTea, the worst of which may allow execution of + arbitrary code. + + oracle-jdk-bin,oracle-jre-bin,icedtea-bin + 2017-09-24 + 2017-09-25: 2 + 625602 + 626088 + 627682 + remote + + + 1.8.0.141 + 1.8.0.141 + + + 1.8.0.141 + 1.8.0.141 + + + 7.2.6.11 + 3.5.0 + 7.2.6.11 + 3.5.0 + + + +

Java Platform, Standard Edition (Java SE) lets you develop and deploy + Java applications on desktops and servers, as well as in today’s + demanding embedded environments. Java offers the rich user interface, + performance, versatility, portability, and security that today’s + applications require. +

+ +

IcedTea’s aim is to provide OpenJDK in a form suitable for easy + configuration, compilation and distribution with the primary goal of + allowing inclusion in GNU/Linux distributions. +

+ +
+ +

Multiple vulnerabilities have been discovered in Oracle’s JRE, JDK and + IcedTea. Please review the referenced CVE identifiers for details. +

+ +
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, or gain + access to information. +

+
+ +

There is no known workaround at this time.

+
+ +

All Oracle JDK binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-java/oracle-jdk-bin-1.8.0.141" + + +

All Oracle JRE binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-java/oracle-jre-bin-1.8.0.141" + + +

All IcedTea binary 7.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-7.2.6.11" + + +

All IcedTea binary 3.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-3.5.0" + + +
+ + + CVE-2017-10053 + + + CVE-2017-10067 + + + CVE-2017-10074 + + + CVE-2017-10078 + + + CVE-2017-10081 + + + CVE-2017-10086 + + + CVE-2017-10087 + + + CVE-2017-10089 + + + CVE-2017-10090 + + + CVE-2017-10096 + + + CVE-2017-10101 + + + CVE-2017-10102 + + + CVE-2017-10105 + + + CVE-2017-10107 + + + CVE-2017-10108 + + + CVE-2017-10109 + + + CVE-2017-10110 + + + CVE-2017-10111 + + + CVE-2017-10114 + + + CVE-2017-10115 + + + CVE-2017-10116 + + + CVE-2017-10117 + + + CVE-2017-10118 + + + CVE-2017-10121 + + + CVE-2017-10125 + + + CVE-2017-10135 + + + CVE-2017-10176 + + + CVE-2017-10193 + + + CVE-2017-10198 + + + CVE-2017-10243 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-23.xml new file mode 100644 index 0000000000..77588a8478 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-23.xml @@ -0,0 +1,323 @@ + + + + Tcpdump: Multiple vulnerabilities + Multiple vulnerabilities have been found in Tcpdump, the worst of + which may allow execution of arbitrary code. + + tcpdump + 2017-09-25 + 2017-09-25: 1 + 624652 + 626462 + 630110 + remote + + + 4.9.2 + 4.9.2 + + + +

Tcpdump is a tool for network monitoring and data acquisition.

+
+ +

Multiple vulnerabilities have been discovered in Tcpdump. Please review + the referenced CVE identifiers for details. +

+ +
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Tcpdump users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/tcpdump-4.9.2" + +
+ + + CVE-2017-11108 + + + CVE-2017-11541 + + + CVE-2017-11542 + + + CVE-2017-11543 + + + CVE-2017-11544 + + + CVE-2017-12893 + + + CVE-2017-12894 + + + CVE-2017-12895 + + + CVE-2017-12896 + + + CVE-2017-12897 + + + CVE-2017-12898 + + + CVE-2017-12899 + + + CVE-2017-12900 + + + CVE-2017-12901 + + + CVE-2017-12902 + + + CVE-2017-12985 + + + CVE-2017-12986 + + + CVE-2017-12987 + + + CVE-2017-12988 + + + CVE-2017-12989 + + + CVE-2017-12990 + + + CVE-2017-12991 + + + CVE-2017-12992 + + + CVE-2017-12993 + + + CVE-2017-12994 + + + CVE-2017-12995 + + + CVE-2017-12996 + + + CVE-2017-12997 + + + CVE-2017-12998 + + + CVE-2017-12999 + + + CVE-2017-13000 + + + CVE-2017-13001 + + + CVE-2017-13002 + + + CVE-2017-13003 + + + CVE-2017-13004 + + + CVE-2017-13005 + + + CVE-2017-13006 + + + CVE-2017-13007 + + + CVE-2017-13008 + + + CVE-2017-13009 + + + CVE-2017-13010 + + + CVE-2017-13011 + + + CVE-2017-13012 + + + CVE-2017-13013 + + + CVE-2017-13014 + + + CVE-2017-13015 + + + CVE-2017-13016 + + + CVE-2017-13017 + + + CVE-2017-13018 + + + CVE-2017-13019 + + + CVE-2017-13020 + + + CVE-2017-13021 + + + CVE-2017-13022 + + + CVE-2017-13023 + + + CVE-2017-13024 + + + CVE-2017-13025 + + + CVE-2017-13026 + + + CVE-2017-13027 + + + CVE-2017-13028 + + + CVE-2017-13029 + + + CVE-2017-13030 + + + CVE-2017-13031 + + + CVE-2017-13032 + + + CVE-2017-13033 + + + CVE-2017-13034 + + + CVE-2017-13035 + + + CVE-2017-13036 + + + CVE-2017-13037 + + + CVE-2017-13038 + + + CVE-2017-13039 + + + CVE-2017-13040 + + + CVE-2017-13041 + + + CVE-2017-13042 + + + CVE-2017-13043 + + + CVE-2017-13044 + + + CVE-2017-13045 + + + CVE-2017-13046 + + + CVE-2017-13047 + + + CVE-2017-13048 + + + CVE-2017-13049 + + + CVE-2017-13050 + + + CVE-2017-13051 + + + CVE-2017-13052 + + + CVE-2017-13053 + + + CVE-2017-13054 + + + CVE-2017-13055 + + + CVE-2017-13687 + + + CVE-2017-13688 + + + CVE-2017-13689 + + + CVE-2017-13690 + + + CVE-2017-13725 + + + BlueKnight + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-24.xml new file mode 100644 index 0000000000..ec85107087 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-24.xml @@ -0,0 +1,73 @@ + + + + RAR, UnRAR: Multiple vulnerabilities + Multiple vulnerabilities have been found in RAR and UnRAR, the + worst of which may allow attackers to execute arbitrary code. + + rar,unrar + 2017-09-25 + 2017-09-25: 1 + 622342 + 628182 + 628184 + remote + + + 5.5.0_p20170811 + 5.5.0_p20170811 + + + 5.5.7 + 5.5.7 + + + +

RAR and UnRAR provide command line interfaces for compressing and + decompressing RAR files. +

+
+ +

Multiple vulnerabilities have been discovered in RAR and UnRAR. Please + review the referenced CVE identifiers for details. +

+
+ +

A remote attacker, by enticing a user to open a specially crafted RAR, + could possibly execute arbitrary code with the privileges of the process + or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All RAR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/rar-5.5.0_p20170811" + + +

All UnRAR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/unrar-5.5.7" + +
+ + CVE-2012-6706 + + CVE-2017-12940 + + + CVE-2017-12941 + + + CVE-2017-12942 + + + BlueKnight + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-25.xml new file mode 100644 index 0000000000..7fd255daa5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-25.xml @@ -0,0 +1,56 @@ + + + + Chromium: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium, the worst of + which could result in the execution of arbitrary code. + + chromium, google-chrome + 2017-09-25 + 2017-09-25: 1 + 631784 + remote + + + 61.0.3163.100 + 61.0.3163.100 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+
+ +

Multiple vulnerabilities have been discovered in Chromium. Please review + the referenced CVE identifiers for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-61.0.3163.100" + +
+ + + CVE-2017-5121 + + + CVE-2017-5122 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-26.xml new file mode 100644 index 0000000000..f88d9811d2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-26.xml @@ -0,0 +1,51 @@ + + + + libsoup: Arbitrary remote code execution + A vulnerability in libsoup might allow remote attackers to execute + arbitrary code. + + + libsoup + 2017-09-26 + 2017-09-26: 1 + 627466 + remote + + + 2.56.1 + 2.56.1 + + + +

libsoup is an HTTP client/server library for GNOME.

+
+ +

A stack based buffer overflow vulnerability was discovered in libsoup.

+
+ +

A remote attacker, by using specially crafted HTTP requests, could + execute arbitrary code with the privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All libsoup users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libsoup-2.56.1" + + +

Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +

+
+ + CVE-2017-2885 + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-27.xml new file mode 100644 index 0000000000..e920730851 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201709-27.xml @@ -0,0 +1,109 @@ + + + + libTIFF: Multiple vulnerabilities + Multiple vulnerabilities have been found in LibTIFF, the worst of + which could result in the execution of arbitrary code. + + tiff + 2017-09-26 + 2017-09-26: 2 + 610330 + 614020 + 614022 + 617996 + 617998 + 618610 + 624602 + remote + + + 4.0.8 + 4.0.8 + + + +

The TIFF library contains encoding and decoding routines for the Tag + Image File Format. It is called by numerous programs, including GNOME and + KDE applications, to interpret TIFF images. +

+
+ +

Multiple vulnerabilities have been discovered in LibTIFF. Please review + the referenced CVE identifiers for details. +

+ +
+ +

A remote attacker, by enticing the user to process a specially crafted + TIFF file, could possibly execute arbitrary code with the privileges of + the process, cause a Denial of Service condition, obtain sensitive + information, or have other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All LibTIFF users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.0.8" + + +

Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +

+
+ + + CVE-2016-10267 + + + CVE-2016-10268 + + + CVE-2017-5225 + + + CVE-2017-5563 + + + CVE-2017-7592 + + + CVE-2017-7593 + + + CVE-2017-7594 + + + CVE-2017-7595 + + + CVE-2017-7596 + + + CVE-2017-7597 + + + CVE-2017-7598 + + + CVE-2017-7599 + + + CVE-2017-7600 + + + CVE-2017-7601 + + + CVE-2017-7602 + + CVE-2017-9403 + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 8d0bb23cfd..4a930ded7f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 18 Sep 2017 19:39:14 +0000 +Fri, 29 Sep 2017 17:39:27 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index defda47548..de145b11d5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -1426d2aa885beb439e28d2ecdcbbb79fc0b7b9f9 1505683118 2017-09-17T21:18:38+00:00 +612f47deca97e8d7ffc2100c1dbc82a602abdf39 1506632095 2017-09-28T20:54:55+00:00 From e031948253e98130eeeb0bed0196c6f2f75be2a3 Mon Sep 17 00:00:00 2001 From: David Michael Date: Fri, 29 Sep 2017 14:06:10 -0700 Subject: [PATCH 07/14] bump(dev-vcs/cvs): sync with upstream --- .../portage-stable/dev-vcs/cvs/Manifest | 23 ------ .../dev-vcs/cvs/cvs-1.12.12-r11.ebuild | 5 +- ...2.12-r10.ebuild => cvs-1.12.12-r12.ebuild} | 81 ++++++++++--------- ...2.12-CVE-2017-12836-commandinjection.patch | 22 +++++ .../portage-stable/dev-vcs/cvs/metadata.xml | 5 +- .../md5-cache/dev-vcs/cvs-1.12.12-r11 | 4 +- .../{cvs-1.12.12-r10 => cvs-1.12.12-r12} | 6 +- 7 files changed, 73 insertions(+), 73 deletions(-) rename sdk_container/src/third_party/portage-stable/dev-vcs/cvs/{cvs-1.12.12-r10.ebuild => cvs-1.12.12-r12.ebuild} (51%) create mode 100644 sdk_container/src/third_party/portage-stable/dev-vcs/cvs/files/cvs-1.12.12-CVE-2017-12836-commandinjection.patch rename sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/{cvs-1.12.12-r10 => cvs-1.12.12-r12} (93%) diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/Manifest b/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/Manifest index f2250d3152..e350aafd24 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/Manifest +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/Manifest @@ -1,27 +1,4 @@ -AUX 01-cvs-env.d 14 SHA256 dd2e8db836e3879e56cba5df8f0700c1c0581df7e2201f9196650936278a0d15 SHA512 cbb7545ae34fcbfb6e64ad6bf91105a1950a483bb68637d164026e7df06da2dccbcfe0af568c3249ac0a8e7ff466a5e77614fe6fd76a3829136a854bfa7ceb5a WHIRLPOOL 8aaa83c3d17a480ec03267b6d397576f04ea0ac41ad26e6030c739355d50ea698094920ff2e6c4ad6fc9f84425866eedead009e7ded11ea3e68113451e8bf9b8 -AUX cvs-1.12.12-CVE-2012-0804.patch 1059 SHA256 e67b521edf07b8c5414b1078521c29f314b9459664d7120e2b6008fdae609f2b SHA512 4f86f75f59caf4ef7e83964ec2d9c93575ccdcb031b1a6a1774a2a80ab7d6f278b3d27c4ab9270b91edf457a0195d702e3bd20da17c167b3f204fd9d8980b720 WHIRLPOOL a7d1dce9992b3e0124f1fb4c8fdea57963b9054d32bc10925ec480b087421bc7d33400c6d9899c391c7694858642bec526283f15bd14e199a4caaa8efd1a7ae2 -AUX cvs-1.12.12-block-requests.patch 4006 SHA256 70bbf745815d1e01582329160a10f5cdd9c11051e4e62d331686dd5124e01294 SHA512 541545ffc64c4f2303b7e8f6cae2cdff0437452e4bcf94b2149d51e43710096e17f024c1a8ed32433560ea51ecef2aba2f3e6bfaef8fa9e4ad2f2436649884d1 WHIRLPOOL 4c56980ea0d307789ace423e7fcafb86c82429f82cfbe6d873706f95e6e2554e06268540d23b9718113e5182b83b01bb22d02ae649e27feaac1dfd09b38fa892 -AUX cvs-1.12.12-cvs-custom.c 1735 SHA256 bd288a9484c4c26569a44e71f0935cf310e4b02e25e7e9ba564c9fc3f5121054 SHA512 0a5589f225b45c41d5ae0b4b6bcba37002d6a1ef9a87a7e47ffa723c87ea6b1f4f29bc7551f1d17378d6f6b5545b0734607772c386851bde1fc51b8cac712a67 WHIRLPOOL d6795d6bd7af4275385a475b936c5b1c0c0f48ef35caa10e824b14b0da475f22026d9c59d30748006f3bd81cf57e368bad3b6f1bea7bcce92350d1495dbcc775 -AUX cvs-1.12.12-cvs-gnulib-vasnprintf.patch 1092 SHA256 f38e6bbb0fd8b783b654ac775183a1cb24e3987698fdbd706a8d5fa59a45f945 SHA512 6c0be276f6e86dbe3646ada02ea57194b8c7d1e4d76c5faeb06750435599aa4125253bdf7af6232f53807977acb34aba093bc8bfa2ce98389c5ee80b2fd6e05d WHIRLPOOL 0b5dd5ee3c11fae83688d900db2ce678870c79b753c1ffde9aa11a6fe18286af7e24d57f2ce28ffcdbfb42172a0e87baed58047497248ffb1a37acca93ad716f -AUX cvs-1.12.12-cvsbug-tmpfix.patch 624 SHA256 061c26d140e1195200f1cc76217b2e7c2ff7f0c4dcbbb31124b386e8e756938e SHA512 29014631f5595dbf51a47032a19a23e545190dd8d40d77a71d363cee07a9ae38263b67db52a512436a9a7b37a7f5ff4daafa4a0a9f3c29bcfeb71ecff74408b7 WHIRLPOOL 09d53fa26159defe56cdbd414b699bd7c5be07f36b0b5addd367b393985bd7c98f14189db5b2793af0fc37d052f21af1f97c3775d46d71cebdfff15c447a9d5a -AUX cvs-1.12.12-fix-massive-leak.patch 1985 SHA256 30727f2f97164b7e71a8abaf859b2a6dea7f680cb7e97699ee1e8ca8600bd782 SHA512 c4c9026e971f3da49cefce102b57bc681427a708ec8caa185df1234fd2a95090c8dc8cbf84374a762fdef7002d658cd4b52450429664cb3a1bfbda63d31c78a7 WHIRLPOOL c669df0411348d88f140a6da8c1c7a89be835483f00308020025d027f2ad55ba463608e48e04f11689c3270c3318b2aebba828020a997c8754e9517baef3b2d2 -AUX cvs-1.12.12-format-security.patch 541 SHA256 8bff441172993aeba5e29b283b221aabce579bb778b3f69b6532676e3d5dd25d SHA512 34f16defa5ab03ca2efcdea27269a37e27510d235bc4efd7a91871c2ae32fe9b922a51f3b87bcfec988964f8ae50d4649d7876937e25352836d5274ce88eea13 WHIRLPOOL e7e46e750e6093daab009ca23274f90c71df9a0ecebf1af521098e3356dcb5e5bc541a5a978b7409d19e77b35377c6b65c8023adfed86f88e3a6ca007d8fc77c -AUX cvs-1.12.12-getdelim.patch 564 SHA256 162fff3d76ff837a25cd44a7a852df01cc534eaf3a053817007e6414c794baa7 SHA512 181b5daa6e103218e3fc1629a0b5f74daad613cdbe530655eff32479e4b9f32d067e60a82107efdbb129f917ee0626d274fb65555c66d907c997bf01fa262bdb WHIRLPOOL 8355d5c946a600858ca73ca55ca90a9c3fd2b7315790d3996bdd5b58d47c83cd62d9f2e50238dc8719b29f41a763c3da05aebb80e246f8009e35466daa09ca4d -AUX cvs-1.12.12-hash-nameclash.patch 1019 SHA256 5b30102b2ec7a54b9c8aa36eeb4fa2a79d4977840fb83a4c774ab19d8884f118 SHA512 dcd612dcc4b008c0fbabd74bcc179e69ebaed31a9f6622127061194a8ed99549502fbc0bffc75cc87aed26f7fe46215da81438c3a797e2179ed3da8e0b5ebdbb WHIRLPOOL e1baa739de03b977b498d0c784152fa82902724d5693cb71d81f3224384563fac5741a3a3e7ea718e040514ccca9b9c4c93e6c5e8a3aa2a8a35566232bb82c93 -AUX cvs-1.12.12-install-sh.patch 495 SHA256 9c2fc03b42804f8edb3a5a6f9c9e80bd68924f265ce52d196c3b5c759ba42f8a SHA512 7e468d41c1eb23c0a62b605e6e48cffc004e8f386a87a9696dd73b36702c74aad529f5cba7280dee1100027b6e1e907adad257cc446ca3ad734fa40d47e4ff72 WHIRLPOOL 1eaf9e7ccab89cd0d2c95440da0454779b13d6efc4b2a773d41f58998353a2670134344d6a97379103f3ba6e8b6c96c93db0b6229821bb8c12ce037a3b7ddb64 -AUX cvs-1.12.12-mktime-configure.patch 4791 SHA256 ae218813689adf47e66d05908ce87176aebc6c5158ec97832c78adb542eade29 SHA512 10b29450d5d0a6a02d92812b919edbba2b86f2217aa54896b44358edb2eb8d8d6111b5c5db39faa50ef1f9a86ed1ee190332629f33402ad8cd8082b77547f486 WHIRLPOOL 2acd1fd3eab25fc419e4b6d603593b06e765cf84b90401f1e6be919b38c0f1739bf12ebc903df8318d88bd2dbac616369b4f3dec4575c586b7ce72404720c2b3 -AUX cvs-1.12.12-mktime-x32.patch 916 SHA256 107b0adceda7c8b7b8e89604f38ea0e7a903420dc58dbf22c5eeac947d63d0e1 SHA512 4a58c0f94de8e19c2de1930b7e5e04816e79a86885c89b792616a4c43f6e12aef271005ae59ae0d5788a910ba97735ccdf35f0ef5faafc2e3c50a9858b8f6216 WHIRLPOOL 5ca4316ee5a272efabe6da249476f6f916851fa92338368616aff03f380b2cd290391faa455e914e423ce74a00122336e6bfa93236a8412c1f32103040e3038a -AUX cvs-1.12.12-musl.patch 421 SHA256 ffde1d04aa5661836d5dfcd00fe2a1d8e31353dd944a198f004937c94bc2a8d3 SHA512 1c14b89dccee3130cc4ff881b7204f01dd8e14d1767e21d30b879df17a368a0f6bc7d3945872f8a6adcf47e34c3e48b9f2c0c0c90cccbf10fa935690a57f5e20 WHIRLPOOL d25e8bd12aa9c4cf498f1b6e173aca51c97c2180ff70af0560b4490878580007127adacc3be7fc6c92ff84d1c598b36ce49928512ddcb4a0127205878f88d01c -AUX cvs-1.12.12-openat.patch 761 SHA256 5b9fc46c2ee46d9136ddfc8d0baaac6087d8cae40fa5521815c3c2e372f25b9f SHA512 b0a7abc785169705d2f0668a8af706f93ee3eba3d050d555689577962283e54f6bd186e662b64c65f926cf72dff76a37259181338707d641ee0f20591ba62805 WHIRLPOOL 31c9eb71d9d8cf5dff05e48c054e29b720702c6c12cafd7a2dd9687578bb1c441cf5e90c355b9164dee6b14f6c5cb7a2f4ad7d9ff4831f3ce2f02f82ffd082f7 -AUX cvs-1.12.12-rcs2log-coreutils.patch 557 SHA256 89fefd4b8f7a67adc8d502a6b45bb33bba6c59a91bb5b15864892123ec1c777b SHA512 73c3506fa670b00ac52363efa2a2fa34203108d3dc112400e52f78eb7d83967cf49b11280d6c27a461f79a9c38317b41b26dd1f67d10229dbcb6c2ad9d43b521 WHIRLPOOL a58d2e22a0688cd2ba189f9d8c96caab2962a2b3cbce5ac17d198803ab224eebe123102f7a275338e3a851774ad19f81c8a9c760c00304f3ee8dd83dc07acdb2 -AUX cvs.pam-include-1.12.12 106 SHA256 8291f84c2d76269e7be6487ae1db7212e67ee7313d35e6b0cebcd01e30d155af SHA512 1e72da3f959433e59d0153ff09e53a79bb68793506456e38d7070ffe4fcf6d596fdc3740dd2325d626a8dbd356dd11d93fbd5f220515f2435a94b90bb5833fb9 WHIRLPOOL 4580958cbd6955c5fc3e84d4b5c5877c2e94c5a3de326f6936c641cda43a588196871b43280cdbe16c8274049a08eb73ac7067a5166b1f613770f4ea24afc5eb -AUX cvspserver.xinetd.d 282 SHA256 71b62c4f278ed17bf3cac8eacb2bfb17b6125bfe77f83b46fa5742395b74ef5f SHA512 6845a5fc38ed9d8f9194f14137066c3f2640f09ebc1dce7e9fa7c49761534003e5b1c59593496ba9f88a6c9b1196980bc145a2e2fdcbf662360d1b1ca8821411 WHIRLPOOL 949abc87f0d7c8f104ce8a896fdfd94e3db8f60d5aaa948d3358e348b17de942f19ba68fe545ec2af0026643d7b5efd5bc3bc26ccc7da47c70c544d01879646a DIST cederqvist-1.12.12.html.tar.bz2 137581 SHA256 6bdd66581ec363e05313a14db27cd3c201b547cdfc9ea2f8edde74e78301f0f6 SHA512 c4f6bdc294b719c1c9f6e8b7d1d4faa9e2aafccd37924e9d4772f8d802da3e7f5ae1778b295989db256b23bb1d0914023db7237adaf07833caaee499ae6b6fa3 WHIRLPOOL 41dd1e0d944a02eeca10539b87b5cfcadbf4fd5923c872aa86e5673bb6a98f774d5378e8b4f1c2e6c6a62e6dc6a4d02c69b5e51ad03da899903070effd62adc9 DIST cederqvist-1.12.12.pdf 1252423 SHA256 211c5792d24bfd5694f23bc217a161d880bfb2447c41016fab6f657168b041ce SHA512 aa90b76664ca103cf41831a5595d5e99df9fd87633aa5a500569f43854ca6e409a26b655f02ed59cde1c37ce88c40e06f3b3376ad71fdc9487032c3f0898706a WHIRLPOOL 88d015117c05716df6d0cdc763f16dc488f0641624475e9bd33478485dd32e36a7ee5c49a1789ebdd173e665ae5963e75975342d7308e8e453adb65dd31ec6c5 DIST cederqvist-1.12.12.ps 1262208 SHA256 0e14189614e2c5ead49bfe0ecd187239f8adc3e66371b49d52163be821e44cab SHA512 9a061ef90c664fbb4f882644f72c4f80ffbe0233b6b364511b1c7f18f0a53383980a6ddda326b6df1f2fe1899aed3225de89b55a65a1d9101ba81d1c10c067e2 WHIRLPOOL fb1616ca734e51a626713e7e78786ecbff18378966c2c131f6992df248096d38e850123449d3a5a6aa111ee209f90ef48848da7366b21cb6befeccf07ce54ab6 DIST cvs-1.12.12.tar.bz2 3197171 SHA256 9fb9176d268b9019768fc57dedc2920c28fbeda5ba224c2348550d4f25043edc SHA512 31c679b77b887e02d9c8c381b0dfb42f1207ef4ca806cd92843638eb2126ed032e99bda70a3e20ea2a029670ff39c40088a43435632e381739e6c2f978e6f4bb WHIRLPOOL 74257976cdb957e86fb9fb7e54fc8c0b7210f72136ce05327203d935195e7a3bdda0c1d616dc04cb1d6495cb038ca7275e88488eddb5d936c1cfceb94583278c -EBUILD cvs-1.12.12-r10.ebuild 2976 SHA256 f4a1812f778b92e77aba12736fb89aca6a58e3c79091ad830785c3fbd7474239 SHA512 4c9dd5668914c9e3127b97da56180149ee0e2be304a085e2881a0c8e0fa7bf28c97b9f3a0c678148b1e411c7dbc9eaada0bc0d253b29191916d690d9124fd114 WHIRLPOOL 84ee8e6350c9b82e5171ca182720d978f0ec52c66570f4fb21d0455657252e4486a6e8b0d0e49124e9b4a8135a25530f9bee972b957655367dc16cec9f5d5fbd -EBUILD cvs-1.12.12-r11.ebuild 3021 SHA256 e1e3caf4d968a2578f4a829f05afa6b46ae940bede26af65d8939f85fd2d607c SHA512 d29852f3701daf1a4b7d4362cf6eaf81fa2637806b0dc03223645ee9622b8dde9d62100624e029c7b30aab93d45d4cc65ab1edd13837212d9b33370e6bbcc68a WHIRLPOOL fd60d7f50facf7333db90c32033fff853f7a2342379ef2e14804ed6f30b05ce369f5fbfbeabedafc63b2588ec67e33908c2c2281faae54c1df1dd6a58e7f1a1c -MISC ChangeLog 6492 SHA256 4c2fc277969313303f2f6e0a551fd59fb607645aad134c6a0dd7a275a8e8b6d0 SHA512 da2b0b6385458bb0c6edf577e8ac540198599a51519df619c9e513898c4e3a2b40575f600c3bbecbf58144c56c269d2e2ec0ff2868497b70fe8f711e8ab07c66 WHIRLPOOL d4ae008c242a8e71654bb016a9e98ff1a448554b82a714fb6c598cd66c4ffe016c148bd1ba552c7bbe2febe092a979f644be7b22a886167566413837af2012a8 -MISC ChangeLog-2015 25705 SHA256 89571841b8c2db0a16ca4017d5a66695019ab49bb297f9034ec6211b28c7c73f SHA512 12b28d936b1a0fda3f6d4a90ce4c46cd6962ceab5743525a7098c080109d8d42d44c40fd81aa10bd97355b226f58c60584001e174af239e14d8c4dc1de575332 WHIRLPOOL e903cd4c13fc52166e46ff66b793ec47a360fd8a38ac1a539285a73e4e6c3465194889b73b76f59a10caf009f117dae4a6134868e3515ee63224bb65ec9ab300 -MISC metadata.xml 331 SHA256 abe97ea27dc3dd970b0bdc5c6a13f144e677da4714992b73a082f0a0cb319904 SHA512 c698a58813dd993a32389cd8ddc4bcc76d4cf6a435c62ee78e1b4f5c3908ba8b55b9a3338b870b3287195d1f480401ee05f5531ca01827e8626e6d77201f2f03 WHIRLPOOL 653ede8acb3ef3f658064ca7622d28f9ccdf3a2152eac9db55c1d8f528aa869b2027159d546ea52dc27fc7e14b9d39580a9a83813d74992a05914321c0d49b7a diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/cvs-1.12.12-r11.ebuild b/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/cvs-1.12.12-r11.ebuild index a39c54f179..415a2fa36d 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/cvs-1.12.12-r11.ebuild +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/cvs-1.12.12-r11.ebuild @@ -1,6 +1,5 @@ -# Copyright 1999-2016 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI=6 @@ -16,7 +15,7 @@ SRC_URI="mirror://gnu/non-gnu/cvs/source/feature/${PV}/${P}.tar.bz2 LICENSE="GPL-2 LGPL-2" SLOT="0" -KEYWORDS="~alpha amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" IUSE="crypt doc kerberos nls pam server" RESTRICT="test" diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/cvs-1.12.12-r10.ebuild b/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/cvs-1.12.12-r12.ebuild similarity index 51% rename from sdk_container/src/third_party/portage-stable/dev-vcs/cvs/cvs-1.12.12-r10.ebuild rename to sdk_container/src/third_party/portage-stable/dev-vcs/cvs/cvs-1.12.12-r12.ebuild index 01964f05d9..0bfbf53733 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/cvs-1.12.12-r10.ebuild +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/cvs-1.12.12-r12.ebuild @@ -1,13 +1,12 @@ -# Copyright 1999-2015 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ -EAPI=3 +EAPI=6 -inherit eutils pam toolchain-funcs +inherit pam toolchain-funcs DESCRIPTION="Concurrent Versions System - source code revision control tools" -HOMEPAGE="http://www.nongnu.org/cvs/" +HOMEPAGE="http://cvs.nongnu.org/" SRC_URI="mirror://gnu/non-gnu/cvs/source/feature/${PV}/${P}.tar.bz2 doc? ( mirror://gnu/non-gnu/cvs/source/feature/${PV}/cederqvist-${PV}.html.tar.bz2 @@ -19,30 +18,41 @@ SLOT="0" KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" IUSE="crypt doc kerberos nls pam server" -RESTRICT='test' +RESTRICT="test" DEPEND=">=sys-libs/zlib-1.1.4 kerberos? ( virtual/krb5 ) pam? ( virtual/pam )" +RDEPEND="${DEPEND}" src_unpack() { unpack ${P}.tar.bz2 use doc && unpack cederqvist-${PV}.html.tar.bz2 } +PATCHES=( + "${FILESDIR}"/${P}-cvsbug-tmpfix.patch + "${FILESDIR}"/${P}-openat.patch + "${FILESDIR}"/${P}-block-requests.patch + "${FILESDIR}"/${P}-cvs-gnulib-vasnprintf.patch + "${FILESDIR}"/${P}-install-sh.patch + "${FILESDIR}"/${P}-hash-nameclash.patch # for AIX + "${FILESDIR}"/${P}-getdelim.patch # 314791 + "${FILESDIR}"/${PN}-1.12.12-rcs2log-coreutils.patch # 144114 + "${FILESDIR}"/${P}-mktime-x32.patch # 395641 + "${FILESDIR}"/${P}-fix-massive-leak.patch + "${FILESDIR}"/${P}-mktime-configure.patch #220040 #570208 + "${FILESDIR}"/${P}-CVE-2012-0804.patch + "${FILESDIR}"/${P}-format-security.patch + "${FILESDIR}"/${P}-musl.patch + "${FILESDIR}"/${P}-CVE-2017-12836-commandinjection.patch + ) +DOCS=( BUGS ChangeLog{,.zoo} DEVEL-CVS FAQ HACKING MINOR-BUGS NEWS \ + PROJECTS README TESTS TODO ) + src_prepare() { - epatch "${FILESDIR}"/${P}-cvsbug-tmpfix.patch - epatch "${FILESDIR}"/${P}-openat.patch - epatch "${FILESDIR}"/${P}-block-requests.patch - epatch "${FILESDIR}"/${P}-cvs-gnulib-vasnprintf.patch - epatch "${FILESDIR}"/${P}-install-sh.patch - epatch "${FILESDIR}"/${P}-hash-nameclash.patch # for AIX - epatch "${FILESDIR}"/${P}-getdelim.patch # 314791 - epatch "${FILESDIR}"/${PN}-1.12.12-rcs2log-coreutils.patch # 144114 - epatch "${FILESDIR}"/${P}-mktime-x32.patch # 395641 - epatch "${FILESDIR}"/${P}-fix-massive-leak.patch - epatch "${FILESDIR}"/${P}-mktime-configure.patch #220040 #570208 - use server || elog "If you want any CVS server functionality, you MUST emerge with USE=server!" + default + sed -i "/^AR/s:ar:$(tc-getAR):" diff/Makefile.in lib/Makefile.in || die } src_configure() { @@ -53,7 +63,7 @@ src_configure() { fi econf \ --with-external-zlib \ - --with-tmpdir=/tmp \ + --with-tmpdir=${EPREFIX%/}/tmp \ $(use_enable crypt encryption) \ $(use_with kerberos gssapi) \ $(use_enable nls) \ @@ -62,29 +72,24 @@ src_configure() { } src_install() { - emake install DESTDIR="${D}" || die - - insinto /etc/xinetd.d - if use server; then - newins "${FILESDIR}"/cvspserver.xinetd.d cvspserver || die "newins failed" - fi - newenvd "${FILESDIR}"/01-cvs-env.d 01cvs - - dodoc BUGS ChangeLog* DEVEL* FAQ HACKING \ - MINOR* NEWS PROJECTS README* TESTS TODO - # Not installed into emacs site-lisp because it clobbers the normal C # indentations. - dodoc cvs-format.el || die "dodoc failed" - - use server && newdoc "${FILESDIR}"/cvs-1.12.12-cvs-custom.c cvs-custom.c + DOCS+=( cvs-format.el ) if use doc; then - dodoc "${DISTDIR}"/cederqvist-${PV}.pdf - dodoc "${DISTDIR}"/cederqvist-${PV}.ps - tar xjf "${DISTDIR}"/cederqvist-${PV}.html.tar.bz2 - dohtml -r cederqvist-${PV}.html/* - dosym cvs.html /usr/share/doc/${PF}/html/index.html + DOCS+=( "${DISTDIR}"/cederqvist-${PV}.{pdf,ps} ) + HTML_DOCS=( ../cederqvist-${PV}.html/. ) + fi + + default + + use doc && dosym cvs.html /usr/share/doc/${PF}/html/index.html + + if use server; then + newdoc "${FILESDIR}"/cvs-1.12.12-cvs-custom.c cvs-custom.c + insinto /etc/xinetd.d + newins "${FILESDIR}"/cvspserver.xinetd.d cvspserver + newenvd "${FILESDIR}"/01-cvs-env.d 01cvs fi newpamd "${FILESDIR}"/cvs.pam-include-1.12.12 cvs diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/files/cvs-1.12.12-CVE-2017-12836-commandinjection.patch b/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/files/cvs-1.12.12-CVE-2017-12836-commandinjection.patch new file mode 100644 index 0000000000..87b1fdc958 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/files/cvs-1.12.12-CVE-2017-12836-commandinjection.patch @@ -0,0 +1,22 @@ +diff -Naurp a/src/rsh-client.c b/src/rsh-client.c +--- a/src/rsh-client.c 2005-03-15 18:45:10.000000000 +0100 ++++ b/src/rsh-client.c 2017-08-26 17:43:23.228060155 +0200 +@@ -97,6 +97,9 @@ start_rsh_server (cvsroot_t *root, struc + rsh_argv[i++] = root->username; + } + ++ /* Only non-option arguments from here. (CVE-2017-12836) */ ++ rsh_argv[i++] = "--"; ++ + rsh_argv[i++] = root->hostname; + rsh_argv[i++] = cvs_server; + rsh_argv[i++] = "server"; +@@ -171,6 +174,8 @@ start_rsh_server (cvsroot_t *root, struc + *p++ = root->username; + } + ++ *p++ = "--"; ++ + *p++ = root->hostname; + *p++ = command; + *p++ = NULL; diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/metadata.xml b/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/metadata.xml index 4951492f58..e74b19c857 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/metadata.xml +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/cvs/metadata.xml @@ -1,10 +1,7 @@ - - cvs-utils@gentoo.org - Gentoo CVS Project - + Enable server support diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/cvs-1.12.12-r11 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/cvs-1.12.12-r11 index b63e909bd5..d4051d598e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/cvs-1.12.12-r11 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/cvs-1.12.12-r11 @@ -4,11 +4,11 @@ DESCRIPTION=Concurrent Versions System - source code revision control tools EAPI=6 HOMEPAGE=http://cvs.nongnu.org/ IUSE=crypt doc kerberos nls pam server -KEYWORDS=~alpha amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris LICENSE=GPL-2 LGPL-2 RDEPEND=>=sys-libs/zlib-1.1.4 kerberos? ( virtual/krb5 ) pam? ( virtual/pam ) RESTRICT=test SLOT=0 SRC_URI=mirror://gnu/non-gnu/cvs/source/feature/1.12.12/cvs-1.12.12.tar.bz2 doc? ( mirror://gnu/non-gnu/cvs/source/feature/1.12.12/cederqvist-1.12.12.html.tar.bz2 mirror://gnu/non-gnu/cvs/source/feature/1.12.12/cederqvist-1.12.12.pdf mirror://gnu/non-gnu/cvs/source/feature/1.12.12/cederqvist-1.12.12.ps ) _eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multilib 97f470f374f2e94ccab04a2fb21d811e pam 3e788d86170dfcd5b06824d898315e18 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=974b73236214c8a64c09aa4e4c9eff58 +_md5_=ffe26d576740390b6d21c2d672958703 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/cvs-1.12.12-r10 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/cvs-1.12.12-r12 similarity index 93% rename from sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/cvs-1.12.12-r10 rename to sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/cvs-1.12.12-r12 index 9384e590c2..36137b62b5 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/cvs-1.12.12-r10 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/cvs-1.12.12-r12 @@ -1,8 +1,8 @@ DEFINED_PHASES=configure install prepare unpack DEPEND=>=sys-libs/zlib-1.1.4 kerberos? ( virtual/krb5 ) pam? ( virtual/pam ) DESCRIPTION=Concurrent Versions System - source code revision control tools -EAPI=3 -HOMEPAGE=http://www.nongnu.org/cvs/ +EAPI=6 +HOMEPAGE=http://cvs.nongnu.org/ IUSE=crypt doc kerberos nls pam server KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris LICENSE=GPL-2 LGPL-2 @@ -11,4 +11,4 @@ RESTRICT=test SLOT=0 SRC_URI=mirror://gnu/non-gnu/cvs/source/feature/1.12.12/cvs-1.12.12.tar.bz2 doc? ( mirror://gnu/non-gnu/cvs/source/feature/1.12.12/cederqvist-1.12.12.html.tar.bz2 mirror://gnu/non-gnu/cvs/source/feature/1.12.12/cederqvist-1.12.12.pdf mirror://gnu/non-gnu/cvs/source/feature/1.12.12/cederqvist-1.12.12.ps ) _eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multilib 97f470f374f2e94ccab04a2fb21d811e pam 3e788d86170dfcd5b06824d898315e18 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=16fae9185ecbd578279c3afbd61e22f5 +_md5_=68022da287f504b569d22661fe607407 From c357d7637de3ad4e77b1ee2a63e3aae306844fb3 Mon Sep 17 00:00:00 2001 From: David Michael Date: Fri, 29 Sep 2017 14:08:17 -0700 Subject: [PATCH 08/14] bump(dev-vcs/mercurial): sync with upstream --- .../portage-stable/dev-vcs/mercurial/Manifest | 20 ++++--------------- .../dev-vcs/mercurial/mercurial-3.8.4.ebuild | 5 ++--- ...al-3.9.1.ebuild => mercurial-4.1.3.ebuild} | 5 ++--- ...al-3.9.2.ebuild => mercurial-4.3.1.ebuild} | 5 ++--- ...rial-4.0.ebuild => mercurial-4.3.2.ebuild} | 5 ++--- ...rial-3.7.3.ebuild => mercurial-4.3.ebuild} | 14 ++++--------- .../dev-vcs/mercurial/mercurial-9999.ebuild | 1 - .../dev-vcs/mercurial/metadata.xml | 11 +--------- .../md5-cache/dev-vcs/mercurial-3.8.4 | 4 ++-- .../{mercurial-3.9.1 => mercurial-4.1.3} | 6 +++--- .../dev-vcs/{mercurial-4.0 => mercurial-4.3} | 6 +++--- .../{mercurial-3.9.2 => mercurial-4.3.1} | 6 +++--- .../{mercurial-3.7.3 => mercurial-4.3.2} | 8 ++++---- .../metadata/md5-cache/dev-vcs/mercurial-9999 | 2 +- 14 files changed, 33 insertions(+), 65 deletions(-) rename sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/{mercurial-3.9.1.ebuild => mercurial-4.1.3.ebuild} (91%) rename sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/{mercurial-3.9.2.ebuild => mercurial-4.3.1.ebuild} (91%) rename sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/{mercurial-4.0.ebuild => mercurial-4.3.2.ebuild} (91%) rename sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/{mercurial-3.7.3.ebuild => mercurial-4.3.ebuild} (86%) rename sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/{mercurial-3.9.1 => mercurial-4.1.3} (81%) rename sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/{mercurial-4.0 => mercurial-4.3} (81%) rename sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/{mercurial-3.9.2 => mercurial-4.3.1} (81%) rename sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/{mercurial-3.7.3 => mercurial-4.3.2} (80%) diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/Manifest b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/Manifest index 53a5b45def..f1b1cf726d 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/Manifest +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/Manifest @@ -1,17 +1,5 @@ -AUX 70mercurial-gentoo.el 76 SHA256 c215746e4a5375569808c6aa6ddabe08e82d33d744128179be3142d9cd53a5ab SHA512 2efb67d5f595842ccdb9b9ea0c6b6fbc3a28a77955d7255817309486fac19e7550ee0a545d5824e3f9acaf586d93533e90ccd05e15d76884d6493f50fb390a44 WHIRLPOOL f4e8fa6a0400bf04314569f3d6e26e464ebf3c7a693508250e2b150919ad5e34a534af86b1b5847ff13f2964d23db531b1a77cc8bdd24e550c7f9e885c6f1682 -AUX cacerts.rc 51 SHA256 3d7c7e238ab4db22d2457e039bb1afcb02c6ac3a6c9aee8448614b0a6f414774 SHA512 39c40c6cc95c54dcae13effb5c23f541f49fd89e0f040e214673afd906c6d5140eb18801d55330f4455507b467f0fae011998e60932e9a2accf37a0e7a047b90 WHIRLPOOL 12c178cf03d7d31744311fd71200efd07a2c9ab3ab3bf1c08f254d113fbd0500848ac3bb76da2baa2c567666f2174026a605dd561a3b1bc96133f314e149f289 -AUX mercurial-3.0.1-po_fixes.patch 1396 SHA256 e111e7e609edec0cb13be1d89d6558bc41785c48266b3f1aca9bc6572c0d884e SHA512 c696e0df1f6d149e8522123fe51585ded2955bbea782819d634eaf6edb0ddd189c68372692cb247bbd96d51c69801c2d8232e4b0b60093ff1f11b28010292cb7 WHIRLPOOL e9ed6368f9a633fcb919c9466b9a613f5f4db62fbed3ac9427e2628ad882320415e851620d609b5ba5c3ee1d96f3d191bc579fdb645765e65f83043b2355bbc8 -DIST mercurial-3.7.3.tar.gz 4636732 SHA256 c099c42d74e2d520b61dd372cd996b0fa7605c06617834fd7b13c79b9a9a5b30 SHA512 7f9f97229e40c7092c16ccf227b19a08a9839d8ce19a9d057341fff75876bff32241ee9aa10eab293f779ea3e8a1d97577597187bd96251fb499cbb1075a82cf WHIRLPOOL 51d7f152a0af27924fec8b39933796f5584867efff7f271147139e740302d05f8976f3c2aa95cb724b774ba4951040483bb51b02eed1495d8b15012301ba060e DIST mercurial-3.8.4.tar.gz 4775341 SHA256 4b2e3ef19d34fa1d781cb7425506a05d4b6b1172bab69d6ea78874175fdf3da6 SHA512 2ee785f631f9ae346e10ca77251a9ce6d3dacd598588c39f1a69ce1f4b668866f6109d682428512c37c300b26741b74672195538d66845e85cfff5ead886cf4c WHIRLPOOL 1f0a12cc6d00f3544ab00e011a9ff9308fe1652c0598045ddba2a41ba17b55c291da200bce85d4c600d673b8746e936c441ffa7398ad810d1069bd97fb32f2db -DIST mercurial-3.9.1.tar.gz 4797967 SHA256 625e4fc7e85ec2278c2828bdc547fce74091b3bbe4d9eeeba2d61af51195df74 SHA512 d96e45cafd36be692d6ce5259e18140641c24f73d4731ff767df0f39af425b0630c687436fc0f53d5882495ceacacaadd5e19f8f7c701b4b94c48631123b4666 WHIRLPOOL ba4e9374b592d294767046fe7d4297df837d9e92ea2279a7a3654054c058a6b994cade2358d2c35a7d30b6985abd0f7afe55af586ccafbe1dc5b50059bc2712f -DIST mercurial-3.9.2.tar.gz 4798958 SHA256 69046a427c05e83097bf0145a1e37975ae0b6ba4430456e2beca3d2fd96583cf SHA512 2217b492216bc640366bf4bfa65bb50d2b7f384d70c59fd1fb138482cbee4768c83a444233958a7ad95e9cd0dcbe3e676d7ff4a8a4019b9773205f8f2500235e WHIRLPOOL 11763311c2df0a235a8401ea0ea59d06797bbfaa420f9c900a39fa127e34f94cefc27dde96e57449cc659da7e13813ad146c17f5db011068bed5f0f7215e331c -DIST mercurial-4.0.tar.gz 4850316 SHA256 24be080745230840f214d93e9f9fb4e25510f9abbbec2e56fab18543fedc43a7 SHA512 8c1974a00efc4d0bcdaca1ce86a172528de58857ac0a78d8cac5c1182dcdd340c7f0f680c8dba82d384ffd3557abbfbdc2e473b5b0b8f05160bd6dbb915e76e4 WHIRLPOOL b4dad09ee488a2630ba37e4f24454de0d171a5b480bd5d161c28a1ec03f60f05efdc25c66c9626d638becebae1ace420312660f66cc9fbd834efca9824c5fbd6 -EBUILD mercurial-3.7.3.ebuild 3662 SHA256 f9c4fd372688b9be253b646a69b4cb8b7cd6ccfaeff311680bca3d27510ebc1d SHA512 a41853354b4d76fd7317079e1e5534a25920d50a41b8a36ddfbb22eb7889af6160077f703c2701c484bc5d9c88dd59bb0d56fc19df638a0eea67a1469dfe5ad7 WHIRLPOOL 212d765bcf289ab3850cff4d1f32962ba2944177acffde2238c2af040aa9d9843b352051abc6e7c1554983f622ffec2e251246882cf14d194253e8e9606a694a -EBUILD mercurial-3.8.4.ebuild 3575 SHA256 15bfa9162be38a7bfc724ab53d93b9e6d9177e2c68fa761d229e110980f10b6d SHA512 813c4783cdd92ff04185db3f3656aae77cdf7b6afb376e4cbf74eaaa2c70247561c21a0e6ee4e90c6a02096c1e7f2d7fd283e9a03c3d5dacfacfdc81ad39d171 WHIRLPOOL 9b7c1c3acdb975de19243602b39e97621b20b374db52e1884a686b77e245f76c031ece59a7517abd7cf5c98ad8c2400a6670e310d889b03d6a1300139cc93876 -EBUILD mercurial-3.9.1.ebuild 3581 SHA256 e1f9a889fb032eae945fc91782a12b9a39bc6ff79bf391ed568632593e3b926c SHA512 bd8ad399239ae13c72b66e51127089f4f566a36ef23e96744740a6b9b3ebd03545f81f97ca8537bb6acc4d6e9d31ef3f857d49a7962a824add8d9ff7929098d4 WHIRLPOOL 8f822e7186989371a967dd4015dd59d4817b1958a31f88f5f7a8b2b4dbecf6030a2163ac872f15e217204a2bd48123c094b698429a65a9a5b20c7c95ec823f00 -EBUILD mercurial-3.9.2.ebuild 3581 SHA256 e1f9a889fb032eae945fc91782a12b9a39bc6ff79bf391ed568632593e3b926c SHA512 bd8ad399239ae13c72b66e51127089f4f566a36ef23e96744740a6b9b3ebd03545f81f97ca8537bb6acc4d6e9d31ef3f857d49a7962a824add8d9ff7929098d4 WHIRLPOOL 8f822e7186989371a967dd4015dd59d4817b1958a31f88f5f7a8b2b4dbecf6030a2163ac872f15e217204a2bd48123c094b698429a65a9a5b20c7c95ec823f00 -EBUILD mercurial-4.0.ebuild 3581 SHA256 e1f9a889fb032eae945fc91782a12b9a39bc6ff79bf391ed568632593e3b926c SHA512 bd8ad399239ae13c72b66e51127089f4f566a36ef23e96744740a6b9b3ebd03545f81f97ca8537bb6acc4d6e9d31ef3f857d49a7962a824add8d9ff7929098d4 WHIRLPOOL 8f822e7186989371a967dd4015dd59d4817b1958a31f88f5f7a8b2b4dbecf6030a2163ac872f15e217204a2bd48123c094b698429a65a9a5b20c7c95ec823f00 -EBUILD mercurial-9999.ebuild 4136 SHA256 6f6050355328f7235cd3f37695c04b15f2213c7ab017a84e9fe91f549953356f SHA512 e2d313fa9acb9ae1e98b8cb2c6c2c29dcbf4de346ba52cc755d6aefe480b6f24424980663b37f4a6c363fae0be08489c3a1440bc590fd7d1ac42ba363f2dbb04 WHIRLPOOL dd5c50e47b1a7eb0a4fac5de95f3c7ae1a5dbb34cfdad2e8f03f454fd65a320136533f9509fd237dae621396f43140bb195acd06d54e83287b19efccb7894321 -MISC ChangeLog 11660 SHA256 c28daa3ae9fea03248116ec936adaba883a6940407584eb01b0ef195b8385e98 SHA512 c32f3b287eaff27142d45455f330fa23d5d4d792df6afaa326fd24715956c017ecb8eddaa948f178fae0929bdf447f7d17f342f7e8be3f99c072f13c7c8e35f8 WHIRLPOOL fcb7a9532a9d93b54d9024368656388c6e1ae3563fb851df72c613ee8b502e165945cf78e9e92924d6173e453d2c36a9688b4dbe869ee572ef1dac9a6b92e9b2 -MISC ChangeLog-2015 44068 SHA256 2eccd660d25882a70a5ede0bca4505eeb894dca03587a0caa8c645e04a77fa5d SHA512 af1853b3f0723f074b0938774cfec30912e5f254f28163c6a1405fcbd6a535c9e40cfacef20416b27aa8b6e761449ec8c9b39b83dbb223d1832bc3836f17e8dc WHIRLPOOL 83f3a0565f4b144611461ce4477743f8aff76d537bf1c533e6314033dda60563bb7060c6bdae045f6f6d2323d1fbad35799f5eedc3c2928048845b7ca4bfec13 -MISC metadata.xml 746 SHA256 dd1d5869b51823876cf5a2659a1a57badf2a9f1361d1586267ac7a57b370ea55 SHA512 ad5932761b80dce4fc422699c2287f16e7310a8da16b7d4eefb477ace53678dbe14f099c86b2bbdd513cf13141e006043d8ed4866c78ad43b4358a6d04b62bbe WHIRLPOOL eefb8106a89b33bbe18ac58e32129667c1eea83e47779d068386df00ec3d186a3068b74aced3671568f915ad5b46ae7ada1d67f06ce9389062e5c53c8b82386b +DIST mercurial-4.1.3.tar.gz 5134965 SHA256 103d2ae187d5c94110c0e86ccc3b46f55fcd8e21c78d1c209bac7b59a73e86d8 SHA512 794c513b7e061bc56d270ef57adc0fadeffd5bcc988da0934b24db686b76bf573aef2bbaa3baa9220f31463795bc6e6a99fc1284ebcf8d7e49f42b8129347811 WHIRLPOOL a2f5d5e3e89f794415521bf0bc93ff0e8a67aec6c39951437b6b585f9f6d604bd556af10cce50951128c746719db54ea48f86fb7c262a36a29576ba539be1e79 +DIST mercurial-4.3.1.tar.gz 5475042 SHA256 2b12f02e3a452adff4ec9cf007017bab0cadb3f37eaf12f4b25a662df73618a2 SHA512 4c42d06b7f111a3e825dd927704a30f88f0b2225cf87ab8954bf53a7fbc0edf561374dd49b13d9c10140d98ff5853a64acb5a744349727abae81d32da401922b WHIRLPOOL 4360763be405d75ffc0e3e2356fcfe44079bf9818c07211964ba7433932956283feb329379af329e0a7d70acc5c6a163a9c08976abb902197d6a6f0180a3a958 +DIST mercurial-4.3.2.tar.gz 5491214 SHA256 0f5bf688ba2add6f5db98a633edef43411ecf2c7ada5f2e14b9265820a96cd48 SHA512 e69b7cff941d83531d59d91c30e336807f868302dfda565e1421b7d34c2769221220686774af236d86ac0f67dba6e8a0947ed1185b30d89463a8d211e20d1cbc WHIRLPOOL 079d05e75cde63ff907b485a45a6a9cf8b42001525a799939647d05dd60d85c1faa0cbf14b9da95488103ec9f0b177f59ad7d8bde93dca3ffe428d697669bd4e +DIST mercurial-4.3.tar.gz 5469979 SHA256 ebf11176e9b5354ec7a1bde6c5382c914d10c397410531faf89f8b5124a7cb65 SHA512 d74ae5f35d8c415c07737b59e6c5455963dfbf5d038c43d683fd34dd84423b9ccf9cd670667f458db20d8580fc7c7d9e5609d29d990e1e94683734694211c417 WHIRLPOOL 54583dbc826fdec3e737dc49d1a8ce180d29579d091c86e48a3b7c68bb4a2d399c5aff3b2ff0e30cd911e8955537a621c73c330d70a55f7efcdeafd21257178f diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.8.4.ebuild b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.8.4.ebuild index 86216d1cee..69641b439a 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.8.4.ebuild +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.8.4.ebuild @@ -1,6 +1,5 @@ -# Copyright 1999-2016 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI=6 @@ -15,7 +14,7 @@ SRC_URI="https://www.mercurial-scm.org/release/${P}.tar.gz" LICENSE="GPL-2" SLOT="0" -KEYWORDS="alpha amd64 arm hppa ~ia64 ~mips ~ppc ppc64 ~sparc x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~x64-freebsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 sparc x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" IUSE="bugzilla emacs gpg test tk" RDEPEND="bugzilla? ( dev-python/mysql-python[${PYTHON_USEDEP}] ) diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.9.1.ebuild b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.1.3.ebuild similarity index 91% rename from sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.9.1.ebuild rename to sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.1.3.ebuild index 1e1d7b5e6f..a04546c6f0 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.9.1.ebuild +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.1.3.ebuild @@ -1,6 +1,5 @@ -# Copyright 1999-2016 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI=6 @@ -15,7 +14,7 @@ SRC_URI="https://www.mercurial-scm.org/release/${P}.tar.gz" LICENSE="GPL-2" SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~x64-freebsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" IUSE="bugzilla emacs gpg test tk" RDEPEND="bugzilla? ( dev-python/mysql-python[${PYTHON_USEDEP}] ) diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.9.2.ebuild b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.3.1.ebuild similarity index 91% rename from sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.9.2.ebuild rename to sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.3.1.ebuild index 1e1d7b5e6f..a04546c6f0 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.9.2.ebuild +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.3.1.ebuild @@ -1,6 +1,5 @@ -# Copyright 1999-2016 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI=6 @@ -15,7 +14,7 @@ SRC_URI="https://www.mercurial-scm.org/release/${P}.tar.gz" LICENSE="GPL-2" SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~x64-freebsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" IUSE="bugzilla emacs gpg test tk" RDEPEND="bugzilla? ( dev-python/mysql-python[${PYTHON_USEDEP}] ) diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.0.ebuild b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.3.2.ebuild similarity index 91% rename from sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.0.ebuild rename to sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.3.2.ebuild index 1e1d7b5e6f..a04546c6f0 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.0.ebuild +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.3.2.ebuild @@ -1,6 +1,5 @@ -# Copyright 1999-2016 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI=6 @@ -15,7 +14,7 @@ SRC_URI="https://www.mercurial-scm.org/release/${P}.tar.gz" LICENSE="GPL-2" SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~x64-freebsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" IUSE="bugzilla emacs gpg test tk" RDEPEND="bugzilla? ( dev-python/mysql-python[${PYTHON_USEDEP}] ) diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.7.3.ebuild b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.3.ebuild similarity index 86% rename from sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.7.3.ebuild rename to sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.3.ebuild index 199c85f4a1..8ad8f85967 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-3.7.3.ebuild +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-4.3.ebuild @@ -1,6 +1,5 @@ -# Copyright 1999-2016 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI=6 @@ -10,12 +9,12 @@ PYTHON_REQ_USE="threads" inherit bash-completion-r1 elisp-common eutils distutils-r1 flag-o-matic DESCRIPTION="Scalable distributed SCM" -HOMEPAGE="http://mercurial.selenic.com/" -SRC_URI="http://mercurial.selenic.com/release/${P}.tar.gz" +HOMEPAGE="https://www.mercurial-scm.org/" +SRC_URI="https://www.mercurial-scm.org/release/${P}.tar.gz" LICENSE="GPL-2" SLOT="0" -KEYWORDS="alpha amd64 arm hppa ia64 ~mips ppc ppc64 sparc x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~x64-freebsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~mips ppc ppc64 ~sparc x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" IUSE="bugzilla emacs gpg test tk" RDEPEND="bugzilla? ( dev-python/mysql-python[${PYTHON_USEDEP}] ) @@ -85,11 +84,6 @@ python_install_all() { docompress -x /usr/share/doc/${PF}/contrib doman doc/*.? - cat > "${T}/80mercurial" <<-EOF -HG="${EPREFIX}/usr/bin/hg" -EOF - doenvd "${T}/80mercurial" - insinto /etc/mercurial/hgrc.d doins "${FILESDIR}/cacerts.rc" } diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-9999.ebuild b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-9999.ebuild index e7c30f8919..ca65f32e36 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-9999.ebuild +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/mercurial-9999.ebuild @@ -1,6 +1,5 @@ # Copyright 1999-2015 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI=5 diff --git a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/metadata.xml b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/metadata.xml index 11f770a7ef..6f2bedbfd6 100644 --- a/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/metadata.xml +++ b/sdk_container/src/third_party/portage-stable/dev-vcs/mercurial/metadata.xml @@ -1,22 +1,13 @@ - - djc@gentoo.org - Dirkjan Ochtman - polynomial-c@gentoo.org Lars Wendler - - skrattaren@yandex.ru - Nikolaj Sjujskij - Fallback maintaner, please CC on bugs - Support bugzilla integration. Support signing with GnuPG. - Install dev-lang/tk for hgk script. + Install dev-lang/tk for hgk script. diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.8.4 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.8.4 index 8356489c54..2657dd30db 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.8.4 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.8.4 @@ -4,11 +4,11 @@ DESCRIPTION=Scalable distributed SCM EAPI=6 HOMEPAGE=https://www.mercurial-scm.org/ IUSE=bugzilla emacs gpg test tk python_targets_python2_7 -KEYWORDS=alpha amd64 arm hppa ~ia64 ~mips ~ppc ppc64 ~sparc x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~x64-freebsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 sparc x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris LICENSE=GPL-2 RDEPEND=bugzilla? ( dev-python/mysql-python[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] ) gpg? ( app-crypt/gnupg ) tk? ( dev-lang/tk ) app-misc/ca-certificates python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7[threads] ) >=dev-lang/python-exec-2:=[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] REQUIRED_USE=|| ( python_targets_python2_7 ) SLOT=0 SRC_URI=https://www.mercurial-scm.org/release/mercurial-3.8.4.tar.gz _eclasses_=bash-completion-r1 8e447753aaf658afa609fbf961d80ab7 distutils-r1 372bbe39047c0a2550319a3a82f3e063 elisp-common 19ff54b35acd0bf2a14831a308a57753 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multiprocessing 284a473719153462f3e974d86c8cb81c python-r1 e9350ec46bb5c9f3504b4fbe8b8d8987 python-utils-r1 c9de01becf9df3f8c10aeec3dc693f5d toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 xdg-utils b9389dfad0ee8f8e0b2a41b79fcf7120 -_md5_=0437d37d09a8cfebddd1efd7942805e3 +_md5_=ce3664309dac49acfe1abc864084f747 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.9.1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.1.3 similarity index 81% rename from sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.9.1 rename to sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.1.3 index bb033a465f..97051c8d44 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.9.1 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.1.3 @@ -4,11 +4,11 @@ DESCRIPTION=Scalable distributed SCM EAPI=6 HOMEPAGE=https://www.mercurial-scm.org/ IUSE=bugzilla emacs gpg test tk python_targets_python2_7 -KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~x64-freebsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris LICENSE=GPL-2 RDEPEND=bugzilla? ( dev-python/mysql-python[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] ) gpg? ( app-crypt/gnupg ) tk? ( dev-lang/tk ) app-misc/ca-certificates python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7[threads] ) >=dev-lang/python-exec-2:=[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] REQUIRED_USE=|| ( python_targets_python2_7 ) SLOT=0 -SRC_URI=https://www.mercurial-scm.org/release/mercurial-3.9.1.tar.gz +SRC_URI=https://www.mercurial-scm.org/release/mercurial-4.1.3.tar.gz _eclasses_=bash-completion-r1 8e447753aaf658afa609fbf961d80ab7 distutils-r1 372bbe39047c0a2550319a3a82f3e063 elisp-common 19ff54b35acd0bf2a14831a308a57753 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multiprocessing 284a473719153462f3e974d86c8cb81c python-r1 e9350ec46bb5c9f3504b4fbe8b8d8987 python-utils-r1 c9de01becf9df3f8c10aeec3dc693f5d toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 xdg-utils b9389dfad0ee8f8e0b2a41b79fcf7120 -_md5_=585c2cfd868ecbcbbf5dc045abb57167 +_md5_=2f2b6060206cd72972de9b7bf91cfb5e diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.0 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.3 similarity index 81% rename from sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.0 rename to sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.3 index 3e66ab08d2..8a7eb02a95 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.0 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.3 @@ -4,11 +4,11 @@ DESCRIPTION=Scalable distributed SCM EAPI=6 HOMEPAGE=https://www.mercurial-scm.org/ IUSE=bugzilla emacs gpg test tk python_targets_python2_7 -KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~x64-freebsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~mips ppc ppc64 ~sparc x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris LICENSE=GPL-2 RDEPEND=bugzilla? ( dev-python/mysql-python[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] ) gpg? ( app-crypt/gnupg ) tk? ( dev-lang/tk ) app-misc/ca-certificates python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7[threads] ) >=dev-lang/python-exec-2:=[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] REQUIRED_USE=|| ( python_targets_python2_7 ) SLOT=0 -SRC_URI=https://www.mercurial-scm.org/release/mercurial-4.0.tar.gz +SRC_URI=https://www.mercurial-scm.org/release/mercurial-4.3.tar.gz _eclasses_=bash-completion-r1 8e447753aaf658afa609fbf961d80ab7 distutils-r1 372bbe39047c0a2550319a3a82f3e063 elisp-common 19ff54b35acd0bf2a14831a308a57753 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multiprocessing 284a473719153462f3e974d86c8cb81c python-r1 e9350ec46bb5c9f3504b4fbe8b8d8987 python-utils-r1 c9de01becf9df3f8c10aeec3dc693f5d toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 xdg-utils b9389dfad0ee8f8e0b2a41b79fcf7120 -_md5_=585c2cfd868ecbcbbf5dc045abb57167 +_md5_=a65c0680a19380f480b3821294dd61be diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.9.2 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.3.1 similarity index 81% rename from sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.9.2 rename to sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.3.1 index 9a79c0876a..7a62e0dea9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.9.2 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.3.1 @@ -4,11 +4,11 @@ DESCRIPTION=Scalable distributed SCM EAPI=6 HOMEPAGE=https://www.mercurial-scm.org/ IUSE=bugzilla emacs gpg test tk python_targets_python2_7 -KEYWORDS=~alpha ~amd64 ~arm ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~x64-freebsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris LICENSE=GPL-2 RDEPEND=bugzilla? ( dev-python/mysql-python[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] ) gpg? ( app-crypt/gnupg ) tk? ( dev-lang/tk ) app-misc/ca-certificates python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7[threads] ) >=dev-lang/python-exec-2:=[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] REQUIRED_USE=|| ( python_targets_python2_7 ) SLOT=0 -SRC_URI=https://www.mercurial-scm.org/release/mercurial-3.9.2.tar.gz +SRC_URI=https://www.mercurial-scm.org/release/mercurial-4.3.1.tar.gz _eclasses_=bash-completion-r1 8e447753aaf658afa609fbf961d80ab7 distutils-r1 372bbe39047c0a2550319a3a82f3e063 elisp-common 19ff54b35acd0bf2a14831a308a57753 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multiprocessing 284a473719153462f3e974d86c8cb81c python-r1 e9350ec46bb5c9f3504b4fbe8b8d8987 python-utils-r1 c9de01becf9df3f8c10aeec3dc693f5d toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 xdg-utils b9389dfad0ee8f8e0b2a41b79fcf7120 -_md5_=585c2cfd868ecbcbbf5dc045abb57167 +_md5_=2f2b6060206cd72972de9b7bf91cfb5e diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.7.3 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.3.2 similarity index 80% rename from sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.7.3 rename to sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.3.2 index eab5d30f60..1d5934879d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-3.7.3 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-4.3.2 @@ -2,13 +2,13 @@ DEFINED_PHASES=compile configure install postinst postrm prepare test DEPEND=emacs? ( virtual/emacs ) test? ( app-arch/unzip dev-python/pygments[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] ) python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7[threads] ) >=dev-lang/python-exec-2:=[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] DESCRIPTION=Scalable distributed SCM EAPI=6 -HOMEPAGE=http://mercurial.selenic.com/ +HOMEPAGE=https://www.mercurial-scm.org/ IUSE=bugzilla emacs gpg test tk python_targets_python2_7 -KEYWORDS=alpha amd64 arm hppa ia64 ~mips ppc ppc64 sparc x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~x64-freebsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~mips ~ppc ~ppc64 ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris LICENSE=GPL-2 RDEPEND=bugzilla? ( dev-python/mysql-python[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] ) gpg? ( app-crypt/gnupg ) tk? ( dev-lang/tk ) app-misc/ca-certificates python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7[threads] ) >=dev-lang/python-exec-2:=[python_targets_python2_7(-)?,-python_single_target_python2_7(-)] REQUIRED_USE=|| ( python_targets_python2_7 ) SLOT=0 -SRC_URI=http://mercurial.selenic.com/release/mercurial-3.7.3.tar.gz +SRC_URI=https://www.mercurial-scm.org/release/mercurial-4.3.2.tar.gz _eclasses_=bash-completion-r1 8e447753aaf658afa609fbf961d80ab7 distutils-r1 372bbe39047c0a2550319a3a82f3e063 elisp-common 19ff54b35acd0bf2a14831a308a57753 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multiprocessing 284a473719153462f3e974d86c8cb81c python-r1 e9350ec46bb5c9f3504b4fbe8b8d8987 python-utils-r1 c9de01becf9df3f8c10aeec3dc693f5d toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 xdg-utils b9389dfad0ee8f8e0b2a41b79fcf7120 -_md5_=c529c24c8f9673006d47f72cf4d06780 +_md5_=2f2b6060206cd72972de9b7bf91cfb5e diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-9999 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-9999 index 2097f1ee18..9f3d508607 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-9999 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-vcs/mercurial-9999 @@ -9,4 +9,4 @@ RDEPEND=bugzilla? ( dev-python/mysql-python[python_targets_python2_7(-)?,-python REQUIRED_USE=|| ( python_targets_python2_7 ) SLOT=0 _eclasses_=bash-completion-r1 8e447753aaf658afa609fbf961d80ab7 distutils-r1 372bbe39047c0a2550319a3a82f3e063 elisp-common 19ff54b35acd0bf2a14831a308a57753 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e mercurial 0bdc9ce12272665fa3749c8408b4d389 multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multiprocessing 284a473719153462f3e974d86c8cb81c python-r1 e9350ec46bb5c9f3504b4fbe8b8d8987 python-utils-r1 c9de01becf9df3f8c10aeec3dc693f5d toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 xdg-utils b9389dfad0ee8f8e0b2a41b79fcf7120 -_md5_=a7d9c65f52387e71b75f90161abbb7a2 +_md5_=0d75a742b34a94659413584f0b4e9827 From 1aea7a18e8730dd8c2719c4c21b504527413cd0b Mon Sep 17 00:00:00 2001 From: David Michael Date: Mon, 9 Oct 2017 11:51:02 -0700 Subject: [PATCH 09/14] bump(metadata/glsa): sync with upstream --- .../metadata/glsa/glsa-201705-15.xml | 15 ++- .../metadata/glsa/glsa-201710-01.xml | 61 +++++++++++ .../metadata/glsa/glsa-201710-02.xml | 53 +++++++++ .../metadata/glsa/glsa-201710-03.xml | 59 ++++++++++ .../metadata/glsa/glsa-201710-04.xml | 52 +++++++++ .../metadata/glsa/glsa-201710-05.xml | 50 +++++++++ .../metadata/glsa/glsa-201710-06.xml | 101 ++++++++++++++++++ .../metadata/glsa/glsa-201710-07.xml | 54 ++++++++++ .../metadata/glsa/glsa-201710-08.xml | 56 ++++++++++ .../metadata/glsa/glsa-201710-09.xml | 66 ++++++++++++ .../metadata/glsa/timestamp.chk | 2 +- .../metadata/glsa/timestamp.commit | 2 +- 12 files changed, 564 insertions(+), 7 deletions(-) create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-01.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-02.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-03.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-04.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-05.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-06.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-07.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-08.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-09.xml diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml index a7507152a4..ee01ba3b83 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml @@ -5,13 +5,13 @@ A vulnerability in sudo allows local users to gain root privileges. sudo,privilege 2017-05-30 - 2017-05-30: 1 + 2017-10-07: 3 620182 local - 1.8.20_p1 - 1.8.20_p1 + 1.8.20_p2 + 1.8.20_p2 @@ -27,6 +27,8 @@ user-controlled, arbitrary tty device during its traversal of “/dev” by utilizing the world-writable /dev/shm.

+ +

For further information, please see the Qualys Security Advisory

A local attacker can pretend that his tty is any character device on the @@ -43,7 +45,7 @@ # emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.20_p1" + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.20_p2" @@ -51,7 +53,10 @@ CVE-2017-1000367 + + Qualys Security Advisory for CVE-2017-1000367 + K_F - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-01.xml new file mode 100644 index 0000000000..4d79ea91fd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-01.xml @@ -0,0 +1,61 @@ + + + + RubyGems: Multiple vulnerabilities + Multiple vulnerabilities were found in RubyGems, the worst of which + allows execution of arbitrary code. + + rubygems + 2017-10-08 + 2017-10-08: 1 + 629230 + remote + + + 2.6.13 + 2.6.13 + + + +

RubyGems is a sophisticated package manager for Ruby.

+
+ +

Multiple vulnerabilities have been discovered in RubyGems. Please review + the referenced CVE identifiers for details. +

+ +
+ +

A remote attacker, by enticing a user to install a specially crafted + gem, could possibly execute arbitrary code with the privileges of the + process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All RubyGems users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-ruby/rubygems-2.6.13" + +
+ + + CVE-2017-0899 + + + CVE-2017-0900 + + + CVE-2017-0901 + + + CVE-2017-0902 + + + chrisadr + chrisadr + diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-02.xml new file mode 100644 index 0000000000..f44b167e62 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-02.xml @@ -0,0 +1,53 @@ + + + + file: Stack-based buffer overflow + A stack-based buffer overflow was found in file, possibly resulting + in the execution of arbitrary code. + + file + 2017-10-08 + 2017-10-08: 1 + 629872 + remote + + + 5.32 + 5.32 + + + +

file is a utility that guesses a file format by scanning binary data for + patterns. +

+
+ +

An issue discovered in file allows attackers to write 20 bytes to the + stack buffer via a specially crafted .notes section. +

+
+ +

A remote attacker, by using a specially crafted .notes section in an ELF + binary, could execute arbitrary code or cause a Denial of Service + condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All file users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/file-5.32" + +
+ + + CVE-2017-1000249 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-03.xml new file mode 100644 index 0000000000..d55c1d1f47 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-03.xml @@ -0,0 +1,59 @@ + + + + ICU: Multiple vulnerabilities + Multiple vulnerabilities have been found in ICU, the worst of which + could allow remote code execution. + + icu + 2017-10-08 + 2017-10-08: 1 + 616468 + remote + + + 58.2-r1 + 58.2-r1 + + + +

ICU is a mature, widely used set of C/C++ and Java libraries providing + Unicode and Globalization support for software applications. +

+
+ +

Multiple vulnerabilities have been discovered in ICU. Please review the + referenced CVE identifiers for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All ICU users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/icu-58.2-r1" + + +

Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +

+
+ + + CVE-2017-7867 + + + CVE-2017-7868 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-04.xml new file mode 100644 index 0000000000..a6ad46e921 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-04.xml @@ -0,0 +1,52 @@ + + + + sudo: Privilege escalation + A vulnerability in sudo allows local users to gain root privileges. + sudo + 2017-10-08 + 2017-10-08: 1 + 620482 + local + + + 1.8.20_p2 + 1.8.20_p2 + + + +

sudo (su “do”) allows a system administrator to delegate authority + to give certain users (or groups of users) the ability to run some (or + all) commands as root or another user while providing an audit trail of + the commands and their arguments. +

+
+ +

The fix present in app-admin/sudo-1.8.20_p1 (GLSA 201705-15) was + incomplete as it did not address the problem of a command with a newline + in the name. +

+
+ +

A local attacker could execute arbitrary code with root privileges.

+
+ +

There is no known workaround at this time.

+
+ +

All sudo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.20_p2" + +
+ + + CVE-2017-1000368 + + GLSA 201705-15 + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-05.xml new file mode 100644 index 0000000000..9fc4492741 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-05.xml @@ -0,0 +1,50 @@ + + + + Munin: Arbitrary file write + A vulnerability in Munin allows local attackers to overwrite any + file accessible to the www-data user. + + munin + 2017-10-08 + 2017-10-08: 1 + 610602 + local + + + 2.0.33 + 2.0.33 + + + +

Munin is an open source server monitoring tool.

+
+ +

When Munin is compiled with CGI graphics enabled then the files + accessible to the www-data user can be overwritten. +

+
+ +

A local attacker, by setting multiple upper_limit GET parameters, could + overwrite files accessible to the www-user. +

+
+ +

There is no known workaround at this time.

+
+ +

All Munin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/munin-2.0.33" + +
+ + + CVE-2017-6188 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-06.xml new file mode 100644 index 0000000000..2ffbb73c66 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-06.xml @@ -0,0 +1,101 @@ + + + + PostgreSQL: Multiple vulnerabilities + Multiple vulnerabilities have been found in PostgreSQL, the worst + of which could result in privilege escalation. + + postgresql + 2017-10-08 + 2017-10-08: 1 + 618462 + 627462 + remote + + + 9.6.4 + 9.5.8 + 9.4.13 + 9.3.18 + 9.2.22 + 9.6.4 + + + +

PostgreSQL is an open source object-relational database management + system. +

+
+ +

Multiple vulnerabilities have been discovered in PostgreSQL. Please + review the referenced CVE identifiers for details. +

+
+ +

A remote attacker could escalate privileges, cause a Denial of Service + condition, obtain passwords, cause a loss in information, or obtain + sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All PostgreSQL 9.6.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.6.4" + + +

All PostgreSQL 9.5.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.5.8" + + +

All PostgreSQL 9.4.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.4.13" + + +

All PostgreSQL 9.3.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.3.18" + + +

All PostgreSQL 9.2.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.2.22" + +
+ + + CVE-2017-7484 + + + CVE-2017-7485 + + + CVE-2017-7486 + + + CVE-2017-7546 + + + CVE-2017-7547 + + + CVE-2017-7548 + + + BlueKnight + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-07.xml new file mode 100644 index 0000000000..8f01fb85b8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-07.xml @@ -0,0 +1,54 @@ + + + + OCaml: Privilege escalation + A vulnerability in OCaml may allow local users to gain root + privileges. + + + ocaml + 2017-10-08 + 2017-10-08: 1 + 622544 + remote + + + 4.04.2 + 4.04.2 + + + +

OCaml is a high-level, strongly-typed, functional, and object-oriented + programming language from the ML family of languages. +

+
+ +

A bad sanitization of environment variables: CAML_CPLUGINS, + CAML_NATIVE_CPLUGINS and CAML_BYTE_CPLUGINS in the OCaml compiler allows + the execution of raised privileges via external code. +

+
+ +

A local attacker, by using specially crafted environment variables, + could possibly escalate privileges to the root group. +

+
+ +

There is no known workaround at this time.

+
+ +

All OCaml users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/ocaml-4.04.2" + +
+ + + CVE-2017-9772 + + + b-man + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-08.xml new file mode 100644 index 0000000000..ea0a9f6277 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-08.xml @@ -0,0 +1,56 @@ + + + + Pacemaker: Multiple vulnerabilities + Multiple vulnerabilities have been found in Pacemaker, the worst of + which could result in the execution of arbitrary code. + + pacemaker + 2017-10-08 + 2017-10-08: 1 + 546550 + 599194 + local, remote + + + 1.1.16 + 1.1.16 + + + +

Pacemaker is an Open Source, High Availability resource manager suitable + for both small and large clusters. +

+
+ +

Multiple vulnerabilities have been discovered in Pacemaker. Please + review the referenced CVE identifiers for details. +

+
+ +

A remote attacker could execute arbitrary code or a local attacker could + escalate privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All Pacemaker users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-cluster/pacemaker-1.1.16 " + +
+ + + CVE-2015-1867 + + + CVE-2016-7035 + + + BlueKnight + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-09.xml new file mode 100644 index 0000000000..09e2c7dce9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-09.xml @@ -0,0 +1,66 @@ + + + + PCRE2: Multiple vulnerabilities + Multiple vulnerabilities have been found in PCRE2, the worst of + which may allow remote attackers to execute arbitrary code. + + libpcre2 + 2017-10-08 + 2017-10-08: 1 + 614050 + 617942 + 617944 + remote + + + 10.30 + 10.30 + + + +

PCRE2 is a project based on PCRE (Perl Compatible Regular Expressions) + which has a new and revised API. +

+
+ +

Multiple vulnerabilities have been discovered in PCRE2. Please review + the referenced CVE identifiers for details. +

+ +
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, or have + other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All PCRE2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libpcre2-10.30" + + +

Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +

+
+ + + CVE-2017-7186 + + + CVE-2017-8399 + + + CVE-2017-8786 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 4a930ded7f..4996685384 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Fri, 29 Sep 2017 17:39:27 +0000 +Mon, 09 Oct 2017 18:08:59 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index de145b11d5..9a85e68140 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -612f47deca97e8d7ffc2100c1dbc82a602abdf39 1506632095 2017-09-28T20:54:55+00:00 +6563aef7bcf2b256b39e321f440df3efe76f81f4 1507473808 2017-10-08T14:43:28+00:00 From 5638e2f91eefb2692b2a288599298803135d227d Mon Sep 17 00:00:00 2001 From: David Michael Date: Mon, 9 Oct 2017 11:53:24 -0700 Subject: [PATCH 10/14] bump(sys-apps/file): sync with upstream --- .../metadata/md5-cache/sys-apps/file-5.25 | 13 --- .../metadata/md5-cache/sys-apps/file-5.29 | 13 --- .../metadata/md5-cache/sys-apps/file-5.32 | 14 +++ .../metadata/md5-cache/sys-apps/file-9999 | 15 +-- .../portage-stable/sys-apps/file/Manifest | 9 +- .../sys-apps/file/file-5.25.ebuild | 103 ------------------ .../{file-5.29.ebuild => file-5.32.ebuild} | 47 ++++---- .../sys-apps/file/file-9999.ebuild | 49 +++++---- 8 files changed, 80 insertions(+), 183 deletions(-) delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.25 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.29 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.32 delete mode 100644 sdk_container/src/third_party/portage-stable/sys-apps/file/file-5.25.ebuild rename sdk_container/src/third_party/portage-stable/sys-apps/file/{file-5.29.ebuild => file-5.32.ebuild} (64%) diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.25 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.25 deleted file mode 100644 index 195b3d8608..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.25 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=python? ( python_targets_pypy? ( >=virtual/pypy-5:0= ) python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) python_targets_python3_4? ( dev-lang/python:3.4 ) >=dev-lang/python-exec-2:=[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-)] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) >=app-portage/elt-patches-20170317 -DESCRIPTION=identify a file's format by scanning binary data for patterns -EAPI=5 -HOMEPAGE=http://www.darwinsys.com/file/ -IUSE=python static-libs zlib python_targets_pypy python_targets_python2_7 python_targets_python3_4 abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd -LICENSE=BSD-2 -RDEPEND=python? ( python_targets_pypy? ( >=virtual/pypy-5:0= ) python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) python_targets_python3_4? ( dev-lang/python:3.4 ) >=dev-lang/python-exec-2:=[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-)] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) python? ( !dev-python/python-magic ) -SLOT=0 -SRC_URI=ftp://ftp.astron.com/pub/file/file-5.25.tar.gz ftp://ftp.gw.com/mirrors/pub/unix/file/file-5.25.tar.gz -_eclasses_=distutils-r1 372bbe39047c0a2550319a3a82f3e063 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 multiprocessing 284a473719153462f3e974d86c8cb81c python-r1 e9350ec46bb5c9f3504b4fbe8b8d8987 python-utils-r1 c9de01becf9df3f8c10aeec3dc693f5d toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 xdg-utils b9389dfad0ee8f8e0b2a41b79fcf7120 -_md5_=ef63135f517e759435d0a3a9bda52397 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.29 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.29 deleted file mode 100644 index 9bd96b0406..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.29 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=python? ( python_targets_pypy? ( >=virtual/pypy-5:0= ) python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) python_targets_python3_4? ( dev-lang/python:3.4 ) python_targets_python3_5? ( dev-lang/python:3.5 ) >=dev-lang/python-exec-2:=[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-)] dev-python/setuptools[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-)] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) >=app-portage/elt-patches-20170317 -DESCRIPTION=identify a file's format by scanning binary data for patterns -EAPI=5 -HOMEPAGE=http://www.darwinsys.com/file/ http://mx.gw.com/pipermail/file/ -IUSE=python static-libs zlib python_targets_pypy python_targets_python2_7 python_targets_python3_4 python_targets_python3_5 abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris -LICENSE=BSD-2 -RDEPEND=python? ( python_targets_pypy? ( >=virtual/pypy-5:0= ) python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) python_targets_python3_4? ( dev-lang/python:3.4 ) python_targets_python3_5? ( dev-lang/python:3.5 ) >=dev-lang/python-exec-2:=[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-)] dev-python/setuptools[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-)] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) python? ( !dev-python/python-magic ) -SLOT=0 -SRC_URI=ftp://ftp.astron.com/pub/file/file-5.29.tar.gz ftp://ftp.gw.com/mirrors/pub/unix/file/file-5.29.tar.gz -_eclasses_=distutils-r1 372bbe39047c0a2550319a3a82f3e063 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 multiprocessing 284a473719153462f3e974d86c8cb81c python-r1 e9350ec46bb5c9f3504b4fbe8b8d8987 python-utils-r1 c9de01becf9df3f8c10aeec3dc693f5d toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 xdg-utils b9389dfad0ee8f8e0b2a41b79fcf7120 -_md5_=736028bacb4b1940e5b5f12579e1e6fe diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.32 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.32 new file mode 100644 index 0000000000..b764079c2b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-5.32 @@ -0,0 +1,14 @@ +DEFINED_PHASES=compile configure install prepare test +DEPEND=python? ( python_targets_pypy? ( >=virtual/pypy-5:0= ) python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) python_targets_python3_4? ( dev-lang/python:3.4 ) python_targets_python3_5? ( dev-lang/python:3.5 ) python_targets_python3_6? ( dev-lang/python:3.6 ) >=dev-lang/python-exec-2:=[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,python_targets_python3_6(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-),-python_single_target_python3_6(-)] dev-python/setuptools[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,python_targets_python3_6(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-),-python_single_target_python3_6(-)] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) >=app-portage/elt-patches-20170317 +DESCRIPTION=identify a file's format by scanning binary data for patterns +EAPI=6 +HOMEPAGE=https://www.darwinsys.com/file/ +IUSE=python static-libs zlib python_targets_pypy python_targets_python2_7 python_targets_python3_4 python_targets_python3_5 python_targets_python3_6 abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~x64-cygwin ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +LICENSE=BSD-2 +RDEPEND=python? ( python_targets_pypy? ( >=virtual/pypy-5:0= ) python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) python_targets_python3_4? ( dev-lang/python:3.4 ) python_targets_python3_5? ( dev-lang/python:3.5 ) python_targets_python3_6? ( dev-lang/python:3.6 ) >=dev-lang/python-exec-2:=[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,python_targets_python3_6(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-),-python_single_target_python3_6(-)] dev-python/setuptools[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,python_targets_python3_6(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-),-python_single_target_python3_6(-)] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) python? ( !dev-python/python-magic ) +REQUIRED_USE=python? ( || ( python_targets_pypy python_targets_python2_7 python_targets_python3_4 python_targets_python3_5 python_targets_python3_6 ) ) +SLOT=0 +SRC_URI=ftp://ftp.astron.com/pub/file/file-5.32.tar.gz +_eclasses_=distutils-r1 372bbe39047c0a2550319a3a82f3e063 libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 multiprocessing 284a473719153462f3e974d86c8cb81c python-r1 e9350ec46bb5c9f3504b4fbe8b8d8987 python-utils-r1 c9de01becf9df3f8c10aeec3dc693f5d toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 xdg-utils b9389dfad0ee8f8e0b2a41b79fcf7120 +_md5_=cf9df3a682388cb8557e3a7d263b489f diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-9999 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-9999 index ae75be4a63..56e1384617 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-9999 +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/sys-apps/file-9999 @@ -1,11 +1,12 @@ DEFINED_PHASES=compile configure install prepare test unpack -DEPEND=python? ( python_targets_pypy? ( >=virtual/pypy-5:0= ) python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) python_targets_python3_4? ( dev-lang/python:3.4 ) python_targets_python3_5? ( dev-lang/python:3.5 ) >=dev-lang/python-exec-2:=[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-)] dev-python/setuptools[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-)] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 >=dev-vcs/git-1.8.2.1 +DEPEND=python? ( python_targets_pypy? ( >=virtual/pypy-5:0= ) python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) python_targets_python3_4? ( dev-lang/python:3.4 ) python_targets_python3_5? ( dev-lang/python:3.5 ) python_targets_python3_6? ( dev-lang/python:3.6 ) >=dev-lang/python-exec-2:=[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,python_targets_python3_6(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-),-python_single_target_python3_6(-)] dev-python/setuptools[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,python_targets_python3_6(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-),-python_single_target_python3_6(-)] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 >=dev-vcs/git-1.8.2.1 DESCRIPTION=identify a file's format by scanning binary data for patterns -EAPI=5 -HOMEPAGE=http://www.darwinsys.com/file/ http://mx.gw.com/pipermail/file/ -IUSE=python static-libs zlib python_targets_pypy python_targets_python2_7 python_targets_python3_4 python_targets_python3_5 abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +EAPI=6 +HOMEPAGE=https://www.darwinsys.com/file/ +IUSE=python static-libs zlib python_targets_pypy python_targets_python2_7 python_targets_python3_4 python_targets_python3_5 python_targets_python3_6 abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 LICENSE=BSD-2 -RDEPEND=python? ( python_targets_pypy? ( >=virtual/pypy-5:0= ) python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) python_targets_python3_4? ( dev-lang/python:3.4 ) python_targets_python3_5? ( dev-lang/python:3.5 ) >=dev-lang/python-exec-2:=[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-)] dev-python/setuptools[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-)] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) python? ( !dev-python/python-magic ) +RDEPEND=python? ( python_targets_pypy? ( >=virtual/pypy-5:0= ) python_targets_python2_7? ( >=dev-lang/python-2.7.5-r2:2.7 ) python_targets_python3_4? ( dev-lang/python:3.4 ) python_targets_python3_5? ( dev-lang/python:3.5 ) python_targets_python3_6? ( dev-lang/python:3.6 ) >=dev-lang/python-exec-2:=[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,python_targets_python3_6(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-),-python_single_target_python3_6(-)] dev-python/setuptools[python_targets_pypy(-)?,python_targets_python2_7(-)?,python_targets_python3_4(-)?,python_targets_python3_5(-)?,python_targets_python3_6(-)?,-python_single_target_pypy(-),-python_single_target_python2_7(-),-python_single_target_python3_4(-),-python_single_target_python3_5(-),-python_single_target_python3_6(-)] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) python? ( !dev-python/python-magic ) +REQUIRED_USE=python? ( || ( python_targets_pypy python_targets_python2_7 python_targets_python3_4 python_targets_python3_5 python_targets_python3_6 ) ) SLOT=0 -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 distutils-r1 372bbe39047c0a2550319a3a82f3e063 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea git-r3 cbafa3261c37c7e3af44bb16a34ea390 libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 multiprocessing 284a473719153462f3e974d86c8cb81c python-r1 e9350ec46bb5c9f3504b4fbe8b8d8987 python-utils-r1 c9de01becf9df3f8c10aeec3dc693f5d toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 xdg-utils b9389dfad0ee8f8e0b2a41b79fcf7120 -_md5_=08e10b0bb17e4e2b5d634a1a2d304a2a +_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 distutils-r1 372bbe39047c0a2550319a3a82f3e063 git-r3 cbafa3261c37c7e3af44bb16a34ea390 libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 multiprocessing 284a473719153462f3e974d86c8cb81c python-r1 e9350ec46bb5c9f3504b4fbe8b8d8987 python-utils-r1 c9de01becf9df3f8c10aeec3dc693f5d toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 xdg-utils b9389dfad0ee8f8e0b2a41b79fcf7120 +_md5_=75476a9218dec50753f7bf27175420a3 diff --git a/sdk_container/src/third_party/portage-stable/sys-apps/file/Manifest b/sdk_container/src/third_party/portage-stable/sys-apps/file/Manifest index e80d93f7cf..3074aa5ff9 100644 --- a/sdk_container/src/third_party/portage-stable/sys-apps/file/Manifest +++ b/sdk_container/src/third_party/portage-stable/sys-apps/file/Manifest @@ -1,8 +1 @@ -DIST file-5.25.tar.gz 739485 SHA256 3735381563f69fb4239470b8c51b876a80425348b8285a7cded8b61d6b890eca SHA512 4a5176a7e80df2bb7e45916490433d22eb98a442d49d04146afcbdcf92ff619ea3e73e95c8991e6b6a0628efb9d127bfa4aafc1cae523f8261ca693bc5e13402 WHIRLPOOL 70c682ff05e58487a551cd98091e27272baa41e034157bec93ac4d69b2f3e93caed40f37d64ef698527124e86ba4a5cb5975abacfd9eb30e4d3583262e5f0b0b -DIST file-5.29.tar.gz 783919 SHA256 ea661277cd39bf8f063d3a83ee875432cc3680494169f952787e002bdd3884c0 SHA512 58db17a6bea5d71723f3f7d25300985b3aa78f27fdb1e8b9bb41e61dc325236acaca7c1475cc2725ed672151e1764892dff83d37c24313fe26f45ee3388d4462 WHIRLPOOL e80f117f3db08707c197db2f30aa81407c85b6a5ff0125b41a311c1d6f7dfbf3c0a315ebd1115bef3eecf05beed1fad3570a90d047ecbc7d3a29adcb8ea5c094 -EBUILD file-5.25.ebuild 2540 SHA256 b7df515630aea11c6a35ac880ae31368c19803f8c93b6303368dd31561dd2f8a SHA512 67a20d69429a4e00570aff262eb3d8034f31e14f5ceb90dd6749667ca09af707f92f85b6459a62ad1b06fe5daa5968483b1d97897b7245593dac052d9c0bade1 WHIRLPOOL a28ffe509238ca3a816a2968953f976acba219d2627e064c0b73935ebcfa7e694f769f3d9574db75b593fe74b3d09f12738f2e1f4c2cd8812943ee683a601cdd -EBUILD file-5.29.ebuild 2900 SHA256 92a322688f7508007a2a9b923c678a57215cf44b395f6ebcef018f691390aee3 SHA512 ad00cb6645040aa029b8ecce7aef7e01b5c2c25e0dfef48ea038cc3ad918e6f8bf0464c6484e9c389eb9109fe3dbf330a031ecc7bfcab88e0469e4ad108d2fc9 WHIRLPOOL e3db40cfee0ec9bf278761fcde6ef9537bc756abaeab3cf88cd8bfa23a1fccae2a24233e062747d644cc188c938bcdfcb5b7fc485576836c7096e35b5eed21ad -EBUILD file-9999.ebuild 2685 SHA256 627d837e65118f014cb3265d2b1f7c8b6c2526cdcb2246ae14d89e4f2cd691bf SHA512 d9470d4112bdc36ef0c337e5bb4e7334a94d31a98cb85a2a63c3251f63f7eb60bba05cc434cf189e888f2409b1e36bb8b990fa87f069f897ca6e234b158fb6d2 WHIRLPOOL c2d4258ea9324e7829144c214769501fa324a45a732f2b4ccca85cb45aea5f969e8b8203b624a99ef50889c704f93d6f4633d11e25f852cc823234836179efcc -MISC ChangeLog 7969 SHA256 81987358deece240892e7fd2faeddc5b422006e3d776cbaa126df3879c5ed38d SHA512 76ded63c89f1363d92f2f58b05529a36060bf9de298dc1aee468c69e8979595c1734baaacb0ad91fe0dd4dbfe66f67c6f2906abbf284ffacb6dc46f1b5f223b1 WHIRLPOOL 3cdbadc9fb4f56e842ec9bc4a56d4857998cfa140986f87cb67093c840d125c5961160c4bff2881f274821520521f2e4c63023ea312277a7aa27b3016fdfb20d -MISC ChangeLog-2015 37841 SHA256 616fa7d579ad222923b2d83ebe972823d5ebed3ac2ab950dbf51b6243477d303 SHA512 78d34734c5032d100fdd143c88ec82e94db7f4fba7f1bdf9e031b69c3d9aa018ab62f69e65fb99f6b4daee2ea936678e94a00a6175474c7b59ef71eb3133fe41 WHIRLPOOL 024d06338949e908f6effefab9f043ff2335b0849b3e4088e46c85763bbb84ceeb8ec7ab3a1e22c881143ce27daa165dc3f5757689b5fd02bcfa03b26c013e05 -MISC metadata.xml 316 SHA256 8027101dc26be73bf16fbdfab8a0d3470305db19f8b8396a43c794ce8a5ddc67 SHA512 8b334ba7a606600ad0548ef0ab7aa809a8fda040104d1663bfe179828a831e621128145325aba158fccf94a7f9a3ca1c9164db979a85e639403a079f0deb622a WHIRLPOOL e1267e2af379355a4e7f79df31caa262aac1a7d887ec6d17ec0c60bc61c59c1e30b51e0b966bd7d5e6796fc65814dd87de20d4c07d1165e34f6020b9fb8ed8ec +DIST file-5.32.tar.gz 797025 SHA256 8639dc4d1b21e232285cd483604afc4a6ee810710e00e579dbe9591681722b50 SHA512 315343229fa196335389544ee8010e9e80995ef4721938492dedcfb0465dfc45e1feb96f26dfe53cab484fb5d9bac54d2d72917fbfd28a1d998c6ad8c8f9792f WHIRLPOOL 557b1dba186f263f0c3199952e50b2a167cc9c2cf32286e87d9d2e8b31914765a659d167974ece3d8d43701a611d616847b306fcbd506333bdb153ebc07fbcc4 diff --git a/sdk_container/src/third_party/portage-stable/sys-apps/file/file-5.25.ebuild b/sdk_container/src/third_party/portage-stable/sys-apps/file/file-5.25.ebuild deleted file mode 100644 index 4fbe5e7503..0000000000 --- a/sdk_container/src/third_party/portage-stable/sys-apps/file/file-5.25.ebuild +++ /dev/null @@ -1,103 +0,0 @@ -# Copyright 1999-2017 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="5" -PYTHON_COMPAT=( python{2_7,3_4} pypy ) -DISTUTILS_OPTIONAL=1 - -inherit eutils distutils-r1 libtool toolchain-funcs multilib-minimal - -if [[ ${PV} == "9999" ]] ; then - EGIT_REPO_URI="git://github.com/glensc/file.git" - inherit autotools git-r3 -else - SRC_URI="ftp://ftp.astron.com/pub/file/${P}.tar.gz - ftp://ftp.gw.com/mirrors/pub/unix/file/${P}.tar.gz" - KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd" -fi - -DESCRIPTION="identify a file's format by scanning binary data for patterns" -HOMEPAGE="http://www.darwinsys.com/file/" - -LICENSE="BSD-2" -SLOT="0" -IUSE="python static-libs zlib" - -DEPEND="python? ( ${PYTHON_DEPS} ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] )" -RDEPEND="${DEPEND} - python? ( !dev-python/python-magic )" - -src_prepare() { - [[ ${PV} == "9999" ]] && eautoreconf - elibtoolize - - # don't let python README kill main README #60043 - mv python/README{,.python} -} - -multilib_src_configure() { - ECONF_SOURCE=${S} \ - ac_cv_header_zlib_h=$(usex zlib) \ - ac_cv_lib_z_gzopen=$(usex zlib) - econf \ - $(use_enable static-libs static) -} - -src_configure() { - # when cross-compiling, we need to build up our own file - # because people often don't keep matching host/target - # file versions #362941 - if tc-is-cross-compiler && ! ROOT=/ has_version ~${CATEGORY}/${P} ; then - mkdir -p "${WORKDIR}"/build - cd "${WORKDIR}"/build - tc-export_build_env BUILD_C{C,XX} - ECONF_SOURCE=${S} \ - ac_cv_header_zlib_h=no \ - ac_cv_lib_z_gzopen=no \ - CHOST=${CBUILD} \ - CFLAGS=${BUILD_CFLAGS} \ - CXXFLAGS=${BUILD_CXXFLAGS} \ - CPPFLAGS=${BUILD_CPPFLAGS} \ - LDFLAGS="${BUILD_LDFLAGS} -static" \ - CC=${BUILD_CC} \ - CXX=${BUILD_CXX} \ - econf --disable-shared - fi - - multilib-minimal_src_configure -} - -multilib_src_compile() { - if multilib_is_native_abi ; then - emake - else - emake -C src libmagic.la - fi -} - -src_compile() { - if tc-is-cross-compiler && ! ROOT=/ has_version "~${CATEGORY}/${P}" ; then - emake -C "${WORKDIR}"/build/src file - PATH="${WORKDIR}/build/src:${PATH}" - fi - multilib-minimal_src_compile - - use python && cd python && distutils-r1_src_compile -} - -multilib_src_install() { - if multilib_is_native_abi ; then - default - else - emake -C src install-{includeHEADERS,libLTLIBRARIES} DESTDIR="${D}" - fi -} - -multilib_src_install_all() { - dodoc ChangeLog MAINT README - - use python && cd python && distutils-r1_src_install - prune_libtool_files -} diff --git a/sdk_container/src/third_party/portage-stable/sys-apps/file/file-5.29.ebuild b/sdk_container/src/third_party/portage-stable/sys-apps/file/file-5.32.ebuild similarity index 64% rename from sdk_container/src/third_party/portage-stable/sys-apps/file/file-5.29.ebuild rename to sdk_container/src/third_party/portage-stable/sys-apps/file/file-5.32.ebuild index 50ff5f20dc..43c64a51de 100644 --- a/sdk_container/src/third_party/portage-stable/sys-apps/file/file-5.29.ebuild +++ b/sdk_container/src/third_party/portage-stable/sys-apps/file/file-5.32.ebuild @@ -1,28 +1,28 @@ -# Copyright 1999-2016 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -EAPI="5" +EAPI=6 -PYTHON_COMPAT=( python{2_7,3_4,3_5} pypy ) +PYTHON_COMPAT=( python2_7 python3_{4,5,6} pypy ) DISTUTILS_OPTIONAL=1 -inherit eutils distutils-r1 libtool toolchain-funcs multilib-minimal +inherit distutils-r1 libtool ltprune toolchain-funcs multilib-minimal if [[ ${PV} == "9999" ]] ; then - EGIT_REPO_URI="git://github.com/glensc/file.git" + EGIT_REPO_URI="https://github.com/glensc/file.git" inherit autotools git-r3 else - SRC_URI="ftp://ftp.astron.com/pub/file/${P}.tar.gz - ftp://ftp.gw.com/mirrors/pub/unix/file/${P}.tar.gz" - KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x64-freebsd ~x86-freebsd ~hppa-hpux ~ia64-hpux ~x86-interix ~amd64-linux ~ia64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" + SRC_URI="ftp://ftp.astron.com/pub/file/${P}.tar.gz" + KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~ppc-aix ~x64-cygwin ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" fi DESCRIPTION="identify a file's format by scanning binary data for patterns" -HOMEPAGE="http://www.darwinsys.com/file/ http://mx.gw.com/pipermail/file/" +HOMEPAGE="https://www.darwinsys.com/file/" LICENSE="BSD-2" SLOT="0" IUSE="python static-libs zlib" +REQUIRED_USE="python? ( ${PYTHON_REQUIRED_USE} )" DEPEND=" python? ( @@ -34,19 +34,22 @@ RDEPEND="${DEPEND} python? ( !dev-python/python-magic )" src_prepare() { + default + [[ ${PV} == "9999" ]] && eautoreconf elibtoolize # don't let python README kill main README #60043 - mv python/README{,.python} + mv python/README{,.python} || die } multilib_src_configure() { - ECONF_SOURCE=${S} \ - econf \ - --enable-fsect-man5 \ - $(use_enable static-libs static) \ + local myeconfargs=( + --enable-fsect-man5 + $(use_enable static-libs static) $(use_enable zlib) + ) + ECONF_SOURCE="${S}" econf "${myeconfargs[@]}" } src_configure() { @@ -54,8 +57,8 @@ src_configure() { # because people often don't keep matching host/target # file versions #362941 if tc-is-cross-compiler && ! ROOT=/ has_version ~${CATEGORY}/${P} ; then - mkdir -p "${WORKDIR}"/build - cd "${WORKDIR}"/build + mkdir -p "${WORKDIR}"/build || die + cd "${WORKDIR}"/build || die tc-export_build_env BUILD_C{C,XX} ECONF_SOURCE=${S} \ ac_cv_header_zlib_h=no \ @@ -77,7 +80,7 @@ multilib_src_compile() { if multilib_is_native_abi ; then emake else - cd src + cd src || die emake magic.h #586444 emake libmagic.la fi @@ -91,7 +94,10 @@ src_compile() { fi multilib-minimal_src_compile - use python && cd python && distutils-r1_src_compile + if use python ; then + cd python || die + distutils-r1_src_compile + fi } multilib_src_install() { @@ -105,6 +111,9 @@ multilib_src_install() { multilib_src_install_all() { dodoc ChangeLog MAINT README - use python && cd python && distutils-r1_src_install + if use python ; then + cd python || die + distutils-r1_src_install + fi prune_libtool_files } diff --git a/sdk_container/src/third_party/portage-stable/sys-apps/file/file-9999.ebuild b/sdk_container/src/third_party/portage-stable/sys-apps/file/file-9999.ebuild index c144b01282..4f3a87f8bf 100644 --- a/sdk_container/src/third_party/portage-stable/sys-apps/file/file-9999.ebuild +++ b/sdk_container/src/third_party/portage-stable/sys-apps/file/file-9999.ebuild @@ -1,28 +1,28 @@ -# Copyright 1999-2016 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -EAPI="5" +EAPI=6 -PYTHON_COMPAT=( python{2_7,3_4,3_5} pypy ) +PYTHON_COMPAT=( python2_7 python3_{4,5,6} pypy ) DISTUTILS_OPTIONAL=1 -inherit eutils distutils-r1 libtool toolchain-funcs multilib-minimal +inherit distutils-r1 libtool ltprune toolchain-funcs multilib-minimal if [[ ${PV} == "9999" ]] ; then - EGIT_REPO_URI="git://github.com/glensc/file.git" + EGIT_REPO_URI="https://github.com/glensc/file.git" inherit autotools git-r3 else - SRC_URI="ftp://ftp.astron.com/pub/file/${P}.tar.gz - ftp://ftp.gw.com/mirrors/pub/unix/file/${P}.tar.gz" - KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd" + SRC_URI="ftp://ftp.astron.com/pub/file/${P}.tar.gz" + KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~ppc-aix ~x64-cygwin ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~m68k-mint ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" fi DESCRIPTION="identify a file's format by scanning binary data for patterns" -HOMEPAGE="http://www.darwinsys.com/file/ http://mx.gw.com/pipermail/file/" +HOMEPAGE="https://www.darwinsys.com/file/" LICENSE="BSD-2" SLOT="0" IUSE="python static-libs zlib" +REQUIRED_USE="python? ( ${PYTHON_REQUIRED_USE} )" DEPEND=" python? ( @@ -34,19 +34,22 @@ RDEPEND="${DEPEND} python? ( !dev-python/python-magic )" src_prepare() { + default + [[ ${PV} == "9999" ]] && eautoreconf elibtoolize # don't let python README kill main README #60043 - mv python/README{,.python} + mv python/README{,.python} || die } multilib_src_configure() { - ECONF_SOURCE=${S} \ - econf \ - --enable-fsect-man5 \ - $(use_enable static-libs static) \ + local myeconfargs=( + --enable-fsect-man5 + $(use_enable static-libs static) $(use_enable zlib) + ) + ECONF_SOURCE="${S}" econf "${myeconfargs[@]}" } src_configure() { @@ -54,8 +57,8 @@ src_configure() { # because people often don't keep matching host/target # file versions #362941 if tc-is-cross-compiler && ! ROOT=/ has_version ~${CATEGORY}/${P} ; then - mkdir -p "${WORKDIR}"/build - cd "${WORKDIR}"/build + mkdir -p "${WORKDIR}"/build || die + cd "${WORKDIR}"/build || die tc-export_build_env BUILD_C{C,XX} ECONF_SOURCE=${S} \ ac_cv_header_zlib_h=no \ @@ -77,7 +80,7 @@ multilib_src_compile() { if multilib_is_native_abi ; then emake else - cd src + cd src || die emake magic.h #586444 emake libmagic.la fi @@ -91,20 +94,26 @@ src_compile() { fi multilib-minimal_src_compile - use python && cd python && distutils-r1_src_compile + if use python ; then + cd python || die + distutils-r1_src_compile + fi } multilib_src_install() { if multilib_is_native_abi ; then default else - emake -C src install-{includeHEADERS,libLTLIBRARIES} DESTDIR="${D}" + emake -C src install-{nodist_includeHEADERS,libLTLIBRARIES} DESTDIR="${D}" fi } multilib_src_install_all() { dodoc ChangeLog MAINT README - use python && cd python && distutils-r1_src_install + if use python ; then + cd python || die + distutils-r1_src_install + fi prune_libtool_files } From d5ee825435313e359b076d4e1d34cc6b737ef114 Mon Sep 17 00:00:00 2001 From: David Michael Date: Sun, 15 Oct 2017 14:42:24 -0700 Subject: [PATCH 11/14] bump(metadata/glsa): sync with upstream --- .../metadata/glsa/glsa-201705-15.xml | 10 +-- .../metadata/glsa/glsa-201710-10.xml | 82 +++++++++++++++++++ .../metadata/glsa/glsa-201710-11.xml | 63 ++++++++++++++ .../metadata/glsa/glsa-201710-12.xml | 56 +++++++++++++ .../metadata/glsa/glsa-201710-13.xml | 77 +++++++++++++++++ .../metadata/glsa/glsa-201710-14.xml | 72 ++++++++++++++++ .../metadata/glsa/glsa-201710-15.xml | 52 ++++++++++++ .../metadata/glsa/glsa-201710-16.xml | 51 ++++++++++++ .../metadata/glsa/timestamp.chk | 2 +- .../metadata/glsa/timestamp.commit | 2 +- 10 files changed, 460 insertions(+), 7 deletions(-) create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-10.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-11.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-12.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-13.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-14.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-15.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-16.xml diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml index ee01ba3b83..88217e6cdf 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml @@ -5,13 +5,13 @@ A vulnerability in sudo allows local users to gain root privileges. sudo,privilege 2017-05-30 - 2017-10-07: 3 + 2017-10-10: 4 620182 local - 1.8.20_p2 - 1.8.20_p2 + 1.8.20_p1 + 1.8.20_p1 @@ -45,7 +45,7 @@ # emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.20_p2" + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.20_p1" @@ -58,5 +58,5 @@
K_F - K_F + K_F diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-10.xml new file mode 100644 index 0000000000..dd52a7ddc0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-10.xml @@ -0,0 +1,82 @@ + + + + elfutils: Multiple vulnerabilities + Multiple vulnerabilities have been found in elfutils, the worst of + which may allow remote attackers to cause a Denial of Service condition. + + elfutils + 2017-10-13 + 2017-10-13: 1 + 614002 + 614004 + 618004 + remote + + + 0.169-r1 + 0.169-r1 + + + +

Elfutils provides a library and utilities to access, modify and analyse + ELF objects. +

+
+ +

Multiple vulnerabilities have been discovered in elfutils. Please review + the referenced CVE identifiers for details. +

+
+ +

A remote attacker could possibly cause a Denial of Service condition via + specially crafted ELF files. +

+
+ +

There is no known workaround at this time.

+
+ +

All elfutils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/elfutils-0.169-r1" + + +

Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +

+
+ + + CVE-2016-10254 + + + CVE-2016-10255 + + + CVE-2017-7607 + + + CVE-2017-7608 + + + CVE-2017-7609 + + + CVE-2017-7610 + + + CVE-2017-7611 + + + CVE-2017-7612 + + + CVE-2017-7613 + + + b-man + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-11.xml new file mode 100644 index 0000000000..bfaf72daf2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-11.xml @@ -0,0 +1,63 @@ + + + + GNU Libtasn1: Multiple vulnerabilities + Multiple vulnerabilities have been found in GNU Libtasn1, the worst + of which may allow remote attackers to execute arbitrary code. + + libtasn1 + 2017-10-13 + 2017-10-13: 1 + 619686 + 627014 + remote + + + 4.12-r1 + 4.12-r1 + + + +

A library that provides Abstract Syntax Notation One (ASN.1, as + specified by the X.680 ITU-T recommendation) parsing and structures + management, and Distinguished Encoding Rules (DER, as per X.690) encoding + and decoding functions. +

+
+ +

Multiple vulnerabilities have been discovered in GNU Libtasn1. Please + review the referenced CVE identifiers for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, or have + other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All GNU Libtasn1 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libtasn1-4.12-r1" + + +

Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +

+
+ + + CVE-2017-10790 + + + CVE-2017-6891 + + + b-man + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-12.xml new file mode 100644 index 0000000000..a8e08cdda1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-12.xml @@ -0,0 +1,56 @@ + + + + Puppet Agent: Multiple vulnerabilities + Multiple vulnerabilities have been found in Puppet Agent, the worst + of which could result in the execution of arbitrary code. + + puppetagent + 2017-10-13 + 2017-10-13: 1 + 597684 + remote + + + 1.7.1 + 1.7.1 + + + +

Puppet Agent contains Puppet’s main code and all of the dependencies + needed to run it, including Facter, Hiera, and bundled versions of Ruby + and OpenSSL. +

+
+ +

Multiple vulnerabilities have been discovered in Puppet Agent. Please + review the references for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or obtain sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All Puppet Agent users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/puppet-agent-1.7.1" + +
+ + + CVE-2016-5714 + + Puppet + Security Advise Oct 2016 + + + b-man + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-13.xml new file mode 100644 index 0000000000..3e94863a03 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-13.xml @@ -0,0 +1,77 @@ + + + + Graphite: Multiple vulnerabilities + Multiple vulnerabilities have been found in Graphite, the worst of + which could lead to the remote execution of arbitrary code. + + + graphite2 + 2017-10-13 + 2017-10-13: 1 + 621724 + remote + + + 1.3.10 + 1.3.10 + + + +

Graphite is a “smart font” system developed specifically to handle + the complexities of lesser-known languages of the world. +

+
+ +

Multiple vulnerabilities have been discovered in Graphite. Please review + the referenced CVE identifiers for details. +

+ +
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, or have + other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All Graphite users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/graphite2-1.3.10" + + +
+ + + CVE-2017-7771 + + + CVE-2017-7772 + + + CVE-2017-7773 + + + CVE-2017-7774 + + + CVE-2017-7775 + + + CVE-2017-7776 + + + CVE-2017-7777 + + + CVE-2017-7778 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-14.xml new file mode 100644 index 0000000000..f5e253bc8f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-14.xml @@ -0,0 +1,72 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Multiple vulnerabilities have been found in WebkitGTK+, the worst + of which may allow remote attackers to execute arbitrary code. + + webkit-gtk + 2017-10-13 + 2017-10-13: 1 + 626142 + remote + + + 2.16.6 + 2.16.6 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, + suitable for projects requiring any kind of web integration, offers + Webkit’s full functionality and is used on a wide range of systems. +

+
+ +

Multiple vulnerabilities have been discovered in WebkitGTK+. Please + review the references below for details. +

+
+ +

A remote attacker could execute arbitrary code, cause a Denial of + Service condition, bypass intended memory-read restrictions, conduct a + timing side-channel attack to bypass the Same Origin Policy, obtain + sensitive information, or spoof the address bar. +

+ +
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.16.6" + + +

Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +

+
+ + CVE-2017-7006 + CVE-2017-7011 + CVE-2017-7012 + CVE-2017-7018 + CVE-2017-7019 + CVE-2017-7020 + CVE-2017-7030 + CVE-2017-7034 + CVE-2017-7037 + CVE-2017-7038 + CVE-2017-7039 + CVE-2017-7040 + CVE-2017-7041 + CVE-2017-7042 + CVE-2017-7043 + + BlueKnight + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-15.xml new file mode 100644 index 0000000000..60c2f5ccd1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-15.xml @@ -0,0 +1,52 @@ + + + + GnuTLS: Denial of Service + A null pointer dereference in GnuTLS might allow attackers to cause + a Denial of Service condition. + + gnutls + 2017-10-15 + 2017-10-15: 1 + 622038 + remote + + + 3.5.13 + 3.5.13 + + + +

GnuTLS is a secure communications library implementing the SSL, TLS and + DTLS protocols and technologies around them. +

+
+ +

A null pointer dereference while decoding a status response TLS + extension with valid contents was discovered in GnuTLS. +

+
+ +

A remote attacker could possibly cause a Denial of Service condition.

+
+ +

There is no known workaround at this time.

+
+ +

All GnuTLS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/gnutls-3.5.13" + + +

Packages which depend on this library may need to be recompiled. Tools + such as revdep-rebuild may assist in identifying some of these packages. +

+
+ + CVE-2017-7507 + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-16.xml new file mode 100644 index 0000000000..2328ec60a1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201710-16.xml @@ -0,0 +1,51 @@ + + + + Shadow: Buffer overflow + A vulnerability found in Shadow may allow remote attackers to cause + a Denial of Service condition or produce other unspecified behaviors. + + shadow + 2017-10-15 + 2017-10-15: 1 + 627044 + remote + + + 4.5 + 4.5 + + + +

Shadow is a set of tools to deal with user accounts.

+
+ +

Malformed input in the newusers tool may produce crashes and other + unspecified behaviors. +

+
+ +

A remote attacker could possibly cause a Denial of Service condition or + bypass privilege boundaries in some web-hosting environments in which a + Control Panel allows an unprivileged user account to create subaccounts. +

+
+ +

There is no known workaround at this time.

+
+ +

All Shadow users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.5" + +
+ + + CVE-2017-12424 + + + b-man + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 4996685384..a3e68c623d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 09 Oct 2017 18:08:59 +0000 +Sun, 15 Oct 2017 21:09:21 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 9a85e68140..a05cb74363 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -6563aef7bcf2b256b39e321f440df3efe76f81f4 1507473808 2017-10-08T14:43:28+00:00 +f5081800804d6a1f4598cbc03e5a8f2664f6a070 1508098974 2017-10-15T20:22:54+00:00 From 7074fca9fa898bafec42290958caa444009905e0 Mon Sep 17 00:00:00 2001 From: David Michael Date: Sun, 15 Oct 2017 14:44:34 -0700 Subject: [PATCH 12/14] bump(dev-libs/elfutils): sync with upstream --- .../dev-libs/elfutils/ChangeLog | 771 ------------------ .../portage-stable/dev-libs/elfutils/Manifest | 29 +- .../dev-libs/elfutils/elfutils-0.158.ebuild | 73 -- .../dev-libs/elfutils/elfutils-0.159.ebuild | 72 -- .../dev-libs/elfutils/elfutils-0.160.ebuild | 72 -- .../dev-libs/elfutils/elfutils-0.161.ebuild | 73 -- .../dev-libs/elfutils/elfutils-0.162.ebuild | 72 -- .../dev-libs/elfutils/elfutils-0.163.ebuild | 72 -- .../elfutils/elfutils-0.169-r1.ebuild | 64 ++ .../elfutils/elfutils-0.170-r1.ebuild | 66 ++ .../dev-libs/elfutils/elfutils-0.170.ebuild | 66 ++ .../files/elfutils-0.118-PaX-support.patch | 8 +- .../files/elfutils-0.143-configure.patch | 22 - .../files/elfutils-0.148-bashifications.patch | 23 - .../files/elfutils-0.150-bashifications.patch | 23 - ...ls-0.158-tests-backtrace-native-core.patch | 46 -- .../elfutils-0.161-libelf-dir-traversal.patch | 51 -- .../dev-libs/elfutils/metadata.xml | 5 +- .../md5-cache/dev-libs/elfutils-0.158 | 13 - .../md5-cache/dev-libs/elfutils-0.159 | 13 - .../md5-cache/dev-libs/elfutils-0.160 | 13 - .../md5-cache/dev-libs/elfutils-0.161 | 13 - .../md5-cache/dev-libs/elfutils-0.162 | 13 - .../md5-cache/dev-libs/elfutils-0.163 | 13 - .../md5-cache/dev-libs/elfutils-0.169-r1 | 13 + .../md5-cache/dev-libs/elfutils-0.170 | 13 + .../md5-cache/dev-libs/elfutils-0.170-r1 | 13 + 27 files changed, 245 insertions(+), 1480 deletions(-) delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/ChangeLog delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.158.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.159.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.160.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.161.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.162.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.163.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.169-r1.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.170-r1.ebuild create mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.170.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.143-configure.patch delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.148-bashifications.patch delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.150-bashifications.patch delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.158-tests-backtrace-native-core.patch delete mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.161-libelf-dir-traversal.patch delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.158 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.159 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.160 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.161 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.162 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.163 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.169-r1 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.170 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.170-r1 diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/ChangeLog b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/ChangeLog deleted file mode 100644 index 2d53940647..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/ChangeLog +++ /dev/null @@ -1,771 +0,0 @@ -# ChangeLog for dev-libs/elfutils -# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/dev-libs/elfutils/ChangeLog,v 1.194 2015/07/22 21:00:18 mrueg Exp $ - - 22 Jul 2015; Manuel Rüger -elfutils-0.146.ebuild, - -elfutils-0.148.ebuild, -elfutils-0.149.ebuild, -elfutils-0.150.ebuild, - -elfutils-0.151.ebuild, -elfutils-0.152-r1.ebuild, -elfutils-0.152.ebuild, - -elfutils-0.153.ebuild, -elfutils-0.154-r1.ebuild, -elfutils-0.154.ebuild, - -elfutils-0.155-r1.ebuild, -elfutils-0.155.ebuild, -elfutils-0.156.ebuild, - -elfutils-0.157.ebuild: - Remove old. - -*elfutils-0.163 (21 Jun 2015) - - 21 Jun 2015; Mike Frysinger +elfutils-0.163.ebuild: - Version bump. - -*elfutils-0.162 (12 Jun 2015) - - 12 Jun 2015; Mike Frysinger +elfutils-0.162.ebuild: - Version bump. - -*elfutils-0.161 (31 Dec 2014) - - 31 Dec 2014; Mike Frysinger +elfutils-0.161.ebuild, - +files/elfutils-0.161-libelf-dir-traversal.patch: - Version bump and libelf directory traversal fix from upstream #534000 by - Agostino Sarubbo. - -*elfutils-0.160 (01 Sep 2014) - - 01 Sep 2014; Mike Frysinger +elfutils-0.160.ebuild: - Version bump. - -*elfutils-0.159 (02 Aug 2014) - - 02 Aug 2014; Mike Frysinger +elfutils-0.159.ebuild: - Version bump. - - 18 Jun 2014; Michał Górny elfutils-0.155-r1.ebuild, - elfutils-0.156.ebuild, elfutils-0.157.ebuild, elfutils-0.158.ebuild: - Update dependencies to require guaranteed EAPI=5 or multilib ebuilds, bug - #513718. - - 23 Mar 2014; Agostino Sarubbo elfutils-0.158.ebuild: - Stable for sparc, wrt bug #500178 - - 06 Mar 2014; Agostino Sarubbo elfutils-0.158.ebuild: - Stable for ppc64, wrt bug #500178 - - 05 Mar 2014; Agostino Sarubbo elfutils-0.158.ebuild: - Stable for ppc, wrt bug #500178 - - 27 Feb 2014; Richard Freeman elfutils-0.158.ebuild: - amd64 stable - 500178 - - 24 Feb 2014; Pawel Hajdan jr elfutils-0.158.ebuild: - x86 stable wrt bug #500178 - - 23 Feb 2014; Markus Meier elfutils-0.158.ebuild: - arm stable, bug #500178 - - 18 Feb 2014; Mike Frysinger elfutils-0.158.ebuild: - Mark m68k/s390/sh stable #500178. - - 11 Feb 2014; Matt Turner elfutils-0.158.ebuild: - alpha stable, bug 500178. - - 08 Feb 2014; Akinori Hattori elfutils-0.158.ebuild: - ia64 stable wrt bug #500178 - - 03 Feb 2014; Jeroen Roovers elfutils-0.158.ebuild: - Stable for HPPA (bug #500178). - - 03 Feb 2014; Mike Frysinger - +files/elfutils-0.158-tests-backtrace-native-core.patch, - elfutils-0.158.ebuild: - Fix from upstream for backtrace tests #497566 by eroen. - - 18 Jan 2014; Mike Frysinger elfutils-0.158.ebuild: - Add arm64 love. - -*elfutils-0.158 (06 Jan 2014) - - 06 Jan 2014; Mike Frysinger +elfutils-0.158.ebuild: - Version bump. - - 02 Jan 2014; Mike Frysinger elfutils-0.157.ebuild: - Drop some sed hacks as the fixes are in the portability patch now. - -*elfutils-0.157 (23 Dec 2013) - - 23 Dec 2013; Mike Frysinger +elfutils-0.157.ebuild: - Version bump. - - 23 Dec 2013; Mike Frysinger - -files/elfutils-0.156-nested-funcs.patch, elfutils-0.156.ebuild: - Drop nested funcs patch since it doesn't fix all the uses. - - 13 Oct 2013; Michał Górny elfutils-0.155-r1.ebuild, - elfutils-0.156.ebuild: - Explicitly call einstalldocs in multilib_src_install_all() to accomodate bug - #483304. - - 19 Sep 2013; Mike Frysinger - +files/elfutils-0.156-nested-funcs.patch, elfutils-0.156.ebuild: - Fix building with clang due to small nested function #451986 by Hendrik v. - Raven. - -*elfutils-0.156 (25 Aug 2013) - - 25 Aug 2013; Mike Frysinger +elfutils-0.156.ebuild: - Version bump. - -*elfutils-0.155-r1 (16 Aug 2013) - - 16 Aug 2013; Alexis Ballier +elfutils-0.155-r1.ebuild: - Convert to multilib, bug #480262. Stack it for emul-baselibs r12 - - 19 Feb 2013; Zac Medico elfutils-0.155.ebuild: - Add ~arm-linux keyword. - - 09 Oct 2012; Mike Frysinger elfutils-0.146.ebuild, - elfutils-0.148.ebuild, elfutils-0.149.ebuild, elfutils-0.150.ebuild, - elfutils-0.151.ebuild, elfutils-0.152-r1.ebuild, elfutils-0.152.ebuild, - elfutils-0.153.ebuild, elfutils-0.154-r1.ebuild, elfutils-0.154.ebuild, - elfutils-0.155.ebuild: - Add m68k love #375737 by Ryan Hill. - -*elfutils-0.155 (07 Sep 2012) - - 07 Sep 2012; Mike Frysinger +elfutils-0.155.ebuild: - Version bump. - - 22 Jul 2012; Mike Frysinger elfutils-0.154-r1.ebuild: - The thread option uses a - separator #427524 by argonovsky. - -*elfutils-0.154-r1 (17 Jul 2012) - - 17 Jul 2012; Mike Frysinger +elfutils-0.154-r1.ebuild, - metadata.xml: - Add knobs for controlling install of utilities (so we can install just - libraries), static libs, and thread support. - -*elfutils-0.154 (23 Jun 2012) - - 23 Jun 2012; Mike Frysinger +elfutils-0.154.ebuild: - Version bump. - - 16 Apr 2012; Mike Frysinger elfutils-0.153.ebuild: - Make sure to apppend -g to CFLAGS when running tests as the local testsuite - depends on it to pass #407135 by Chris Reffett. - - 28 Feb 2012; Mike Frysinger elfutils-0.153.ebuild: - Drop cross-compiling hacks now that upstream has updated things. - -*elfutils-0.153 (23 Feb 2012) - - 23 Feb 2012; Mike Frysinger +elfutils-0.153.ebuild: - Version bump. - - 31 Oct 2011; Mike Frysinger elfutils-0.152-r1.ebuild: - Tweak dis.h dependency so we don't regenerate the i386_gendis helper binary. - - 20 Oct 2011; Diego E. Pettenò - elfutils-0.152-r1.ebuild: - QA: fix src_test after recent cross-compile changes. - - 13 Oct 2011; Mike Frysinger elfutils-0.152-r1.ebuild: - Add support for cross-compiling. - -*elfutils-0.152-r1 (05 Oct 2011) - - 05 Oct 2011; Mike Frysinger +elfutils-0.152-r1.ebuild: - Switch to patches published with upstream. - - 05 Oct 2011; Mike Frysinger elfutils-0.146.ebuild, - elfutils-0.148.ebuild, elfutils-0.149.ebuild, elfutils-0.150.ebuild, - elfutils-0.151.ebuild, elfutils-0.152.ebuild: - Drop forced gcc/binutils/glibc upgrade since these versions are long stable. - - 28 Feb 2011; Brent Baude elfutils-0.149.ebuild: - stable ppc, bug 348407 - -*elfutils-0.152 (27 Feb 2011) - - 27 Feb 2011; Ryan Hill +elfutils-0.152.ebuild: - Version bump. - - 22 Jan 2011; Raúl Porcel elfutils-0.149.ebuild: - alpha/ia64/s390/sh/sparc stable wrt #348407 - -*elfutils-0.151 (14 Jan 2011) - - 14 Jan 2011; Ryan Hill +elfutils-0.151.ebuild: - Version bump. - - 29 Dec 2010; Brent Baude elfutils-0.149.ebuild: - stable ppc64, bug 348407 - - 21 Dec 2010; Markus Meier elfutils-0.149.ebuild: - arm stable, bug #348407 - - 15 Dec 2010; Christian Faulhammer - elfutils-0.149.ebuild: - stable x86, bug 348407 - - 14 Dec 2010; Markos Chandras elfutils-0.149.ebuild: - Stable on amd64 wrt bug #348407 - - 13 Dec 2010; Jeroen Roovers elfutils-0.149.ebuild: - Stable for HPPA (bug #348407). - -*elfutils-0.150 (11 Dec 2010) - - 11 Dec 2010; Ryan Hill +elfutils-0.150.ebuild, - +files/elfutils-0.150-bashifications.patch: - Version bump. - -*elfutils-0.149 (19 Sep 2010) - - 19 Sep 2010; Ryan Hill -elfutils-0.131-r2.ebuild, - -files/elfutils-0.131-gnu-inline.patch, - -files/elfutils-0.143-fix-fill_mmap-for-sections-past-the-section-headers. - patch, -files/elfutils-0.144-sloppy-include.patch, -elfutils-0.145.ebuild, - -elfutils-0.147.ebuild, +elfutils-0.149.ebuild: - Version bump, remove old. - - 10 Aug 2010; Jeroen Roovers elfutils-0.146.ebuild: - Stable for HPPA (bug #321943). - - 25 Jul 2010; Raúl Porcel elfutils-0.146.ebuild: - alpha/ia64/s390/sh/sparc stable wrt #321943 - - 22 Jul 2010; Markus Meier elfutils-0.146.ebuild: - arm stable, bug #321943 - - 18 Jul 2010; elfutils-0.146.ebuild: - ppc stable #321943 - - 07 Jul 2010; Samuli Suominen elfutils-0.146.ebuild: - ppc64 stable wrt #321943 - -*elfutils-0.148 (07 Jul 2010) - - 07 Jul 2010; Ryan Hill +elfutils-0.148.ebuild, - +files/elfutils-0.148-bashifications.patch: - Version bump. DWARF-4 support. - - 01 Jun 2010; Pawel Hajdan jr - elfutils-0.146.ebuild: - x86 stable wrt bug #321943 - - 30 May 2010; Markos Chandras elfutils-0.146.ebuild: - Stable on amd64 wrt bug #321943. Thanks to Thomas Beierlein - for testing - -*elfutils-0.147 (29 May 2010) - - 29 May 2010; Ryan Hill -elfutils-0.127.ebuild, - -elfutils-0.131-r1.ebuild, -elfutils-0.143-r1.ebuild, - -elfutils-0.144.ebuild, +elfutils-0.147.ebuild: - Version bump, remove old. - -*elfutils-0.146 (24 Apr 2010) - - 24 Apr 2010; Ryan Hill +elfutils-0.146.ebuild: - Version bump. - - 31 Mar 2010; elfutils-0.127.ebuild, - elfutils-0.131-r1.ebuild, elfutils-0.131-r2.ebuild, - elfutils-0.143-r1.ebuild, elfutils-0.144.ebuild, elfutils-0.145.ebuild: - - elibc_glibc has to be defined in IUSE= for profiles that are unable to - use.force that flag bug #312085 - -*elfutils-0.145 (07 Mar 2010) - - 07 Mar 2010; Ryan Hill +elfutils-0.145.ebuild: - Version bump. - - 20 Feb 2010; Jonathan Callen elfutils-0.144.ebuild: - Transfer prefix keywords, remove dep on glibc on prefix - -*elfutils-0.144 (04 Feb 2010) - - 04 Feb 2010; Ryan Hill -elfutils-0.140.ebuild, - -elfutils-0.143.ebuild, +elfutils-0.144.ebuild, - +files/elfutils-0.144-sloppy-include.patch: - Version bump. - - 26 Nov 2009; Harald van Dijk - elfutils-0.143-r1.ebuild, +files/elfutils-0.143-configure.patch: - Fix bash extensions in configure script #287130 - -*elfutils-0.143-r1 (21 Nov 2009) - - 21 Nov 2009; Mike Frysinger +elfutils-0.143-r1.ebuild, - +files/elfutils-0.143-fix-fill_mmap-for-sections-past-the-section-headers. - patch: - Add fix by Lubomir Rintel for corrupting some object files #288977 by Hugo - Mildenberger. - -*elfutils-0.143 (26 Sep 2009) - - 26 Sep 2009; Ryan Hill +elfutils-0.143.ebuild, - metadata.xml: - Version bump, bug #278144 by Conrad Kostecki. - -*elfutils-0.140 (15 Mar 2009) - - 15 Mar 2009; Peter Volkov elfutils-0.127.ebuild, - +elfutils-0.140.ebuild: - Version bump, bug #220577, thank Conrad Kostecki for report. Don't build - tests if tests are disabled, bug #226349, and added flex into DEPEND, bug - 221381, thank Diego E. 'Flameeyes' Pettenò for both reports. Added nls - USE flag as requested in bug #225273 by Le retraité. New bzip2 and zlib - USE flags. - - 14 Feb 2009; Kenneth Prugh elfutils-0.131-r2.ebuild: - amd64 stable, bug #245861 - - 12 Feb 2009; Brent Baude elfutils-0.131-r2.ebuild: - stable ppc64, bug 245861 - - 12 Feb 2009; Raúl Porcel elfutils-0.131-r2.ebuild: - arm/ia64/s390/sh/sparc stable wrt #245861 - - 09 Feb 2009; nixnut elfutils-0.131-r2.ebuild: - ppc stable #245861 - - 08 Feb 2009; Tobias Klausmann - elfutils-0.131-r2.ebuild: - Stable on alpha, bug #245861 - - 07 Feb 2009; Christian Faulhammer - elfutils-0.131-r2.ebuild: - stable x86, bug 245861 - - 07 Feb 2009; Jeroen Roovers elfutils-0.131-r2.ebuild: - Stable for HPPA (bug #245861). - - 10 May 2008; Mike Frysinger - files/elfutils-0.131-gnu-inline.patch: - Fix building with no optimization #220641. - - 10 May 2008; Mike Frysinger elfutils-0.131-r2.ebuild: - Make sure we carry forward the PaX fix #219848. - -*elfutils-0.131-r2 (20 Apr 2008) - - 20 Apr 2008; Mike Frysinger - +files/elfutils-0.131-gnu-inline.patch, +elfutils-0.131-r2.ebuild: - Use Debian patched tarball to fix #158438 and add fix by Ryan Hill for - building with gcc-4.3 #204610. - -*elfutils-0.131-r1 (06 Jan 2008) - - 06 Jan 2008; Mike Frysinger +elfutils-0.131-r1.ebuild: - Change off64_t in libelf.h to __off64_t as the latter type is not always - available #204502 by Ryan Hill. - -*elfutils-0.131 (30 Dec 2007) - - 30 Dec 2007; Diego Pettenò +elfutils-0.131.ebuild: - Version bump, needed for dev-util/dwarves. - - 20 Nov 2007; Samuli Suominen elfutils-0.127.ebuild: - amd64 stable too, closing also bug 196489. - - 19 Nov 2007; Joshua Kinard elfutils-0.127.ebuild: - Stable on mips. - - 27 Sep 2007; Jeroen Roovers elfutils-0.127.ebuild: - Stable for HPPA too. - - 13 Aug 2007; Tobias Scherbaum - elfutils-0.127.ebuild: - ppc. stable - - 13 Aug 2007; Gustavo Zacarias elfutils-0.127.ebuild: - Stable on sparc - - 24 Jul 2007; Raúl Porcel elfutils-0.127.ebuild: - alpha stable - - 21 Jul 2007; Tom Gall elfutils-0.127.ebuild: - stable on ppc64 - - 28 Jun 2007; Raúl Porcel elfutils-0.127.ebuild: - ia64/x86 stable - - 12 May 2007; Joshua Kinard elfutils-0.125.ebuild: - Stable on mips for #165798. - -*elfutils-0.127 (04 May 2007) - - 04 May 2007; Mike Frysinger +elfutils-0.127.ebuild: - Version bump #175753 by Raul Porcel. - - 23 Apr 2007; Gustavo Zacarias elfutils-0.125.ebuild: - Stable on sparc - - 21 Apr 2007; Raúl Porcel elfutils-0.125.ebuild: - ia64 stable - - 15 Apr 2007; Markus Rothe elfutils-0.125.ebuild: - Stable on ppc64 - - 06 Apr 2007; Tobias Scherbaum - elfutils-0.125.ebuild: - ppc stable - - 20 Mar 2007; Raúl Porcel elfutils-0.125.ebuild: - x86 stable - - 05 Mar 2007; Jeroen Roovers elfutils-0.125.ebuild: - Stable for HPPA. - - 14 Feb 2007; Chris Gianelloni elfutils-0.123.ebuild: - Stable on alpha wrt bug #165798. - - 13 Feb 2007; Markus Rothe elfutils-0.123.ebuild: - Stable on ppc64; bug #165798 - - 12 Feb 2007; Gustavo Zacarias elfutils-0.123.ebuild: - Stable on sparc wrt #165798 - - 12 Feb 2007; Simon Stelling elfutils-0.123.ebuild: - stable on amd64; bug 165798 - - 10 Feb 2007; Jeroen Roovers elfutils-0.123.ebuild: - Stable for HPPA (bug #165798). - - 10 Feb 2007; nixnut elfutils-0.123.ebuild: - Stable on ppc wrt bug 165798 - - 10 Feb 2007; Christian Faulhammer - elfutils-0.123.ebuild: - stable x86; bug #165798 - -*elfutils-0.125 (15 Jan 2007) - - 15 Jan 2007; Mike Frysinger +elfutils-0.125.ebuild: - Version bump. - - 28 Nov 2006; Jeroen Roovers elfutils-0.118.ebuild: - Stable for HPPA (bug #130121). - - 20 Oct 2006; Bryan Østergaard elfutils-0.118.ebuild: - Stable on Alpha. - -*elfutils-0.123 (26 Sep 2006) - - 26 Sep 2006; Mike Frysinger +elfutils-0.123.ebuild: - Version bump. - -*elfutils-0.122 (25 Jul 2006) - - 25 Jul 2006; Martin Schlemmer +elfutils-0.122.ebuild: - Update version. - - 28 Apr 2006; Joseph Jezak elfutils-0.118.ebuild: - Marked ppc stable for bug #130121. - - 29 Apr 2006; Joshua Kinard elfutils-0.118.ebuild: - Marked stable on mips. - - 20 Apr 2006; Mike Frysinger - +files/elfutils-0.118-glibc-hacks.patch, elfutils-0.118.ebuild: - Add a hack for old glibc installs #130121. - - 18 Apr 2006; Markus Rothe elfutils-0.118.ebuild: - Stable on ppc64; bug #130121 - - 18 Apr 2006; Patrick McLean elfutils-0.118.ebuild: - Stable on amd64 (bug 130121). - - 18 Apr 2006; Krzysiek Pawlik elfutils-0.118.ebuild: - Stable on x86, see bug #130121. - -*elfutils-0.120 (16 Apr 2006) - - 16 Apr 2006; Mike Frysinger - +files/elfutils-0.120-mkinstalldirs.patch, +elfutils-0.120.ebuild: - Version bump. - - 13 Jan 2006; Mike Frysinger elfutils-0.108.ebuild, - elfutils-0.108-r1.ebuild, elfutils-0.118.ebuild: - Force nls since the package refuses to build without it. - - 06 Jan 2006; Mike Frysinger - +files/elfutils-0.118-no-nested-functions.patch, elfutils-0.118.ebuild: - Add a hack so eu-nm is not generated with an executable stack #116968 by - Benno Schulenberg. - - 19 Dec 2005; Mike Frysinger - +files/elfutils-0.118-libelf-link.patch, elfutils-0.118.ebuild: - Fix linking of utilities with libelf #115385. - - 17 Dec 2005; Mike Frysinger - +files/elfutils-0.118-PaX-support.patch, elfutils-0.118.ebuild: - Kevin F. Quinn: fix PaX support #115100. - - 10 Dec 2005; elfutils-0.108-r1.ebuild, - elfutils-0.108.ebuild, elfutils-0.118.ebuild: - - changed depends to use elibc_glibc vs !elibc_uclibc - -*elfutils-0.118 (10 Dec 2005) - - 10 Dec 2005; Martin Schlemmer +elfutils-0.118.ebuild: - New release. - - 16 Sep 2005; Ciaran McCreesh ChangeLog: - Converted to UTF-8, fixed encoding screwups - - 24 Jul 2005; Martin Schlemmer - -files/elfutils-0.108-robustify3.patch, elfutils-0.108-r1.ebuild: - Move robustify3.patch to mirrors, bug #99961. - -*elfutils-0.108-r1 (20 Jul 2005) - - 20 Jul 2005; Martin Schlemmer - +files/elfutils-0.108-robustify3.patch, +elfutils-0.108-r1.ebuild: - Update robustify patch. - - 03 Jun 2005; Stephen P. Becker elfutils-0.108.ebuild: - stable on mips - - 01 Jun 2005; +metadata.xml, - -files/elfutils-0.101-portability.patch, - -files/elfutils-0.94-alpha-mips-atime.diff, - -files/elfutils-sections-heap-overflow.diff, -elfutils-0.101-r1.ebuild, - -elfutils-0.101.ebuild, -elfutils-0.94-r1.ebuild, -elfutils-0.94-r2.ebuild, - -elfutils-0.97-r1.ebuild, -elfutils-0.97.ebuild: - - Remove old ebuilds. - - Added a metadata.xml (assigned to toolchain@) for now. - - Ready for GLSA. - - 29 May 2005; elfutils-0.101-r1.ebuild, - elfutils-0.101.ebuild, elfutils-0.108.ebuild, elfutils-0.94-r1.ebuild, - elfutils-0.94-r2.ebuild, elfutils-0.97-r1.ebuild, elfutils-0.97.ebuild: - echangelog - update package to use libc expanded variable elibc_uclibc vs - uclibc so USE=-* works - - 22 May 2005; Olivier Crête elfutils-0.108.ebuild: - Marking stable on x86 per security bug #91398 - - 20 May 2005; Bryan Østergaard elfutils-0.108.ebuild: - Stable on alpha + ia64, bug 91817. - - 19 May 2005; Gustavo Zacarias elfutils-0.108.ebuild: - Stable on sparc wrt #91817 - - 19 May 2005; Jan Brinkmann elfutils-0.108.ebuild: - stable on amd64 wrt #91817 - - 19 May 2005; Rene Nussbaumer elfutils-0.108.ebuild: - stable on hppa; bug #91817 - - 19 May 2005; Michael Hanselmann elfutils-0.108.ebuild: - Stable on ppc. - - 19 May 2005; Yuta SATOH elfutils-0.108.ebuild: - Stable on ppc64, bug #91817 - - 17 May 2005; +files/elfutils-0.108-robustify2.patch, - elfutils-0.108.ebuild: - - add additional incremental from Jakub which solves remaining regression - failure with elfutils that we found. This version or a 0.109 is what arches - will want to mark stable in general - -*elfutils-0.108 (17 May 2005) - - 17 May 2005; +files/elfutils-0.108-portability.patch, - +elfutils-0.108.ebuild: - - version bump to 0.108 and added a new patch from Jakub Jelinek to fix misc - crashes and the heap overflow on some invalid ELF files - - 15 May 2005; Bryan Østergaard - elfutils-0.94-r2.ebuild: - Stable on alpha + ia64, bug 91817. - - 15 May 2005; Markus Rothe elfutils-0.97-r1.ebuild: - Stable on ppc64; bug #91817 - - 14 May 2005; Olivier Crête elfutils-0.94-r2.ebuild: - Stable on x86 per security bug #91817 - - 13 May 2005; Rene Nussbaumer - elfutils-0.94-r2.ebuild: - Stable on hppa; bug #91817 - - 13 May 2005; Gustavo Zacarias - elfutils-0.94-r2.ebuild: - Stable on sparc wrt #91817 - - 13 May 2005; Jan Brinkmann elfutils-0.94-r2.ebuild: - stable on amd64 wrt #91817 - - 13 May 2005; Michael Hanselmann - elfutils-0.94-r2.ebuild: - Stable on ppc. - -*elfutils-0.94-r2 (12 May 2005) - - 12 May 2005; Tavis Ormandy - +files/elfutils-sections-heap-overflow.diff, +elfutils-0.101-r1.ebuild, - +elfutils-0.94-r2.ebuild, +elfutils-0.97-r1.ebuild: - fix for #91817 - - 31 Mar 2005; Aron Griffis elfutils-0.97.ebuild: - stable on ia64 - - 17 Mar 2005; Markus Rothe elfutils-0.97.ebuild: - Stable on ppc64; bug #85575 - -*elfutils-0.101 (13 Mar 2005) - - 13 Mar 2005; Martin Schlemmer - +files/elfutils-0.101-bswap.patch, - +files/elfutils-0.101-portability.patch, +elfutils-0.101.ebuild: - Update version. - - 17 Feb 2005; Markus Rothe elfutils-0.97.ebuild: - Added ~ppc64 to KEYWORDS - -*elfutils-0.97 (09 Feb 2005) - - 09 Feb 2005; Mike Frysinger +elfutils-0.97.ebuild: - Version bump. - - 25 Nov 2004; Daniel Black elfutils-0.94-r1.ebuild: - fixed test routine as per bug #72347. Thanks to Sébastien DIAZ - - - 02 Aug 2004; elfutils-0.94-r1.ebuild: - elfutils does not actually seem to compile currently in a uClibc environment - (xrealloc errs), but we need to ensure that glibc never gets pulled in as a - dep, since this package does not respect virtual/libc - - 20 Apr 2004; elfutils-0.94-r1.ebuild: - Add missing ia64 keyword - - 16 Apr 2004; elfutils-0.94-r1.ebuild: - files/elfutils-0.94-alpha-mips-atime.diff: Fix 0.94 compilation on mips and - alpha - - 11 Apr 2004; elfutils-0.94-r1.ebuild: - Stable on all archs - - 09 Apr 2004; elfutils-0.89.ebuild: - Stable on mips - - 22 Mar 2004; Jason Wever elfutils-0.84.ebuild: - Marked stable on sparc. - - 07 Mar 2004; Jason Wever elfutils-0.94-r1.ebuild: - Added ~sparc keyword, fixes bug #43828. - -*elfutils-0.94-r1 (29 Feb 2004) - - 29 Feb 2004; Martin Schlemmer elfutils-0.94-r1.ebuild: - Utils need libdw ... - -*elfutils-0.94 (24 Feb 2004) - - 24 Feb 2004; Stefan Jones : - New version from what was RedHat rawhide. x86 only - - 22 Feb 2004; elfutils-0.89.ebuild: - files/elfutils-0.89-alpha-mips-atime.diff: Fix 0.89 compilation on mips - - 22 Feb 2004; elfutils-0.84.ebuild: - Fix 0.84 compilation on mips - - 31 Dec 2003; Aron Griffis elfutils-0.89.ebuild: - Stable on alpha and ia64 to support ircd-hybrid - - 14 Dec 2003; Guy Martin elfutils-0.84.ebuild: - Marked stable on hppa. - - 14 Nov 2003; Brad House elfutils-0.89.ebuild: - add ~amd64 flag - - 13 Nov 2003; elfutils-0.76-r2.ebuild: - added mips to KEYWORDS - - 29 Oct 2003; Seemant Kulleen elfutils-0.89.ebuild: - added nls USE flag check - - 26 Oct 2003; Aron Griffis - files/elfutils-0.89-atime.diff: - Fix 0.89 compilation on alpha - -*elfutils-0.89 (20 Oct 2003) - - 30 Oct 2003; Stefan Jones : - New version - -*elfutils-0.84 (23 Aug 2003) - - 30 Sep 2003; Joshua Kinard elfutils-0.84.ebuild: - Added ~mips to KEYWORDS - - 03 Sep 2003; Stefan Jones : - Move to stable and require binutils-2.14.90.0.6 - - 01 Sep 2003; Stefan Jones : - Add patch for alpha for st_atime, bug #27372 - - 27 Aug 2003; Stefan Jones : - Mark stable as unstable till sys-devel/binutils-2.14.90.0.6-r1 - becomes stable, without it fails to compile - - 27 Aug 2003; Stefan Jones : - Mark stable as fixes #19285 - - 23 Aug 2003; Stefan Jones : - New version for testing. - It seems on my system the hidden patch is not needed anymore - -*elfutils-0.76-r2 (14 May 2003) - - 23 Aug 2003; Luca Barbato : - Setting ppc for elfutils-0.76-r2, fixes bug 27017. - - 27 June 2003; Stefan Jones : - Opps, adding it back, I was wrong ... - - 24 June 2003; Stefan Jones : - Remove from portage as bug fix is not needed anymore, - it was a gcc / binutils bug. sys-devel/binutils-2.14.90.0.2 - works fine - - 14 May 2003; Stefan Jones elfutils-0.76-hidden.diff : - Added patch to fix bug #20948 - -*elfutils-0.76-r1 (24 Apr 2003) - - 24 June 2003; Stefan Jones : - Added to stable amd64 tree. - - 24 Apr 2003; Martin Holzer elfutils-0.76-r1.ebuild: - Removed /usr/usr/share. closes #19758. - -*elfutils-0.76 (08 Mar 2003) - - 14 Apr 2003; Stefan Jones elfutils-0.76.ebuild : - Moved to stable tree. - - 08 Mar 2003; Martin Schlemmer elfutils-0.76.ebuild : - Update version. - -*elfutils-0.73 (03 Feb 2003) - - 03 Feb 2003; Martin Schlemmer elfutils-0.73.ebuild : - Update version. - -*elfutils-0.72 (02 Jan 2003) - - 13 Jan 2003; Stefan Jones elfutils-0.72.ebuild : - Zapped -Werror as per bugreport, even with newer gcc's it fails without. - - 07 Jan 2003; Stefan Jones elfutils-0.72.ebuild : - Requires sys-devel/gcc-3.2.1-r6 or higher - - 02 Jan 2003; Martin Schlemmer elfutils-0.72.ebuild : - Initial release. Unfortunately there are no source tarballs for this - on a public ftp/http server, so we need to check for new releases: - - http://rawhide.redhat.com/pub/redhat/linux/rawhide/SRPMS/SRPMS/ diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/Manifest b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/Manifest index 9c4151efb1..d37567126e 100644 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/Manifest +++ b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/Manifest @@ -1,27 +1,2 @@ -AUX elfutils-0.118-PaX-support.patch 954 SHA256 e769e1168dc645ce99655f984f5c19a54d765210cacd098556b6b68743b877fa SHA512 d2b27b1715908ebc68c304a32b29e5bdebede5d4c9819b552617b3e3fd00f21570fa2346ec0e01b9b8028e9139eea629e0e70bee2f509ebfdacd31bbcd3bea0d WHIRLPOOL 47b537a5a01b9a1240b0e922eeef7e5e0e00b04cb474dbb0728849deba4a50c13e6a56b9b5476121771dab25a61641091deefd2cf94bb7cdcf4858f1b6222670 -AUX elfutils-0.143-configure.patch 772 SHA256 af91d9c73612d82b3b47099c0dd8e5cfaac1aa6538185e2760ba5ab933ef9091 SHA512 988d9a85339848150023df4193c6fa45a9dc2e3609b16b575ef7e25c4b0eff8b7e1bd188ebc4a5c0ae9b1aeeb16a99ddf1441f53d4a5ec0c88041fee65491c01 WHIRLPOOL 98b0576f049706b6c21765dfe26985bc88f97b5f39ad2ab950944382c06650b25e2ebad47c155924c664c9b56ac822339c0056e3bb0e8156f4f9963946bbadd3 -AUX elfutils-0.148-bashifications.patch 760 SHA256 e741d81d4136a1f9a720fcbb67ffbb389cf00f98e344a5102b6c89e77b150c18 SHA512 778899e982021266db3d109ca8eb9c6144e13d98d017fd4d43fbbcc118b2aaebb827dceafc5dc196b437509bbbc4a95d4b152fa493f3a94c2daaa9da2dc91f74 WHIRLPOOL 1f78c567d5460097d8ed0f5756208bb0ef74c41e8a41db16c85fa28d9bc858a71c4ccd5d2978c596d0b12ae57c9a094e8f9062f7b580db93772e38b92c5707ba -AUX elfutils-0.150-bashifications.patch 763 SHA256 8a7f67e8adeb3ae1aeeb0b3302ed1cda10f852d3f6702d21dfb011761a2b7576 SHA512 d111c043a47f9c6bbb9e51393ad496be79618c6fda50da7870bec6998a295835e68dc0b3dc38bc2a7bbe98b2f894fc4f3c46985a4faf3bc76d92d3b5dbd845b6 WHIRLPOOL 60fbabd765c6c93c64ae81413173347d611c8f34adb38d4fb274f9f830cfedaa5e70a0009be826f4f3ee06dd5196aa480b0c7b38d3a35541037a50d3ee730d1d -AUX elfutils-0.158-tests-backtrace-native-core.patch 1347 SHA256 2f577e225649af7f59209f6e05ef1733b665ffb835a2a598b9eb289a40b93c0e SHA512 23f77f3446b1309d0db0000d718169c6927f924e3645de6d31034fdf5cdd39423c559d5b35f485ca066d6ee5227194719c050a47cd383f93265c073c1112478d WHIRLPOOL e6b5c15ac838138c72cf17ba1f5c66da1533977e2d28b6d4325b3880ecd2926911170236bb5cff0a5170ecce74016925f0a4342f4a4d22189e70a87f37fd622b -AUX elfutils-0.161-libelf-dir-traversal.patch 1630 SHA256 aaad1abf56c3125a1cdc56218db5339a0b4719542185d60af307a0bfc74c3a67 SHA512 f6b05c4d1da60853825a2803de9201a7c17c9511d70861f1e0f7f5d501e39b11dfda920b39290e398b367f33403b6c99bf6e38dd8e17fe4cdf91750b8c3fe9c8 WHIRLPOOL ab9b6eb384153ffd5f051aff7ec538c37f133953dab9a32a246e727fdf5f4a7f7cd50d052ffad7abdae7067a0c4c6dbbd9f01349fdbc9a765a3bb12a7d234bea -DIST elfutils-0.158-portability.patch 61898 SHA256 edc5e367b90dc3b179439c1c56ac28b04e810b09952d76c51b2df7a2a3f44e78 SHA512 3710f5b9e43a7ae230d8f3b7058addc667e34841fcbb85e3e6e289851b5daf1d82d8f6e592cfa62be127588ae1e274f5b04499156dec3e9c5922f1a06a0e845b WHIRLPOOL 7bc95985ed12c8b356fb6a8d7f92fd0d6aa2d5a8aedb157f85b894199ebb0ae63b2d7baebe759489895bb9db2b552a84647add04f0c02168d9ebfd598ab8fd69 -DIST elfutils-0.158-robustify.patch 62790 SHA256 dde94387e6565803d7c8d5b4351e4224e0fdeccfb9ef4a2080f15fabf43fe8bf SHA512 cdafe50d93ca74a38e62728f52965a48b37ef6dc05ca949893381c917549e498a2b007580ceb5de81c7292d86fbb11fd62315001216c12baffc243e2e6fd1015 WHIRLPOOL b3d0440230e23d66fc4862083ca9a9b2f3d58619c8789d086e6c9933af5c27b9b1c55dd8fa714acd708757bdee0707041cf6c8b09b804d7c6a4932f77a2648e4 -DIST elfutils-0.158.tar.bz2 4931570 SHA256 be27af5c21352f53e010342bf1c68e0b9e18232dbf3adec7e2f9b41f6bbe397d SHA512 6f27c07ad2b146d2ff857ad596f0d9150b0a041b4667f9174880a7766250ba2e52103bed9c4295e005255b683346d33d82efcda8f18f66c343df2722ca5d2ca2 WHIRLPOOL ff0c2224f9a514b83995c6f5a628e1331887e3906d3678c237c551d5572371b5a4c8bcf705f8e1389bff02bdab257460b26d8cfd3b3de2cbbc84e3f5a55445ac -DIST elfutils-0.159-portability.patch 63319 SHA256 aaaa91cc9101962cdef221b2901346921945bf6e8b7806dbf99c5c2d76dc3ae0 SHA512 043ef48ea0f2cec718d952d7137e16f34c47420b7d1788a9e1685b3543576f8d4a9f8565069709ab87a1b65d32204db01da4e0f08be51c5d8a5890c548369568 WHIRLPOOL e690f510ebe97562dbee233b146481b56fb589c7ed7e99eafd121c3990f084d6adb58fc4db0824518a84cd609a0a10a65f125697f51819b18dfcd3e691c1abd9 -DIST elfutils-0.159.tar.bz2 5469000 SHA256 fffaad1ba0c4ac5c8cee56dc195746e1f1e7197ba3eba7052ad5a3635ac1242e SHA512 c58d95c90685fb0b37f728c83e9d462be2fabe1dfb7b271b3adcde5f10c532a90b07bcc1c51dd81bf768f0cd3d22fa231fafb74fb5e79098d94a566e139408ff WHIRLPOOL 71cc156658af3ea8461c4cebcf27331a3844af470e337c18a7532fd795ea91eca035ecdc74fa71e92100bf2354b9e724490eae6305cd3ab418202938a4818684 -DIST elfutils-0.160-portability.patch 63302 SHA256 feb307acf472598ea7af4e4b439251613a8f5d81e804b4abf9aeca195a5d4254 SHA512 a408596fe114392034c7c6f42c4ef2e7a6bdeae346ad07c733eebe29c30d644984d775756b0395ab360c6107eab7d526cdcd0d4955eb8431cccf9ca8a278bca1 WHIRLPOOL cd415d959c8fdf16ea656de84c7e328bb98de1f9b98ba36bdafffca80a008c3673787843b876f6ddd37e1bc0d13283ed85548b5407c90120de164971cee6ae44 -DIST elfutils-0.160.tar.bz2 5391252 SHA256 741b556863c069ceab2d81eb54aeda8c34f46728859704eaf9baef8503e9a9d1 SHA512 2df392739ae05e1a9ad333a02cc13e088f39370e3d14482072384b0b5285d5ba73e35562cc6c99211272f36744e657081d6d18e16e8c8519e49a51ece9151330 WHIRLPOOL afafd0c2fd2672c7b0e9cb4cdd4fc710fa38c819b7f117673e99cace7931594f03a46085a87fb4e819243572abc52f695d37cc03522bb46cdc6498be9f209582 -DIST elfutils-0.161-portability.patch 63317 SHA256 bf0363d03e1e4668778eb4e7ddd10e405a22f753b3ad813a537fc01164d1e3fe SHA512 78a8a46b5eaf0326916b79f2502d8e66dabd2783c5661248482572b1528173c5e47f84868693ba58bbf015dfeb3f9897bfe72a778d22aa1b396e7da81b2512b5 WHIRLPOOL bdaa682d3c4113f0d54409afe4d22a0e56f0b28d8f1e69e2c0c16cd31cf12341df56259d3ab38e70b840dd449b2686e7823d4961b282b76de5dde8c458f4e97a -DIST elfutils-0.161.tar.bz2 5524766 SHA256 570c91a1783fa5386aaa2dfdd08dda1de777c2b63bf3b9c1437d635ffdd7a070 SHA512 c5061faa01cb6f211c326574f10bd5eb4fe8437afb2581f26cf34e88053d7bd91dc47bae1c8bdd143c35cad055bf48eab1e03acf4069a8e8843643ecf2a198df WHIRLPOOL adf14b937b38fff1de0e0cd18a6866d4080ed6ee80fab73a45c1b94ffe546fe4c1662b090f6802a522c5103fb7826fac46c5e4ccfc8441f09025285722d08ede -DIST elfutils-0.162-portability.patch 70906 SHA256 71cd52c43af31a9e445ed14e2f51e4aee32a00c1ffb251390c1a247cfc503d23 SHA512 8bd5647a169b9201dfc93f98a6580ebae34433180941b481248cb644f4991cb670f073d7ca63b203821a398ddd96558b069461aef83b8dd1a60aa154f15dccd1 WHIRLPOOL c31586f846e6cff511996c97015b479d0bc4b80577fb69df140f9cbae817a17ddcaca58a1a0e16ded6efc7f9ae3f570e74b87888a32b524ab9d7c5d3a02f7419 -DIST elfutils-0.162.tar.bz2 6021217 SHA256 526106bc6be898b3b3281a66b83d64993aa0ef1b55b0416766868ad53d0a1951 SHA512 5d62a84b509f638cb62175b332fdeaa68e04677893d5647fd944e5b5928fa4f0daf8f161dc64f7762dc736f74471c8d617cbc54464cf2e1f79141e937d3db4a9 WHIRLPOOL 2e8bee400f0209206373d716199835729f4d4da97116a4ec76a2dfe977e8a431601208655d576d66e6f1e4eb630dab004eedebabd58a03e4938b745f71daf35d -DIST elfutils-0.163-portability.patch 72818 SHA256 e4e82315dad2efaa4e4476503e7537e01b7c1b1f98a96de4ca1c7fa85f4f1045 SHA512 c657da2c4a37e8dac6fe4b399ef72ff60b6780000721f0617fb1dc0a6d962cb1e609b8e72fa0dc5b2d50db8dd68dcd58096bf2e475f7c5461f1765a4ee4c0d2e WHIRLPOOL 0ff248e4767778351f46c91fd5f189d7d2cfee59ac2afdfd5fee659151b72e33d310440273da0ed6f5611f76f9ec651ff51acffcc0557a0ec111c50b819db091 -DIST elfutils-0.163.tar.bz2 6029307 SHA256 7c774f1eef329309f3b05e730bdac50013155d437518a2ec0e24871d312f2e23 SHA512 80cb37b965e85f6c6b51247f0cb07cde9d9071e7cdde4c028479a609e12dfb196e428fa8743586ce8a46d49dac74073b55bcb812ea6118471c0de07b3dd7f772 WHIRLPOOL 5e2b7881ec96438e0ecb583b77202ccdad6ae7b46f2dcc0b2869119642173bc5da5f26d51bf4464fc9c5c1951f14a4a11bf8dfc6906e6dfd551782c4c9f28cd8 -EBUILD elfutils-0.158.ebuild 2534 SHA256 813351314a32dac1bf366a85bacc37a40d9fcdce9b653c21fb001d2301e6a47a SHA512 0209d25b85e502c9b77eee8fd3f8665b385bf0ea0f82ec797f40e36f46eb25eaf85e907736452ee98c7acc9259cd33d01f5c13125524f288276f1a8318e75ef7 WHIRLPOOL ca39c79350d35fc57bdfcb8d46010444ec3f1393703ee6fe3508c41ed9c2a94137cb593b73db4faab088de5dda84aebc71386b5ab3e6696de81f9a5e8970b6f0 -EBUILD elfutils-0.159.ebuild 2406 SHA256 0840b37caea0a7431dea975cf46acb224f36fdaf2ad9784a922dfde41aa5a58e SHA512 5840e47a041c3e9a8f089de1a33f64cdf6928115445c7aa3cfbd3cb4b760b40707b73a1db62e9a0c737fa82931b06a2bf86e197e6211e4d47f59adc80073cf50 WHIRLPOOL bc222a777cd4cf922b60db28529a50f072c9c77308bd39b4bfeb09a88950b4db2049f285c570ad04551f074e400658d1e5f21c78046d53cc6b9d9255711a87a2 -EBUILD elfutils-0.160.ebuild 2406 SHA256 0840b37caea0a7431dea975cf46acb224f36fdaf2ad9784a922dfde41aa5a58e SHA512 5840e47a041c3e9a8f089de1a33f64cdf6928115445c7aa3cfbd3cb4b760b40707b73a1db62e9a0c737fa82931b06a2bf86e197e6211e4d47f59adc80073cf50 WHIRLPOOL bc222a777cd4cf922b60db28529a50f072c9c77308bd39b4bfeb09a88950b4db2049f285c570ad04551f074e400658d1e5f21c78046d53cc6b9d9255711a87a2 -EBUILD elfutils-0.161.ebuild 2474 SHA256 073dd5065f2dd5a31dbad795be2d93317bc6b97e14af9c4e0702bb2258033ecb SHA512 97424db9b13fd3871b6951a4e922fb0345ef490c589b072793ee5ef47b875ac8512838f7e3c438a1d426f9f199bfd4cce601c794bc348da4a1a59e6f997c9117 WHIRLPOOL 27695d34b268aaea80df7bc8ab8afdc7890a9fc2ef9838a9fd38dabedcbd4d10121a326f846a72e49ae305a798a9e4dbc168b09cda36fbd13e615467b79d723a -EBUILD elfutils-0.162.ebuild 2412 SHA256 eaa91c131da7d581d25e45f463c5af609be4b2e0007003dc468a0e6b39a4ed89 SHA512 93db6c427a2a2139e21e3cc58a284d38a5aff0c829d34ae77bdee7bbdf718e78f5f121d8718589c38f210a211155058682f5ed1d58b38949901784ff97ab54d8 WHIRLPOOL d83211c7e88fac7186dc16bc8a7d8e787d32aead40043534e911d519383f59598a1f5f4cf63fa0e76aa8f3251f4b148dcc33798c47e732448123b4fb020d6950 -EBUILD elfutils-0.163.ebuild 2412 SHA256 eaa91c131da7d581d25e45f463c5af609be4b2e0007003dc468a0e6b39a4ed89 SHA512 93db6c427a2a2139e21e3cc58a284d38a5aff0c829d34ae77bdee7bbdf718e78f5f121d8718589c38f210a211155058682f5ed1d58b38949901784ff97ab54d8 WHIRLPOOL d83211c7e88fac7186dc16bc8a7d8e787d32aead40043534e911d519383f59598a1f5f4cf63fa0e76aa8f3251f4b148dcc33798c47e732448123b4fb020d6950 -MISC ChangeLog 26517 SHA256 61907666b709962af3b2eaf57d8f4d826b63acd7dbf8900bd252a6705d2694e0 SHA512 78e8c72dedef41246c681629f263abcccfee692f6435c07593a979c83842a6fa9561bc4b39029bb557c23769decf154248ca957b99e54f1fbf0e2f79aba6979a WHIRLPOOL f20236de60045698116307ca83f42ff35eb6fe1fd5c956b9962f4fda07aea53e8352a9cdfb810914fbab626135ac94e24d98496132f8c7b9327d933c32a93323 -MISC metadata.xml 438 SHA256 33cbcbd727257fa6d03488d531c099d33f4c3e4db3cf3739d11d8d4cd8266b37 SHA512 e013123116aa3a3f00fa77cc3e9d18a5c1f481dd304ee6af6e77e3e5e44fb9e3f94ac542fc10fb0c59dea6699c15cce11b1513c061494919f1e821120fb162d9 WHIRLPOOL f07f16d5235c538cef44daca3210ad7374af35705b6562b9bb17b2a5532ba0ed6ea32d1d7f23e93c899e8868503f7a9f8994d2454ca144c45ae7e9317fb0cabd +DIST elfutils-0.169.tar.bz2 8067758 SHA256 9412fac7b30872b738bc1ed1ebcaed54493c26ef9a67887913498c17b10f3bc2 SHA512 0a81a20bb2aff533d035d6b76f1403437b2e11bce390db57e34b8c26e4b9b3150346d83dddcbfbbdc58063f046ca3223508dba35c6ce88e375d201e7a777a8b9 WHIRLPOOL dc4f689b403160272dccb1e306ee3584f6d06156d3318d745bba46f9b4a31a477795223233ffb420b096b1c196aba09492e4ab5803f6150326b48e1045f92e06 +DIST elfutils-0.170.tar.bz2 8358001 SHA256 1f844775576b79bdc9f9c717a50058d08620323c1e935458223a12f249c9e066 SHA512 aca0b5e271138eaf86e36505ffb101181207b151e833e6cd7c18986ac50678542a5ecd2250f8dd6923ca497142f197c8b08fd225e4130b16b6203c24013d6d28 WHIRLPOOL ebb3069aa52e49b7e137c722ac490b12393e0c54656d6d7476193eaa4253b48209e62e4babd4819a52cf5a9f3a1a6f56945eb776f014df9cbd841aa392e94823 diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.158.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.158.ebuild deleted file mode 100644 index b27769d914..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.158.ebuild +++ /dev/null @@ -1,73 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="4" - -inherit eutils flag-o-matic multilib-minimal - -DESCRIPTION="Libraries/utilities to handle ELF objects (drop in replacement for libelf)" -HOMEPAGE="https://fedorahosted.org/elfutils/" -SRC_URI="https://fedorahosted.org/releases/e/l/${PN}/${PV}/${P}.tar.bz2 - https://fedorahosted.org/releases/e/l/${PN}/${PV}/${PN}-portability.patch -> ${P}-portability.patch - https://fedorahosted.org/releases/e/l/${PN}/${PV}/${PN}-robustify.patch -> ${P}-robustify.patch" - -LICENSE="GPL-2-with-exceptions" -SLOT="0" -KEYWORDS="alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-linux ~arm-linux ~x86-linux" -IUSE="bzip2 lzma nls static-libs test +threads +utils zlib" - -# This pkg does not actually seem to compile currently in a uClibc -# environment (xrealloc errs), but we need to ensure that glibc never -# gets pulled in as a dep since this package does not respect virtual/libc -RDEPEND="zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - bzip2? ( >=app-arch/bzip2-1.0.6-r4[${MULTILIB_USEDEP}] ) - lzma? ( >=app-arch/xz-utils-5.0.5-r1[${MULTILIB_USEDEP}] ) - !dev-libs/libelf - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - nls? ( sys-devel/gettext ) - >=sys-devel/flex-2.5.4a - sys-devel/m4" - -src_prepare() { - epatch "${FILESDIR}"/${PN}-0.118-PaX-support.patch - epatch "${DISTDIR}"/${P}-{portability,robustify}.patch - epatch "${FILESDIR}"/${PN}-0.158-tests-backtrace-native-core.patch - use static-libs || sed -i -e '/^lib_LIBRARIES/s:=.*:=:' -e '/^%.os/s:%.o$::' lib{asm,dw,elf}/Makefile.in - # some patches touch both configure and configure.ac - find -type f -exec touch -r configure {} + -} - -src_configure() { - use test && append-flags -g #407135 - multilib-minimal_src_configure -} - -multilib_src_configure() { - ECONF_SOURCE="${S}" econf \ - --disable-werror \ - $(use_enable nls) \ - $(use_enable threads thread-safety) \ - --program-prefix="eu-" \ - $(use_with zlib) \ - $(use_with bzip2 bzlib) \ - $(use_with lzma) -} - -multilib_src_test() { - env LD_LIBRARY_PATH="${BUILD_DIR}/libelf:${BUILD_DIR}/libebl:${BUILD_DIR}/libdw:${BUILD_DIR}/libasm" \ - LC_ALL="C" \ - emake check || die -} - -multilib_src_install_all() { - einstalldocs - dodoc NOTES - # These build quick, and are needed for most tests, so don't - # disable their building when the USE flag is disabled. - use utils || rm -rf "${ED}"/usr/bin -} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.159.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.159.ebuild deleted file mode 100644 index 6ac8a28cab..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.159.ebuild +++ /dev/null @@ -1,72 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="4" - -inherit eutils flag-o-matic multilib-minimal - -DESCRIPTION="Libraries/utilities to handle ELF objects (drop in replacement for libelf)" -HOMEPAGE="https://fedorahosted.org/elfutils/" -SRC_URI="https://fedorahosted.org/releases/e/l/${PN}/${PV}/${P}.tar.bz2 - https://fedorahosted.org/releases/e/l/${PN}/${PV}/${PN}-portability.patch -> ${P}-portability.patch" - -LICENSE="GPL-2-with-exceptions" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux" -IUSE="bzip2 lzma nls static-libs test +threads +utils zlib" - -# This pkg does not actually seem to compile currently in a uClibc -# environment (xrealloc errs), but we need to ensure that glibc never -# gets pulled in as a dep since this package does not respect virtual/libc -RDEPEND="zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - bzip2? ( >=app-arch/bzip2-1.0.6-r4[${MULTILIB_USEDEP}] ) - lzma? ( >=app-arch/xz-utils-5.0.5-r1[${MULTILIB_USEDEP}] ) - !dev-libs/libelf - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - nls? ( sys-devel/gettext ) - >=sys-devel/flex-2.5.4a - sys-devel/m4" - -src_prepare() { - epatch "${FILESDIR}"/${PN}-0.118-PaX-support.patch - epatch "${DISTDIR}"/${P}-portability.patch - use static-libs || sed -i -e '/^lib_LIBRARIES/s:=.*:=:' -e '/^%.os/s:%.o$::' lib{asm,dw,elf}/Makefile.in - sed -i 's:-Werror::' */Makefile.in - # some patches touch both configure and configure.ac - find -type f -exec touch -r configure {} + -} - -src_configure() { - use test && append-flags -g #407135 - multilib-minimal_src_configure -} - -multilib_src_configure() { - ECONF_SOURCE="${S}" econf \ - --disable-werror \ - $(use_enable nls) \ - $(use_enable threads thread-safety) \ - --program-prefix="eu-" \ - $(use_with zlib) \ - $(use_with bzip2 bzlib) \ - $(use_with lzma) -} - -multilib_src_test() { - env LD_LIBRARY_PATH="${BUILD_DIR}/libelf:${BUILD_DIR}/libebl:${BUILD_DIR}/libdw:${BUILD_DIR}/libasm" \ - LC_ALL="C" \ - emake check || die -} - -multilib_src_install_all() { - einstalldocs - dodoc NOTES - # These build quick, and are needed for most tests, so don't - # disable their building when the USE flag is disabled. - use utils || rm -rf "${ED}"/usr/bin -} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.160.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.160.ebuild deleted file mode 100644 index 6ac8a28cab..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.160.ebuild +++ /dev/null @@ -1,72 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="4" - -inherit eutils flag-o-matic multilib-minimal - -DESCRIPTION="Libraries/utilities to handle ELF objects (drop in replacement for libelf)" -HOMEPAGE="https://fedorahosted.org/elfutils/" -SRC_URI="https://fedorahosted.org/releases/e/l/${PN}/${PV}/${P}.tar.bz2 - https://fedorahosted.org/releases/e/l/${PN}/${PV}/${PN}-portability.patch -> ${P}-portability.patch" - -LICENSE="GPL-2-with-exceptions" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux" -IUSE="bzip2 lzma nls static-libs test +threads +utils zlib" - -# This pkg does not actually seem to compile currently in a uClibc -# environment (xrealloc errs), but we need to ensure that glibc never -# gets pulled in as a dep since this package does not respect virtual/libc -RDEPEND="zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - bzip2? ( >=app-arch/bzip2-1.0.6-r4[${MULTILIB_USEDEP}] ) - lzma? ( >=app-arch/xz-utils-5.0.5-r1[${MULTILIB_USEDEP}] ) - !dev-libs/libelf - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - nls? ( sys-devel/gettext ) - >=sys-devel/flex-2.5.4a - sys-devel/m4" - -src_prepare() { - epatch "${FILESDIR}"/${PN}-0.118-PaX-support.patch - epatch "${DISTDIR}"/${P}-portability.patch - use static-libs || sed -i -e '/^lib_LIBRARIES/s:=.*:=:' -e '/^%.os/s:%.o$::' lib{asm,dw,elf}/Makefile.in - sed -i 's:-Werror::' */Makefile.in - # some patches touch both configure and configure.ac - find -type f -exec touch -r configure {} + -} - -src_configure() { - use test && append-flags -g #407135 - multilib-minimal_src_configure -} - -multilib_src_configure() { - ECONF_SOURCE="${S}" econf \ - --disable-werror \ - $(use_enable nls) \ - $(use_enable threads thread-safety) \ - --program-prefix="eu-" \ - $(use_with zlib) \ - $(use_with bzip2 bzlib) \ - $(use_with lzma) -} - -multilib_src_test() { - env LD_LIBRARY_PATH="${BUILD_DIR}/libelf:${BUILD_DIR}/libebl:${BUILD_DIR}/libdw:${BUILD_DIR}/libasm" \ - LC_ALL="C" \ - emake check || die -} - -multilib_src_install_all() { - einstalldocs - dodoc NOTES - # These build quick, and are needed for most tests, so don't - # disable their building when the USE flag is disabled. - use utils || rm -rf "${ED}"/usr/bin -} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.161.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.161.ebuild deleted file mode 100644 index 0b70488ecd..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.161.ebuild +++ /dev/null @@ -1,73 +0,0 @@ -# Copyright 1999-2014 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="4" - -inherit eutils flag-o-matic multilib-minimal - -DESCRIPTION="Libraries/utilities to handle ELF objects (drop in replacement for libelf)" -HOMEPAGE="https://fedorahosted.org/elfutils/" -SRC_URI="https://fedorahosted.org/releases/e/l/${PN}/${PV}/${P}.tar.bz2 - https://fedorahosted.org/releases/e/l/${PN}/${PV}/${PN}-portability-${PV}.patch -> ${P}-portability.patch" - -LICENSE="GPL-2-with-exceptions" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux" -IUSE="bzip2 lzma nls static-libs test +threads +utils zlib" - -# This pkg does not actually seem to compile currently in a uClibc -# environment (xrealloc errs), but we need to ensure that glibc never -# gets pulled in as a dep since this package does not respect virtual/libc -RDEPEND="zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - bzip2? ( >=app-arch/bzip2-1.0.6-r4[${MULTILIB_USEDEP}] ) - lzma? ( >=app-arch/xz-utils-5.0.5-r1[${MULTILIB_USEDEP}] ) - !dev-libs/libelf - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - nls? ( sys-devel/gettext ) - >=sys-devel/flex-2.5.4a - sys-devel/m4" - -src_prepare() { - epatch "${FILESDIR}"/${PN}-0.118-PaX-support.patch - epatch "${DISTDIR}"/${P}-portability.patch - epatch "${FILESDIR}"/${P}-libelf-dir-traversal.patch #534000 - use static-libs || sed -i -e '/^lib_LIBRARIES/s:=.*:=:' -e '/^%.os/s:%.o$::' lib{asm,dw,elf}/Makefile.in - sed -i 's:-Werror::' */Makefile.in - # some patches touch both configure and configure.ac - find -type f -exec touch -r configure {} + -} - -src_configure() { - use test && append-flags -g #407135 - multilib-minimal_src_configure -} - -multilib_src_configure() { - ECONF_SOURCE="${S}" econf \ - --disable-werror \ - $(use_enable nls) \ - $(use_enable threads thread-safety) \ - --program-prefix="eu-" \ - $(use_with zlib) \ - $(use_with bzip2 bzlib) \ - $(use_with lzma) -} - -multilib_src_test() { - env LD_LIBRARY_PATH="${BUILD_DIR}/libelf:${BUILD_DIR}/libebl:${BUILD_DIR}/libdw:${BUILD_DIR}/libasm" \ - LC_ALL="C" \ - emake check || die -} - -multilib_src_install_all() { - einstalldocs - dodoc NOTES - # These build quick, and are needed for most tests, so don't - # disable their building when the USE flag is disabled. - use utils || rm -rf "${ED}"/usr/bin -} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.162.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.162.ebuild deleted file mode 100644 index a2ae40f23f..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.162.ebuild +++ /dev/null @@ -1,72 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="4" - -inherit eutils flag-o-matic multilib-minimal - -DESCRIPTION="Libraries/utilities to handle ELF objects (drop in replacement for libelf)" -HOMEPAGE="https://fedorahosted.org/elfutils/" -SRC_URI="https://fedorahosted.org/releases/e/l/${PN}/${PV}/${P}.tar.bz2 - https://fedorahosted.org/releases/e/l/${PN}/${PV}/${PN}-portability-${PV}.patch -> ${P}-portability.patch" - -LICENSE="GPL-2-with-exceptions" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux" -IUSE="bzip2 lzma nls static-libs test +threads +utils zlib" - -# This pkg does not actually seem to compile currently in a uClibc -# environment (xrealloc errs), but we need to ensure that glibc never -# gets pulled in as a dep since this package does not respect virtual/libc -RDEPEND="zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - bzip2? ( >=app-arch/bzip2-1.0.6-r4[${MULTILIB_USEDEP}] ) - lzma? ( >=app-arch/xz-utils-5.0.5-r1[${MULTILIB_USEDEP}] ) - !dev-libs/libelf - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - nls? ( sys-devel/gettext ) - >=sys-devel/flex-2.5.4a - sys-devel/m4" - -src_prepare() { - epatch "${FILESDIR}"/${PN}-0.118-PaX-support.patch - epatch "${DISTDIR}"/${P}-portability.patch - use static-libs || sed -i -e '/^lib_LIBRARIES/s:=.*:=:' -e '/^%.os/s:%.o$::' lib{asm,dw,elf}/Makefile.in - sed -i 's:-Werror::' */Makefile.in - # some patches touch both configure and configure.ac - find -type f -exec touch -r configure {} + -} - -src_configure() { - use test && append-flags -g #407135 - multilib-minimal_src_configure -} - -multilib_src_configure() { - ECONF_SOURCE="${S}" econf \ - --disable-werror \ - $(use_enable nls) \ - $(use_enable threads thread-safety) \ - --program-prefix="eu-" \ - $(use_with zlib) \ - $(use_with bzip2 bzlib) \ - $(use_with lzma) -} - -multilib_src_test() { - env LD_LIBRARY_PATH="${BUILD_DIR}/libelf:${BUILD_DIR}/libebl:${BUILD_DIR}/libdw:${BUILD_DIR}/libasm" \ - LC_ALL="C" \ - emake check || die -} - -multilib_src_install_all() { - einstalldocs - dodoc NOTES - # These build quick, and are needed for most tests, so don't - # disable their building when the USE flag is disabled. - use utils || rm -rf "${ED}"/usr/bin -} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.163.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.163.ebuild deleted file mode 100644 index a2ae40f23f..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.163.ebuild +++ /dev/null @@ -1,72 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI="4" - -inherit eutils flag-o-matic multilib-minimal - -DESCRIPTION="Libraries/utilities to handle ELF objects (drop in replacement for libelf)" -HOMEPAGE="https://fedorahosted.org/elfutils/" -SRC_URI="https://fedorahosted.org/releases/e/l/${PN}/${PV}/${P}.tar.bz2 - https://fedorahosted.org/releases/e/l/${PN}/${PV}/${PN}-portability-${PV}.patch -> ${P}-portability.patch" - -LICENSE="GPL-2-with-exceptions" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux" -IUSE="bzip2 lzma nls static-libs test +threads +utils zlib" - -# This pkg does not actually seem to compile currently in a uClibc -# environment (xrealloc errs), but we need to ensure that glibc never -# gets pulled in as a dep since this package does not respect virtual/libc -RDEPEND="zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - bzip2? ( >=app-arch/bzip2-1.0.6-r4[${MULTILIB_USEDEP}] ) - lzma? ( >=app-arch/xz-utils-5.0.5-r1[${MULTILIB_USEDEP}] ) - !dev-libs/libelf - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - nls? ( sys-devel/gettext ) - >=sys-devel/flex-2.5.4a - sys-devel/m4" - -src_prepare() { - epatch "${FILESDIR}"/${PN}-0.118-PaX-support.patch - epatch "${DISTDIR}"/${P}-portability.patch - use static-libs || sed -i -e '/^lib_LIBRARIES/s:=.*:=:' -e '/^%.os/s:%.o$::' lib{asm,dw,elf}/Makefile.in - sed -i 's:-Werror::' */Makefile.in - # some patches touch both configure and configure.ac - find -type f -exec touch -r configure {} + -} - -src_configure() { - use test && append-flags -g #407135 - multilib-minimal_src_configure -} - -multilib_src_configure() { - ECONF_SOURCE="${S}" econf \ - --disable-werror \ - $(use_enable nls) \ - $(use_enable threads thread-safety) \ - --program-prefix="eu-" \ - $(use_with zlib) \ - $(use_with bzip2 bzlib) \ - $(use_with lzma) -} - -multilib_src_test() { - env LD_LIBRARY_PATH="${BUILD_DIR}/libelf:${BUILD_DIR}/libebl:${BUILD_DIR}/libdw:${BUILD_DIR}/libasm" \ - LC_ALL="C" \ - emake check || die -} - -multilib_src_install_all() { - einstalldocs - dodoc NOTES - # These build quick, and are needed for most tests, so don't - # disable their building when the USE flag is disabled. - use utils || rm -rf "${ED}"/usr/bin -} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.169-r1.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.169-r1.ebuild new file mode 100644 index 0000000000..44003a04d5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.169-r1.ebuild @@ -0,0 +1,64 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI=6 + +inherit eutils flag-o-matic multilib-minimal + +DESCRIPTION="Libraries/utilities to handle ELF objects (drop in replacement for libelf)" +HOMEPAGE="http://elfutils.org/" +SRC_URI="https://sourceware.org/elfutils/ftp/${PV}/${P}.tar.bz2" + +LICENSE="|| ( GPL-2+ LGPL-3+ ) utils? ( GPL-3+ )" +SLOT="0" +KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh ~sparc x86 ~amd64-linux ~arm-linux ~x86-linux" +IUSE="bzip2 lzma nls static-libs test +threads +utils" + +RDEPEND=">=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] + bzip2? ( >=app-arch/bzip2-1.0.6-r4[${MULTILIB_USEDEP}] ) + lzma? ( >=app-arch/xz-utils-5.0.5-r1[${MULTILIB_USEDEP}] ) + !dev-libs/libelf" +DEPEND="${RDEPEND} + nls? ( sys-devel/gettext ) + >=sys-devel/flex-2.5.4a + sys-devel/m4" + +src_prepare() { + default + epatch "${FILESDIR}"/${PN}-0.118-PaX-support.patch + if use static-libs; then + sed -i -e '/^lib_LIBRARIES/s:=.*:=:' -e '/^%.os/s:%.o$::' lib{asm,dw,elf}/Makefile.in || die + fi + sed -i 's:-Werror::' */Makefile.in || die +} + +src_configure() { + use test && append-flags -g #407135 + multilib-minimal_src_configure +} + +multilib_src_configure() { + ECONF_SOURCE="${S}" econf \ + $(use_enable nls) \ + $(use_enable threads thread-safety) \ + --program-prefix="eu-" \ + --with-zlib \ + $(use_with bzip2 bzlib) \ + $(use_with lzma) +} + +multilib_src_test() { + env LD_LIBRARY_PATH="${BUILD_DIR}/libelf:${BUILD_DIR}/libebl:${BUILD_DIR}/libdw:${BUILD_DIR}/libasm" \ + LC_ALL="C" \ + emake check +} + +multilib_src_install_all() { + einstalldocs + dodoc NOTES + # These build quick, and are needed for most tests, so don't + # disable their building when the USE flag is disabled. + if ! use utils; then + rm -rf "${ED}"/usr/bin || die + fi +} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.170-r1.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.170-r1.ebuild new file mode 100644 index 0000000000..f0c1ce9046 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.170-r1.ebuild @@ -0,0 +1,66 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI=6 + +inherit flag-o-matic multilib-minimal + +DESCRIPTION="Libraries/utilities to handle ELF objects (drop in replacement for libelf)" +HOMEPAGE="http://elfutils.org/" +SRC_URI="https://sourceware.org/elfutils/ftp/${PV}/${P}.tar.bz2" + +LICENSE="|| ( GPL-2+ LGPL-3+ ) utils? ( GPL-3+ )" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux" +IUSE="bzip2 lzma nls static-libs test +threads +utils" + +RDEPEND=">=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] + bzip2? ( >=app-arch/bzip2-1.0.6-r4[${MULTILIB_USEDEP}] ) + lzma? ( >=app-arch/xz-utils-5.0.5-r1[${MULTILIB_USEDEP}] ) + !dev-libs/libelf" +DEPEND="${RDEPEND} + nls? ( sys-devel/gettext ) + >=sys-devel/flex-2.5.4a + sys-devel/m4" + +PATCHES=("${FILESDIR}"/${PN}-0.118-PaX-support.patch) + +src_prepare() { + default + + if ! use static-libs; then + sed -i -e '/^lib_LIBRARIES/s:=.*:=:' -e '/^%.os/s:%.o$::' lib{asm,dw,elf}/Makefile.in || die + fi + sed -i 's:-Werror::' */Makefile.in || die +} + +src_configure() { + use test && append-flags -g #407135 + multilib-minimal_src_configure +} + +multilib_src_configure() { + ECONF_SOURCE="${S}" econf \ + $(use_enable nls) \ + $(use_enable threads thread-safety) \ + --program-prefix="eu-" \ + --with-zlib \ + $(use_with bzip2 bzlib) \ + $(use_with lzma) +} + +multilib_src_test() { + env LD_LIBRARY_PATH="${BUILD_DIR}/libelf:${BUILD_DIR}/libebl:${BUILD_DIR}/libdw:${BUILD_DIR}/libasm" \ + LC_ALL="C" \ + emake check +} + +multilib_src_install_all() { + einstalldocs + dodoc NOTES + # These build quick, and are needed for most tests, so don't + # disable their building when the USE flag is disabled. + if ! use utils; then + rm -rf "${ED}"/usr/bin || die + fi +} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.170.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.170.ebuild new file mode 100644 index 0000000000..5172c44eb9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/elfutils-0.170.ebuild @@ -0,0 +1,66 @@ +# Copyright 1999-2017 Gentoo Foundation +# Distributed under the terms of the GNU General Public License v2 + +EAPI=6 + +inherit flag-o-matic multilib-minimal + +DESCRIPTION="Libraries/utilities to handle ELF objects (drop in replacement for libelf)" +HOMEPAGE="http://elfutils.org/" +SRC_URI="https://sourceware.org/elfutils/ftp/${PV}/${P}.tar.bz2" + +LICENSE="|| ( GPL-2+ LGPL-3+ ) utils? ( GPL-3+ )" +SLOT="0" +KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux" +IUSE="bzip2 lzma nls static-libs test +threads +utils" + +RDEPEND=">=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] + bzip2? ( >=app-arch/bzip2-1.0.6-r4[${MULTILIB_USEDEP}] ) + lzma? ( >=app-arch/xz-utils-5.0.5-r1[${MULTILIB_USEDEP}] ) + !dev-libs/libelf" +DEPEND="${RDEPEND} + nls? ( sys-devel/gettext ) + >=sys-devel/flex-2.5.4a + sys-devel/m4" + +PATCHES=("${FILESDIR}"/${PN}-0.118-PaX-support.patch) + +src_prepare() { + default + + if use static-libs; then + sed -i -e '/^lib_LIBRARIES/s:=.*:=:' -e '/^%.os/s:%.o$::' lib{asm,dw,elf}/Makefile.in || die + fi + sed -i 's:-Werror::' */Makefile.in || die +} + +src_configure() { + use test && append-flags -g #407135 + multilib-minimal_src_configure +} + +multilib_src_configure() { + ECONF_SOURCE="${S}" econf \ + $(use_enable nls) \ + $(use_enable threads thread-safety) \ + --program-prefix="eu-" \ + --with-zlib \ + $(use_with bzip2 bzlib) \ + $(use_with lzma) +} + +multilib_src_test() { + env LD_LIBRARY_PATH="${BUILD_DIR}/libelf:${BUILD_DIR}/libebl:${BUILD_DIR}/libdw:${BUILD_DIR}/libasm" \ + LC_ALL="C" \ + emake check +} + +multilib_src_install_all() { + einstalldocs + dodoc NOTES + # These build quick, and are needed for most tests, so don't + # disable their building when the USE flag is disabled. + if ! use utils; then + rm -rf "${ED}"/usr/bin || die + fi +} diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.118-PaX-support.patch b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.118-PaX-support.patch index 083f32ff85..0ae359fe7d 100644 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.118-PaX-support.patch +++ b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.118-PaX-support.patch @@ -4,8 +4,8 @@ Patch by Kevin F. Quinn http://bugs.gentoo.org/115100 ---- libelf/elf.h -+++ libelf/elf.h +--- a/libelf/elf.h ++++ b/libelf/elf.h @@ -568,6 +568,7 @@ #define PT_GNU_EH_FRAME 0x6474e550 /* GCC .eh_frame_hdr segment */ #define PT_GNU_STACK 0x6474e551 /* Indicates stack executability */ @@ -14,8 +14,8 @@ http://bugs.gentoo.org/115100 #define PT_LOSUNW 0x6ffffffa #define PT_SUNWBSS 0x6ffffffa /* Sun Specific segment */ #define PT_SUNWSTACK 0x6ffffffb /* Stack segment */ ---- src/elflint.c -+++ src/elflint.c +--- a/src/elflint.c ++++ b/src/elflint.c @@ -3187,6 +3187,7 @@ if (phdr->p_type >= PT_NUM && phdr->p_type != PT_GNU_EH_FRAME diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.143-configure.patch b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.143-configure.patch deleted file mode 100644 index 4c00cd88d8..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.143-configure.patch +++ /dev/null @@ -1,22 +0,0 @@ -https://bugs.gentoo.org/287130 - ---- elfutils-0.143/configure -+++ elfutils-0.143/configure -@@ -5460,7 +5460,7 @@ - - # 1.234 -> 1234 - case "$PACKAGE_VERSION" in --[0-9].*) eu_version="${PACKAGE_VERSION/./}" ;; -+[0-9].*) eu_version=`echo "$PACKAGE_VERSION" | sed 's@\.@@'` ;; - *) { { $as_echo "$as_me:$LINENO: error: confused by version number '$PACKAGE_VERSION'" >&5 - $as_echo "$as_me: error: confused by version number '$PACKAGE_VERSION'" >&2;} - { (exit 1); exit 1; }; } ;; -@@ -5495,7 +5495,7 @@ - esac - - # Round up to the next release API (x.y) version. --eu_version=$[($eu_version + 999) / 1000] -+eu_version=`expr \( $eu_version + 999 \) / 1000` - - cat >confcache <<\_ACEOF - # This file is a shell script that caches the results of configure diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.148-bashifications.patch b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.148-bashifications.patch deleted file mode 100644 index 5cdf34fa3a..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.148-bashifications.patch +++ /dev/null @@ -1,23 +0,0 @@ -Remove bashifications -https://bugs.gentoo.org/287130 - ---- a/configure -+++ b/configure -@@ -4874,7 +4874,7 @@ ac_config_files="$ac_config_files version.h:config/version.h.in" - - # 1.234 -> 1234 - case "$PACKAGE_VERSION" in --[0-9].*) eu_version="${PACKAGE_VERSION/./}" ;; -+[0-9].*) eu_version=`echo "$PACKAGE_VERSION" | sed 's@\.@@'` ;; - *) as_fn_error "confused by version number '$PACKAGE_VERSION'" "$LINENO" 5 ;; - esac - case "$eu_version" in -@@ -4903,7 +4903,7 @@ case "$eu_version" in - esac - - # Round up to the next release API (x.y) version. --eu_version=$[($eu_version + 999) / 1000] -+eu_version=`expr \( $eu_version + 999 \) / 1000` - - cat >confcache <<\_ACEOF - # This file is a shell script that caches the results of configure diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.150-bashifications.patch b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.150-bashifications.patch deleted file mode 100644 index a2f2b85857..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.150-bashifications.patch +++ /dev/null @@ -1,23 +0,0 @@ -Remove bashifications -https://bugs.gentoo.org/287130 - ---- a/configure -+++ b/configure -@@ -4880,7 +4880,7 @@ ac_config_files="$ac_config_files version.h:config/version.h.in" - - # 1.234 -> 1234 - case "$PACKAGE_VERSION" in --[0-9].*) eu_version="${PACKAGE_VERSION/./}" ;; -+[0-9].*) eu_version=`echo "$PACKAGE_VERSION" | sed 's@\.@@'` ;; - *) as_fn_error $? "confused by version number '$PACKAGE_VERSION'" "$LINENO" 5 ;; - esac - case "$eu_version" in -@@ -4909,7 +4909,7 @@ case "$eu_version" in - esac - - # Round up to the next release API (x.y) version. --eu_version=$[($eu_version + 999) / 1000] -+eu_version=`expr \( $eu_version + 999 \) / 1000` - - cat >confcache <<\_ACEOF - # This file is a shell script that caches the results of configure diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.158-tests-backtrace-native-core.patch b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.158-tests-backtrace-native-core.patch deleted file mode 100644 index 213b06b7a1..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.158-tests-backtrace-native-core.patch +++ /dev/null @@ -1,46 +0,0 @@ -https://bugs.gentoo.org/497566 - -From 435808a681cc375f0907f2066c4cc062173a6c7e Mon Sep 17 00:00:00 2001 -From: Jan Kratochvil -Date: Sat, 18 Jan 2014 21:56:13 +0100 -Subject: [PATCH] Fix false FAILs on testsuite with ulimit -c unlimited. - -Signed-off-by: Jan Kratochvil ---- - tests/ChangeLog | 6 ++++++ - tests/backtrace-child.c | 8 +++++--- - 2 files changed, 11 insertions(+), 3 deletions(-) - -2014-01-18 Jan Kratochvil - - Fix false FAILs on testsuite with ulimit -c unlimited. - * backtrace-child.c (sigusr2): Call pthread_exit. - (main): Return, do not call abort. - -diff --git a/tests/backtrace-child.c b/tests/backtrace-child.c -index 0db1258..512aa23 100644 ---- a/tests/backtrace-child.c -+++ b/tests/backtrace-child.c -@@ -100,7 +100,10 @@ sigusr2 (int signo) - if (! gencore) - { - raise (SIGUSR1); -- /* It should not be reached. */ -+ /* Do not return as stack may be invalid due to ptrace-patched PC to the -+ jmp function. */ -+ pthread_exit (NULL); -+ /* Not reached. */ - abort (); - } - /* Here we dump the core for --gencore. */ -@@ -218,6 +221,5 @@ main (int argc UNUSED, char **argv) - pthread_join (thread, NULL); - else - raise (SIGUSR2); -- /* Not reached. */ -- abort (); -+ return 0; - } --- -1.8.5.3 - diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.161-libelf-dir-traversal.patch b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.161-libelf-dir-traversal.patch deleted file mode 100644 index 84a28c71d2..0000000000 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/files/elfutils-0.161-libelf-dir-traversal.patch +++ /dev/null @@ -1,51 +0,0 @@ -https://bugs.gentoo.org/534000 - -From 147018e729e7c22eeabf15b82d26e4bf68a0d18e Mon Sep 17 00:00:00 2001 -From: Alexander Cherepanov -Date: Sun, 28 Dec 2014 19:57:19 +0300 -Subject: [PATCH] libelf: Fix dir traversal vuln in ar extraction. - -read_long_names terminates names at the first '/' found but then skips -one character without checking (it's supposed to be '\n'). Hence the -next name could start with any character including '/'. This leads to -a directory traversal vulnerability at the time the contents of the -archive is extracted. - -The danger is mitigated by the fact that only one '/' is possible in a -resulting filename and only in the leading position. Hence only files -in the root directory can be written via this vuln and only when ar is -executed as root. - -The fix for the vuln is to not skip any characters while looking -for '/'. - -Signed-off-by: Alexander Cherepanov ---- - libelf/ChangeLog | 5 +++++ - libelf/elf_begin.c | 5 +---- - 2 files changed, 6 insertions(+), 4 deletions(-) - -2014-12-28 Alexander Cherepanov - - * elf_begin.c (read_long_names): Don't miss '/' right after - another '/'. Fixes a dir traversal vuln in ar extraction. - -diff --git a/libelf/elf_begin.c b/libelf/elf_begin.c -index 30abe0b..cd3756c 100644 ---- a/libelf/elf_begin.c -+++ b/libelf/elf_begin.c -@@ -749,10 +749,7 @@ read_long_names (Elf *elf) - } - - /* NUL-terminate the string. */ -- *runp = '\0'; -- -- /* Skip the NUL byte and the \012. */ -- runp += 2; -+ *runp++ = '\0'; - - /* A sanity check. Somebody might have generated invalid - archive. */ --- -2.2.1 - diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/metadata.xml b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/metadata.xml index 6d5bc382fd..14c09d810f 100644 --- a/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/metadata.xml +++ b/sdk_container/src/third_party/portage-stable/dev-libs/elfutils/metadata.xml @@ -1,7 +1,10 @@ - toolchain + + toolchain@gentoo.org + Gentoo Toolchain Project + Support automatic decompression of LZMA-compressed files and kernel images Build the libraries with thread safe support diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.158 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.158 deleted file mode 100644 index ef1e936411..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.158 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) nls? ( sys-devel/gettext ) >=sys-devel/flex-2.5.4a sys-devel/m4 -DESCRIPTION=Libraries/utilities to handle ELF objects (drop in replacement for libelf) -EAPI=4 -HOMEPAGE=https://fedorahosted.org/elfutils/ -IUSE=bzip2 lzma nls static-libs test +threads +utils zlib abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=alpha amd64 arm arm64 hppa ia64 m68k ~mips ppc ppc64 s390 sh sparc x86 ~amd64-linux ~arm-linux ~x86-linux -LICENSE=GPL-2-with-exceptions -RDEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=https://fedorahosted.org/releases/e/l/elfutils/0.158/elfutils-0.158.tar.bz2 https://fedorahosted.org/releases/e/l/elfutils/0.158/elfutils-portability.patch -> elfutils-0.158-portability.patch https://fedorahosted.org/releases/e/l/elfutils/0.158/elfutils-robustify.patch -> elfutils-0.158-robustify.patch -_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=dfd42033add5f0e8a763e3951e6df746 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.159 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.159 deleted file mode 100644 index 603ba2f28c..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.159 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) nls? ( sys-devel/gettext ) >=sys-devel/flex-2.5.4a sys-devel/m4 -DESCRIPTION=Libraries/utilities to handle ELF objects (drop in replacement for libelf) -EAPI=4 -HOMEPAGE=https://fedorahosted.org/elfutils/ -IUSE=bzip2 lzma nls static-libs test +threads +utils zlib abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux -LICENSE=GPL-2-with-exceptions -RDEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=https://fedorahosted.org/releases/e/l/elfutils/0.159/elfutils-0.159.tar.bz2 https://fedorahosted.org/releases/e/l/elfutils/0.159/elfutils-portability.patch -> elfutils-0.159-portability.patch -_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=757a1fabc09f4d2fcd888e37ce084aee diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.160 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.160 deleted file mode 100644 index 55af964084..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.160 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) nls? ( sys-devel/gettext ) >=sys-devel/flex-2.5.4a sys-devel/m4 -DESCRIPTION=Libraries/utilities to handle ELF objects (drop in replacement for libelf) -EAPI=4 -HOMEPAGE=https://fedorahosted.org/elfutils/ -IUSE=bzip2 lzma nls static-libs test +threads +utils zlib abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux -LICENSE=GPL-2-with-exceptions -RDEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=https://fedorahosted.org/releases/e/l/elfutils/0.160/elfutils-0.160.tar.bz2 https://fedorahosted.org/releases/e/l/elfutils/0.160/elfutils-portability.patch -> elfutils-0.160-portability.patch -_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=757a1fabc09f4d2fcd888e37ce084aee diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.161 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.161 deleted file mode 100644 index 4dd59555f4..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.161 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) nls? ( sys-devel/gettext ) >=sys-devel/flex-2.5.4a sys-devel/m4 -DESCRIPTION=Libraries/utilities to handle ELF objects (drop in replacement for libelf) -EAPI=4 -HOMEPAGE=https://fedorahosted.org/elfutils/ -IUSE=bzip2 lzma nls static-libs test +threads +utils zlib abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux -LICENSE=GPL-2-with-exceptions -RDEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=https://fedorahosted.org/releases/e/l/elfutils/0.161/elfutils-0.161.tar.bz2 https://fedorahosted.org/releases/e/l/elfutils/0.161/elfutils-portability-0.161.patch -> elfutils-0.161-portability.patch -_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=c8d305231d4ca888273dbc163ec753db diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.162 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.162 deleted file mode 100644 index 9f6246a131..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.162 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) nls? ( sys-devel/gettext ) >=sys-devel/flex-2.5.4a sys-devel/m4 -DESCRIPTION=Libraries/utilities to handle ELF objects (drop in replacement for libelf) -EAPI=4 -HOMEPAGE=https://fedorahosted.org/elfutils/ -IUSE=bzip2 lzma nls static-libs test +threads +utils zlib abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux -LICENSE=GPL-2-with-exceptions -RDEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=https://fedorahosted.org/releases/e/l/elfutils/0.162/elfutils-0.162.tar.bz2 https://fedorahosted.org/releases/e/l/elfutils/0.162/elfutils-portability-0.162.patch -> elfutils-0.162-portability.patch -_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=78ab4f4192e203cc66ce4108ea916d70 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.163 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.163 deleted file mode 100644 index cc4bbadd90..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.163 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare test -DEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) nls? ( sys-devel/gettext ) >=sys-devel/flex-2.5.4a sys-devel/m4 -DESCRIPTION=Libraries/utilities to handle ELF objects (drop in replacement for libelf) -EAPI=4 -HOMEPAGE=https://fedorahosted.org/elfutils/ -IUSE=bzip2 lzma nls static-libs test +threads +utils zlib abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux -LICENSE=GPL-2-with-exceptions -RDEPEND=zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20130224-r11 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=https://fedorahosted.org/releases/e/l/elfutils/0.163/elfutils-0.163.tar.bz2 https://fedorahosted.org/releases/e/l/elfutils/0.163/elfutils-portability-0.163.patch -> elfutils-0.163-portability.patch -_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=78ab4f4192e203cc66ce4108ea916d70 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.169-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.169-r1 new file mode 100644 index 0000000000..f6a134d667 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.169-r1 @@ -0,0 +1,13 @@ +DEFINED_PHASES=compile configure install prepare test +DEPEND=>=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf nls? ( sys-devel/gettext ) >=sys-devel/flex-2.5.4a sys-devel/m4 +DESCRIPTION=Libraries/utilities to handle ELF objects (drop in replacement for libelf) +EAPI=6 +HOMEPAGE=http://elfutils.org/ +IUSE=bzip2 lzma nls static-libs test +threads +utils abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh ~sparc x86 ~amd64-linux ~arm-linux ~x86-linux +LICENSE=|| ( GPL-2+ LGPL-3+ ) utils? ( GPL-3+ ) +RDEPEND=>=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf +SLOT=0 +SRC_URI=https://sourceware.org/elfutils/ftp/0.169/elfutils-0.169.tar.bz2 +_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 +_md5_=9df9e2e1dcb266d5f0eb7dc8e4ef2d03 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.170 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.170 new file mode 100644 index 0000000000..a4dbcb5354 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.170 @@ -0,0 +1,13 @@ +DEFINED_PHASES=compile configure install prepare test +DEPEND=>=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf nls? ( sys-devel/gettext ) >=sys-devel/flex-2.5.4a sys-devel/m4 +DESCRIPTION=Libraries/utilities to handle ELF objects (drop in replacement for libelf) +EAPI=6 +HOMEPAGE=http://elfutils.org/ +IUSE=bzip2 lzma nls static-libs test +threads +utils abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux +LICENSE=|| ( GPL-2+ LGPL-3+ ) utils? ( GPL-3+ ) +RDEPEND=>=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf +SLOT=0 +SRC_URI=https://sourceware.org/elfutils/ftp/0.170/elfutils-0.170.tar.bz2 +_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 +_md5_=1de5fc489d858c988d6574b84042ab3e diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.170-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.170-r1 new file mode 100644 index 0000000000..bf37d78520 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/elfutils-0.170-r1 @@ -0,0 +1,13 @@ +DEFINED_PHASES=compile configure install prepare test +DEPEND=>=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf nls? ( sys-devel/gettext ) >=sys-devel/flex-2.5.4a sys-devel/m4 +DESCRIPTION=Libraries/utilities to handle ELF objects (drop in replacement for libelf) +EAPI=6 +HOMEPAGE=http://elfutils.org/ +IUSE=bzip2 lzma nls static-libs test +threads +utils abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-linux ~arm-linux ~x86-linux +LICENSE=|| ( GPL-2+ LGPL-3+ ) utils? ( GPL-3+ ) +RDEPEND=>=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] bzip2? ( >=app-arch/bzip2-1.0.6-r4[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) lzma? ( >=app-arch/xz-utils-5.0.5-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) !dev-libs/libelf +SLOT=0 +SRC_URI=https://sourceware.org/elfutils/ftp/0.170/elfutils-0.170.tar.bz2 +_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea flag-o-matic 61cad4fb5d800b29d484b27cb033f59b ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 +_md5_=725ef5f2bb514b8ab246a06f3bc523cf From 88ae7c5f879460b41dc99da6dd558af9b2232835 Mon Sep 17 00:00:00 2001 From: David Michael Date: Sun, 15 Oct 2017 14:49:30 -0700 Subject: [PATCH 13/14] bump(dev-libs/libtasn1): sync with upstream --- .../portage-stable/dev-libs/libtasn1/Manifest | 6 +- .../files/libtasn1-4.12-CVE-2017-10790.patch | 55 +++++++++++++++++++ ...4.10-r1.ebuild => libtasn1-4.12-r1.ebuild} | 10 +++- .../md5-cache/dev-libs/libtasn1-4.10-r1 | 13 ----- .../md5-cache/dev-libs/libtasn1-4.12-r1 | 13 +++++ 5 files changed, 76 insertions(+), 21 deletions(-) create mode 100644 sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/files/libtasn1-4.12-CVE-2017-10790.patch rename sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/{libtasn1-4.10-r1.ebuild => libtasn1-4.12-r1.ebuild} (72%) delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/libtasn1-4.10-r1 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/libtasn1-4.12-r1 diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/Manifest b/sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/Manifest index e256aaf05a..fcab671419 100644 --- a/sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/Manifest +++ b/sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/Manifest @@ -1,5 +1 @@ -DIST libtasn1-4.10.tar.gz 1887057 SHA256 681a4d9a0d259f2125713f2e5766c5809f151b3a1392fd91390f780b4b8f5a02 SHA512 614e93128e6be8f46a2ad46e2a515e2edfb1f5a2e90c9e5da02d3afc0a882dc956632dd2b1eddd6b0e258e7b58a82d5d745d8ccd23120d94bb0af48132ed1a18 WHIRLPOOL 3f7bf6ba72006b22d126546e5f683d5bb8e758e4a919deac5d319d520175f7805a0c922561967bc7708ac1838ae1ccfa0da829b818705434eb46406e8a0ff1f1 -EBUILD libtasn1-4.10-r1.ebuild 1344 SHA256 1ec72d3b03b4af6ff70e4ca708eff940f9192cf650ec3d7e12dc50be0d50916a SHA512 90d4ed7f9d6b0dddd3136f027cbe8da2a35cab1838f134e4620496e2001b971feac1bc10b2bd752f3841542ff50c5c9c1056eeb0d594c6e5188b4995014b8c79 WHIRLPOOL cac824a8af4034108591793db62e1d9bee1386102da512d7094b4ae339fe81bb6f5b3f49376df61a628ed998dc46944a7ae97a3e3e3a33261bfacc8e6d5a306f -MISC ChangeLog 5517 SHA256 6ee489831ed2ca0de17096d39abde90111420649410b80e3b2685a7a0c77d361 SHA512 d18846f310c2e49fc65802855beb4ff7c3a303dd2a3288d207356f87e7209ae3f9df3ba478dceb3401e212fc63530a0fbcbf422baf50931d66aa158a689ce6b9 WHIRLPOOL a0053d02e586abf07526896741d92bb027af09339bbca11a09995aa071e8a98540cd0789948422c6f60e95b91333974a05be87d9785b52c1d18f659d01211f52 -MISC ChangeLog-2015 29688 SHA256 8f9a731b7eda2c9321d3934d944889d3c08fa2afe2bc0735c76fa894fb24d04e SHA512 d891912b5eabdc1ada0db858b0f6e5daa3c3d90b95bf9cbe3abf36931484f0305abb81d2c3c5448b82a57d6625cfec1eb874a2992f9a5fdf3ddcbe561ad4ed0e WHIRLPOOL bb760059ca2af1f3e11e5025023c3d0a64b8c2f6655060cf4ab38299235610910ffafbf03a536432abdf0df9e449aaeab971494738e353d9a6f6a9b7c24b0664 -MISC metadata.xml 347 SHA256 ffd75a0aa1c43acc2024cac48563e899f68020b6114547c3d4f7abff8253dc01 SHA512 2f70d06c9e91e2d9305cce180c302b6b04b4831fd93c1897fd2027a1bf5855700c5531ba3f9c3fe93748df1db923d6ad4ea78bbe3cfd2458c0006457ed43a450 WHIRLPOOL 2165e6fdce1234ecaa0dfddd3071a6cf71bfcfcfee58cc02149e43a49c3da775a91d3590be63dc916b8763f1f1a7e7f683614c9eac74e9ace77a6ee6cb31e208 +DIST libtasn1-4.12.tar.gz 1888450 SHA256 6753da2e621257f33f5b051cc114d417e5206a0818fe0b1ecfd6153f70934753 SHA512 6c551670949881193e39122f72948e4999ff1ba377f9ee5963d0a4ad1b84256e4fe42e9f6d6a2aa9f7d4ef7acc0e5174fb5cc3df5298524cdeda92f4b8c104f7 WHIRLPOOL a2f29dbfb59bb2cbe5d533647028c9418b2b4871b67f7367757ebf4c706eab2b1bac8d5645784899bb85e9611a28f693655c1ff857c984109c0719a6f5dd78a5 diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/files/libtasn1-4.12-CVE-2017-10790.patch b/sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/files/libtasn1-4.12-CVE-2017-10790.patch new file mode 100644 index 0000000000..eb752c20a9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/files/libtasn1-4.12-CVE-2017-10790.patch @@ -0,0 +1,55 @@ +From d8d805e1f2e6799bb2dff4871a8598dc83088a39 Mon Sep 17 00:00:00 2001 +From: Nikos Mavrogiannopoulos +Date: Thu, 22 Jun 2017 16:31:37 +0200 +Subject: [PATCH] _asn1_check_identifier: safer access to values read + +Signed-off-by: Nikos Mavrogiannopoulos +--- + lib/parser_aux.c | 17 ++++++++++++----- + 1 file changed, 12 insertions(+), 5 deletions(-) + +diff --git a/lib/parser_aux.c b/lib/parser_aux.c +index 976ab38..786ea64 100644 +--- a/lib/parser_aux.c ++++ b/lib/parser_aux.c +@@ -955,7 +955,7 @@ _asn1_check_identifier (asn1_node node) + if (p2 == NULL) + { + if (p->value) +- _asn1_strcpy (_asn1_identifierMissing, p->value); ++ _asn1_str_cpy (_asn1_identifierMissing, sizeof(_asn1_identifierMissing), (char*)p->value); + else + _asn1_strcpy (_asn1_identifierMissing, "(null)"); + return ASN1_IDENTIFIER_NOT_FOUND; +@@ -968,9 +968,15 @@ _asn1_check_identifier (asn1_node node) + if (p2 && (type_field (p2->type) == ASN1_ETYPE_DEFAULT)) + { + _asn1_str_cpy (name2, sizeof (name2), node->name); +- _asn1_str_cat (name2, sizeof (name2), "."); +- _asn1_str_cat (name2, sizeof (name2), (char *) p2->value); +- _asn1_strcpy (_asn1_identifierMissing, p2->value); ++ if (p2->value) ++ { ++ _asn1_str_cat (name2, sizeof (name2), "."); ++ _asn1_str_cat (name2, sizeof (name2), (char *) p2->value); ++ _asn1_str_cpy (_asn1_identifierMissing, sizeof(_asn1_identifierMissing), (char*)p2->value); ++ } ++ else ++ _asn1_strcpy (_asn1_identifierMissing, "(null)"); ++ + p2 = asn1_find_node (node, name2); + if (!p2 || (type_field (p2->type) != ASN1_ETYPE_OBJECT_ID) || + !(p2->type & CONST_ASSIGN)) +@@ -990,7 +996,8 @@ _asn1_check_identifier (asn1_node node) + _asn1_str_cpy (name2, sizeof (name2), node->name); + _asn1_str_cat (name2, sizeof (name2), "."); + _asn1_str_cat (name2, sizeof (name2), (char *) p2->value); +- _asn1_strcpy (_asn1_identifierMissing, p2->value); ++ _asn1_str_cpy (_asn1_identifierMissing, sizeof(_asn1_identifierMissing), (char*)p2->value); ++ + p2 = asn1_find_node (node, name2); + if (!p2 || (type_field (p2->type) != ASN1_ETYPE_OBJECT_ID) + || !(p2->type & CONST_ASSIGN)) +-- +1.9.1 + diff --git a/sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/libtasn1-4.10-r1.ebuild b/sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/libtasn1-4.12-r1.ebuild similarity index 72% rename from sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/libtasn1-4.10-r1.ebuild rename to sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/libtasn1-4.12-r1.ebuild index 722fc67701..581fad0288 100644 --- a/sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/libtasn1-4.10-r1.ebuild +++ b/sdk_container/src/third_party/portage-stable/dev-libs/libtasn1/libtasn1-4.12-r1.ebuild @@ -3,7 +3,7 @@ EAPI=6 -inherit multilib-minimal libtool +inherit multilib-minimal libtool ltprune DESCRIPTION="ASN.1 library" HOMEPAGE="https://www.gnu.org/software/libtasn1/" @@ -11,7 +11,7 @@ SRC_URI="mirror://gnu/${PN}/${P}.tar.gz" LICENSE="GPL-3 LGPL-2.1" SLOT="0/6" # subslot = libtasn1 soname version -KEYWORDS="alpha amd64 arm arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x64-cygwin ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" +KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x64-cygwin ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" IUSE="doc static-libs valgrind" DEPEND=">=dev-lang/perl-5.6 @@ -26,6 +26,10 @@ RDEPEND=" DOCS=( AUTHORS ChangeLog NEWS README THANKS ) +PATCHES=( + "${FILESDIR}/${P}-CVE-2017-10790.patch" +) + pkg_setup() { if use doc; then DOCS+=( doc/libtasn1.pdf ) @@ -46,5 +50,5 @@ multilib_src_configure() { multilib_src_install_all() { einstalldocs - use static-libs || find "${ED}" -name '*.la' -delete + prune_libtool_files } diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/libtasn1-4.10-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/libtasn1-4.10-r1 deleted file mode 100644 index 315d4e4248..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/libtasn1-4.10-r1 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-lang/perl-5.6 sys-apps/help2man virtual/yacc >=app-portage/elt-patches-20170317 -DESCRIPTION=ASN.1 library -EAPI=6 -HOMEPAGE=https://www.gnu.org/software/libtasn1/ -IUSE=doc static-libs valgrind abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=alpha amd64 arm arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x64-cygwin ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-2.1 -RDEPEND=valgrind? ( dev-util/valgrind ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20131008-r16 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/6 -SRC_URI=mirror://gnu/libtasn1/libtasn1-4.10.tar.gz -_eclasses_=libtool e32ea84bf82cf8987965b574672dba93 multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 -_md5_=b538a19cc5fe96e99be2c98d64b18df8 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/libtasn1-4.12-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/libtasn1-4.12-r1 new file mode 100644 index 0000000000..63c8317e73 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/dev-libs/libtasn1-4.12-r1 @@ -0,0 +1,13 @@ +DEFINED_PHASES=compile configure install prepare setup test +DEPEND=>=dev-lang/perl-5.6 sys-apps/help2man virtual/yacc >=app-portage/elt-patches-20170317 +DESCRIPTION=ASN.1 library +EAPI=6 +HOMEPAGE=https://www.gnu.org/software/libtasn1/ +IUSE=doc static-libs valgrind abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~x64-cygwin ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +LICENSE=GPL-3 LGPL-2.1 +RDEPEND=valgrind? ( dev-util/valgrind ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20131008-r16 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) +SLOT=0/6 +SRC_URI=mirror://gnu/libtasn1/libtasn1-4.12.tar.gz +_eclasses_=libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 +_md5_=618868abfb6eb28efdb114d8df3d85b8 From 7f26b283f5f01ffee4dce16176e6c93abcd1e13a Mon Sep 17 00:00:00 2001 From: David Michael Date: Sun, 15 Oct 2017 14:52:46 -0700 Subject: [PATCH 14/14] bump(net-libs/gnutls): sync with upstream --- .../md5-cache/net-libs/gnutls-3.3.17.1 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.3.18 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.3.19 | 13 - .../md5-cache/net-libs/gnutls-3.3.19-r1 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.3.20 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.3.21 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.3.22 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.3.23 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.4.10 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.4.11 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.4.13 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.4.5 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.4.6 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.4.7 | 13 - .../md5-cache/net-libs/gnutls-3.4.7-r1 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.4.8 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.4.9 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.5.0 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.5.1 | 13 - .../metadata/md5-cache/net-libs/gnutls-3.5.13 | 14 + .../metadata/md5-cache/net-libs/gnutls-3.5.15 | 14 + .../metadata/md5-cache/net-libs/gnutls-3.6.0 | 13 + .../portage-stable/net-libs/gnutls/ChangeLog | 333 --- .../net-libs/gnutls/ChangeLog-2015 | 2399 ----------------- .../portage-stable/net-libs/gnutls/Manifest | 20 +- .../gnutls/files/gnutls-2.12.20-AF_UNIX.patch | 37 - .../gnutls-2.12.20-guile-parallelmake.patch | 9 - .../gnutls/files/gnutls-2.12.20-libadd.patch | 36 - .../files/gnutls-2.12.23-CVE-2013-2116.patch | 25 - .../files/gnutls-2.12.23-CVE-2014-0092.patch | 102 - .../files/gnutls-2.12.23-CVE-2014-1959.patch | 14 - .../files/gnutls-2.12.23-CVE-2014-3466.patch | 311 --- .../files/gnutls-2.12.23-CVE-2014-3467.patch | 45 - .../files/gnutls-2.12.23-CVE-2014-3468.patch | 45 - .../files/gnutls-2.12.23-CVE-2014-3469.patch | 122 - .../files/gnutls-2.12.23-cross-compile.patch | 69 - .../files/gnutls-2.12.23-gdoc-perl-5.18.patch | 137 - ...tests-getaddrinfo-skip-if-no-network.patch | 30 - .../gnutls/files/gnutls-2.12.23-hppa.patch | 44 - ...stalling-man-1-even-with-disable-doc.patch | 94 - ...stalling-man-1-even-with-disable-doc.patch | 96 - .../net-libs/gnutls/gnutls-3.3.17.1.ebuild | 174 -- .../net-libs/gnutls/gnutls-3.3.18.ebuild | 174 -- .../net-libs/gnutls/gnutls-3.3.19-r1.ebuild | 177 -- .../net-libs/gnutls/gnutls-3.3.19.ebuild | 174 -- .../net-libs/gnutls/gnutls-3.3.20.ebuild | 177 -- .../net-libs/gnutls/gnutls-3.3.21.ebuild | 177 -- .../net-libs/gnutls/gnutls-3.3.22.ebuild | 177 -- .../net-libs/gnutls/gnutls-3.3.23.ebuild | 177 -- .../net-libs/gnutls/gnutls-3.4.10.ebuild | 135 - .../net-libs/gnutls/gnutls-3.4.13.ebuild | 135 - .../net-libs/gnutls/gnutls-3.4.5.ebuild | 132 - .../net-libs/gnutls/gnutls-3.4.6.ebuild | 132 - .../net-libs/gnutls/gnutls-3.4.7-r1.ebuild | 135 - .../net-libs/gnutls/gnutls-3.4.7.ebuild | 132 - .../net-libs/gnutls/gnutls-3.4.8.ebuild | 135 - .../net-libs/gnutls/gnutls-3.5.1.ebuild | 127 - ...utls-3.4.9.ebuild => gnutls-3.5.13.ebuild} | 105 +- ...tls-3.4.11.ebuild => gnutls-3.5.15.ebuild} | 127 +- ...nutls-3.5.0.ebuild => gnutls-3.6.0.ebuild} | 125 +- .../net-libs/gnutls/metadata.xml | 23 +- 61 files changed, 243 insertions(+), 6863 deletions(-) delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.17.1 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.18 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.19 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.19-r1 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.20 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.21 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.22 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.23 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.10 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.11 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.13 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.5 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.6 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.7 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.7-r1 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.8 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.9 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.0 delete mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.1 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.13 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.15 create mode 100644 sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.6.0 delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/ChangeLog delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/ChangeLog-2015 delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-AF_UNIX.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-guile-parallelmake.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-libadd.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2013-2116.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-0092.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-1959.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3466.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3467.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3468.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3469.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-cross-compile.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-gdoc-perl-5.18.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-gl-tests-getaddrinfo-skip-if-no-network.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-hppa.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-3.3.19-build-allow-installing-man-1-even-with-disable-doc.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-3.4.7-build-allow-installing-man-1-even-with-disable-doc.patch delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.17.1.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.18.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.19-r1.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.19.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.20.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.21.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.22.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.23.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.10.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.13.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.5.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.6.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.7-r1.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.7.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.8.ebuild delete mode 100644 sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.1.ebuild rename sdk_container/src/third_party/portage-stable/net-libs/gnutls/{gnutls-3.4.9.ebuild => gnutls-3.5.13.ebuild} (53%) rename sdk_container/src/third_party/portage-stable/net-libs/gnutls/{gnutls-3.4.11.ebuild => gnutls-3.5.15.ebuild} (50%) rename sdk_container/src/third_party/portage-stable/net-libs/gnutls/{gnutls-3.5.0.ebuild => gnutls-3.6.0.ebuild} (53%) diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.17.1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.17.1 deleted file mode 100644 index ce9d5ac31b..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.17.1 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=5 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=mirror://gnupg/gnutls/v3.3/gnutls-3.3.17.1.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=a89819345de77503aff20d133878412b diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.18 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.18 deleted file mode 100644 index fac52833c8..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.18 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=5 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=mirror://gnupg/gnutls/v3.3/gnutls-3.3.18.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=0a47829c08ada3cafe35dae1d6de9807 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.19 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.19 deleted file mode 100644 index e9e795a0d6..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.19 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=5 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=mirror://gnupg/gnutls/v3.3/gnutls-3.3.19.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=0a47829c08ada3cafe35dae1d6de9807 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.19-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.19-r1 deleted file mode 100644 index 70890bdf06..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.19-r1 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=5 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=mirror://gnupg/gnutls/v3.3/gnutls-3.3.19.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=8fd26b77402e76278d57fe143c09a367 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.20 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.20 deleted file mode 100644 index 94baf06b18..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.20 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=5 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=mirror://gnupg/gnutls/v3.3/gnutls-3.3.20.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=2da6be907266ab04e654479eab05382b diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.21 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.21 deleted file mode 100644 index 61bb0ff6ad..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.21 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=6 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=mirror://gnupg/gnutls/v3.3/gnutls-3.3.21.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=527b4909ba7693986d35159210985cc8 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.22 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.22 deleted file mode 100644 index 6c5060bfc9..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.22 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=6 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=mirror://gnupg/gnutls/v3.3/gnutls-3.3.22.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=527b4909ba7693986d35159210985cc8 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.23 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.23 deleted file mode 100644 index 259af548c4..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.3.23 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=6 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-2.7:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] sys-devel/autogen crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.20.7[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0 -SRC_URI=mirror://gnupg/gnutls/v3.3/gnutls-3.3.23.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=527b4909ba7693986d35159210985cc8 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.10 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.10 deleted file mode 100644 index 19906ff1fe..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.10 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=6 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/30 -SRC_URI=mirror://gnupg/gnutls/v3.4/gnutls-3.4.10.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=cfadac2e28b86e49e900cfe75d5a2b54 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.11 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.11 deleted file mode 100644 index 9a7b2a2ff0..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.11 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=6 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/30 -SRC_URI=mirror://gnupg/gnutls/v3.4/gnutls-3.4.11.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=cfadac2e28b86e49e900cfe75d5a2b54 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.13 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.13 deleted file mode 100644 index a01b281c94..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.13 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=6 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/30 -SRC_URI=mirror://gnupg/gnutls/v3.4/gnutls-3.4.13.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=cfadac2e28b86e49e900cfe75d5a2b54 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.5 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.5 deleted file mode 100644 index c80ac5f118..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.5 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=5 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/30 -SRC_URI=mirror://gnupg/gnutls/v3.4/gnutls-3.4.5.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=2b434b6725f9b6cf87feccb9fb97ca5d diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.6 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.6 deleted file mode 100644 index ff94ac5385..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.6 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=5 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/30 -SRC_URI=mirror://gnupg/gnutls/v3.4/gnutls-3.4.6.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=2b434b6725f9b6cf87feccb9fb97ca5d diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.7 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.7 deleted file mode 100644 index 5bd793b0f5..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.7 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=5 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/30 -SRC_URI=mirror://gnupg/gnutls/v3.4/gnutls-3.4.7.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=2b434b6725f9b6cf87feccb9fb97ca5d diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.7-r1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.7-r1 deleted file mode 100644 index ae26fa3b4d..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.7-r1 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=5 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/30 -SRC_URI=mirror://gnupg/gnutls/v3.4/gnutls-3.4.7.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=05a1a11418bf7999cc933c9d02b0c3b3 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.8 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.8 deleted file mode 100644 index 3a2f8bad08..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.8 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=5 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/30 -SRC_URI=mirror://gnupg/gnutls/v3.4/gnutls-3.4.8.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=19414a1c4cd0b78b924f88f248db9c21 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.9 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.9 deleted file mode 100644 index d6b895b170..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.4.9 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=6 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/30 -SRC_URI=mirror://gnupg/gnutls/v3.4/gnutls-3.4.9.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=cfadac2e28b86e49e900cfe75d5a2b54 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.0 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.0 deleted file mode 100644 index bbfcba9eea..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.0 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=6 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/30 -SRC_URI=mirror://gnupg/gnutls/v3.5/gnutls-3.5.0.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=58d0ec0dcb13c23b5afb052ef8d3c9a8 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.1 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.1 deleted file mode 100644 index a04c564a38..0000000000 --- a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.1 +++ /dev/null @@ -1,13 +0,0 @@ -DEFINED_PHASES=compile configure install prepare setup test -DEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( sys-apps/texinfo dev-util/gtk-doc ) nls? ( sys-devel/gettext ) test? ( app-misc/datefudge ) >=app-portage/elt-patches-20170317 !=sys-devel/automake-1.15:1.15 ) >=sys-devel/autoconf-2.69 >=sys-devel/libtool-2.4 -DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project -EAPI=6 -HOMEPAGE=http://www.gnutls.org/ -IUSE=+cxx dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 -KEYWORDS=~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris -LICENSE=GPL-3 LGPL-3 -RDEPEND=>=dev-libs/libtasn1-4.3[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:*[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) -SLOT=0/30 -SRC_URI=mirror://gnupg/gnutls/v3.5/gnutls-3.5.1.tar.xz -_eclasses_=autotools 7027963e8e8cc12c91117bdb9225dc26 epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 -_md5_=c073f2079e78178ff7bf9a9746fcb4f2 diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.13 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.13 new file mode 100644 index 0000000000..12d80a393d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.13 @@ -0,0 +1,14 @@ +DEFINED_PHASES=compile configure install prepare setup test +DEPEND=>=dev-libs/libtasn1-4.9:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/libunistring:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:=[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( >=net-dns/libidn2-0.16-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( dev-util/gtk-doc ) nls? ( sys-devel/gettext ) valgrind? ( dev-util/valgrind ) test? ( seccomp? ( sys-libs/libseccomp ) ) test-full? ( guile? ( >=dev-scheme/guile-2 ) app-crypt/dieharder app-misc/datefudge dev-libs/softhsm:2[-bindist] net-dialup/ppp net-misc/socat ) >=app-portage/elt-patches-20170317 +DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project +EAPI=6 +HOMEPAGE=http://www.gnutls.org/ +IUSE=+cxx dane doc examples guile +idn nls openpgp +openssl pkcs11 sslv2 sslv3 seccomp static-libs test test-full +tls-heartbeat tools valgrind zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +LICENSE=GPL-3 LGPL-2.1 +RDEPEND=>=dev-libs/libtasn1-4.9:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/libunistring:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:=[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( >=net-dns/libidn2-0.16-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) +REQUIRED_USE=test-full? ( guile pkcs11 openpgp openssl idn seccomp tools zlib ) +SLOT=0/30 +SRC_URI=mirror://gnupg/gnutls/v3.5/gnutls-3.5.13.tar.xz +_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 +_md5_=c501a30248f659733f285beaa0b2042e diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.15 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.15 new file mode 100644 index 0000000000..63aedff67b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.5.15 @@ -0,0 +1,14 @@ +DEFINED_PHASES=compile configure install prepare setup test +DEPEND=>=dev-libs/libtasn1-4.9:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/libunistring:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:=[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( >=net-dns/libidn2-0.16-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( dev-util/gtk-doc ) nls? ( sys-devel/gettext ) valgrind? ( dev-util/valgrind ) test? ( seccomp? ( sys-libs/libseccomp ) ) test-full? ( guile? ( >=dev-scheme/guile-2 ) app-crypt/dieharder app-misc/datefudge dev-libs/softhsm:2[-bindist] net-dialup/ppp net-misc/socat ) >=app-portage/elt-patches-20170317 +DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project +EAPI=6 +HOMEPAGE=http://www.gnutls.org/ +IUSE=+cxx dane doc examples guile +idn nls openpgp +openssl pkcs11 seccomp sslv2 sslv3 static-libs test test-full +tls-heartbeat tools valgrind zlib linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +KEYWORDS=~alpha ~amd64 ~arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris +LICENSE=GPL-3 LGPL-2.1 +RDEPEND=>=dev-libs/libtasn1-4.9:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/libunistring:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:=[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( >=net-dns/libidn2-0.16-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) +REQUIRED_USE=test-full? ( guile pkcs11 openpgp openssl idn seccomp tools zlib ) +SLOT=0/30 +SRC_URI=mirror://gnupg/gnutls/v3.5/gnutls-3.5.15.tar.xz +_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 +_md5_=a3935c4c9e4c3df8d9c2da9431f99b9c diff --git a/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.6.0 b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.6.0 new file mode 100644 index 0000000000..9d6c46cab6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/md5-cache/net-libs/gnutls-3.6.0 @@ -0,0 +1,13 @@ +DEFINED_PHASES=compile configure install prepare setup test +DEPEND=>=dev-libs/libtasn1-4.9:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/libunistring:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:=[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( >=net-dns/libidn2-0.16-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) >=virtual/pkgconfig-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] doc? ( dev-util/gtk-doc ) nls? ( sys-devel/gettext ) valgrind? ( dev-util/valgrind ) test? ( seccomp? ( sys-libs/libseccomp ) ) test-full? ( guile? ( >=dev-scheme/guile-2 ) app-crypt/dieharder app-misc/datefudge dev-libs/softhsm:2[-bindist] net-dialup/ppp net-misc/socat ) >=app-portage/elt-patches-20170317 +DESCRIPTION=A TLS 1.2 and SSL 3.0 implementation for the GNU project +EAPI=6 +HOMEPAGE=http://www.gnutls.org/ +IUSE=+cxx dane doc examples guile +idn nls +openssl pkcs11 seccomp sslv2 sslv3 static-libs test test-full +tls-heartbeat tools valgrind linguas_en linguas_cs linguas_de linguas_fi linguas_fr linguas_it linguas_ms linguas_nl linguas_pl linguas_sv linguas_uk linguas_vi linguas_zh_CN abi_x86_32 abi_x86_64 abi_x86_x32 abi_mips_n32 abi_mips_n64 abi_mips_o32 abi_ppc_32 abi_ppc_64 abi_s390_32 abi_s390_64 +LICENSE=GPL-3 LGPL-2.1 +RDEPEND=>=dev-libs/libtasn1-4.9:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] dev-libs/libunistring:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/nettle-3.1:=[gmp,abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] >=dev-libs/gmp-5.1.3-r1:=[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] tools? ( sys-devel/autogen ) dane? ( >=net-dns/unbound-1.4.20[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) guile? ( >=dev-scheme/guile-1.8:=[networking] ) nls? ( >=virtual/libintl-0-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) idn? ( >=net-dns/libidn2-0.16-r1[abi_x86_32(-)?,abi_x86_64(-)?,abi_x86_x32(-)?,abi_mips_n32(-)?,abi_mips_n64(-)?,abi_mips_o32(-)?,abi_ppc_32(-)?,abi_ppc_64(-)?,abi_s390_32(-)?,abi_s390_64(-)?] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] ) +REQUIRED_USE=test-full? ( cxx dane doc examples guile idn nls openssl pkcs11 seccomp tls-heartbeat tools ) +SLOT=0/30 +SRC_URI=mirror://gnupg/gnutls/v3.6/gnutls-3.6.0.tar.xz +_eclasses_=epatch 8233751dc5105a6ae8fcd86ce2bb0247 estack 43ddf5aaffa7a8d0482df54d25a66a1f eutils 9c113d6a64826c40154cad7be15d95ea libtool e32ea84bf82cf8987965b574672dba93 ltprune 2770eed66a9b8ef944714cd0e968182e multibuild 72647e255187a1fadc81097b3657e5c3 multilib 97f470f374f2e94ccab04a2fb21d811e multilib-build eed53a6313267c9fbcd35fc384bd0087 multilib-minimal 9139c3a57e077cb8e0d0f73ceb080b89 toolchain-funcs 8fec6b1eb195836560e70b66d98fb163 versionator c80ccf29e90adea7c5cae94b42eb76d0 +_md5_=fce7764226451e4efda3764947845bca diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/ChangeLog b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/ChangeLog deleted file mode 100644 index f49352146f..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/ChangeLog +++ /dev/null @@ -1,333 +0,0 @@ -# ChangeLog for net-libs/gnutls -# Copyright 1999-2016 Gentoo Foundation; Distributed under the GPL v2 -# (auto-generated from git log) - -*gnutls-3.4.3-r1 (09 Aug 2015) -*gnutls-3.3.16-r1 (09 Aug 2015) -*gnutls-3.3.15 (09 Aug 2015) -*gnutls-2.12.23-r6 (09 Aug 2015) - - 09 Aug 2015; Robin H. Johnson - +files/gnutls-2.12.20-AF_UNIX.patch, - +files/gnutls-2.12.20-guile-parallelmake.patch, - +files/gnutls-2.12.20-libadd.patch, - +files/gnutls-2.12.23-CVE-2013-2116.patch, - +files/gnutls-2.12.23-CVE-2014-0092.patch, - +files/gnutls-2.12.23-CVE-2014-1959.patch, - +files/gnutls-2.12.23-CVE-2014-3466.patch, - +files/gnutls-2.12.23-CVE-2014-3467.patch, - +files/gnutls-2.12.23-CVE-2014-3468.patch, - +files/gnutls-2.12.23-CVE-2014-3469.patch, - +files/gnutls-2.12.23-cross-compile.patch, - +files/gnutls-2.12.23-gdoc-perl-5.18.patch, - +files/gnutls-2.12.23-gl-tests-getaddrinfo-skip-if-no-network.patch, - +files/gnutls-2.12.23-hppa.patch, +gnutls-2.12.23-r6.ebuild, - +gnutls-3.3.15.ebuild, +gnutls-3.3.16-r1.ebuild, +gnutls-3.4.3-r1.ebuild, - +metadata.xml: - proj/gentoo: Initial commit - - This commit represents a new era for Gentoo: - Storing the gentoo-x86 tree in Git, as converted from CVS. - - This commit is the start of the NEW history. - Any historical data is intended to be grafted onto this point. - - Creation process: - 1. Take final CVS checkout snapshot - 2. Remove ALL ChangeLog* files - 3. Transform all Manifests to thin - 4. Remove empty Manifests - 5. Convert all stale $Header$/$Id$ CVS keywords to non-expanded Git $Id$ - 5.1. Do not touch files with -kb/-ko keyword flags. - - Signed-off-by: Robin H. Johnson - X-Thanks: Alec Warner - did the GSoC 2006 migration - tests - X-Thanks: Robin H. Johnson - infra guy, herding this - project - X-Thanks: Nguyen Thai Ngoc Duy - Former Gentoo - developer, wrote Git features for the migration - X-Thanks: Brian Harring - wrote much python to improve - cvs2svn - X-Thanks: Rich Freeman - validation scripts - X-Thanks: Patrick Lauer - Gentoo dev, running new 2014 - work in migration - X-Thanks: Michał Górny - scripts, QA, nagging - X-Thanks: All of other Gentoo developers - many ideas and lots of paint on - the bikeshed - -*gnutls-3.4.4 (10 Aug 2015) -*gnutls-3.3.17 (10 Aug 2015) - - 10 Aug 2015; Alon Bar-Lev +gnutls-3.3.17.ebuild, - +gnutls-3.4.4.ebuild: - version bumps - - Package-Manager: portage-2.2.20 - - 10 Aug 2015; Julian Ospald gnutls-3.3.17.ebuild, - gnutls-3.4.4.ebuild: - Convert CVS style headers back to git style headers - - 19 Aug 2015; Alon Bar-Lev gnutls-3.3.17.ebuild, - gnutls-3.4.3-r1.ebuild, gnutls-3.4.4.ebuild: - remove usless S override - - Package-Manager: portage-2.2.20.1 - -*gnutls-3.4.4.1 (21 Aug 2015) -*gnutls-3.3.17.1 (21 Aug 2015) - - 21 Aug 2015; Alon Bar-Lev -gnutls-3.3.17.ebuild, - +gnutls-3.3.17.1.ebuild, -gnutls-3.4.4.ebuild, +gnutls-3.4.4.1.ebuild: - version bump - - Bug: 557592 - - Package-Manager: portage-2.2.20.1 - - 24 Aug 2015; Justin Lecher metadata.xml: - Use https by default - - Convert all URLs for sites supporting encrypted connections from http to - https - - Signed-off-by: Justin Lecher - - 24 Aug 2015; Mike Gilbert metadata.xml: - Revert DOCTYPE SYSTEM https changes in metadata.xml - - repoman does not yet accept the https version. - This partially reverts eaaface92ee81f30a6ac66fe7acbcc42c00dc450. - - Bug: https://bugs.gentoo.org/552720 - - 29 Aug 2015; Alon Bar-Lev gnutls-3.4.4.1.ebuild: - fix libtasm1 dependency - - Bug: 558858 - Thanks: Andrew John Hughes - - Package-Manager: portage-2.2.20.1 - - 29 Aug 2015; Alon Bar-Lev gnutls-3.3.17.1.ebuild: - fix libtasm1 dependency - - Bug: 558858 - Thanks: Andrew John Hughes - - Package-Manager: portage-2.2.20.1 - - 29 Aug 2015; Alon Bar-Lev -gnutls-3.3.16-r1.ebuild, - -gnutls-3.4.3-r1.ebuild: - cleanup - - Package-Manager: portage-2.2.20.1 - - 30 Aug 2015; Mikle Kolyada gnutls-3.3.17.1.ebuild: - amd64 stable wrt bug #559120 - - Package-Manager: portage-2.2.20.1 - - 30 Aug 2015; Tobias Klausmann gnutls-3.3.17.1.ebuild: - add alpha keyword - - Gentoo-Bug: 559120 - - Package-Manager: portage-2.2.20.1 - - 06 Sep 2015; Markus Meier gnutls-3.3.17.1.ebuild: - arm stable, bug #559120 - - Package-Manager: portage-2.2.20.1 - RepoMan-Options: --include-arches="arm" - - 06 Sep 2015; Agostino Sarubbo gnutls-3.3.17.1.ebuild: - ppc stable wrt bug #559120 - - Package-Manager: portage-2.2.20.1 - RepoMan-Options: --include-arches="ppc" - - 08 Sep 2015; Jeroen Roovers gnutls-3.3.17.1.ebuild: - Stable for HPPA PPC64 (bug #559120). - - Package-Manager: portage-2.2.20.1 - -*gnutls-3.4.5 (12 Sep 2015) -*gnutls-3.3.18 (12 Sep 2015) - - 12 Sep 2015; Alon Bar-Lev +gnutls-3.3.18.ebuild, - +gnutls-3.4.5.ebuild: - version bump - - Package-Manager: portage-2.2.20.1 - - 20 Sep 2015; Agostino Sarubbo gnutls-3.3.17.1.ebuild: - x86 stable wrt bug #559120 - - Package-Manager: portage-2.2.20.1 - RepoMan-Options: --include-arches="x86" - - 21 Sep 2015; Agostino Sarubbo gnutls-3.3.17.1.ebuild: - sparc stable wrt bug #559120 - - Package-Manager: portage-2.2.20.1 - RepoMan-Options: --include-arches="sparc" - - 24 Sep 2015; Agostino Sarubbo gnutls-3.3.17.1.ebuild: - ia64 stable wrt bug #559120 - - Package-Manager: portage-2.2.20.1 - RepoMan-Options: --include-arches="ia64" - - 24 Sep 2015; Alon Bar-Lev -gnutls-3.3.15.ebuild, - -gnutls-3.4.4.1.ebuild: - cleanup - - Package-Manager: portage-2.2.20.1 - - 25 Sep 2015; Alon Bar-Lev gnutls-3.3.17.1.ebuild, - gnutls-3.3.18.ebuild, gnutls-3.4.5.ebuild: - depend nettle with subslot aware - - Bug: 561458 - - Package-Manager: portage-2.2.20.1 - -*gnutls-3.4.6 (20 Oct 2015) - - 20 Oct 2015; Alon Bar-Lev +gnutls-3.4.6.ebuild: - version bump - - Package-Manager: portage-2.2.20.1 - - 22 Oct 2015; Alon Bar-Lev metadata.xml: - add subslot description - - Package-Manager: portage-2.2.20.1 - - 18 Nov 2015; Alon Bar-Lev -gnutls-2.12.23-r6.ebuild, - metadata.xml: - cleanup - - Bug: 553690 - - Package-Manager: portage-2.2.20.1 - -*gnutls-3.4.7 (22 Nov 2015) -*gnutls-3.3.19 (22 Nov 2015) - - 22 Nov 2015; Alon Bar-Lev +gnutls-3.3.19.ebuild, - +gnutls-3.4.7.ebuild: - version bump - - Package-Manager: portage-2.2.20.1 - -*gnutls-3.4.7-r1 (19 Dec 2015) -*gnutls-3.3.19-r1 (19 Dec 2015) - - 19 Dec 2015; Alon Bar-Lev +files/gnutls-3.3.19-build-all - ow-installing-man-1-even-with-disable-doc.patch, +files/gnutls-3.4.7-build-a - llow-installing-man-1-even-with-disable-doc.patch, +gnutls-3.3.19-r1.ebuild, - +gnutls-3.4.7-r1.ebuild: - install man(1) - - Bug: 568534 - - Package-Manager: portage-2.2.24 - -*gnutls-3.4.8 (08 Jan 2016) -*gnutls-3.3.20 (08 Jan 2016) - - 08 Jan 2016; Alon Bar-Lev +gnutls-3.3.20.ebuild, - +gnutls-3.4.8.ebuild: - version bump - - Package-Manager: portage-2.2.26 - - 24 Jan 2016; Michał Górny metadata.xml: - Replace all herds with appropriate projects (GLEP 67) - - Replace all uses of herd with appropriate project maintainers, or no - maintainers in case of herds requested to be disbanded. - - 24 Jan 2016; Michał Górny metadata.xml: - Set appropriate maintainer types in metadata.xml (GLEP 67) - -*gnutls-3.4.9 (03 Feb 2016) -*gnutls-3.3.21 (03 Feb 2016) - - 03 Feb 2016; Alon Bar-Lev +gnutls-3.3.21.ebuild, - +gnutls-3.4.9.ebuild: - version bump - - Package-Manager: portage-2.2.26 - -*gnutls-3.4.10 (03 Mar 2016) - - 03 Mar 2016; Alon Bar-Lev +gnutls-3.4.10.ebuild: - version bump - - Package-Manager: portage-2.2.26 - -*gnutls-3.3.22 (11 Mar 2016) - - 11 Mar 2016; Alon Bar-Lev +gnutls-3.3.22.ebuild: - version bump - - Package-Manager: portage-2.2.26 - -*gnutls-3.4.11 (11 Apr 2016) - - 11 Apr 2016; Alon Bar-Lev +gnutls-3.4.11.ebuild: - version bump - - Package-Manager: portage-2.2.26 - -*gnutls-3.5.0 (09 May 2016) - - 09 May 2016; Alon Bar-Lev - +files/gnutls-3.5.0-build.patch, +gnutls-3.5.0.ebuild: - version bump - - Package-Manager: portage-2.2.26 - - 10 May 2016; Alon Bar-Lev -gnutls-3.3.18.ebuild, - -gnutls-3.3.19.ebuild, -gnutls-3.3.19-r1.ebuild, -gnutls-3.3.20.ebuild, - -gnutls-3.3.21.ebuild, -gnutls-3.4.5.ebuild, -gnutls-3.4.6.ebuild, - -gnutls-3.4.7.ebuild, -gnutls-3.4.7-r1.ebuild, -gnutls-3.4.8.ebuild, - -gnutls-3.4.9.ebuild, -gnutls-3.4.10.ebuild: - cleanup - - Package-Manager: portage-2.2.26 - -*gnutls-3.4.12 (20 May 2016) -*gnutls-3.3.23 (20 May 2016) - - 20 May 2016; Alon Bar-Lev +gnutls-3.3.23.ebuild, - +gnutls-3.4.12.ebuild: - version bump - - Package-Manager: portage-2.2.28 - -*gnutls-3.4.13 (06 Jun 2016) - - 06 Jun 2016; Alon Bar-Lev +gnutls-3.4.13.ebuild: - version bump - - Package-Manager: portage-2.2.28 - - 11 Jun 2016; Alon Bar-Lev -gnutls-3.3.22.ebuild, - -gnutls-3.4.11.ebuild, -gnutls-3.4.12.ebuild: - cleanup - - Package-Manager: portage-2.2.28 - -*gnutls-3.5.1 (14 Jun 2016) - - 14 Jun 2016; Alon Bar-Lev - -files/gnutls-3.5.0-build.patch, +gnutls-3.5.1.ebuild: - version bump - - Package-Manager: portage-2.2.28 - diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/ChangeLog-2015 b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/ChangeLog-2015 deleted file mode 100644 index 7344a72c0d..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/ChangeLog-2015 +++ /dev/null @@ -1,2399 +0,0 @@ -# ChangeLog for net-libs/gnutls -# Copyright 1999-2015 Gentoo Foundation; Distributed under the GPL v2 -# $Header: /var/cvsroot/gentoo-x86/net-libs/gnutls/ChangeLog,v 1.550 2015/07/13 19:08:22 alonbl Exp $ - -*gnutls-3.4.3-r1 (13 Jul 2015) -*gnutls-3.3.16-r1 (13 Jul 2015) - - 13 Jul 2015; Alon Bar-Lev +gnutls-3.3.16-r1.ebuild, - +gnutls-3.4.3-r1.ebuild, -gnutls-3.3.16.ebuild, -gnutls-3.4.3.ebuild: - Add texinfo dependency and force doc USE as top level doc in configure, - bug#554682 - -*gnutls-3.3.16 (12 Jul 2015) -*gnutls-3.4.3 (12 Jul 2015) - - 12 Jul 2015; Alon Bar-Lev +gnutls-3.3.16.ebuild, - +gnutls-3.4.3.ebuild, -files/gnutls-3.4.2-build.patch, - -gnutls-3.3.15-r1.ebuild, -gnutls-3.4.1.ebuild, -gnutls-3.4.2-r1.ebuild: - Version bump + cleanup - - 21 Jun 2015; Alon Bar-Lev -gnutls-3.3.10-r2.ebuild, - -gnutls-3.3.12.ebuild, -gnutls-3.3.14.ebuild: - Cleanup, bug#546760, bug#548636 - -*gnutls-3.3.15-r1 (17 Jun 2015) -*gnutls-3.4.2-r1 (17 Jun 2015) - - 17 Jun 2015; Alon Bar-Lev +gnutls-3.3.15-r1.ebuild, - +gnutls-3.4.2-r1.ebuild, -gnutls-3.4.2.ebuild: - Disable pdf doc generation, bug#552356 - - 17 Jun 2015; Agostino Sarubbo gnutls-3.3.15.ebuild: - Stable for sparc, wrt bug #548636 - -*gnutls-3.4.2 (16 Jun 2015) - - 16 Jun 2015; Alon Bar-Lev +files/gnutls-3.4.2-build.patch, - +gnutls-3.4.2.ebuild: - Version bump - - 27 May 2015; Agostino Sarubbo gnutls-3.3.15.ebuild: - Stable for arm, wrt bug #548636 - - 20 May 2015; Matt Turner gnutls-3.3.15.ebuild: - alpha stable, bug 548636. - - 19 May 2015; Agostino Sarubbo gnutls-3.3.15.ebuild: - Stable for x86, wrt bug #548636 - - 16 May 2015; Mike Frysinger - +files/gnutls-2.12.23-cross-compile.patch, gnutls-2.12.23-r6.ebuild: - Fix from Chromium OS for cross-compiling. - - 15 May 2015; Pacho Ramos gnutls-3.3.15.ebuild: - ppc stable wrt bug #548636 - - 13 May 2015; Jack Morgan gnutls-3.3.15.ebuild: - ia64 stable wrt bug #548636 - - 07 May 2015; Jeroen Roovers gnutls-3.3.15.ebuild, - metadata.xml: - Stable for HPPA (bug #548636). - - 07 May 2015; Jeroen Roovers gnutls-3.3.15.ebuild: - Stable for PPC64 (bug #548636). - - 06 May 2015; Agostino Sarubbo gnutls-3.3.15.ebuild: - Stable for amd64, wrt bug #548636 - -*gnutls-3.4.1 (03 May 2015) -*gnutls-3.3.15 (03 May 2015) - - 03 May 2015; Alon Bar-Lev +gnutls-3.3.15.ebuild, - +gnutls-3.4.1.ebuild, -files/gnutls-3.4.0-build.patch, -gnutls-3.4.0.ebuild: - Version bump - - 27 Apr 2015; Agostino Sarubbo gnutls-3.3.10-r2.ebuild: - Stable for sparc, wrt bug #492522 - - 10 Apr 2015; Alon Bar-Lev gnutls-3.3.14.ebuild, - gnutls-3.4.0.ebuild, metadata.xml: - Add openssl USE to enable/disable the openssl compatibility library - - 10 Apr 2015; Patrick Lauer gnutls-3.3.10-r2.ebuild, - gnutls-3.3.12.ebuild, gnutls-3.3.14.ebuild: - Tighten dependencies for nettle #546100 - -*gnutls-3.4.0 (10 Apr 2015) - - 10 Apr 2015; Alon Bar-Lev +files/gnutls-3.4.0-build.patch, - +gnutls-3.4.0.ebuild, metadata.xml: - Version bump, removed most of complexity of multilib as tools are optional, - multilib is probably broken, we fix it fast once issue reported. removed - unknown undocumented complexity so we can document and fix, add subslot - - 03 Apr 2015; Mike Frysinger gnutls-2.12.23-r6.ebuild: - Fix cross-compiling by not searching the host paths directly. The toolchain - already has the right paths built into it for finding these libs. - -*gnutls-3.3.14 (01 Apr 2015) - - 01 Apr 2015; Alon Bar-Lev +gnutls-3.3.14.ebuild: - Version bump, bug#545208 - - 10 Mar 2015; Mike Frysinger gnutls-3.3.10-r2.ebuild: - Mark arm64/ia64/m68k/s390/sh stable #492522. - - 25 Feb 2015; Pacho Ramos gnutls-3.3.10-r2.ebuild: - ppc/ppc64 stable, bug #492522 - - 06 Feb 2015; Pacho Ramos gnutls-3.3.10-r2.ebuild: - amd64/x86 stable, bug #492522 - -*gnutls-3.3.12 (19 Jan 2015) - - 19 Jan 2015; Alon Bar-Lev +gnutls-3.3.12.ebuild, - -gnutls-3.3.11.ebuild: - Version bump, bug#537054 - - 09 Jan 2015; Tobias Klausmann gnutls-3.3.10-r2.ebuild: - Stable on alpha, bug 492522 - - 30 Dec 2014; Markus Meier gnutls-3.3.10-r2.ebuild: - arm stable, bug #492522 - -*gnutls-3.3.11 (30 Dec 2014) - - 30 Dec 2014; Alon Bar-Lev +gnutls-3.3.11.ebuild: - Version bump, bug#533298 - - 15 Dec 2014; Jeroen Roovers gnutls-3.3.10-r2.ebuild: - Stable for HPPA (bug #492522). - - 13 Dec 2014; Alon Bar-Lev -gnutls-3.2.20.ebuild, - -gnutls-3.3.10-r1.ebuild: - Cleanup - - 24 Nov 2014; Michał Górny gnutls-3.3.10-r2.ebuild: - Add work-around for gtk-doc out-of-source build issues, bug #519762. - -*gnutls-3.3.10-r2 (23 Nov 2014) - - 23 Nov 2014; Alon Bar-Lev +gnutls-3.3.10-r2.ebuild: - drop textinfo and enforce UTC timezone, bug#520818 - -*gnutls-3.3.10-r1 (23 Nov 2014) - - 23 Nov 2014; Alon Bar-Lev +gnutls-3.3.10-r1.ebuild, - -gnutls-3.3.10.ebuild: - Fix libtasn1 dependency, bug#530060, thanks to Harvey Mittens - -*gnutls-3.3.10 (10 Nov 2014) -*gnutls-3.2.20 (10 Nov 2014) - - 10 Nov 2014; Alon Bar-Lev +gnutls-3.2.20.ebuild, - +gnutls-3.3.10.ebuild, -gnutls-3.2.18.ebuild, -gnutls-3.3.8.ebuild, - -gnutls-3.3.9.ebuild: - Version bump + cleanup, bug#528824 - -*gnutls-3.3.9 (13 Oct 2014) - - 13 Oct 2014; Alon Bar-Lev +gnutls-3.3.9.ebuild, - -files/gnutls-3.3.7-build.patch, -gnutls-3.2.16.ebuild, -gnutls-3.2.17.ebuild, - -gnutls-3.3.6.ebuild, -gnutls-3.3.7-r1.ebuild, -gnutls-3.3.7.ebuild: - Version bump, cleanup - - 23 Sep 2014; Alon Bar-Lev gnutls-3.3.8.ebuild: - Bump p11-kit dependency, bug#523472, thanks to Marcin Mirosław - -*gnutls-3.3.8 (19 Sep 2014) -*gnutls-3.2.18 (19 Sep 2014) - - 19 Sep 2014; Alon Bar-Lev +gnutls-3.2.18.ebuild, - +gnutls-3.3.8.ebuild: - Version bump, bug#523190, thanks to polynomial-c - -*gnutls-3.3.7-r1 (29 Aug 2014) - - 29 Aug 2014; Alon Bar-Lev +gnutls-3.3.7-r1.ebuild: - Remove htmldir if \!use doc, bug#520854. Force regenerate of makeinfo files, - bug#520818 - -*gnutls-3.2.17 (24 Aug 2014) -*gnutls-3.3.7 (24 Aug 2014) - - 24 Aug 2014; Alon Bar-Lev +files/gnutls-3.3.7-build.patch, - +gnutls-3.2.17.ebuild, +gnutls-3.3.7.ebuild, -gnutls-3.2.15.ebuild, - -gnutls-3.3.4-r1.ebuild: - Version bump, bug#520784, cleanup - -*gnutls-3.2.16 (08 Aug 2014) -*gnutls-3.3.6 (08 Aug 2014) - - 08 Aug 2014; Alon Bar-Lev +gnutls-3.2.16.ebuild, - +gnutls-3.3.6.ebuild, -gnutls-3.3.4.ebuild: - Version bump, bug#518762 - -*gnutls-3.3.4-r1 (06 Jul 2014) - - 06 Jul 2014; Alon Bar-Lev +gnutls-3.3.4-r1.ebuild: - Fix dane roots issue, bug#443104, thanks to Rafał Mużyło - - 18 Jun 2014; Michał Górny gnutls-3.3.4.ebuild: - Update dependencies to require guaranteed EAPI=5 or multilib ebuilds, bug - #513718. - - 13 Jun 2014; Alon Bar-Lev gnutls-2.12.23-r6.ebuild: - Remove libtasn-1 mask, since long time we could have done this, bug#492522 - - 10 Jun 2014; Alon Bar-Lev -gnutls-2.12.23-r4.ebuild, - -gnutls-2.12.23-r5.ebuild: - Cleanup old, bug#511840 - - 10 Jun 2014; Mikle Kolyada gnutls-2.12.23-r6.ebuild: - ppc64/ppc stable wrt bug #511840 - - 10 Jun 2014; Mikle Kolyada gnutls-2.12.23-r6.ebuild: - ia64 stable wrt bug #511840 - - 10 Jun 2014; Mikle Kolyada gnutls-2.12.23-r6.ebuild: - sparc stable wrt bug #511840 - - 10 Jun 2014; Mikle Kolyada gnutls-2.12.23-r6.ebuild: - alpha stable wrt bug #511840 - - 10 Jun 2014; Mike Frysinger gnutls-2.12.23-r4.ebuild, - gnutls-2.12.23-r5.ebuild, gnutls-2.12.23-r6.ebuild, gnutls-3.2.15.ebuild, - gnutls-3.3.4.ebuild: - Mark m68k/s390/sh stable. - - 10 Jun 2014; Mike Frysinger gnutls-2.12.23-r4.ebuild, - gnutls-2.12.23-r5.ebuild, gnutls-2.12.23-r6.ebuild, gnutls-3.2.15.ebuild, - gnutls-3.3.4.ebuild: - Add arm64 love. - - 09 Jun 2014; Mikle Kolyada gnutls-2.12.23-r6.ebuild: - arm stable wrt bug #511840 - - 09 Jun 2014; Mikle Kolyada gnutls-2.12.23-r6.ebuild: - x86 stable wrt bug #511840 - - 09 Jun 2014; Mikle Kolyada gnutls-2.12.23-r6.ebuild: - amd64 stable wrt bug #511840 - - 09 Jun 2014; Jeroen Roovers gnutls-2.12.23-r6.ebuild: - Stable for HPPA (bug #511840). - -*gnutls-2.12.23-r6 (07 Jun 2014) - - 07 Jun 2014; Alon Bar-Lev - +files/gnutls-2.12.23-CVE-2014-3466.patch, - +files/gnutls-2.12.23-CVE-2014-3467.patch, - +files/gnutls-2.12.23-CVE-2014-3468.patch, - +files/gnutls-2.12.23-CVE-2014-3469.patch, +gnutls-2.12.23-r6.ebuild: - Fix CVE-2014-3466, CVE-2014-3467, CVE-2014-3468, CVE-2014-3469 of 2.12 series - - 07 Jun 2014; Alon Bar-Lev - -files/gnutls-2.12.20-glibc-2.16.patch, -files/gnutls-3.3.1-guile.patch, - -files/gnutls-3.3.2-build-out-of-tree.patch, -gnutls-3.2.11.ebuild, - -gnutls-3.2.12.1.ebuild, -gnutls-3.2.12.ebuild, -gnutls-3.2.13.ebuild, - -gnutls-3.2.14.ebuild, -gnutls-3.3.1-r1.ebuild, -gnutls-3.3.1.ebuild, - -gnutls-3.3.2.ebuild: - Cleanup old - -*gnutls-3.3.4 (01 Jun 2014) -*gnutls-3.2.15 (01 Jun 2014) - - 01 Jun 2014; Tim Harder +gnutls-3.2.15.ebuild, - +gnutls-3.3.4.ebuild: - Security bumps (bug #511840). - - 17 May 2014; Michał Górny gnutls-3.3.2.ebuild: - Symlink remaining tools necessary for tests for non-native ABIs. - -*gnutls-3.3.2 (17 May 2014) -*gnutls-3.2.14 (17 May 2014) - - 17 May 2014; Alon Bar-Lev - +files/gnutls-3.3.2-build-out-of-tree.patch, +gnutls-3.2.14.ebuild, - +gnutls-3.3.2.ebuild: - Version bumps, fix bug#510282, fix build issues bug#510418 thanks to Michał - Górny - - 15 May 2014; Michał Górny gnutls-3.3.1-r1.ebuild: - Symlink native certtool for reuse in tests, bug #510420. - - 15 May 2014; Alon Bar-Lev -gnutls-2.12.23-r1.ebuild: - Remove old, bug#501282 - -*gnutls-3.3.1-r1 (13 May 2014) - - 13 May 2014; Michał Górny +gnutls-3.3.1-r1.ebuild: - Enable multilib support, bug #493166. - - 25 Apr 2014; Alon Bar-Lev +files/gnutls-3.3.1-guile.patch, - gnutls-3.3.1.ebuild: - Fix guile build, bug#508454, thanks to Ed Catmur - -*gnutls-3.3.1 (22 Apr 2014) - - 22 Apr 2014; Alon Bar-Lev +gnutls-3.3.1.ebuild, - -gnutls-3.3.0.ebuild: - Version bump, bug#508360 - -*gnutls-3.3.0 (18 Apr 2014) - - 18 Apr 2014; Alon Bar-Lev +gnutls-3.3.0.ebuild: - Version bump, bug#508032 - -*gnutls-3.2.13 (11 Apr 2014) - - 11 Apr 2014; Tim Harder +gnutls-3.2.13.ebuild: - Version bump. - -*gnutls-2.12.23-r5 (29 Mar 2014) - - 29 Mar 2014; Alon Bar-Lev - +files/gnutls-2.12.23-gdoc-perl-5.18.patch, +gnutls-2.12.23-r5.ebuild: - Fix perl-5.18 compatibility, bug#504028, thanks to Kerin Millar - - 24 Mar 2014; Agostino Sarubbo gnutls-2.12.23-r4.ebuild: - Stable for ppc64, wrt bug #503394 - - 22 Mar 2014; Markus Meier gnutls-2.12.23-r4.ebuild: - arm stable, bug #503394 - - 19 Mar 2014; Agostino Sarubbo gnutls-2.12.23-r4.ebuild: - Stable for alpha, wrt bug #503394 - - 18 Mar 2014; Agostino Sarubbo gnutls-2.12.23-r4.ebuild: - Stable for ia64, wrt bug #503394 - - 16 Mar 2014; Agostino Sarubbo gnutls-2.12.23-r4.ebuild: - Stable for ppc, wrt bug #503394 - - 12 Mar 2014; Agostino Sarubbo gnutls-2.12.23-r4.ebuild: - Stable for sparc, wrt bug #503394 - - 08 Mar 2014; Alon Bar-Lev - +files/gnutls-2.12.23-gl-tests-getaddrinfo-skip-if-no-network.patch, - gnutls-2.12.23-r4.ebuild, gnutls-3.2.12.1.ebuild: - Fix network sandbox gnulib issue, bug#503870 - - 06 Mar 2014; Pawel Hajdan jr gnutls-2.12.23-r4.ebuild: - x86 stable wrt security bug #503394 - -*gnutls-3.2.12.1 (05 Mar 2014) - - 05 Mar 2014; Tim Harder +gnutls-3.2.12.1.ebuild: - Version bump. - - 05 Mar 2014; Richard Freeman gnutls-2.12.23-r4.ebuild: - amd64 stable - 503394 - - 05 Mar 2014; Jeroen Roovers gnutls-2.12.23-r4.ebuild: - Stable for HPPA (bug #503394). - -*gnutls-2.12.23-r4 (04 Mar 2014) - - 04 Mar 2014; Alon Bar-Lev - +files/gnutls-2.12.23-CVE-2014-1959.patch, +gnutls-2.12.23-r4.ebuild, - -gnutls-2.12.23-r2.ebuild, -gnutls-2.12.23-r3.ebuild: - Fix CVE-2014-1959, bug#501282 - -*gnutls-2.12.23-r3 (04 Mar 2014) - - 04 Mar 2014; Alon Bar-Lev - +files/gnutls-2.12.23-CVE-2014-0092.patch, +gnutls-2.12.23-r3.ebuild: - Fix CVE-2014-0092, bug#503394 - -*gnutls-3.2.12 (03 Mar 2014) - - 03 Mar 2014; Tim Harder +gnutls-3.2.12.ebuild: - Version bump. - - 01 Mar 2014; Michał Górny gnutls-2.12.23-r1.ebuild, - gnutls-2.12.23-r2.ebuild: - Update libgcrypt dep to use slot :0. - - 17 Feb 2014; Alon Bar-Lev gnutls-3.2.11.ebuild: - Update p11-kit dependency, bug#501462, thanks to michael@kuemmling.de - - 17 Feb 2014; Alon Bar-Lev gnutls-3.2.11.ebuild: - Update p11-kit dependency, bug#501462, thanks to michael@kuemmling.de - -*gnutls-2.12.23-r2 (15 Feb 2014) - - 15 Feb 2014; Alon Bar-Lev +gnutls-2.12.23-r2.ebuild, - gnutls-2.12.23-r1.ebuild, gnutls-3.2.11.ebuild: - Fix autotools usage, bug#501186, remove libtool manual cleanup - - 15 Feb 2014; Alon Bar-Lev -gnutls-3.2.10.ebuild: - Clean old ebuilds - - 15 Feb 2014; Tim Harder -gnutls-3.2.7.ebuild, - -gnutls-3.2.8.ebuild, -gnutls-3.2.9.ebuild, -files/gnutls-3.2.5-build.patch, - -files/gnutls-3.2.8-build.patch: - Remove old. - -*gnutls-3.2.11 (15 Feb 2014) - - 15 Feb 2014; Tim Harder +gnutls-3.2.11.ebuild: - Version bump. - -*gnutls-3.2.10 (03 Feb 2014) - - 03 Feb 2014; Tim Harder +gnutls-3.2.10.ebuild, - metadata.xml: - Version bump, add crywrap use flag (bug #498034 by James Le Cuirot), and - remove C++ compiler checks when cxx support is disabled (bug #497472). - -*gnutls-3.2.9 (24 Jan 2014) - - 24 Jan 2014; Tim Harder +gnutls-3.2.9.ebuild: - Version bump. - - 22 Dec 2013; Alon Bar-Lev +files/gnutls-3.2.8-build.patch, - gnutls-3.2.8.ebuild: - Fix build issue, bug#494940 - - 21 Dec 2013; Fabian Groffen gnutls-3.2.8.ebuild: - Disable hardware accelleration on Darwin because that causes misc compilation - problems for now - -*gnutls-3.2.8 (21 Dec 2013) - - 21 Dec 2013; Tim Harder +gnutls-3.2.8.ebuild: - Version bump. - - 12 Dec 2013; Alon Bar-Lev -gnutls-3.2.5.ebuild, - -gnutls-3.2.6.ebuild: - Cleanup, bug#494066 - -*gnutls-3.2.7 (23 Nov 2013) - - 23 Nov 2013; Tim Harder +gnutls-3.2.7.ebuild: - Version bump. - -*gnutls-3.2.6 (09 Nov 2013) - - 09 Nov 2013; Tim Harder +gnutls-3.2.6.ebuild: - Version bump. - - 28 Oct 2013; Alon Bar-Lev -gnutls-3.2.3.ebuild: - Remove old ebuild, bug#489262 - - 28 Oct 2013; Alon Bar-Lev -gnutls-3.2.4.ebuild: - Remove old ebuild, bug#489262 - -*gnutls-3.2.5 (24 Oct 2013) - - 24 Oct 2013; Alon Bar-Lev +files/gnutls-3.2.5-build.patch, - +gnutls-3.2.5.ebuild: - Version bump, bug#489262 - - 22 Oct 2013; Fabian Groffen gnutls-3.2.4.ebuild: - Add patch from upstream to fix compilation on Darwin, bug #488498 - - 22 Sep 2013; Chris Reffett -gnutls-2.12.20.ebuild: - Drop affected version wrt bug 455560 - - 01 Sep 2013; Tim Harder -gnutls-2.12.23.ebuild, - -gnutls-3.1.10.ebuild, -gnutls-3.1.11.ebuild, -gnutls-3.2.1-r1.ebuild, - -files/gnutls-3.2.1-build-gmp-1.patch, -files/gnutls-3.2.1-build-gmp-2.patch, - -files/gnutls-3.2.1-build-gmp-3.patch: - Remove old. - -*gnutls-3.2.4 (01 Sep 2013) - - 01 Sep 2013; Tim Harder +gnutls-3.2.4.ebuild: - Version bump. - -*gnutls-3.2.3 (31 Jul 2013) - - 31 Jul 2013; Tim Harder +gnutls-3.2.3.ebuild: - Version bump. - - 17 Jun 2013; Alon Bar-Lev files/gnutls-2.12.23-hppa.patch: - fix hppa build issue, bug#471914, again... there is duplicate file - - 15 Jun 2013; Alon Bar-Lev - +files/gnutls-2.12.23-hppa.patch, gnutls-2.12.23-r1.ebuild: - fix hppa build issue, bug#471914 - - 11 Jun 2013; Agostino Sarubbo gnutls-2.12.23-r1.ebuild: - Stable for sh, wrt bug #471788 - - 09 Jun 2013; Agostino Sarubbo gnutls-2.12.23-r1.ebuild: - Stable for s390, wrt bug #471788 - - 09 Jun 2013; Agostino Sarubbo gnutls-2.12.23-r1.ebuild: - Stable for ppc64, wrt bug #471788 - - 09 Jun 2013; Agostino Sarubbo gnutls-2.12.23-r1.ebuild: - Stable for sparc, wrt bug #471788 - - 09 Jun 2013; Agostino Sarubbo gnutls-2.12.23-r1.ebuild: - Stable for ppc, wrt bug #471788 - - 09 Jun 2013; Agostino Sarubbo gnutls-2.12.23-r1.ebuild: - Stable for ia64, wrt bug #471788 - - 09 Jun 2013; Markus Meier gnutls-2.12.23-r1.ebuild: - arm stable, bug #471788 - - 04 Jun 2013; Agostino Sarubbo gnutls-2.12.23-r1.ebuild: - Stable for x86, wrt bug #471788 - -*gnutls-3.2.1-r1 (03 Jun 2013) - - 03 Jun 2013; Alon Bar-Lev - +files/gnutls-3.2.1-build-gmp-1.patch, +files/gnutls-3.2.1-build-gmp-2.patch, - +files/gnutls-3.2.1-build-gmp-3.patch, +gnutls-3.2.1-r1.ebuild, - -files/gnutls-3.2.1-build-gmp.patch, -gnutls-3.2.1.ebuild: - backport patches from upstream related to bug#472056, should solve bug#472196 - - 02 Jun 2013; Richard Freeman gnutls-2.12.23-r1.ebuild: - amd64 stable - 471788 - - 02 Jun 2013; Alon Bar-Lev - +files/gnutls-3.2.1-build-gmp.patch, gnutls-3.2.1.ebuild: - link explicitly against gmp, bug#472056 - -*gnutls-3.2.1 (01 Jun 2013) - - 01 Jun 2013; Alon Bar-Lev +gnutls-3.2.1.ebuild, - -gnutls-3.2.0.ebuild: - Version bump, fixes bug#459964 - - 31 May 2013; Jeroen Roovers gnutls-2.12.23-r1.ebuild: - Stable for HPPA (bug #471788). - - 31 May 2013; Tobias Klausmann gnutls-2.12.23-r1.ebuild: - Stable on alpha, bug #471788 - -*gnutls-2.12.23-r1 (30 May 2013) - - 30 May 2013; Tim Harder +gnutls-2.12.23-r1.ebuild, - gnutls-3.1.10.ebuild, gnutls-3.1.11.ebuild, gnutls-3.2.0.ebuild, - +files/gnutls-2.12.23-CVE-2013-2116.patch: - Revision bump to fix CVE-2013-2116 (bug #471788), drop redundant - --disable-silent-rules econf option for EAPI 5 ebuilds, and run tests - serially since they often fail in parallel. - - 22 May 2013; Tim Harder gnutls-3.2.0.ebuild: - Update nettle dep (bug #471022). - - 22 May 2013; Tim Harder gnutls-3.1.10.ebuild, - gnutls-3.1.11.ebuild, gnutls-3.2.0.ebuild: - Drop m68k keyword until dev-libs/nettle is keyworded. - - 22 May 2013; Tim Harder -gnutls-3.1.8.ebuild, - -gnutls-3.1.9-r1.ebuild: - Remove old. - -*gnutls-3.2.0 (22 May 2013) -*gnutls-3.1.11 (22 May 2013) - - 22 May 2013; Tim Harder +gnutls-3.1.11.ebuild, - +gnutls-3.2.0.ebuild: - Version bumps (bug #470698). - -*gnutls-3.1.10 (27 Mar 2013) - - 27 Mar 2013; Tim Harder +gnutls-3.1.10.ebuild: - Version bump. - - 10 Mar 2013; Agostino Sarubbo gnutls-2.12.23.ebuild: - Stable for s390, wrt bug #455560 - - 09 Mar 2013; Agostino Sarubbo gnutls-2.12.23.ebuild: - Stable for sparc, wrt bug #455560 - - 09 Mar 2013; Agostino Sarubbo gnutls-2.12.23.ebuild: - Stable for ia64, wrt bug #455560 - - 09 Mar 2013; Agostino Sarubbo gnutls-2.12.23.ebuild: - Stable for alpha, wrt bug #455560 - - 09 Mar 2013; Agostino Sarubbo gnutls-2.12.23.ebuild: - Stable for ppc64, wrt bug #455560 - - 08 Mar 2013; Agostino Sarubbo gnutls-2.12.23.ebuild: - Stable for arm, wrt bug #455560 - - 06 Mar 2013; Agostino Sarubbo gnutls-2.12.23.ebuild: - Stable for sh, wrt bug #455560 - - 04 Mar 2013; Brent Baude gnutls-2.12.23.ebuild: - Marking gnutls-2.12.23 ppc for bug 455560 - - 04 Mar 2013; Jeroen Roovers gnutls-2.12.23.ebuild: - Stable for HPPA (bug #455560). - - 04 Mar 2013; Agostino Sarubbo gnutls-2.12.23.ebuild: - Stable for x86, wrt bug #455560 - - 04 Mar 2013; Agostino Sarubbo gnutls-2.12.23.ebuild: - Stable for amd64, wrt bug #455560 - -*gnutls-3.1.9-r1 (28 Feb 2013) - - 28 Feb 2013; Diego E. Pettenò +gnutls-3.1.9-r1.ebuild, - -gnutls-3.1.9.ebuild: - Revision bump to ensure that everybody is using the new spin of the tarball - (upstream considers it a 3.1.9.1). - - 28 Feb 2013; Tim Harder Manifest: - Fix checksums for gnutls-3.1.9 (bug #459604). - -*gnutls-3.1.9 (27 Feb 2013) - - 27 Feb 2013; Diego E. Pettenò +gnutls-3.1.9.ebuild, - -files/gnutls-3.1.3-guile-parallelmake.patch, - -files/gnutls-3.1.6-danetool.patch, -gnutls-3.1.5-r1.ebuild, - -gnutls-3.1.6.ebuild: - Version bump; remove old. - - 21 Feb 2013; Zac Medico gnutls-3.1.8.ebuild: - Add ~arm-linux keyword. - -*gnutls-3.1.8 (10 Feb 2013) - - 10 Feb 2013; Diego E. Pettenò +gnutls-3.1.8.ebuild, - -gnutls-3.1.7.ebuild: - Version bump to 3.1.8 that, once again, connects to GTalk. - - 08 Feb 2013; Alexis Ballier gnutls-3.1.7.ebuild: - keyword ~amd64-fbsd - - 05 Feb 2013; Alon Bar-Lev gnutls-3.1.7.ebuild: - Alter SRC_URI to some more generic expression - -*gnutls-2.12.23 (05 Feb 2013) - - 05 Feb 2013; Alon Bar-Lev +gnutls-2.12.23.ebuild: - Version bump, bug#455560, solves GNUTLS-SA-2013-1 - -*gnutls-3.1.7 (04 Feb 2013) - - 04 Feb 2013; Diego E. Pettenò +gnutls-3.1.7.ebuild: - Version bump; do not make heartbeat optional yet; fix automake dependency - properly to not require 1.11 when 1.12+ is installed. - - 20 Jan 2013; Alon Bar-Lev - +files/gnutls-3.1.6-danetool.patch, gnutls-3.1.6.ebuild: - Fix parallel build, bug#452942 - - 07 Jan 2013; Alon Bar-Lev gnutls-3.1.6.ebuild: - Depend on >=1.11.6, per bug#450644, thanks to Martin Mokrejš - - 04 Jan 2013; Alon Bar-Lev gnutls-3.1.6.ebuild: - Minor cleanup (spelling) - - 04 Jan 2013; Alon Bar-Lev gnutls-3.1.6.ebuild: - Revert autogen move, replace at RDEPEND as we configure gnutls to use system - autogen. Thanks for radhermit. - - 03 Jan 2013; Alon Bar-Lev gnutls-3.1.6.ebuild: - Cleanup autogen is required only for build, libtool is not required if we - inherit autotools - - 03 Jan 2013; Tim Harder gnutls-3.1.6.ebuild: - Use updated SRC_URI and drop guile parallel make patch since it's fixed - upstream. - -*gnutls-3.1.6 (02 Jan 2013) - - 02 Jan 2013; Tim Harder +gnutls-3.1.6.ebuild: - Version bump. Simplify adding linguas use flags to IUSE. - - 30 Dec 2012; Diego E. Pettenò - -files/gnutls-3.0.20-parallelmake.patch, -gnutls-3.1.3.ebuild, - -gnutls-3.1.5.ebuild, metadata.xml: - Add a local description for the bindist USE flag; remove old; remove stray - file. - - 23 Dec 2012; Alon Bar-Lev gnutls-3.1.5-r1.ebuild: - Revert bug#438222, multilib issue, thanks for Alexander E. Patrakov - - 22 Dec 2012; Alon Bar-Lev gnutls-3.1.5-r1.ebuild: - Add certtool.cfg as doc, per bug#426124, thanks to Petr Pisar - - 22 Dec 2012; Alon Bar-Lev gnutls-3.1.5-r1.ebuild: - Support cross compile, per bug#438222, thanks to James Le Cuirot - -*gnutls-3.1.5-r1 (22 Dec 2012) - - 22 Dec 2012; Alon Bar-Lev +gnutls-3.1.5-r1.ebuild: - Respect LINGUAS, per bug#402683. Remove unused myconf usage. - -*gnutls-3.1.5 (24 Nov 2012) - - 24 Nov 2012; Diego E. Pettenò +gnutls-3.1.5.ebuild, - -files/gnutls-3.1.4-nodane.patch, -gnutls-3.1.4.ebuild: - Version bump; remove 3.1.4 and its patch. - -*gnutls-3.1.4 (10 Nov 2012) - - 10 Nov 2012; Diego E. Pettenò - +files/gnutls-3.1.4-nodane.patch, +gnutls-3.1.4.ebuild: - Version bump; a patch is needed for a test failure with USE=-dane. - - 04 Nov 2012; Tim Harder gnutls-3.1.3.ebuild: - Don't try to install the postscript doc since it's not built by default - anymore (bug #440720). - - 30 Oct 2012; Rick Farina gnutls-2.12.20.ebuild: - gnutls-2 is not compatible with libtasn1-3 so adjust deps accordingly - - 19 Oct 2012; Dane Smith -gnutls-2.12.18.ebuild, - gnutls-2.12.20.ebuild, +files/gnutls-2.12.20-guile-parallelmake.patch, - gnutls-3.1.3.ebuild, +files/gnutls-3.1.3-guile-parallelmake.patch: - Add patches to fix parallel make issues in bug 427844 and bug 437256. - Update ebuilds for 2.12.20 and 3.1.3 to make use of said patches. - Drop old. - -*gnutls-3.1.3 (13 Oct 2012) - - 13 Oct 2012; Diego E. Pettenò +gnutls-3.1.3.ebuild, - -gnutls-3.0.23.ebuild, -gnutls-3.0.24.ebuild, -gnutls-3.1.1.ebuild, - -gnutls-3.1.2.ebuild, metadata.xml: - Version bump to 3.1.3 adding support for building the DANE library. Remove - older version that make up the old stable branch for upstream. - - 06 Oct 2012; Raúl Porcel gnutls-2.12.20.ebuild: - alpha/ia64/m68k/s390/sh/sparc/x86 stable wrt #436368 - - 03 Oct 2012; Agostino Sarubbo gnutls-2.12.20.ebuild: - Stable for amd64, wrt bug #436368 - - 02 Oct 2012; Jeroen Roovers gnutls-2.12.20.ebuild: - Stable for HPPA (bug #436368). - - 28 Sep 2012; Anthony G. Basile gnutls-2.12.20.ebuild: - stable arm, bug #436368 - - 27 Sep 2012; Anthony G. Basile gnutls-2.12.20.ebuild: - stable ppc ppc64, bug #436368 - - 26 Sep 2012; Tim Harder gnutls-2.12.20.ebuild, - +files/gnutls-2.12.20-glibc-2.16.patch, +files/gnutls-2.12.20-libadd.patch: - Fix build with glibc-2.16 (bug #424988 by Christian Hagau) and link against - the built libgnutls library instead of the system version (bug #436146 by - Bartosz Brachaczek). - - 26 Sep 2012; Tim Harder -gnutls-2.12.19.ebuild, - -gnutls-3.0.20.ebuild, -gnutls-3.0.21.ebuild, -gnutls-3.0.22.ebuild, - -gnutls-3.1.0.ebuild: - Remove old. - -*gnutls-3.1.2 (26 Sep 2012) -*gnutls-3.0.24 (26 Sep 2012) - - 26 Sep 2012; Tim Harder +gnutls-3.0.24.ebuild, - +gnutls-3.1.2.ebuild: - Version bumps. - -*gnutls-3.1.1 (02 Sep 2012) -*gnutls-3.0.23 (02 Sep 2012) - - 02 Sep 2012; Tim Harder +gnutls-3.0.23.ebuild, - +gnutls-3.1.1.ebuild: - Version bumps. - -*gnutls-3.1.0 (15 Aug 2012) - - 15 Aug 2012; Diego E. Pettenò +gnutls-3.1.0.ebuild: - Version bump; disable TPM support for now until it can be tested by somebody - with a TPM device. - -*gnutls-3.0.22 (05 Aug 2012) - - 05 Aug 2012; Diego E. Pettenò +gnutls-3.0.22.ebuild: - Version bump. - - 02 Aug 2012; Tim Harder gnutls-2.12.18.ebuild, - gnutls-2.12.19.ebuild, gnutls-2.12.20.ebuild, gnutls-3.0.20.ebuild, - gnutls-3.0.21.ebuild: - Enable verbose build (bug #429312). - -*gnutls-3.0.21 (04 Jul 2012) - - 04 Jul 2012; Tim Harder +gnutls-3.0.21.ebuild: - Version bump. - - 17 Jun 2012; Fabian Groffen - +files/gnutls-2.12.20-AF_UNIX.patch, gnutls-2.12.20.ebuild: - Add backport of AF_LOCAL/AF_UNIX fix from upstream to fix compilation on e.g. - Solaris. - - 15 Jun 2012; Diego E. Pettenò - +files/gnutls-3.0.20-parallelmake.patch, gnutls-3.0.20.ebuild: - Add patch to build properly with parallel make; also build tests in parallel. - -*gnutls-2.12.20 (11 Jun 2012) - - 11 Jun 2012; Tim Harder +gnutls-2.12.20.ebuild: - Version bump. - - 10 Jun 2012; Tim Harder -gnutls-3.0.19.ebuild: - Remove old. - - 10 Jun 2012; Tim Harder gnutls-2.12.18.ebuild, - gnutls-2.12.19.ebuild: - Drop -Werror flag from all relevant configure files. - - 10 Jun 2012; Tim Harder gnutls-2.12.18.ebuild, - gnutls-2.12.19.ebuild: - Don't make automake warnings into errors. - - 09 Jun 2012; Tim Harder gnutls-3.0.20.ebuild: - Don't make automake warnings into errors. - - 06 Jun 2012; Tim Harder -gnutls-3.0.18.ebuild: - Remove old. - -*gnutls-3.0.20 (06 Jun 2012) - - 06 Jun 2012; Tim Harder +gnutls-3.0.20.ebuild: - Version bump. - - 28 May 2012; Fabian Groffen gnutls-2.12.19.ebuild, - gnutls-3.0.19.ebuild: - Transferred Prefix keywords, fixed for Prefix - - 10 May 2012; Tim Harder -gnutls-2.10.5.ebuild: - Remove old, insecure version. - - 09 May 2012; Matt Turner gnutls-2.12.19.ebuild: - Added ~mips, bug 402959. - -*gnutls-2.12.19 (07 May 2012) - - 07 May 2012; Tim Harder +gnutls-2.12.19.ebuild: - Version bump. - - 05 May 2012; Jeff Horelick gnutls-2.12.18.ebuild, - gnutls-3.0.18.ebuild, gnutls-3.0.19.ebuild: - dev-util/pkgconfig -> virtual/pkgconfig - - 26 Apr 2012; Alexis Ballier gnutls-2.12.18.ebuild: - keyword ~amd64-fbsd - - 22 Apr 2012; Tim Harder -gnutls-3.0.16.ebuild: - Remove old. - -*gnutls-3.0.19 (22 Apr 2012) - - 22 Apr 2012; Tim Harder +gnutls-3.0.19.ebuild: - Version bump. - - 16 Apr 2012; Brent Baude gnutls-2.12.18.ebuild: - Marking gnutls-2.12.18 ppc for bug 409287 - - 08 Apr 2012; Raúl Porcel gnutls-2.12.18.ebuild: - alpha/ia64/m68k/s390/sh/sparc stable wrt #409287 - - 08 Apr 2012; Tim Harder gnutls-3.0.16.ebuild, - gnutls-3.0.18.ebuild: - Update LICENSE. - -*gnutls-3.0.18 (03 Apr 2012) - - 03 Apr 2012; Tim Harder +gnutls-3.0.18.ebuild: - Version bump. - - 31 Mar 2012; Markus Meier gnutls-2.12.18.ebuild: - arm stable, bug #409287 - - 31 Mar 2012; Nirbheek Chauhan gnutls-2.12.18.ebuild: - Fix p11kit dependency to be >=0.11 - - 29 Mar 2012; Tim Harder -gnutls-2.12.17.ebuild, - -gnutls-3.0.15.ebuild: - Remove old. - - 29 Mar 2012; Tim Harder gnutls-3.0.16.ebuild: - Add pkgconfig build dependency. - - 28 Mar 2012; Brent Baude gnutls-2.12.18.ebuild: - Marking gnutls-2.12.18 ppc64 for bug 409287 - - 28 Mar 2012; Jeroen Roovers gnutls-2.12.18.ebuild: - Stable for HPPA (bug #409287). - - 28 Mar 2012; Diego E. Pettenò gnutls-2.12.18.ebuild: - Add missing pkgconfig dependency, thanks to Nikoli in bug #410015. - - 28 Mar 2012; Agostino Sarubbo gnutls-2.12.18.ebuild: - Stable for amd64, wrt bug #409287 - - 27 Mar 2012; Pawel Hajdan jr gnutls-2.12.18.ebuild: - x86 stable wrt bug #409287 - - 17 Mar 2012; Naohiro Aota gnutls-2.12.18.ebuild: - Add ~x86-fbsd. #402959 - - 17 Mar 2012; Tim Harder gnutls-3.0.16.ebuild: - Use local variable. - - 16 Mar 2012; Tim Harder -gnutls-2.12.16.ebuild, - -gnutls-3.0.13.ebuild, -files/gnutls-3.0.13-test-kill.patch, - -gnutls-3.0.14.ebuild: - Remove old. - -*gnutls-3.0.16 (16 Mar 2012) - - 16 Mar 2012; Tim Harder +gnutls-3.0.16.ebuild: - Version bump. - -*gnutls-2.12.18 (16 Mar 2012) - - 16 Mar 2012; Tim Harder +gnutls-2.12.18.ebuild: - Version bump. - - 16 Mar 2012; Tim Harder gnutls-2.12.17.ebuild: - Keyword newer version for ~ppc64 as well. - - 09 Mar 2012; Brent Baude gnutls-2.12.16.ebuild: - Marking gnutls-2.12.16 ~ppc64 for bug 402959 - -*gnutls-3.0.15 (03 Mar 2012) - - 03 Mar 2012; Tim Harder +gnutls-3.0.15.ebuild: - Version bump. Explicity disable valgrind tests since they now require the git - repo. - -*gnutls-2.12.17 (02 Mar 2012) - - 02 Mar 2012; Tim Harder +gnutls-2.12.17.ebuild: - Version bump. - - 25 Feb 2012; Tim Harder -gnutls-3.0.11.ebuild: - Remove old. - -*gnutls-3.0.14 (25 Feb 2012) - - 25 Feb 2012; Tim Harder +gnutls-3.0.14.ebuild: - Version bump. - - 22 Feb 2012; Brent Baude gnutls-2.12.16.ebuild: - Marking gnutls-2.12.16 ~ppc for bug 402959 - -*gnutls-3.0.13 (20 Feb 2012) - - 20 Feb 2012; Tim Harder +gnutls-3.0.13.ebuild, - +files/gnutls-3.0.13-test-kill.patch: - Version bump. - - 19 Feb 2012; Tomáš Chvátal gnutls-2.10.5.ebuild, - gnutls-2.12.16.ebuild, gnutls-3.0.11.ebuild: - Support for user patches wrt bug#395253. - - 10 Feb 2012; Tim Harder -gnutls-2.12.14.ebuild, - -gnutls-3.0.8.ebuild, -gnutls-3.0.9.ebuild, -gnutls-3.0.10.ebuild: - Remove old. - - 10 Feb 2012; Tim Harder gnutls-2.12.14.ebuild, - gnutls-2.12.16.ebuild: - Drop KEYWORDS for arches that haven't keyworded p11-kit yet. - -*gnutls-3.0.11 (13 Jan 2012) -*gnutls-2.12.16 (13 Jan 2012) - - 13 Jan 2012; Tim Harder +gnutls-2.12.16.ebuild, - +gnutls-3.0.11.ebuild: - Version bumps. - -*gnutls-3.0.10 (05 Jan 2012) - - 05 Jan 2012; Tim Harder +gnutls-3.0.10.ebuild: - Version bump. - -*gnutls-3.0.9 (14 Dec 2011) - - 14 Dec 2011; Tim Harder +gnutls-3.0.9.ebuild: - Version bump. - - 28 Nov 2011; Tim Harder gnutls-2.12.14.ebuild, - gnutls-3.0.8.ebuild: - Revert to autotools eclass (fixes bug #392163). - - 26 Nov 2011; Tim Harder gnutls-2.12.14.ebuild, - -gnutls-3.0.7.ebuild, gnutls-3.0.8.ebuild: - Remove old and build in the source tree. - -*gnutls-3.0.8 (12 Nov 2011) - - 12 Nov 2011; Tim Harder -gnutls-2.12.12.ebuild, - -gnutls-3.0.5.ebuild, +gnutls-3.0.8.ebuild: - Version bump and remove old. - -*gnutls-3.0.7 (08 Nov 2011) -*gnutls-2.12.14 (08 Nov 2011) - - 08 Nov 2011; Tim Harder +gnutls-2.12.14.ebuild, - +gnutls-3.0.7.ebuild: - Version bump to latest releases. Update gnutls-2.12.14 to use EAPI 4 and add - pkcs11/static-libs use flags. - - 05 Nov 2011; Markos Chandras gnutls-2.12.12.ebuild, - gnutls-3.0.5.ebuild: - Delete obsolete comments. Patch by Arfrever. - -*gnutls-3.0.5 (28 Oct 2011) - - 28 Oct 2011; Tim Harder -gnutls-3.0.3.ebuild, - -gnutls-3.0.4.ebuild, +gnutls-3.0.5.ebuild: - Version bump and remove old. - -*gnutls-2.12.12 (21 Oct 2011) - - 21 Oct 2011; Tim Harder -gnutls-2.12.10.ebuild, - -gnutls-2.12.11.ebuild, +gnutls-2.12.12.ebuild: - Version bump and remove old. - -*gnutls-3.0.4 (15 Oct 2011) - - 15 Oct 2011; Tim Harder +gnutls-3.0.4.ebuild: - Version bump. - - 21 Sep 2011; Tomáš Chvátal -gnutls-3.0.2.ebuild, - gnutls-3.0.3.ebuild, metadata.xml: - Make pkcs11 support optional. Drop older 3.0 ebuild that fails with that. - -*gnutls-3.0.3 (21 Sep 2011) -*gnutls-2.12.11 (21 Sep 2011) - - 21 Sep 2011; Tim Harder +gnutls-2.12.11.ebuild, - +gnutls-3.0.3.ebuild: - Version bump to latest releases. - -*gnutls-3.0.2 (18 Sep 2011) -*gnutls-2.12.10 (18 Sep 2011) - - 18 Sep 2011; Tomáš Chvátal -gnutls-2.10.4.ebuild, - -gnutls-2.11.6.ebuild, -gnutls-2.11.7.ebuild, -gnutls-2.12.0.ebuild, - -gnutls-2.12.0-r1.ebuild, -files/gnutls-2.12.0-C++.patch, - -gnutls-2.12.1.ebuild, -gnutls-2.12.2.ebuild, -gnutls-2.12.3.ebuild, - -gnutls-2.12.4.ebuild, -gnutls-2.12.5.ebuild, -gnutls-2.12.6.1.ebuild, - -gnutls-2.12.7.ebuild, +gnutls-2.12.10.ebuild, +gnutls-3.0.2.ebuild: - Version bump to latest 2.12 release and to 3.0.2. Drop older overshadowed - versions. - - 10 Jul 2011; Mark Loeser gnutls-2.10.5.ebuild: - Stable for ppc64; bug #361525 - -*gnutls-2.12.7 (07 Jul 2011) - - 07 Jul 2011; Markos Chandras +gnutls-2.12.7.ebuild: - Version bump. Requested by Arfrever - -*gnutls-2.12.6.1 (01 Jul 2011) - - 01 Jul 2011; Markos Chandras +gnutls-2.12.6.1.ebuild: - Version bump. Requested by Arfrever - -*gnutls-2.12.5 (14 May 2011) - - 14 May 2011; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.12.5.ebuild: - Version bump. - -*gnutls-2.12.4 (06 May 2011) - - 06 May 2011; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.12.4.ebuild: - Version bump. - - 23 Apr 2011; Raúl Porcel gnutls-2.10.5.ebuild: - alpha/ia64/m68k/s390/sh/sparc stable wrt #361525 - -*gnutls-2.12.3 (22 Apr 2011) - - 22 Apr 2011; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.12.3.ebuild: - Version bump. - - 16 Apr 2011; nixnut gnutls-2.10.5.ebuild: - ppc stable #361525 - - 12 Apr 2011; Markus Meier gnutls-2.10.5.ebuild: - arm stable, bug #361525 - -*gnutls-2.12.2 (08 Apr 2011) - - 08 Apr 2011; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.12.2.ebuild: - Version bump. - - 05 Apr 2011; Jeroen Roovers gnutls-2.10.5.ebuild: - Stable for HPPA (bug #361525). - - 04 Apr 2011; Thomas Kahle gnutls-2.10.5.ebuild: - x86 stable per bug 361525 - -*gnutls-2.12.1 (03 Apr 2011) - - 03 Apr 2011; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.12.1.ebuild: - Version bump. - - 02 Apr 2011; Christoph Mende gnutls-2.10.5.ebuild: - Stable on amd64 wrt bug #361525 - -*gnutls-2.12.0-r1 (30 Mar 2011) - - 30 Mar 2011; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.12.0-r1.ebuild, +files/gnutls-2.12.0-C++.patch: - Fix compatibility with C++. - -*gnutls-2.12.0 (25 Mar 2011) - - 25 Mar 2011; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.12.0.ebuild: - Version bump. - - 22 Mar 2011; Arfrever Frehtes Taifersar Arahesis - gnutls-2.10.5.ebuild, gnutls-2.11.7.ebuild: - Update dependencies (bug #358625). - -*gnutls-2.11.7 (09 Mar 2011) - - 09 Mar 2011; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.10.2.ebuild, -gnutls-2.10.2-r1.ebuild, -gnutls-2.10.3.ebuild, - -gnutls-2.11.4.ebuild, -gnutls-2.11.4-r1.ebuild, -gnutls-2.11.5.ebuild, - +gnutls-2.11.7.ebuild: - Version bump. - - 28 Feb 2011; Brent Baude gnutls-2.10.4.ebuild: - Marking gnutls-2.10.4 ppc64 for bug 352744 - -*gnutls-2.10.5 (28 Feb 2011) - - 28 Feb 2011; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.8.6.ebuild, -gnutls-2.10.1.ebuild, +gnutls-2.10.5.ebuild: - Version bump. - - 22 Feb 2011; nixnut gnutls-2.10.4.ebuild: - ppc stable #352744 - - 30 Jan 2011; Raúl Porcel gnutls-2.10.4.ebuild: - alpha/arm/ia64/m68k/s390/sh/sparc stable wrt #352744 - - 28 Jan 2011; Pawel Hajdan jr gnutls-2.10.4.ebuild: - x86 stable wrt bug #352744 - - 26 Jan 2011; Markos Chandras gnutls-2.10.4.ebuild: - Stable on amd64 wrt bug #352744 - - 25 Jan 2011; Jeroen Roovers gnutls-2.10.4.ebuild: - Stable for HPPA (bug #352744). - - 10 Jan 2011; Samuli Suominen gnutls-2.10.4.ebuild, - gnutls-2.11.6.ebuild: - Prevent valgrind detection (we definately don't want to run valgrind from - Portage because it's too unreliable). - - 27 Dec 2010; Brent Baude gnutls-2.10.2.ebuild: - stable ppc64, bug 343755 - -*gnutls-2.11.6 (27 Dec 2010) - - 27 Dec 2010; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.11.6.ebuild: - Version bump. - -*gnutls-2.11.5 (27 Dec 2010) - - 27 Dec 2010; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.11.5.ebuild: - Version bump. - -*gnutls-2.10.4 (27 Dec 2010) - - 27 Dec 2010; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.10.4.ebuild: - Version bump. - -*gnutls-2.10.3 (27 Dec 2010) - - 27 Dec 2010; Arfrever Frehtes Taifersar Arahesis - -files/gnutls-2.6.0-cxx-configure.in.patch, -gnutls-2.10.0.ebuild, - +gnutls-2.10.3.ebuild, -gnutls-2.11.0.ebuild, -gnutls-2.11.1.ebuild, - -gnutls-2.11.2.ebuild, -gnutls-2.11.3.ebuild: - Version bump. - - 27 Nov 2010; Raúl Porcel gnutls-2.10.2.ebuild: - alpha/ia64/m68k/s390/sh/sparc stable wrt #343755 - - 13 Nov 2010; Raúl Porcel gnutls-2.10.2-r1.ebuild: - Add ~ia64/~m68k/~s390/~sh/~sparc wrt #326999 - - 12 Nov 2010; Dane Smith gnutls-2.10.2-r1.ebuild, - gnutls-2.11.4-r1.ebuild: - Changed guile dependency in 2.10.2-r1 and 2.11.4-r1 to be >=1.8 wrt bug - 302619. - - 10 Nov 2010; Dane Smith gnutls-2.10.2-r1.ebuild: - Readd alpha keyword as per bug 326999 as alpha *has* in fact keyworded - app-misc/datefudge. - -*gnutls-2.11.4-r1 (10 Nov 2010) -*gnutls-2.10.2-r1 (10 Nov 2010) - - 10 Nov 2010; Dane Smith -gnutls-2.10.1-r1.ebuild, - +gnutls-2.10.2-r1.ebuild, +gnutls-2.11.4-r1.ebuild, metadata.xml: - *Revision bumps for 2.10.2 and 2.11.4 include new valgrind use flag to fix - automahic dependency wrt bug 333403. - *Small QA fixes in both. - *Removed keywords for alpha ia64 m68k s390 sh sparc in 2.10.2-r1 as - datefudge - is not keyworded for those archs. I will be opening a keyword req for - datefudge. - *Removed 2.10.1-r1 as it contained an ~alpha keyword when datefudge was - not - keyworded for alpha. - - 06 Nov 2010; Markus Meier gnutls-2.10.2.ebuild: - arm stable, bug #343755 - - 04 Nov 2010; Christian Faulhammer gnutls-2.10.2.ebuild: - stable x86, bug 343755 - - 03 Nov 2010; Jeroen Roovers gnutls-2.10.2.ebuild: - Stable for PPC (bug #343755). - - 02 Nov 2010; Jeroen Roovers gnutls-2.10.2.ebuild: - Stable for HPPA (bug #343755). - - 02 Nov 2010; Markos Chandras gnutls-2.10.2.ebuild: - Stable on amd64 wrt bug #343755 - - 24 Oct 2010; Tobias Klausmann gnutls-2.10.1.ebuild: - Stable on alpha, bug #337139 - -*gnutls-2.11.4 (16 Oct 2010) - - 16 Oct 2010; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.11.4.ebuild: - Version bump. - -*gnutls-2.11.3 (16 Oct 2010) - - 16 Oct 2010; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.11.3.ebuild: - Version bump. - -*gnutls-2.11.2 (16 Oct 2010) - - 16 Oct 2010; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.11.2.ebuild: - Version bump. Fix dependencies (bug #337661). - - 11 Oct 2010; Markus Meier gnutls-2.10.1.ebuild: - arm stable, bug #337139 - - 10 Oct 2010; Tobias Klausmann - gnutls-2.10.1-r1.ebuild: - Keyworded on alpha, bug #326999 - - 06 Oct 2010; Jeroen Roovers gnutls-2.10.1.ebuild: - Stable for HPPA (bug #337139). - -*gnutls-2.10.2 (01 Oct 2010) - - 01 Oct 2010; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.10.2.ebuild: - Version bump. - - 30 Sep 2010; Samuli Suominen gnutls-2.11.1.ebuild: - Backport USE="test" also to development series. - -*gnutls-2.10.1-r1 (28 Sep 2010) - - 28 Sep 2010; Samuli Suominen - +gnutls-2.10.1-r1.ebuild: - USE="test" for app-misc/datefudge DEPEND wrt #326999. - - 28 Sep 2010; Samuli Suominen gnutls-2.10.1.ebuild: - ppc64 stable wrt #337139 - - 28 Sep 2010; Brent Baude gnutls-2.10.1.ebuild: - stable ppc, bug 337139 - - 25 Sep 2010; Markus Meier gnutls-2.10.1.ebuild: - x86 stable, bug #337139 - - 20 Sep 2010; Markos Chandras gnutls-2.10.1.ebuild: - Stable on amd64 wrt bug #337139 - -*gnutls-2.11.1 (14 Sep 2010) - - 14 Sep 2010; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.11.1.ebuild: - Version bump. - - 14 Sep 2010; Arfrever Frehtes Taifersar Arahesis - metadata.xml: - Add "nettle" USE flag. - - 06 Aug 2010; Jeroen Roovers gnutls-2.10.0.ebuild: - Stable for PPC (bug #292025). - - 25 Jul 2010; Raúl Porcel gnutls-2.10.0.ebuild: - arm/ia64/m68k/s390/sh/sparc stable wrt #292025 - -*gnutls-2.10.1 (25 Jul 2010) - - 25 Jul 2010; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.10.1.ebuild: - Version bump. - -*gnutls-2.11.0 (22 Jul 2010) - - 22 Jul 2010; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.8.5.ebuild, -gnutls-2.9.12.ebuild, +gnutls-2.11.0.ebuild: - Version bump. - - 11 Jul 2010; Tobias Klausmann gnutls-2.10.0.ebuild: - Stable on alpha, bug #292025 - - 05 Jul 2010; Samuli Suominen gnutls-2.10.0.ebuild: - ppc64 stable wrt #292025 - - 28 Jun 2010; Jeroen Roovers gnutls-2.10.0.ebuild: - Stable for HPPA (bug #292025). - - 27 Jun 2010; Christian Faulhammer gnutls-2.10.0.ebuild: - stable x86, security bug 292025 - - 26 Jun 2010; Christoph Mende gnutls-2.10.0.ebuild: - Stable on amd64 wrt bug #292025 - -*gnutls-2.10.0 (25 Jun 2010) - - 25 Jun 2010; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.6.6.ebuild, -gnutls-2.9.11.ebuild, +gnutls-2.10.0.ebuild: - Version bump (bug #292025). - - 19 Jun 2010; Raúl Porcel gnutls-2.8.6.ebuild: - alpha/ia64/m68k/s390/sh/sparc stable wrt #315781 - -*gnutls-2.9.12 (17 Jun 2010) - - 17 Jun 2010; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.9.10.ebuild, +gnutls-2.9.12.ebuild: - Version bump. - -*gnutls-2.9.11 (07 Jun 2010) - - 07 Jun 2010; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.9.9.ebuild, +gnutls-2.9.11.ebuild: - Version bump. - - 28 May 2010; Markus Meier gnutls-2.8.6.ebuild: - arm/x86 stable, bug #315781 - - 21 May 2010; Peter Volkov gnutls-2.8.6.ebuild: - amd64 stable, bug 315781 - - 07 May 2010; Jeroen Roovers gnutls-2.8.6.ebuild: - Stable for PPC (bug #315781). - - 07 May 2010; Jeroen Roovers gnutls-2.8.6.ebuild: - Stable for HPPA (bug #315781). - -*gnutls-2.9.10 (22 Apr 2010) - - 22 Apr 2010; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.9.10.ebuild: - Version bump. - -*gnutls-2.8.6 (18 Mar 2010) - - 18 Mar 2010; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.8.3.ebuild, -gnutls-2.8.4.ebuild, +gnutls-2.8.6.ebuild, - -gnutls-2.9.8.ebuild: - Version bump. - - 30 Jan 2010; Raúl Porcel gnutls-2.8.5.ebuild: - ia64/m68k/s390/sh/sparc stable wrt #296045 - - 01 Jan 2010; Tobias Klausmann gnutls-2.8.5.ebuild: - Stable on alpha, bug #296045 - - 22 Dec 2009; Markus Meier gnutls-2.8.5.ebuild: - arm/x86 stable, bug #296045 - - 20 Dec 2009; Markos Chandras gnutls-2.8.5.ebuild: - Stable for amd64 wrt bug #296045 - - 09 Dec 2009; nixnut gnutls-2.8.5.ebuild: - ppc stable #296045 - - 08 Dec 2009; Brent Baude gnutls-2.8.5.ebuild: - Marking gnutls-2.8.5 ppc64 for bug 296045 - - 07 Dec 2009; Jeroen Roovers gnutls-2.8.5.ebuild: - Stable for HPPA (bug #296045). - - 17 Nov 2009; Brent Baude gnutls-2.8.4.ebuild: - Marking gnutls-2.8.4 ppc64 for bug 289625 - -*gnutls-2.9.9 (13 Nov 2009) - - 13 Nov 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.9.6.ebuild, +gnutls-2.9.9.ebuild: - Version bump. - - 10 Nov 2009; Markus Meier gnutls-2.8.4.ebuild: - amd64/arm stable, bug #289625 - - 08 Nov 2009; Tobias Klausmann gnutls-2.8.4.ebuild: - Stable on alpha, bug #289625 - -*gnutls-2.9.8 (05 Nov 2009) - - 05 Nov 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.9.5.ebuild, +gnutls-2.9.8.ebuild: - Version bump. - -*gnutls-2.8.5 (02 Nov 2009) - - 02 Nov 2009; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.8.5.ebuild: - Version bump. - - 28 Oct 2009; Christian Faulhammer gnutls-2.8.4.ebuild: - stable x86, bug 289625 - - 26 Oct 2009; Jeroen Roovers gnutls-2.8.4.ebuild: - Stable for HPPA (bug #289625). - - 24 Oct 2009; nixnut gnutls-2.8.3.ebuild: - ppc stable #275695 - - 23 Oct 2009; Raúl Porcel gnutls-2.8.3.ebuild: - ia64/sparc stable wrt #275695 - -*gnutls-2.9.6 (22 Sep 2009) - - 22 Sep 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.9.4.ebuild, +gnutls-2.9.6.ebuild: - Version bump. - - 19 Sep 2009; Markus Meier gnutls-2.8.3.ebuild: - arm stable, bug #275695 - -*gnutls-2.8.4 (18 Sep 2009) - - 18 Sep 2009; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.8.4.ebuild: - Version bump. - - 16 Sep 2009; Olivier Crête gnutls-2.8.3.ebuild: - Stable on amd64, bug #275695 - - 15 Sep 2009; Jeroen Roovers gnutls-2.8.3.ebuild: - Stable for HPPA (bug #275695). - - 14 Sep 2009; Christian Faulhammer gnutls-2.8.3.ebuild: - stable x86, bug 275695 - - 13 Sep 2009; Brent Baude gnutls-2.8.3.ebuild: - Marking gnutls-2.8.3 ppc64 for bug 275695 - -*gnutls-2.9.5 (10 Sep 2009) - - 10 Sep 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.9.3.ebuild, +gnutls-2.9.5.ebuild: - Version bump. - -*gnutls-2.9.4 (03 Sep 2009) - - 03 Sep 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.9.2.ebuild, +gnutls-2.9.4.ebuild: - Version bump. - - 25 Aug 2009; Tobias Klausmann gnutls-2.8.3.ebuild: - Stable on alpha, bug #275695 - -*gnutls-2.9.3 (20 Aug 2009) - - 20 Aug 2009; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.9.3.ebuild: - Version bump. - -*gnutls-2.9.2 (15 Aug 2009) - - 15 Aug 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.9.1.ebuild, +gnutls-2.9.2.ebuild: - Version bump. - -*gnutls-2.8.3 (13 Aug 2009) - - 13 Aug 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.8.1.ebuild, -gnutls-2.8.2.ebuild, -gnutls-2.8.2-r1.ebuild, - -files/gnutls-2.8.2-fix_reading_of_memory.patch, +gnutls-2.8.3.ebuild: - Version bump. - -*gnutls-2.8.2-r1 (13 Aug 2009) - - 13 Aug 2009; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.8.2-r1.ebuild, +files/gnutls-2.8.2-fix_reading_of_memory.patch: - Fix reading of memory (bug #281249). - -*gnutls-2.8.2 (10 Aug 2009) - - 10 Aug 2009; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.8.2.ebuild: - Version bump. - -*gnutls-2.8.1 (10 Jun 2009) - - 10 Jun 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.8.0.ebuild, +gnutls-2.8.1.ebuild: - Version bump. - -*gnutls-2.9.1 (09 Jun 2009) - - 09 Jun 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.9.0.ebuild, +gnutls-2.9.1.ebuild: - Version bump. - - 01 Jun 2009; Arfrever Frehtes Taifersar Arahesis - gnutls-2.8.0.ebuild, gnutls-2.9.0.ebuild: - Fix installation of documentation (bug #271944). - -*gnutls-2.9.0 (28 May 2009) -*gnutls-2.8.0 (28 May 2009) - - 28 May 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.7.12.ebuild, -gnutls-2.7.13.ebuild, +gnutls-2.8.0.ebuild, - +gnutls-2.9.0.ebuild: - Version bumps. - -*gnutls-2.7.13 (25 May 2009) - - 25 May 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.7.11.ebuild, +gnutls-2.7.13.ebuild: - Version bump. - -*gnutls-2.7.12 (20 May 2009) - - 20 May 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.7.10.ebuild, +gnutls-2.7.12.ebuild: - Version bump. - -*gnutls-2.7.11 (19 May 2009) - - 19 May 2009; Arfrever Frehtes Taifersar Arahesis - -files/gnutls-2.6.0-openpgp-selftest.patch, -gnutls-2.6.4.ebuild, - -gnutls-2.6.5.ebuild, -gnutls-2.6.5-r1.ebuild, -gnutls-2.7.8.ebuild, - -files/gnutls-2.7.8-lzo.patch, +gnutls-2.7.11.ebuild, - -files/CVE-2009-1415.patch, -files/CVE-2009-1416.patch, - -files/CVE-2009-1417.patch: - Version bump. - -*gnutls-2.7.10 (15 May 2009) - - 15 May 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.7.7.ebuild, +gnutls-2.7.10.ebuild: - Version bump. - - 06 May 2009; Raúl Porcel gnutls-2.6.6.ebuild: - alpha/arm/ia64/m68k/s390/sh/sparc stable wrt #267774 - -*gnutls-2.7.8 (04 May 2009) - - 04 May 2009; Arfrever Frehtes Taifersar Arahesis - +gnutls-2.7.8.ebuild, +files/gnutls-2.7.8-lzo.patch: - Version bump. - - 03 May 2009; Brent Baude gnutls-2.6.6.ebuild: - Marking gnutls-2.6.6 ppc64 and ppc for bug 267774 - - 03 May 2009; Tobias Klausmann gnutls-2.6.6.ebuild: - Stable on alpha, bug #267774 - - 02 May 2009; Jeroen Roovers gnutls-2.6.6.ebuild: - Stable for HPPA (bug #267774). - - 01 May 2009; Markus Meier gnutls-2.6.6.ebuild: - amd64/x86 stable, bug #267774 - - 01 May 2009; Daniel Black gnutls-2.6.5-r1.ebuild, - gnutls-2.6.6.ebuild: - libtool rebuild to prevent bug #268065 which I forgot about - -*gnutls-2.6.6 (30 Apr 2009) - - 30 Apr 2009; Daniel Black +gnutls-2.6.6.ebuild: - official upstream release to fix CVE-2009-1415 CVE-2009-1416 CVE-2009-1417 - -*gnutls-2.6.5-r1 (30 Apr 2009) - - 30 Apr 2009; Daniel Black - +files/CVE-2009-1415.patch, +files/CVE-2009-1416.patch, - +files/CVE-2009-1417.patch, +gnutls-2.6.5-r1.ebuild: - fix for security bug #267774 - -*gnutls-2.7.7 (26 Apr 2009) - - 26 Apr 2009; Arfrever Frehtes Taifersar Arahesis - -gnutls-2.7.6.ebuild, +gnutls-2.7.7.ebuild: - Version bump. - -*gnutls-2.6.5 (12 Apr 2009) - - 12 Apr 2009; Arfrever Frehtes Taifersar Arahesis - -files/gnutls-2.2.5-CVE-2008-4989-V2.patch, - -files/gnutls-2.3.11+gcc-4.3.patch, -gnutls-2.2.5.ebuild, - -gnutls-2.4.1-r2.ebuild, -gnutls-2.6.0-r2.ebuild, -gnutls-2.6.3.ebuild, - +gnutls-2.6.5.ebuild, -gnutls-2.7.4.ebuild: - Version bump. Remove older versions. - - 11 Apr 2009; Raúl Porcel gnutls-2.6.4.ebuild: - arm/ia64/m68k/s390/sh/sparc stable wrt #264392 - - 08 Apr 2009; Jeroen Roovers gnutls-2.6.4.ebuild: - Stable for HPPA (bug #264392). - - 07 Apr 2009; Tobias Klausmann gnutls-2.6.4.ebuild: - Stable on alpha, bug #264392 - - 05 Apr 2009; Markus Meier gnutls-2.6.4.ebuild: - amd64/x86 stable, bug #264392 - - 01 Apr 2009; Joseph Jezak gnutls-2.6.4.ebuild: - Marked ppc/ppc64 stable for bug #264392. - -*gnutls-2.6.4 (01 Mar 2009) - - 01 Mar 2009; Daniel Black +gnutls-2.6.4.ebuild: - version bump as per bug #259018 thanks to Arfrever - -*gnutls-2.7.6 (28 Feb 2009) - - 28 Feb 2009; Daniel Black -gnutls-2.6.2.ebuild, - +gnutls-2.7.6.ebuild: - version bump as per bug #259018 patch thanks to Arfrever Frehtes Taifersar - Arahesis - -*gnutls-2.7.4 (10 Jan 2009) - - 10 Jan 2009; Daniel Black +gnutls-2.7.4.ebuild: - version bump as per bug #254445 - still masked - it breaks a few packages as - per bug #253709 - - 10 Jan 2009; Daniel Black - +files/gnutls-2.6.0-openpgp-selftest.patch, gnutls-2.6.0-r2.ebuild, - gnutls-2.6.2.ebuild, gnutls-2.6.3.ebuild: - openpgp patch from upstream. https://savannah.gnu.org/support/index.php?106543 - -*gnutls-2.6.3 (05 Jan 2009) - - 05 Jan 2009; Daniel Black - files/gnutls-2.6.0-cxx-configure.in.patch, gnutls-2.6.0-r2.ebuild, - gnutls-2.6.2.ebuild, +gnutls-2.6.3.ebuild: - version bump as per bug #250987 thanks to Arfrever. USE=-cxx fix as per bug - #249326 by Lars Strojny with patch thanks to Arfrever. Fix libtool cleanup - on 2.6.0 version. - - 18 Nov 2008; Daniel Black - -files/gnutls-2.2.5-CVE-2008-4989.patch, -gnutls-2.4.1-r1.ebuild, - gnutls-2.4.1-r2.ebuild, -gnutls-2.6.0-r1.ebuild: - cleanup and stable - -*gnutls-2.6.0-r2 (18 Nov 2008) -*gnutls-2.4.1-r2 (18 Nov 2008) - - 18 Nov 2008; Daniel Black - +files/gnutls-2.2.5-CVE-2008-4989-V2.patch, +gnutls-2.4.1-r2.ebuild, - +gnutls-2.6.0-r2.ebuild, -gnutls-2.6.1.ebuild: - fixed cve patch as per bug #246976 - thanks parafin - - 18 Nov 2008; Daniel Black gnutls-2.6.2.ebuild: - eapi problem - bug #247164 - thanks en.ABCD - - 15 Nov 2008; Tobias Scherbaum - gnutls-2.4.1-r1.ebuild: - ppc stable, bug #245850 - -*gnutls-2.6.2 (13 Nov 2008) - - 13 Nov 2008; Daniel Black +gnutls-2.6.2.ebuild: - version bump - bug #246492 - thanks Arfrever - - 12 Nov 2008; Markus Rothe gnutls-2.4.1-r1.ebuild: - Stable on ppc64; bug #245850 - -*gnutls-2.6.1 (10 Nov 2008) -*gnutls-2.6.0-r1 (10 Nov 2008) - - 10 Nov 2008; Daniel Black -gnutls-2.4.1.ebuild, - gnutls-2.4.1-r1.ebuild, -gnutls-2.5.4.ebuild, -gnutls-2.6.0.ebuild, - +gnutls-2.6.0-r1.ebuild, +gnutls-2.6.1.ebuild: - more bumps for CVE. Remove old versions - -*gnutls-2.4.1-r1 (10 Nov 2008) - - 10 Nov 2008; Christian Hoffmann - +files/gnutls-2.2.5-CVE-2008-4989.patch, +gnutls-2.4.1-r1.ebuild: - revision bump to fix security bug 245850 (CVE-2008-4989), straight to - stable on alpha amd64 hppa ia64 sparc x86 as tested on the mentioned bug - - 05 Nov 2008; Daniel Black gnutls-2.6.0.ebuild: - alternate and much better solution by loki_val - - 05 Nov 2008; Daniel Black gnutls-2.6.0.ebuild: - minimium libtool version as per bug #245544 thanks to Vasileios and Lars. - - 04 Nov 2008; Mike Frysinger Manifest: - Fix gnutls-2.2.5.tar.bz2 manifest. - -*gnutls-2.6.0 (04 Nov 2008) - - 04 Nov 2008; Daniel Black - +files/gnutls-2.6.0-cxx-configure.in.patch, gnutls-2.5.4.ebuild, - +gnutls-2.6.0.ebuild: - version bump as per bug #236690 thanks to Arfrever - - 04 Sep 2008; Daniel Black gnutls-2.5.4.ebuild: - change dependancy as per bug #236642 suggested by Arfreve. Bug thanks to - Seemant. - -*gnutls-2.5.4 (19 Aug 2008) - - 19 Aug 2008; Daniel Black -gnutls-2.5.3.ebuild, - +gnutls-2.5.4.ebuild: - version bump to correct subversion errors - bug #235098 + probing from Arfrever - - 17 Aug 2008; Daniel Black gnutls-2.2.5.ebuild, - gnutls-2.4.1.ebuild, gnutls-2.5.3.ebuild: - autotools qa fixes - -*gnutls-2.5.3 (17 Aug 2008) - - 17 Aug 2008; Daniel Black +gnutls-2.5.3.ebuild: - version bump as per bug #231610 thanks to Arfrever Frehtes Taifersar Arahesis - -*gnutls-2.4.1 (01 Jul 2008) - - 01 Jul 2008; Daniel Black - -files/gnutls-2.3.15-qa_gnutls_session_is_psk.patch, - -gnutls-2.3.11.ebuild, -gnutls-2.4.0.ebuild, +gnutls-2.4.1.ebuild: - version bump and older version cleanout as per security bug #230263 thanks rbu - -*gnutls-2.4.0 (19 Jun 2008) - - 19 Jun 2008; Daniel Black -gnutls-2.3.15.ebuild, - +gnutls-2.4.0.ebuild: - version bump - using proper release - -*gnutls-2.3.15 (19 Jun 2008) - - 19 Jun 2008; Daniel Black - +files/gnutls-2.3.15-qa_gnutls_session_is_psk.patch, gnutls-2.3.11.ebuild, - +gnutls-2.3.15.ebuild: - version bump thanks to bug #227385. opencdk notlonger supported as per bug - #227381. Thanks to Arfrever Frehtes Taifersar Arahesis and Franz Metz - - 01 Jun 2008; Diego Pettenò - +files/gnutls-2.3.11+gcc-4.3.patch, gnutls-2.3.11.ebuild: - Add patch to fix building examples with GCC 4.3. See bug #224453. - -*gnutls-2.3.11 (01 Jun 2008) - - 01 Jun 2008; Daniel Black -gnutls-2.2.2.ebuild, - -gnutls-2.2.3.ebuild, +gnutls-2.3.11.ebuild: - version bump _ old version cleanout - - 21 May 2008; Tobias Scherbaum gnutls-2.2.5.ebuild: - ppc stable, bug #222823 - - 21 May 2008; Richard Freeman gnutls-2.2.5.ebuild: - amd64 stable - 222823 - - 20 May 2008; Daniel Black gnutls-2.2.5.ebuild: - -m moved URL to mirror:// thanks to Blackbird on irc - - 20 May 2008; Markus Rothe gnutls-2.2.5.ebuild: - Stable on ppc64. Fix double lzo enabling. Bug #222823 - - 20 May 2008; Raúl Porcel gnutls-2.2.5.ebuild: - alpha/ia64/sparc/x86 stable wrt security #222823 - - 20 May 2008; Jeroen Roovers gnutls-2.2.5.ebuild: - Stable for HPPA (bug #222823). - -*gnutls-2.2.5 (20 May 2008) - - 20 May 2008; Daniel Black +gnutls-2.2.5.ebuild: - version bump - ref security bug #222823 - -*gnutls-2.2.3 (06 May 2008) - - 06 May 2008; Alon Bar-Lev +gnutls-2.2.3.ebuild: - Version bump - - 26 Mar 2008; Jeroen Roovers gnutls-2.2.2.ebuild: - Stable for HPPA (bug #209984). - - 24 Mar 2008; Raúl Porcel gnutls-2.2.2.ebuild: - alpha/ia64/sparc stable wrt #209984 - - 22 Mar 2008; Markus Rothe gnutls-2.2.2.ebuild: - Stable on ppc64; bug #209984 - - 22 Mar 2008; nixnut gnutls-2.2.2.ebuild: - Stable on ppc wrt bug 209984 - - 21 Mar 2008; Markus Meier gnutls-2.2.2.ebuild: - amd64/x86 stable, bug #209984 - -*gnutls-2.2.2 (22 Feb 2008) - - 22 Feb 2008; Alon Bar-Lev -gnutls-2.2.1.ebuild, - +gnutls-2.2.2.ebuild: - Version bump - - 13 Feb 2008; Alon Bar-Lev - -files/gnutls-1.4.4-selflink.patch, -gnutls-1.4.4-r1.ebuild: - Cleanup - - 20 Jan 2008; Alon Bar-Lev gnutls-2.2.1.ebuild: - Don't fail build on bindist, bug#202381, thanks to jacub - - 18 Jan 2008; Alon Bar-Lev gnutls-2.2.1.ebuild: - Fix bug#202381, bug#203880 - -*gnutls-2.2.1 (18 Jan 2008) - - 18 Jan 2008; Alon Bar-Lev - -files/gnutls-2.2.0-selflink.patch, -gnutls-2.2.0.ebuild, - +gnutls-2.2.1.ebuild: - Version bump - - 16 Jan 2008; Fabian Groffen gnutls-1.4.4-r1.ebuild, - gnutls-2.0.4.ebuild, gnutls-2.2.0.ebuild: - Dropped ppc-macos keyword, see you in prefix - - 14 Jan 2008; Christoph Mende gnutls-2.0.4.ebuild: - Stable on amd64 wrt bug #199297 - - 10 Jan 2008; Alon Bar-Lev -gnutls-1.4.5.ebuild, - -gnutls-1.6.1.ebuild, -gnutls-1.6.2.ebuild, -gnutls-1.6.3.ebuild: - Cleanup - - 08 Jan 2008; Jeroen Roovers gnutls-2.0.4.ebuild: - Stable for HPPA (bug #199297). - - 05 Jan 2008; Raúl Porcel gnutls-2.0.4.ebuild: - alpha/ia64/sparc stable wrt #199297 - - 03 Jan 2008; Brent Baude gnutls-2.0.4.ebuild: - Marking gnutls-2.0.4 ppc64 for bug 199297 - - 03 Jan 2008; Christian Faulhammer gnutls-2.0.4.ebuild: - stable x86, bug 199297 - - 03 Jan 2008; Brent Baude gnutls-2.0.4.ebuild: - Marking gnutls-2.0.4 ppc for bug 199297 - - 19 Dec 2007; Alon Bar-Lev gnutls-2.2.0.ebuild: - Modify libgcrypt dependency, bug#202783, thanks to Ramon - - 14 Dec 2007; Alon Bar-Lev - +files/gnutls-2.2.0-selflink.patch, gnutls-2.2.0.ebuild: - Fix selflink issue, bug#202269, thanks to aballier - -*gnutls-2.2.0 (14 Dec 2007) - - 14 Dec 2007; Alon Bar-Lev +gnutls-2.2.0.ebuild: - Version bump - -*gnutls-2.0.4 (30 Nov 2007) - - 30 Nov 2007; Alon Bar-Lev -gnutls-2.0.3.ebuild, - +gnutls-2.0.4.ebuild: - Version bump, bug#200484 - -*gnutls-2.0.3 (16 Nov 2007) - - 16 Nov 2007; Alon Bar-Lev -gnutls-2.0.1.ebuild, - +gnutls-2.0.3.ebuild: - Version bump, bug#199371 - -*gnutls-2.0.1 (22 Sep 2007) - - 22 Sep 2007; Alon Bar-Lev -gnutls-2.0.0.ebuild, - +gnutls-2.0.1.ebuild: - Version bump - - 11 Sep 2007; Roy Marples gnutls-2.0.0.ebuild: - elibtoolize for sane .so versioning on FreeBSD. - -*gnutls-2.0.0 (05 Sep 2007) - - 05 Sep 2007; Alon Bar-Lev +gnutls-2.0.0.ebuild: - Version bump, bug#191395 - - 30 Aug 2007; Christian Heim metadata.xml: - Removing liquidx from metadata due to his retirement (see #171155 for - reference). - -*gnutls-1.6.3 (19 Jul 2007) - - 19 Jul 2007; Alon Bar-Lev +gnutls-1.6.3.ebuild: - Version bump, bug#185700 - - 12 Jul 2007; Roy Marples gnutls-1.6.2.ebuild: - Keyworded ~sparc-fbsd. - -*gnutls-1.6.2 (21 Apr 2007) - - 21 Apr 2007; Daniel Black -gnutls-1.6.0.ebuild, - +gnutls-1.6.2.ebuild: - version bump. remove older version - - 10 Jan 2007; Markus Ullmann gnutls-1.4.4-r1.ebuild: - Fix autotools deps, thanks to rangerpb for pointing that out - -*gnutls-1.6.1 (30 Dec 2006) - - 30 Dec 2006; Daniel Black +gnutls-1.6.1.ebuild: - version bump - upstream bug fixes - -*gnutls-1.6.0 (09 Dec 2006) -*gnutls-1.4.5 (09 Dec 2006) - - 09 Dec 2006; Daniel Black - -files/gnutls-1.2.10-as-needed.patch, -files/gnutls-1.4.1-as-needed.patch, - -gnutls-1.2.10.ebuild, -gnutls-1.2.10-r1.ebuild, -gnutls-1.2.11.ebuild, - -gnutls-1.4.1.ebuild, gnutls-1.4.4-r1.ebuild, +gnutls-1.4.5.ebuild, - +gnutls-1.6.0.ebuild: - purge security vulnerable versions. Version bumps too - - 09 Nov 2006; Ilya A. Volynets-Evenbakh - gnutls-1.4.4-r1.ebuild: - stabilize on mips (#140530) - - 25 Sep 2006; Jason Wever gnutls-1.4.4-r1.ebuild: - Stable on SPARC wrt security bug #147682. - - 23 Sep 2006; Daniel Black gnutls-1.4.4-r1.ebuild: - fix nls support as per bug #148778 thanks to Timo Kamph - - 22 Sep 2006; Bryan Østergaard gnutls-1.4.4-r1.ebuild: - Stable on Alpha + ia64, bug 147682. - - 21 Sep 2006; gnutls-1.4.4-r1.ebuild: - stable on amd64 - - 21 Sep 2006; Tobias Scherbaum - gnutls-1.4.4-r1.ebuild: - ppc, hppa stable, bug #147682 - - 21 Sep 2006; Daniel Black gnutls-1.4.4-r1.ebuild: - added postinst message explaining the need for a rebuild - - 21 Sep 2006; Markus Rothe gnutls-1.4.4-r1.ebuild: - Stable on ppc64; bug #147682 - - 20 Sep 2006; gnutls-1.4.4-r1.ebuild: - Stable on x86. Security bug #147682. - -*gnutls-1.4.4-r1 (19 Sep 2006) - - 19 Sep 2006; Daniel Black - files/gnutls-1.4.4-selflink.patch, -gnutls-1.4.4.ebuild, - +gnutls-1.4.4-r1.ebuild: - fixed selflink patch thanks to Alon Bar-Lev in bug #147800 - - 17 Sep 2006; Daniel Black gnutls-1.4.4.ebuild: - Temporarily added sys-devel/autoconf-2.60 dependency as per bug #147970 - until a better solution can be found - - 17 Sep 2006; Daniel Black - +files/gnutls-1.4.4-selflink.patch, gnutls-1.4.4.ebuild: - partial fix for selflinking - bug #147800 thanks Carsten Lohrke - -*gnutls-1.4.4 (16 Sep 2006) - - 16 Sep 2006; Daniel Black +gnutls-1.4.4.ebuild: - version bump for security bug #147682 - - 10 Sep 2006; Javier Villavicencio - gnutls-1.2.11.ebuild: - Add ~x86-fbsd keyword. - - 03 Aug 2006; Daniel Black gnutls-1.4.1.ebuild: - removed --without-included-libtasn1 as oddly enough it uses the included - libtasn1. Thanks to Peter Hyman for picking up the missing dependency - -*gnutls-1.4.1 (01 Aug 2006) -*gnutls-1.2.11 (01 Aug 2006) - - 01 Aug 2006; Daniel Black - +files/gnutls-1.2.10-as-needed.patch, +files/gnutls-1.4.1-as-needed.patch, - gnutls-1.2.10-r1.ebuild, +gnutls-1.2.11.ebuild, +gnutls-1.4.1.ebuild: - fix for selftest with LDFLAGS="-Wl,--as-needed" as per bug #142353 thanks to - Brant Gurganus. Version bump to 1.4.1 as well - - 15 Jul 2006; Marcelo Goes -gnutls-1.2.3.ebuild, - -gnutls-1.2.4.ebuild, -gnutls-1.2.9.ebuild, -gnutls-1.2.9-r1.ebuild: - Remove ebuilds earlier than 1.2.10 for security cleanup bug 140530, reported - by Jakub Moc . - - 09 Jul 2006; Joshua Kinard gnutls-1.2.10.ebuild: - Marked stable on mips. - - 27 Apr 2006; Alec Warner files/digest-gnutls-1.2.3, - files/digest-gnutls-1.2.4, files/digest-gnutls-1.2.9, - files/digest-gnutls-1.2.9-r1, Manifest: - Fixing SHA256 digest, pass four - - 23 Apr 2006; Diego Pettenò gnutls-1.2.10.ebuild, - gnutls-1.2.10-r1.ebuild: - Run elibtoolize and add ~x86-fbsd keyword. - - 10 Mar 2006; Marcelo Goes gnutls-1.2.3.ebuild, - gnutls-1.2.4.ebuild: - Use --library=foo instead of --soname foo as a revdep-rebuild argument given - by einfo. This is for bug 125506, reported by Carsten Lohrke . - - 12 Feb 2006; Tobias Scherbaum - gnutls-1.2.10.ebuild: - ppc stable, bug #122307 - - 11 Feb 2006; Markus Rothe gnutls-1.2.10.ebuild: - Stable on ppc64: bug #122307 - - 11 Feb 2006; Joshua Jackson gnutls-1.2.10.ebuild: - Stable on x86; bug #122307 - - 10 Feb 2006; Aron Griffis gnutls-1.2.10.ebuild: - Mark 1.2.10 stable on alpha/ia64 #122307 - - 10 Feb 2006; Gustavo Zacarias gnutls-1.2.10.ebuild: - Stable on sparc wrt security #122307 - - 10 Feb 2006; Simon Stelling gnutls-1.2.10.ebuild: - stable on amd64 wrt bug 122307 - - 10 Feb 2006; Rene Nussbaumer gnutls-1.2.10.ebuild: - Stable on hppa. See bug #122307. - -*gnutls-1.2.10-r1 (09 Feb 2006) -*gnutls-1.2.10 (09 Feb 2006) - - 09 Feb 2006; Marcelo Goes +gnutls-1.2.10.ebuild, - +gnutls-1.2.10-r1.ebuild: - 1.2.10 version bump for bug 122307. - -*gnutls-1.2.9-r1 (03 Jan 2006) - - 03 Jan 2006; Daniel Black - -files/gnutls-1.0.17-extra.h.patch, -files/gnutls-1.2.3-gcc4.patch, - -gnutls-1.0.17.ebuild, -gnutls-1.0.25.ebuild, gnutls-1.2.3.ebuild, - -gnutls-1.2.3-r1.ebuild, gnutls-1.2.4.ebuild, -gnutls-1.2.6.ebuild, - gnutls-1.2.9.ebuild, +gnutls-1.2.9-r1.ebuild: - major pruning cause it needed it. Made gnutls-1.2[349] depend on =lzo-1* and - gnutls-1.2.9-r1 depend on >=lzo-2 (bug #112357). gnutls-1.2.9-r1 currently - masked due to TEXTRELs - - 27 Nov 2005; Marcelo Goes gnutls-1.0.17.ebuild, - gnutls-1.0.25.ebuild, gnutls-1.2.3.ebuild, gnutls-1.2.3-r1.ebuild, - gnutls-1.2.4.ebuild, gnutls-1.2.6.ebuild, gnutls-1.2.9.ebuild: - Do not install COPYING or COPYING.LIB. Fixes bug 113678. Thanks to Ryan Hill - . - - 11 Nov 2005; Daniel Black gnutls-1.2.6.ebuild, - gnutls-1.2.9.ebuild: - really only need lzo-1 dependancy - bug #112139 - -*gnutls-1.2.9 (10 Nov 2005) - - 10 Nov 2005; Marcelo Goes -gnutls-1.2.5.ebuild, - +gnutls-1.2.9.ebuild: - 1.2.9 version bump for bug 111928. Depends on libgcrypt-1.2.2 instead of - 1.2.0. Thanks to Kai . - - 15 Sep 2005; Aron Griffis gnutls-1.2.4.ebuild: - Mark 1.2.4 stable on alpha - - 05 Sep 2005; Markus Rothe gnutls-1.2.4.ebuild: - Stable on ppc64 - - 24 Aug 2005; Aron Griffis gnutls-1.2.4.ebuild: - stable on ia64 - -*gnutls-1.2.6 (17 Jul 2005) - - 17 Jul 2005; Daniel Black +gnutls-1.2.6.ebuild: - version bump - gtk-doc fixed - -*gnutls-1.2.5 (17 Jul 2005) - - 17 Jul 2005; Daniel Black +gnutls-1.2.5.ebuild: - version bump - still masked due to lzo-2 dependancy - - 10 Jul 2005; Lina Pezzella gnutls-1.2.4.ebuild: - Testing ppc-macos. Bug #98390. Submitted on behalf of Fabian Groffen. - - 05 Jul 2005; Rene Nussbaumer gnutls-1.2.3.ebuild: - Stable on hppa. - - 03 Jul 2005; Hardave Riar gnutls-1.0.25.ebuild, - gnutls-1.2.3.ebuild: - Stable on mips, bug #90726. - - 21 Jun 2005; Daniel Black gnutls-1.0.25.ebuild, - gnutls-1.2.3.ebuild, gnutls-1.2.3-r1.ebuild, gnutls-1.2.4.ebuild: - added dropped keywords - - 06 Jun 2005; Danny van Dyk gnutls-1.2.4.ebuild: - Marked ~s390, BUG #93960. - - 04 Jun 2005; Jan Brinkmann gnutls-1.2.4.ebuild: - stable on amd64 wrt #94913 - -*gnutls-1.2.4 (03 Jun 2005) - - 03 Jun 2005; Daniel Black +gnutls-1.2.4.ebuild: - Version bump - thanks tigger - -*gnutls-1.2.3-r1 (04 May 2005) - - 04 May 2005; Martin Schlemmer - +files/gnutls-1.2.3-gcc4.patch, +gnutls-1.2.3-r1.ebuild: - Fix building with gcc4. - -*gnutls-1.0.17 (01 May 2005) - - 01 May 2005; Daniel Black - +files/gnutls-1.0.17-extra.h.patch, +gnutls-1.0.17.ebuild: - re-added files so arm and mips still work - - 01 May 2005; Daniel Black - -files/gnutls-1.0.14-extra.h.patch, -files/gnutls-1.1.23-extra.h.patch, - -gnutls-1.0.17.ebuild, -gnutls-1.0.23.ebuild, -gnutls-1.2.0.ebuild, - -gnutls-1.2.1.ebuild: - prune potentially vulnerable versions - - 01 May 2005; Daniel Black gnutls-1.2.3.ebuild: - Removed crypt flag due to bug #90976. Thanks to Alex Murray - - - 30 Apr 2005; Bryan Østergaard gnutls-1.2.3.ebuild: - alpha + ~ia64 keywords. - - 29 Apr 2005; Gustavo Zacarias gnutls-1.0.25.ebuild, - gnutls-1.2.3.ebuild: - Stable on sparc wrt #90726 - - 29 Apr 2005; Michael Hanselmann gnutls-1.0.25.ebuild: - Stable on hppa. - - 29 Apr 2005; Jan Brinkmann gnutls-1.0.25.ebuild, - gnutls-1.2.3.ebuild: - stable on amd64 wrt security bug #90726 - - 29 Apr 2005; Markus Rothe gnutls-1.2.3.ebuild: - Stable on ppc64 - - 29 Apr 2005; Daniel Black gnutls-1.0.25.ebuild, - gnutls-1.2.3.ebuild: - ppc stable. Fixed bug #90841 (bad quotes by Rork ). - - 29 Apr 2005; Markus Rothe gnutls-1.0.25.ebuild: - Stable on ppc64; bug #90726 - - 28 Apr 2005; Marcelo Goes : - Took gnutls-1.2.1 out of package.mask, pointless to mask it now. - -*gnutls-1.2.3 (28 Apr 2005) -*gnutls-1.0.25 (28 Apr 2005) - - 28 Apr 2005; Daniel Black +gnutls-1.0.25.ebuild, - +gnutls-1.2.3.ebuild: - Version bumps for security bug #90726 - -*gnutls-1.2.1 (18 Apr 2005) - - 18 Apr 2005; Marcelo Goes +gnutls-1.2.1.ebuild: - Version bump to 1.2.1. Dropped patch since it seems to have been integrated in - upstream. I added it to package.mask for testing, but anyone who feels it - works OK can take it out. Fixes bug 89588. Thanks to Erinn Looney-Triggs - for reporting. - - 01 Apr 2005; Aron Griffis gnutls-1.0.23.ebuild: - stable on ia64 - - 05 Mar 2005; Markus Rothe gnutls-1.0.23.ebuild: - Stable on ppc64 - - 20 Feb 2005; Aron Griffis gnutls-1.0.23.ebuild: - add ~ia64 - - 06 Feb 2005; Daniel Black gnutls-1.2.0.ebuild: - Fixed bad parsing in gtk-doc as per bug #80906. Thanks to Ivan Yosifov - and others for reporting it. - - 05 Feb 2005; Daniel Black -gnutls-1.1.23-r1.ebuild, - -gnutls-1.1.23.ebuild: - Removed due to working 1.2.0. Fixes bug #79327. - -*gnutls-1.2.0 (05 Feb 2005) - - 05 Feb 2005; Daniel Black +gnutls-1.2.0.ebuild: - version bump as per bug #80809. Thanks to Erinn Looney-Triggs - - -*gnutls-1.1.23-r1 (24 Jan 2005) - - 24 Jan 2005; Christian Parpart - +files/gnutls-1.1.23-extra.h.patch, +gnutls-1.1.23-r1.ebuild: - added C++ header stubs into extra.h - - 24 Jan 2005; Daniel Black gnutls-1.0.23.ebuild, - gnutls-1.1.23.ebuild: - Fixed dependacy on dev-libs/libgcrypt >= 1.2.0 as per bug #79232. Fixed - version notices for rebuild. Thanks to Alex Tomkins - for the bug report - -*gnutls-1.1.23 (22 Jan 2005) - - 22 Jan 2005; Tom Martin +gnutls-1.1.23.ebuild: - Version bump. - - 15 Jan 2005; Daniel Black gnutls-1.0.17.ebuild, - gnutls-1.0.23.ebuild: - Notices placed about version API change requireing revdep-rebuild as per bug - #62283 - - 07 Jan 2005; Markus Rothe gnutls-1.0.23.ebuild: - Added ~ppc64 to KEYWORDS - - 07 Jan 2005; Daniel Black - +files/gnutls-1.0.14-extra.h.patch: - Over zelously pruned patch. Bug #76890 refers. Thanks to Alex Tomkins - and Dargo (on irc) - - 06 Jan 2005; Daniel Black gnutls-1.0.17.ebuild, - gnutls-1.0.23.ebuild: - added dev-libs/libgpg-error to depandencies as per mail by Bussolaro - Jean-pierre - -*gnutls-1.0.23 (06 Jan 2005) - - 06 Jan 2005; Daniel Black metadata.xml, - -files/gnutls-1.0.14-extra.h.patch, -gnutls-0.8.10.ebuild, - -gnutls-0.8.12.ebuild, -gnutls-1.0.14.ebuild, +gnutls-1.0.23.ebuild - -gnutls-1.0.4.ebuild: - Version bump as per bug #61944. Reported by Daniel Webert - . Ebuild by me. Old version cleanout - too. - - 29 Dec 2004; Ciaran McCreesh : - Change encoding to UTF-8 for GLEP 31 compliance - - 23 Dec 2004; Daniel Drake gnutls-1.0.17.ebuild: - Fix compilation with included minilzo, bug 64622 - - 26 Sep 2004; Tom Gall gnutls-1.0.17.ebuild: - stable on ppc64, bug #59231 - - 14 Aug 2004; Hardave Riar gnutls-1.0.17.ebuild: - Added gnuconfig_update for mips64 support - - 14 Aug 2004; Hardave Riar gnutls-1.0.17.ebuild: - Stable on mips, bug 59231. - - 09 Aug 2004; Guy Martin gnutls-1.0.17.ebuild: - Stable on hppa. - - 07 Aug 2004; gnutls-1.0.17.ebuild: - stable on ia64, security update #59231 - - 07 Aug 2004; Luca Barbato gnutls-1.0.17.ebuild: - Stable on ppc - - 07 Aug 2004; Luca Barbato gnutls-1.0.17.ebuild: - Stable on ppc - - 07 Aug 2004; Tom Martin gnutls-1.0.17.ebuild: - Stable on amd64, bug 59231. - - 07 Aug 2004; Bryan Østergaard gnutls-1.0.17.ebuild: - Stable on alpha, bug 59231. - - 06 Aug 2004; Gustavo Zacarias gnutls-1.0.17.ebuild: - Stable on sparc wrt #59231 - - 04 Aug 2004; Alastair Tse - files/gnutls-1.0.14-extra.h.patch: - fixed extra.h patch - - 04 Aug 2004; Alastair Tse gnutls-1.0.17.ebuild: - fixed opencdk dep. people should fix the deps rather than leave comments in - the ebuild :) - -*gnutls-1.0.17 (04 Aug 2004) - - 04 Aug 2004; Alastair Tse +gnutls-1.0.17.ebuild: - version bump. security problems with x509 certificate validation (#59231) - - 29 Jul 2004; Stephen P. Becker gnutls-1.0.4.ebuild: - Stable on mips. - - 24 Jul 2004; Alastair Tse - +files/gnutls-1.0.14-extra.h.patch, gnutls-1.0.14.ebuild: - add extern C headers to extra.h (#51206) - - 01 Jul 2004; Tom Gall gnutls-1.0.14.ebuild: - stable on ppc64, bug #54804 - - 01 Jul 2004; Jeremy Huddleston gnutls-1.0.14.ebuild: - virtual/glibc -> virtual/libc - -*gnutls-1.0.14 (16 Jun 2004) - - 16 Jun 2004; Daniel Black +gnutls-1.0.14.ebuild: - version bump - - 16 Jun 2004; Daniel Black gnutls-0.8.12.ebuild, - gnutls-1.0.4.ebuild: - marked x86 stable to solve bug #53775. Thanks to Susie Edgeworth - . - - 10 Jun 2004; Aron Griffis gnutls-0.8.10.ebuild, - gnutls-0.8.12.ebuild, gnutls-1.0.4.ebuild: - Fix use invocation - - 17 May 2004; Bryan Østergaard gnutls-1.0.4.ebuild: - Add ~alpha. - - 02 May 2004; Stephen P. Becker gnutls-1.0.4.ebuild: - Added ~mips keyword. - - 09 Apr 2004; David Holm gnutls-1.0.4.ebuild: - Added to ~ppc. - - 29 Feb 2004; Jason Wever gnutls-1.0.4.ebuild: - Riders on the ~sparc. - -*gnutls-1.0.4 (04 Feb 2004) - - 04 Feb 2004; Alastair Tse gnutls-1.0.4.ebuild: - version bump. removed keyword because of major version upgrade. archs should - look at marking this ~. added symlink hack to get around breaking apps because - of major lib number change, however, the code is still binary compatible. - - 04 Jan 2004; Daniel Ahlberg gnutls-0.8.10.ebuild, - gnutls-0.8.12.ebuild: - Update SRC_URI. - - 26 Dec 2003; Jason Wever gnutls-0.8.10.ebuild: - Marked stable on sparc. - - 16 Dec 2003; Guy Martin gnutls-0.8.10.ebuild: - Marked stable on hppa. - - 14 Dec 2003; Lars Weiler gnutls-0.8.12.ebuild: - Make stable on ppc - - 13 Dec 2003; Brad House gnutls-0.8.12.ebuild: - mark stable on amd64 - - 10 Dec 2003; gnutls-0.8.12.ebuild: - stable on ia64 - -*gnutls-0.8.12 (23 Nov 2003) - - 23 Nov 2003; Alastair Tse gnutls-0.8.12.ebuild: - fixed opencdk linking due to faulty configure flags. new version now depends - on opencdk-0.5.1 (#33930) - - 21 Nov 2003; Jason Wever gnutls-0.8.10.ebuild: - Added ~sparc keyword. - - 20 Oct 2003; Aron Griffis gnutls-0.8.10.ebuild: - Stable on alpha - - 13 Oct 2003; Alastair Tse gnutls-0.8.10.ebuild: - stable bump for x86 - - 06 Sep 2003; Alastair Tse gnutls-0.8.10.ebuild: - put opencdk dep behind crypt USE flag and removed optional lzo support. also - changed build to use included libtasn1 instead of dev-libs/libtasn1 - -*gnutls-0.8.10 (02 Sep 2003) - - 02 Sep 2003; Alastair Tse gnutls-0.8.10.ebuild: - initial ebuild. thanks to Marshall T. Vandegrift (#19339) diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/Manifest b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/Manifest index 08caa4ccf0..9c83cdb461 100644 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/Manifest +++ b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/Manifest @@ -1,17 +1,3 @@ -DIST gnutls-3.3.17.1.tar.xz 6339588 SHA256 b40f158030a92f450a07b20300a3996710ca19800848d9f6fd62493170c5bbb4 SHA512 9f2945abe1251db176fa227f2c90be46dba831af97647f04b960c71a50fc597776be31080733f9417f2242c4c6ae92fa897bf02d5f2ba40863e94df245c03319 WHIRLPOOL 8a04e56a5f47ddaad106081a613ead85a107b013d3e894074745e9439e0a7797b7f528aab5db7e3ac808f1c5c361c4717d7f0cb3abc943a6f912e5b6981db320 -DIST gnutls-3.3.18.tar.xz 6275948 SHA256 7a87e7f486d1ada10007356917a412cde6c6114dac018e3569e3aa09e9f29395 SHA512 e7c972458ad0af401121c705ebe86aafa46c02743d963b1b67ca09192c746a9193c73d28501b6c046435259b40ac0f8d201860cd6cf6240a7783b6c01b64286c WHIRLPOOL ce2134515d234d6dbceebefd5602bc7f0d96faff839055fd401149c6969a245f5284d7e29ae2eca810fa6039d7184477b9fda2ae0faa379262434927320ebde3 -DIST gnutls-3.3.19.tar.xz 6280376 SHA256 888d8779b48f21959b33d4d9ad0b546e5ec3dea20abf0d9bb03869d56b1f44cf SHA512 d204ba16d5806d8a19df1825ceee49583b0d34ea212fe40e8d81a28f8843e18b211af5b8455fc0c84c0643fc23b12bd6434e6174170382d8e732e32f0d1f2fa2 WHIRLPOOL 7b68978de61edef731268a9ed7405735e589e1f6180a05e5f7b5466f1fde898da42ab9116242f2b210571c60c7f7ea1a4136323fd2dd305ebe442ec066092ee4 -DIST gnutls-3.3.20.tar.xz 6281012 SHA256 4c903e5cde7a8f15318af9a7a6c9b7fc8348594b0a1e9ac767636ef2187399ea SHA512 83059242a01a700abbca7f400712127ac3664e56e839929d1fe8571c2296b63f3c18f3fed04b5445973f4658b6b70ede85fadcc129a848a2fbbdac83437b97d1 WHIRLPOOL 32c7145a14e953ee348d8ae649236bb70fe7afd61f200fed067192d7851d4501d9d70e19a615f71de026852e2a3c8b9acde1dc8c3a0ac445d9f32da5784b2351 -DIST gnutls-3.3.21.tar.xz 6284464 SHA256 885ccb46e52f5a9f5aed3edf8aae4d67aa85e41b72471bed93e84fe3f7df3e5e SHA512 5161b036b3c55fec920e859b6e19aca8e7b667e53fa33666a2a28a16a6ff71b78da051798a36f09413f69c4d88ac5e48da9b2135751e78e9a7bed8d7a8c9cd19 WHIRLPOOL 104a129f8147386707e1a6ad690e1f6c27e2c8f09b05e16fc4ff191dfe6d6452213d3151645885b33daf45bbbd3c9d0ee521e5ea50dba752bcb1cc7616e01fc4 -DIST gnutls-3.3.22.tar.xz 6295088 SHA256 0ffa233e022e851f3f5f7811ac9223081a0870d5a05a7cf35a9f22e173c7b009 SHA512 9cfbf4057b0728afde8465a4c10a8d1fbcb615e07210abab158a3008c73b71ddfbad1b2d67b92d8d5facb4bcd8298a3fb7e9ce6629bda1c6dd35d7f9e4b74a9d WHIRLPOOL 22ddd249a2d5362e7e01743a6809f7909c7a3bda27309fe16754fba60665e87efd1ac1d6af6ad6a8b34f84e8d833650477087e93a7ca380132c74e01f145f0a4 -DIST gnutls-3.3.23.tar.xz 6304332 SHA256 f53453857e369d66d665c40389201c0b9dacb7ccda560fd21b20b798687a4239 SHA512 5c2e93ddbff3ca2fc5f8fca8eeaef363bf8fe0f5dce2f4a9448e3235c930baa09d59a456a019283a451d19e0497d3ae645786080aa31febc7f1bcd71c6de1e09 WHIRLPOOL fa082db1933eefc7e061dc7f7e6584d03920f40584865e2983250097db9acea0e6d0c075e8207a2e5b96e37ae77db2b91bcf21e97cc7dfdec0744904de4b5866 -DIST gnutls-3.4.10.tar.xz 6645892 SHA256 6a32c2b4acbd33ff7eefcbd1357009da04c94c60146ef61320b6c076b1bdf59f SHA512 e5cd60240ebbcac9d8f7c28fdbf023a499e3c58a352a43c24d075b248a0a903161b1745641bf263519293c0014424cc23dbb67274c8934aaf273a523ad0a2925 WHIRLPOOL 8ebdb70ae1f2cb8f31f0f79ca37d519cabc9897c3f70261f7d80c812df6c68d07e1b4e0c35597048734dbd884f456b35156bd6354721294db0565db8eb540282 -DIST gnutls-3.4.11.tar.xz 6652224 SHA256 70ef9c9f95822d363036c6e6b5479750e5b7fc34f50e750c3464a98ec65a9ab8 SHA512 cf58309a45f751d07dc05858c163209cefd09831717220df7e072a303c7af5f71da872e975a776557e42982bc21efbe2e4d6f2ec46aec020e7d465274d1d4b42 WHIRLPOOL 3e99a66556539de7f155ef8f9fc3b97a8c4349997e48bb2e29ecd444a76812c660b2385c2c2e1ed672408a4444fd2880e4581b9b3c6529ba8053452bd08f3cb1 -DIST gnutls-3.4.13.tar.xz 6670508 SHA256 fd3386e8e72725980bcd7f40949aa0121dcb7650b5147c6490e794555ed25859 SHA512 bec4832560945ca127524a7b529757aa36b7eb9a070d7385f8e5d10628e39b76ae20c1c146fab286860c70add8755f17a4b61bfa1a266eeb30d481f259120406 WHIRLPOOL aaee0a5b597305a2dab0064e9ef1fb1cf05f1f301de30601fa8a8c81f9c35f72c82df8c1c24e57c7f4beb132b4c50285f765ba998829ba7ab0681eadf7cfe7f7 -DIST gnutls-3.4.5.tar.xz 6552036 SHA256 af88b8e0460728d034ff3f454f7851a09b7f0959a93531b6f8d35658ef0f7aae SHA512 16dfdaecbcc0b02ea762def35724a3433063136429d0eb67d9e009ced14a6ddddfa567f41e03a4fda9c4f68e3625bac41e8966882257099413c9500e33171a2f WHIRLPOOL 9274ae5660ac3f6da839f6a7fe3df4042155259170b069b8b54772d77b18564cc5f5337acc475d0936afe855fe9e046a1fb167bbd6842063c9c0335d218f4393 -DIST gnutls-3.4.6.tar.xz 6591628 SHA256 feb559ed7fffa24d5aa40527054fae5cb7f7b66e9f2bebc2383a781dfa4d20ec SHA512 c81da5bba3b28ab17ef762d8c6a6607745f1fa7177e0fdaacd374ac0ee64c14cd804e048aeb965383fafaa677ba2ed256c709a117f8a95012f8494c650d29c81 WHIRLPOOL c1c6a3a7ad3d046058d2fbc0d380d453e35567eed7f602184b577dea215ee8018f82a76684646513926473f4a504348390912ab3cd7ce5f3c1c5e11cf869f09b -DIST gnutls-3.4.7.tar.xz 6613096 SHA256 c1be9e4b30295d7b5f96fa332c6a908e6fa2254377b67811301fca92eb882e5a SHA512 fdfca4c37292ee07d2d1e398380afe79a20f56040a7c84deb7a5b5221f3bcb4080471b9644c7f2bacb42247c3cc62e32a511f1e2ec6e31c15d9b08b20e8050b6 WHIRLPOOL b56e54c13c33fd74076caf29062cb0c6b38afecfe044a6d7db9b3eef3379a133fb327527ddf07c333783266f00b970aec33b2bb2a21e8b35ceaee0d934456aee -DIST gnutls-3.4.8.tar.xz 6631528 SHA256 e07c05dea525c6bf0dd8017fc5b89d886954f04fedf457ecd1ce488ac3b86ab7 SHA512 b3b445ecbd8eae312183eee4f5087a33011236061fe1fe1f0db20239c4e281f5cacd818d62a992ef3011eb9fdc8459d0ed6faca6ea55012b152b5ac5907648bc WHIRLPOOL 97fc97a9f15b51ca91a06cc745397447a7f6b1d986f44f227d0e1aa970f48ca269c8527ff7320f072f555fcd7a1b34dfe115123e96bf45884c2e5357e02c9021 -DIST gnutls-3.4.9.tar.xz 6627640 SHA256 48594fadba33d450f796ec69526cf2bce6ff9bc3dc90fbd7bf38dc3601f57c3f SHA512 3ec5349f1418bf9f8ac492e93d2e8967c2011f9aaea262e0acb40db124ec19c269a9de49b1c9c994e9039929cd03d75f77a40580a1d7eb4b3db0e1d2b9d40f86 WHIRLPOOL 9b440e33a20e76c5fa9d9252136c5667562681d6e28e0c182d3befdf49abb753b9aab2193774334b5570aec0b58961193f27f2395898ba6664cb2749dd8c344e -DIST gnutls-3.5.0.tar.xz 6716848 SHA256 fc6b3b544d411e6ca54dd6167541770559070ea15e6868946cf56a621d58ae25 SHA512 0b53b8084972e9b47e71c47ca9a42d0413c781641f4da640a1016aa0c1a736863a57eadbd9bb81248d3fdf723796edbb1424b14f9846b2300ad7650925f2ac27 WHIRLPOOL 0f1b3e07f94f101b004ecb1024424a10826d32bab0168076e412cd8d3881af8d77b440395b1811a910188d950ed71a2eb13e87dae029ee4c8c461a3d71077ba3 -DIST gnutls-3.5.1.tar.xz 6799264 SHA256 bc4a0f80a627c3aca6e7ea59d30e50cda118c61e0e3fab367ff1451d6ec8bdbd SHA512 d59d0a7624a2783645d217a2f6955e8a5e67eea4a9bc682b101cf939f7b623f046b381bc12ae0bae08c17031e4bd178e615afbe2cdde3914433b8d829c353e14 WHIRLPOOL 1ce587c664896115a0b8f4d8bfadb562738b85db15dc592d049c89a10c1386ec2ec73f7bc94a7291188e590cd862419a15dac8ac37670629998231216a2450ce +DIST gnutls-3.5.13.tar.xz 7226468 SHA256 79f5480ad198dad5bc78e075f4a40c4a315a1b2072666919d2d05a08aec13096 SHA512 e98f23a589042f879936c3f8b474535e695fb7dd68a9e81323668c013241f765c2d3af6c6a072ecf867acc1e551ec46e15bb842144d3a06bdd5d2f4fc3d828a7 WHIRLPOOL 89439e7adba634698642a247c418569c0ea6ca6155bfb5dce17c8ed69d2506a37d9ad793122aaaec92adffefa75cb23a857c49ef722c5cf506700fe0c34b6028 +DIST gnutls-3.5.15.tar.xz 7238928 SHA256 046081108b8b1fe455a13a4c5a4eaa0368e185b678f1670fe09a11a2d7ecfad5 SHA512 046cf3adf6cc3d38fd431f2ff28ddabb65f3c13379516d105316a04c7128be89c5f7ed3df6a034fc06e9ab2e154c2cde2f5cbe8530a1e58cc4b4fb72e158134b WHIRLPOOL 811cca49bdd144107b6c25de31b3209694a8590107953fc3c4ecafddba48339e98cf1dc8e489addb04f0ac525411e96e505fd8edb342dca4e02f97dde3f26ffe +DIST gnutls-3.6.0.tar.xz 8024972 SHA256 2ab9e3c0131fcd9142382f37ba9c6d20022b76cba83560cbcaa8e4002d71fb72 SHA512 e5f36d7e8d64e8432098e30549c321745d3605eeb85aba2a04bfa92146ca771961f0e2f3682bcae36be5b6095acd25996104a4213ce7b3466d61332a5188dc03 WHIRLPOOL e8e479d7a0adc14c969b7364f58505f68ed92054fb8d8ba862f59d9ab64578e83ae02309ec9b5da2e63fc5dec799d86e434abc32394dbf414dc46bf46b15b0c8 diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-AF_UNIX.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-AF_UNIX.patch deleted file mode 100644 index 719baf37b2..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-AF_UNIX.patch +++ /dev/null @@ -1,37 +0,0 @@ -Backport of commit 60a13b98e9f410c3b1019252f271d3c0f20b2e61 for 2.12.20 - -From 60a13b98e9f410c3b1019252f271d3c0f20b2e61 Mon Sep 17 00:00:00 2001 -From: Nikos Mavrogiannopoulos -Date: Fri, 23 Sep 2011 14:39:29 +0000 -Subject: a hack to allow compilation on systems without AF_LOCAL. - ---- lib/nettle/egd.c -+++ lib/nettle/egd.c -@@ -33,6 +33,12 @@ - - #include - -+#ifdef AF_UNIX -+# define LOCAL_SOCKET_TYPE AF_UNIX -+#else -+# define LOCAL_SOCKET_TYPE AF_LOCAL -+#endif -+ - #ifndef offsetof - #define offsetof(type, member) ((size_t) &((type *)0)->member) - #endif -@@ -141,12 +147,12 @@ - } - - memset (&addr, 0, sizeof addr); -- addr.sun_family = AF_LOCAL; -+ addr.sun_family = LOCAL_SOCKET_TYPE; - strcpy (addr.sun_path, name); - addr_len = (offsetof (struct sockaddr_un, sun_path) - + strlen (addr.sun_path)); - -- fd = socket (AF_LOCAL, SOCK_STREAM, 0); -+ fd = socket (LOCAL_SOCKET_TYPE, SOCK_STREAM, 0); - if (fd == -1) - { - _gnutls_debug_log ("can't create unix domain socket: %s\n", diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-guile-parallelmake.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-guile-parallelmake.patch deleted file mode 100644 index 5bb085793d..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-guile-parallelmake.patch +++ /dev/null @@ -1,9 +0,0 @@ ---- a/guile/src/Makefile.am -+++ b/guile/src/Makefile.am -@@ -124,4 +124,7 @@ - - .c.x: $(BUILT_SOURCES) - $(guile_snarf) -o $@ $< $(snarfcppopts) -+core.x: core.c enums.h enum-map.i.c priorities.i.c smobs.h smob-types.i.c -+errors.x: errors.c enums.h -+extra.x: extra.c enums.h extra-enums.h extra-enum-map.i.c extra-smobs.h extra-smob-types.i.c smobs.h diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-libadd.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-libadd.patch deleted file mode 100644 index fe5f1964dd..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.20-libadd.patch +++ /dev/null @@ -1,36 +0,0 @@ ---- gnutls-2.12.20/libextra/Makefile.am -+++ gnutls-2.12.20/libextra/Makefile.am -@@ -69,7 +69,7 @@ - if ENABLE_MINITASN1 - libgnutls_openssl_la_LIBADD += ../lib/minitasn1/libminitasn1.la - else --libgnutls_openssl_la_LDFLAGS += $(LTLIBTASN1) -+libgnutls_openssl_la_LIBADD += $(LTLIBTASN1) - endif - - if HAVE_LD_OUTPUT_DEF -@@ -89,8 +89,9 @@ - libgnutls_extra_la_SOURCES += \ - ext_inner_application.h ext_inner_application.c gnutls_ia.c - -+cryptolib_ldadd = - if !ENABLE_NETTLE --libgnutls_extra_la_LIBADD += $(LTLIBGCRYPT) -+cryptolib_ldadd = $(LTLIBGCRYPT) - endif - - # Rest -@@ -104,11 +105,10 @@ - DISTCLEANFILES += $(defexec_DATA) - - libgnutls_extra_la_LDFLAGS += \ -- -version-info $(LT_CURRENT):$(LT_REVISION):$(LT_AGE) \ -- $(LZO_LIBS) -+ -version-info $(LT_CURRENT):$(LT_REVISION):$(LT_AGE) - - libgnutls_extra_la_LIBADD += ../lib/gl/liblgnu.la gl/libxgnu.la \ -- ../lib/libgnutls.la -+ ../lib/libgnutls.la $(cryptolib_ldadd) $(LZO_LIBS) - - if HAVE_LD_VERSION_SCRIPT - libgnutls_extra_la_LDFLAGS += \ diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2013-2116.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2013-2116.patch deleted file mode 100644 index 2223e708a6..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2013-2116.patch +++ /dev/null @@ -1,25 +0,0 @@ -From 5164d5a1d57cd0372a5dd074382ca960ca18b27d Mon Sep 17 00:00:00 2001 -From: Nikos Mavrogiannopoulos -Date: Thu, 23 May 2013 09:54:37 +0200 -Subject: [PATCH] re-applied sanity check patch - ---- - lib/gnutls_cipher.c | 2 ++ - 1 files changed, 2 insertions(+), 0 deletions(-) - -diff --git a/lib/gnutls_cipher.c b/lib/gnutls_cipher.c -index 2835121..71f5a98 100644 ---- a/lib/gnutls_cipher.c -+++ b/lib/gnutls_cipher.c -@@ -561,6 +561,8 @@ _gnutls_ciphertext2compressed (gnutls_session_t session, - return GNUTLS_E_DECRYPTION_FAILED; - } - pad = ciphertext.data[ciphertext.size - 1]; /* pad */ -+ if (pad+1 > ciphertext.size-hash_size) -+ pad_failed = GNUTLS_E_DECRYPTION_FAILED; - - /* Check the pading bytes (TLS 1.x). - * Note that we access all 256 bytes of ciphertext for padding check --- -1.7.1 - diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-0092.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-0092.patch deleted file mode 100644 index 21d3f3b9c4..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-0092.patch +++ /dev/null @@ -1,102 +0,0 @@ -From 6aa26f78150ccbdf0aec1878a41c17c41d358a3b Mon Sep 17 00:00:00 2001 -From: Nikos Mavrogiannopoulos -Date: Thu, 27 Feb 2014 19:42:26 +0100 -Subject: [PATCH] corrected return codes - ---- - lib/x509/verify.c | 16 ++++++++++------ - 1 files changed, 10 insertions(+), 6 deletions(-) - -diff --git a/lib/x509/verify.c b/lib/x509/verify.c -index c9a6b0d..eef85a8 100644 ---- a/lib/x509/verify.c -+++ b/lib/x509/verify.c -@@ -141,7 +141,7 @@ check_if_ca (gnutls_x509_crt_t cert, gnutls_x509_crt_t issuer, - if (result < 0) - { - gnutls_assert (); -- goto cleanup; -+ goto fail; - } - - result = -@@ -150,7 +150,7 @@ check_if_ca (gnutls_x509_crt_t cert, gnutls_x509_crt_t issuer, - if (result < 0) - { - gnutls_assert (); -- goto cleanup; -+ goto fail; - } - - result = -@@ -158,7 +158,7 @@ check_if_ca (gnutls_x509_crt_t cert, gnutls_x509_crt_t issuer, - if (result < 0) - { - gnutls_assert (); -- goto cleanup; -+ goto fail; - } - - result = -@@ -166,7 +166,7 @@ check_if_ca (gnutls_x509_crt_t cert, gnutls_x509_crt_t issuer, - if (result < 0) - { - gnutls_assert (); -- goto cleanup; -+ goto fail; - } - - /* If the subject certificate is the same as the issuer -@@ -206,6 +206,7 @@ check_if_ca (gnutls_x509_crt_t cert, gnutls_x509_crt_t issuer, - else - gnutls_assert (); - -+fail: - result = 0; - - cleanup: -@@ -330,7 +331,7 @@ _gnutls_verify_certificate2 (gnutls_x509_crt_t cert, - gnutls_datum_t cert_signed_data = { NULL, 0 }; - gnutls_datum_t cert_signature = { NULL, 0 }; - gnutls_x509_crt_t issuer = NULL; -- int issuer_version, result; -+ int issuer_version, result = 0; - - if (output) - *output = 0; -@@ -363,7 +364,7 @@ _gnutls_verify_certificate2 (gnutls_x509_crt_t cert, - if (issuer_version < 0) - { - gnutls_assert (); -- return issuer_version; -+ return 0; - } - - if (!(flags & GNUTLS_VERIFY_DISABLE_CA_SIGN) && -@@ -385,6 +386,7 @@ _gnutls_verify_certificate2 (gnutls_x509_crt_t cert, - if (result < 0) - { - gnutls_assert (); -+ result = 0; - goto cleanup; - } - -@@ -393,6 +395,7 @@ _gnutls_verify_certificate2 (gnutls_x509_crt_t cert, - if (result < 0) - { - gnutls_assert (); -+ result = 0; - goto cleanup; - } - -@@ -410,6 +413,7 @@ _gnutls_verify_certificate2 (gnutls_x509_crt_t cert, - else if (result < 0) - { - gnutls_assert(); -+ result = 0; - goto cleanup; - } - --- -1.7.1 - diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-1959.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-1959.patch deleted file mode 100644 index 28989c97ce..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-1959.patch +++ /dev/null @@ -1,14 +0,0 @@ ---- a/lib/x509/verify.c -+++ b/lib/x509/verify.c -@@ -692,8 +693,10 @@ - /* note that here we disable this V1 CA flag. So that no version 1 - * certificates can exist in a supplied chain. - */ -- if (!(flags & GNUTLS_VERIFY_ALLOW_ANY_X509_V1_CA_CRT)) -+ if (!(flags & GNUTLS_VERIFY_ALLOW_ANY_X509_V1_CA_CRT)) { - flags &= ~(GNUTLS_VERIFY_ALLOW_X509_V1_CA_CRT); -+ flags |= GNUTLS_VERIFY_DO_NOT_ALLOW_X509_V1_CA_CRT; -+ } - if ((ret = - _gnutls_verify_certificate2(certificate_list[i - 1], - &certificate_list[i], 1, \ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3466.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3466.patch deleted file mode 100644 index 9e32296e86..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3466.patch +++ /dev/null @@ -1,311 +0,0 @@ -From e47d30e272a0b3977db8dae09327acad45b931d8 Mon Sep 17 00:00:00 2001 -From: mancha -Date: Sun, 1 Jun 2014 -Subject: CVE-2014-3466 - -This is a backport adaptation for use with GnuTLS 2.12.23. - -Relevant upstream commit(s): -------------------------- -https://gitorious.org/gnutls/gnutls/commit/688ea6428a432c -https://gitorious.org/gnutls/gnutls/commit/a7be326f0e33cf - ---- - lib/gnutls_handshake.c | 2 - tests/Makefile.am | 2 - tests/long-session-id.c | 268 ++++++++++++++++++++++++++++++++++++++++ - 3 files changed, 270 insertions(+), 2 deletions(-) - ---- a/lib/gnutls_handshake.c -+++ b/lib/gnutls_handshake.c -@@ -1797,7 +1797,7 @@ _gnutls_read_server_hello (gnutls_sessio - DECR_LEN (len, 1); - session_id_len = data[pos++]; - -- if (len < session_id_len) -+ if (len < session_id_len || session_id_len > TLS_MAX_SESSION_ID_SIZE) - { - gnutls_assert (); - return GNUTLS_E_UNSUPPORTED_VERSION_PACKET; ---- a/tests/Makefile.am -+++ b/tests/Makefile.am -@@ -64,7 +64,7 @@ ctests = simple gc set_pkcs12_cred certd - crq_key_id x509sign-verify cve-2009-1415 cve-2009-1416 \ - crq_apis init_roundtrip pkcs12_s2k_pem dn2 mini-eagain \ - nul-in-x509-names x509_altname pkcs12_encode mini-x509 \ -- mini-x509-rehandshake rng-fork x509cert gendh -+ mini-x509-rehandshake rng-fork x509cert gendh long-session-id - - if ENABLE_OPENSSL - ctests += openssl ---- /dev/null -+++ b/tests/long-session-id.c -@@ -0,0 +1,268 @@ -+/* -+ * Copyright (C) 2012 Free Software Foundation, Inc. -+ * -+ * Author: Nikos Mavrogiannopoulos -+ * -+ * This file is part of GnuTLS. -+ * -+ * GnuTLS is free software; you can redistribute it and/or modify it -+ * under the terms of the GNU General Public License as published by -+ * the Free Software Foundation; either version 3 of the License, or -+ * (at your option) any later version. -+ * -+ * GnuTLS is distributed in the hope that it will be useful, but -+ * WITHOUT ANY WARRANTY; without even the implied warranty of -+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU -+ * General Public License for more details. -+ * -+ * You should have received a copy of the GNU General Public License -+ * along with GnuTLS; if not, write to the Free Software Foundation, -+ * Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA -+ */ -+ -+#ifdef HAVE_CONFIG_H -+#include -+#endif -+ -+#include -+#include -+ -+#if defined(_WIN32) -+ -+int main() -+{ -+ exit(77); -+} -+ -+#else -+ -+#include -+#include -+#include -+#include -+#include -+#include -+#include -+#include -+#include -+ -+static int debug = 0; -+static void terminate(int); -+ -+/* This program tests the robustness of record -+ * decoding. -+ */ -+ -+static void client_log_func(int level, const char *str) -+{ -+ fprintf(stderr, "client|<%d>| %s", level, str); -+} -+ -+static unsigned char server_cert_pem[] = -+ "-----BEGIN CERTIFICATE-----\n" -+ "MIICVjCCAcGgAwIBAgIERiYdMTALBgkqhkiG9w0BAQUwGTEXMBUGA1UEAxMOR251\n" -+ "VExTIHRlc3QgQ0EwHhcNMDcwNDE4MTMyOTIxWhcNMDgwNDE3MTMyOTIxWjA3MRsw\n" -+ "GQYDVQQKExJHbnVUTFMgdGVzdCBzZXJ2ZXIxGDAWBgNVBAMTD3Rlc3QuZ251dGxz\n" -+ "Lm9yZzCBnDALBgkqhkiG9w0BAQEDgYwAMIGIAoGA17pcr6MM8C6pJ1aqU46o63+B\n" -+ "dUxrmL5K6rce+EvDasTaDQC46kwTHzYWk95y78akXrJutsoKiFV1kJbtple8DDt2\n" -+ "DZcevensf9Op7PuFZKBroEjOd35znDET/z3IrqVgbtm2jFqab7a+n2q9p/CgMyf1\n" -+ "tx2S5Zacc1LWn9bIjrECAwEAAaOBkzCBkDAMBgNVHRMBAf8EAjAAMBoGA1UdEQQT\n" -+ "MBGCD3Rlc3QuZ251dGxzLm9yZzATBgNVHSUEDDAKBggrBgEFBQcDATAPBgNVHQ8B\n" -+ "Af8EBQMDB6AAMB0GA1UdDgQWBBTrx0Vu5fglyoyNgw106YbU3VW0dTAfBgNVHSME\n" -+ "GDAWgBTpPBz7rZJu5gakViyi4cBTJ8jylTALBgkqhkiG9w0BAQUDgYEAaFEPTt+7\n" -+ "bzvBuOf7+QmeQcn29kT6Bsyh1RHJXf8KTk5QRfwp6ogbp94JQWcNQ/S7YDFHglD1\n" -+ "AwUNBRXwd3riUsMnsxgeSDxYBfJYbDLeohNBsqaPDJb7XailWbMQKfAbFQ8cnOxg\n" -+ "rOKLUQRWJ0K3HyXRMhbqjdLIaQiCvQLuizo=\n" "-----END CERTIFICATE-----\n"; -+ -+const gnutls_datum_t server_cert = { server_cert_pem, -+ sizeof(server_cert_pem) -+}; -+ -+static unsigned char server_key_pem[] = -+ "-----BEGIN RSA PRIVATE KEY-----\n" -+ "MIICXAIBAAKBgQDXulyvowzwLqknVqpTjqjrf4F1TGuYvkrqtx74S8NqxNoNALjq\n" -+ "TBMfNhaT3nLvxqResm62ygqIVXWQlu2mV7wMO3YNlx696ex/06ns+4VkoGugSM53\n" -+ "fnOcMRP/PciupWBu2baMWppvtr6far2n8KAzJ/W3HZLllpxzUtaf1siOsQIDAQAB\n" -+ "AoGAYAFyKkAYC/PYF8e7+X+tsVCHXppp8AoP8TEZuUqOZz/AArVlle/ROrypg5kl\n" -+ "8YunrvUdzH9R/KZ7saNZlAPLjZyFG9beL/am6Ai7q7Ma5HMqjGU8kTEGwD7K+lbG\n" -+ "iomokKMOl+kkbY/2sI5Czmbm+/PqLXOjtVc5RAsdbgvtmvkCQQDdV5QuU8jap8Hs\n" -+ "Eodv/tLJ2z4+SKCV2k/7FXSKWe0vlrq0cl2qZfoTUYRnKRBcWxc9o92DxK44wgPi\n" -+ "oMQS+O7fAkEA+YG+K9e60sj1K4NYbMPAbYILbZxORDecvP8lcphvwkOVUqbmxOGh\n" -+ "XRmTZUuhBrJhJKKf6u7gf3KWlPl6ShKEbwJASC118cF6nurTjuLf7YKARDjNTEws\n" -+ "qZEeQbdWYINAmCMj0RH2P0mvybrsXSOD5UoDAyO7aWuqkHGcCLv6FGG+qwJAOVqq\n" -+ "tXdUucl6GjOKKw5geIvRRrQMhb/m5scb+5iw8A4LEEHPgGiBaF5NtJZLALgWfo5n\n" -+ "hmC8+G8F0F78znQtPwJBANexu+Tg5KfOnzSILJMo3oXiXhf5PqXIDmbN0BKyCKAQ\n" -+ "LfkcEcUbVfmDaHpvzwY9VEaoMOKVLitETXdNSxVpvWM=\n" -+ "-----END RSA PRIVATE KEY-----\n"; -+ -+const gnutls_datum_t server_key = { server_key_pem, -+ sizeof(server_key_pem) -+}; -+ -+ -+/* A very basic TLS client, with anonymous authentication. -+ */ -+ -+static void client(int fd, const char *prio) -+{ -+ int ret; -+ gnutls_anon_client_credentials_t anoncred; -+ gnutls_certificate_credentials_t x509_cred; -+ gnutls_session_t session; -+ /* Need to enable anonymous KX specifically. */ -+ -+ gnutls_global_init(); -+ -+ if (debug) { -+ gnutls_global_set_log_function(client_log_func); -+ gnutls_global_set_log_level(7); -+ } -+ -+ gnutls_anon_allocate_client_credentials(&anoncred); -+ gnutls_certificate_allocate_credentials(&x509_cred); -+ -+ /* Initialize TLS session -+ */ -+ gnutls_init(&session, GNUTLS_CLIENT); -+ -+ /* Use default priorities */ -+ gnutls_priority_set_direct(session, prio, NULL); -+ -+ /* put the anonymous credentials to the current session -+ */ -+ gnutls_credentials_set(session, GNUTLS_CRD_ANON, anoncred); -+ gnutls_credentials_set(session, GNUTLS_CRD_CERTIFICATE, x509_cred); -+ -+ gnutls_transport_set_ptr (session, (gnutls_transport_ptr_t) fd); -+ -+ /* Perform the TLS handshake -+ */ -+ do { -+ ret = gnutls_handshake(session); -+ } -+ while (ret < 0 && gnutls_error_is_fatal(ret) == 0); -+ -+ if (ret < 0) { -+ fprintf(stderr, "client: Handshake failed (expected)\n"); -+ gnutls_perror(ret); -+ exit(0); -+ } else { -+ if (debug) -+ fprintf(stderr, "client: Handshake was completed\n"); -+ } -+ -+ close(fd); -+ -+ gnutls_deinit(session); -+ -+ gnutls_anon_free_client_credentials(anoncred); -+ gnutls_certificate_free_credentials(x509_cred); -+ -+ gnutls_global_deinit(); -+} -+ -+ -+/* These are global */ -+pid_t child; -+ -+static void terminate(int ret) -+{ -+ kill(child, SIGTERM); -+ exit(ret); -+} -+ -+static void server(int fd, const char *prio) -+{ -+ int ret; -+ uint8_t id[255]; -+ uint8_t buffer[] = "\x16\x03\x00\x01\x25" -+ "\x02\x00\x01\x21" -+ "\x03\x00"/*Server Version */ -+ /*Random*/"\x00\x00\x00\x00\x01\x00\x00\x00\x00\x01\x00\x00\x00\x00\x01\x00\x00\x00\x00\x01\x00\x00\x00\x00\x01\x00\x00\x00\x00\x01\x00\x00" -+ /*SessionID*/"\xfe"; -+ -+ ret = read(fd, id, sizeof(id)); -+ if (ret < 0) { -+ abort(); -+ } -+ -+ ret = write(fd, buffer, sizeof(buffer)); -+ if (ret < 0) { -+ return; -+ } -+ -+ memset(id, 0xff, sizeof(id)); -+ ret = write(fd, id, sizeof(id)); -+ if (ret < 0) { -+ return; -+ } -+ -+ memset(id, 0xff, sizeof(id)); -+ ret = write(fd, id, sizeof(id)); -+ if (ret < 0) { -+ return; -+ } -+ sleep(3); -+ -+ return; -+} -+ -+static void start(const char *prio) -+{ -+ int fd[2]; -+ int ret; -+ -+ ret = socketpair(AF_UNIX, SOCK_STREAM, 0, fd); -+ if (ret < 0) { -+ perror("socketpair"); -+ exit(1); -+ } -+ -+ child = fork(); -+ if (child < 0) { -+ perror("fork"); -+ exit(1); -+ } -+ -+ if (child) { -+ /* parent */ -+ close(fd[1]); -+ server(fd[0], prio); -+ kill(child, SIGTERM); -+ } else { -+ close(fd[0]); -+ client(fd[1], prio); -+ exit(0); -+ } -+} -+ -+static void ch_handler(int sig) -+{ -+ int status, ret = 0; -+ wait(&status); -+ if (WEXITSTATUS(status) != 0 || -+ (WIFSIGNALED(status) && WTERMSIG(status) == SIGSEGV)) { -+ if (WIFSIGNALED(status)) { -+ fprintf(stderr, "Child died with sigsegv\n"); -+ ret = 1; -+ } else { -+ fprintf(stderr, "Child died with status %d\n", -+ WEXITSTATUS(status)); -+ } -+ terminate(ret); -+ } -+ return; -+} -+ -+int main(int argc, char **argv) -+{ -+ signal(SIGCHLD, ch_handler); -+ -+ if (argc > 1) -+ debug = 1; -+ -+ start("NORMAL"); -+ return 0; -+} -+ -+#endif /* _WIN32 */ diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3467.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3467.patch deleted file mode 100644 index e52965e2b8..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3467.patch +++ /dev/null @@ -1,45 +0,0 @@ -From d4ff19de527cd3eb444c560639324cda35bc838e Mon Sep 17 00:00:00 2001 -From: mancha -Date: Sun, 1 Jun 2014 -Subject: CVE-2014-3467 - -This is a backport adaptation for use with GnuTLS 2.12.23. - -Relevant upstream commit(s): -------------------------- -http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=ff3b5c68cc32e3 -http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=51612fca32dda4 - ---- - lib/minitasn1/decoding.c | 6 +++--- - 1 file changed, 3 insertions(+), 3 deletions(-) - ---- a/lib/minitasn1/decoding.c -+++ b/lib/minitasn1/decoding.c -@@ -149,7 +149,7 @@ asn1_get_tag_der (const unsigned char *d - /* Long form */ - punt = 1; - ris = 0; -- while (punt <= der_len && der[punt] & 128) -+ while (punt < der_len && der[punt] & 128) - { - last = ris; - -@@ -259,7 +259,7 @@ _asn1_get_time_der (const unsigned char - if (der_len <= 0 || str == NULL) - return ASN1_DER_ERROR; - str_len = asn1_get_length_der (der, der_len, &len_len); -- if (str_len < 0 || str_size < str_len) -+ if (str_len <= 0 || str_size < str_len) - return ASN1_DER_ERROR; - memcpy (str, der + len_len, str_len); - str[str_len] = 0; -@@ -285,7 +285,7 @@ _asn1_get_objectid_der (const unsigned c - return ASN1_GENERIC_ERROR; - len = asn1_get_length_der (der, der_len, &len_len); - -- if (len < 0 || len > der_len || len_len > der_len) -+ if (len <= 0 || len > der_len || len_len > der_len) - return ASN1_DER_ERROR; - - val1 = der[len_len] / 40; diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3468.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3468.patch deleted file mode 100644 index bd324094c2..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3468.patch +++ /dev/null @@ -1,45 +0,0 @@ -From 24ed1d41707f873f3b7a22159e4bb3942f319fac Mon Sep 17 00:00:00 2001 -From: mancha -Date: Sun, 1 Jun 2014 -Subject: CVE-2014-3468 - -This is a backport adaptation for use with GnuTLS 2.12.23. - -Relevant upstream commit(s): -------------------------- -http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=1c3ccb3e040bf1 - ---- - lib/minitasn1/decoding.c | 7 +++++-- - 1 file changed, 5 insertions(+), 2 deletions(-) - ---- a/lib/minitasn1/decoding.c -+++ b/lib/minitasn1/decoding.c -@@ -226,7 +226,7 @@ asn1_get_octet_der (const unsigned char - int *ret_len, unsigned char *str, int str_size, - int *str_len) - { -- int len_len; -+ int len_len = 0; - - if (der_len <= 0) - return ASN1_GENERIC_ERROR; -@@ -347,7 +347,7 @@ asn1_get_bit_der (const unsigned char *d - int *ret_len, unsigned char *str, int str_size, - int *bit_len) - { -- int len_len, len_byte; -+ int len_len = 0, len_byte; - - if (der_len <= 0) - return ASN1_GENERIC_ERROR; -@@ -358,6 +358,9 @@ asn1_get_bit_der (const unsigned char *d - *ret_len = len_byte + len_len + 1; - *bit_len = len_byte * 8 - der[len_len]; - -+ if (*bit_len <= 0) -+ return ASN1_DER_ERROR; -+ - if (str_size >= len_byte) - memcpy (str, der + len_len + 1, len_byte); - else diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3469.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3469.patch deleted file mode 100644 index a99b433b3c..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-CVE-2014-3469.patch +++ /dev/null @@ -1,122 +0,0 @@ -From 7f5a6256231e278aa7d00b6851c22fb457537262 Mon Sep 17 00:00:00 2001 -From: mancha -Date: Sun, 1 Jun 2014 -Subject: CVE-2014-3469 - -This is a backport adaptation for use with GnuTLS 2.12.23. - -Relevant upstream commit(s): -------------------------- -http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=a8b3e14f84174e -http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=3d6a02f19ff15a -http://git.savannah.gnu.org/cgit/libtasn1.git/commit/?id=53958290ab731c - ---- - lib/minitasn1/decoding.c | 11 ++++++++--- - lib/minitasn1/element.c | 27 ++++++++++++++++++--------- - 2 files changed, 26 insertions(+), 12 deletions(-) - ---- a/lib/minitasn1/decoding.c -+++ b/lib/minitasn1/decoding.c -@@ -231,7 +231,6 @@ asn1_get_octet_der (const unsigned char - if (der_len <= 0) - return ASN1_GENERIC_ERROR; - -- /* if(str==NULL) return ASN1_SUCCESS; */ - *str_len = asn1_get_length_der (der, der_len, &len_len); - - if (*str_len < 0) -@@ -239,7 +238,10 @@ asn1_get_octet_der (const unsigned char - - *ret_len = *str_len + len_len; - if (str_size >= *str_len) -- memcpy (str, der + len_len, *str_len); -+ { -+ if (*str_len > 0 && str != NULL) -+ memcpy (str, der + len_len, *str_len); -+ } - else - { - return ASN1_MEM_ERROR; -@@ -362,7 +364,10 @@ asn1_get_bit_der (const unsigned char *d - return ASN1_DER_ERROR; - - if (str_size >= len_byte) -- memcpy (str, der + len_len + 1, len_byte); -+ { -+ if (len_byte > 0 && str) -+ memcpy (str, der + len_len + 1, len_byte); -+ } - else - { - return ASN1_MEM_ERROR; ---- a/lib/minitasn1/element.c -+++ b/lib/minitasn1/element.c -@@ -112,8 +112,11 @@ _asn1_convert_integer (const unsigned ch - /* VALUE_OUT is too short to contain the value conversion */ - return ASN1_MEM_ERROR; - -- for (k2 = k; k2 < SIZEOF_UNSIGNED_LONG_INT; k2++) -- value_out[k2 - k] = val[k2]; -+ if (value_out != NULL) -+ { -+ for (k2 = k; k2 < SIZEOF_UNSIGNED_LONG_INT; k2++) -+ value_out[k2 - k] = val[k2]; -+ } - - #if 0 - printf ("_asn1_convert_integer: valueIn=%s, lenOut=%d", value, *len); -@@ -611,7 +614,8 @@ asn1_write_value (asn1_node node_root, c - if (ptr_size < data_size) { \ - return ASN1_MEM_ERROR; \ - } else { \ -- memcpy( ptr, data, data_size); \ -+ if (ptr && data_size > 0) \ -+ memcpy( ptr, data, data_size); \ - } - - #define PUT_STR_VALUE( ptr, ptr_size, data) \ -@@ -620,16 +624,19 @@ asn1_write_value (asn1_node node_root, c - return ASN1_MEM_ERROR; \ - } else { \ - /* this strcpy is checked */ \ -- _asn1_strcpy(ptr, data); \ -+ if (ptr) { \ -+ _asn1_strcpy(ptr, data); \ -+ } \ - } - - #define ADD_STR_VALUE( ptr, ptr_size, data) \ -- *len = (int) _asn1_strlen(data) + 1; \ -- if (ptr_size < (int) _asn1_strlen(ptr)+(*len)) { \ -+ *len += _asn1_strlen(data); \ -+ if (ptr_size < (int) *len) { \ -+ (*len)++; \ - return ASN1_MEM_ERROR; \ - } else { \ - /* this strcat is checked */ \ -- _asn1_strcat(ptr, data); \ -+ if (ptr) _asn1_strcat (ptr, data); \ - } - - /** -@@ -786,7 +793,9 @@ asn1_read_value (asn1_node root, const c - case TYPE_OBJECT_ID: - if (node->type & CONST_ASSIGN) - { -- value[0] = 0; -+ *len = 0; -+ if (value) -+ value[0] = 0; - p = node->down; - while (p) - { -@@ -800,7 +809,7 @@ asn1_read_value (asn1_node root, const c - } - p = p->right; - } -- *len = _asn1_strlen (value) + 1; -+ (*len)++; - } - else if ((node->type & CONST_DEFAULT) && (node->value == NULL)) - { diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-cross-compile.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-cross-compile.patch deleted file mode 100644 index 31178fcd8c..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-cross-compile.patch +++ /dev/null @@ -1,69 +0,0 @@ -use pkg-config to locate zlib rather than hardcoding system -L/-I paths - -for pthreads, just hardcode it enabled - -for gnutls, don't hardcode -L/-I all the time to the host paths - ---- a/lib/configure.ac -+++ b/lib/configure.ac -@@ -70,26 +70,23 @@ AC_ARG_WITH(zlib, AS_HELP_STRING([--without-zlib], - AC_MSG_CHECKING([whether to include zlib compression support]) - if test x$ac_zlib != xno; then - AC_MSG_RESULT(yes) -- AC_LIB_HAVE_LINKFLAGS(z,, [#include ], [compress (0, 0, 0, 0);]) -- if test "$ac_cv_libz" != yes; then -- AC_MSG_WARN( --*** --*** ZLIB was not found. You will not be able to use ZLIB compression.) -- fi - else - AC_MSG_RESULT(no) - fi - --PKG_CHECK_EXISTS(zlib, ZLIB_HAS_PKGCONFIG=y, ZLIB_HAS_PKGCONFIG=n) -- - if test x$ac_zlib != xno; then -+ PKG_CHECK_MODULES(ZLIB, zlib, ZLIB_HAS_PKGCONFIG=y, ZLIB_HAS_PKGCONFIG=n) - if test "$ZLIB_HAS_PKGCONFIG" = "y" ; then -+ LTLIBZ=$ZLIB_LIBS -+ AC_DEFINE([HAVE_LIBZ], [1], [zlib is enabled]) -+ AC_SUBST(LTLIBZ) - if test "x$GNUTLS_REQUIRES_PRIVATE" = "x"; then - GNUTLS_REQUIRES_PRIVATE="Requires.private: zlib" - else - GNUTLS_REQUIRES_PRIVATE="$GNUTLS_REQUIRES_PRIVATE , zlib" - fi - else -+ AC_LIB_HAVE_LINKFLAGS(z,, [#include ], [compress (0, 0, 0, 0);]) - GNUTLS_ZLIB_LIBS_PRIVATE="$LTLIBZ" - fi - fi -@@ -124,10 +121,12 @@ fi - lgl_INIT - - AC_CHECK_FUNCS(getrusage,,) --AC_LIB_HAVE_LINKFLAGS(pthread,, [#include ], [pthread_mutex_lock (0);]) -+LTLIBPTHREAD='-pthread' -+AC_DEFINE([HAVE_LIBPTHREAD], [1], [pthread enabled]) -+AC_SUBST(LTLIBPTHREAD) - --LIBGNUTLS_LIBS="-L${libdir} -lgnutls $LIBS" --LIBGNUTLS_CFLAGS="-I${includedir}" -+LIBGNUTLS_LIBS="-lgnutls $LIBS" -+LIBGNUTLS_CFLAGS="" - AC_SUBST(LIBGNUTLS_LIBS) - AC_SUBST(LIBGNUTLS_CFLAGS) - ---- a/libextra/configure.ac -+++ b/libextra/configure.ac -@@ -41,8 +41,8 @@ LIBGNUTLS_EXTRA_HOOKS - - xgl_INIT - --LIBGNUTLS_EXTRA_LIBS="-L${libdir} -lgnutls-extra $LZO_LIBS $LIBGNUTLS_LIBS" --LIBGNUTLS_EXTRA_CFLAGS="-I${includedir}" -+LIBGNUTLS_EXTRA_LIBS="-lgnutls-extra $LZO_LIBS $LIBGNUTLS_LIBS" -+LIBGNUTLS_EXTRA_CFLAGS="" - AC_SUBST(LIBGNUTLS_EXTRA_LIBS) - AC_SUBST(LIBGNUTLS_EXTRA_CFLAGS) - diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-gdoc-perl-5.18.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-gdoc-perl-5.18.patch deleted file mode 100644 index a89e8f2530..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-gdoc-perl-5.18.patch +++ /dev/null @@ -1,137 +0,0 @@ ---- gnutls-2.12.23.orig/doc/scripts/gdoc 2011-04-08 02:30:44.000000000 +0200 -+++ gnutls-2.12.23/doc/scripts/gdoc 2014-03-10 01:53:28.899566076 +0200 -@@ -7,6 +7,8 @@ - ## Copyright (c) 2001, 2002 Nikos Mavrogiannopoulos - ## added -tex - ## Copyright (c) 1998 Michael Zucchi -+## Copyright (c) 2013 Adam Sampson -+## made highlighting not depend on hash order, for Perl 5.18 - - # This program is free software: you can redistribute it and/or modify - # it under the terms of the GNU General Public License as published by -@@ -143,44 +145,44 @@ - # One for each output format - - # these work fairly well --%highlights_html = ( $type_constant, "\$2", -- $type_func, "\$1", -- $type_struct, "\$1", -- $type_param, "\$1" ); -+@highlights_html = ( [$type_constant, "\$2"], -+ [$type_func, "\$1"], -+ [$type_struct, "\$1"], -+ [$type_param, "\$1"] ); - $blankline_html = "

"; - --%highlights_texinfo = ( $type_constant, "\\\@code{\$2}", -- $type_func, "\\\@code{\$1}", -- $type_struct, "\\\@code{\$1}", -- $type_param, "\\\@code{\$1}" ); -+@highlights_texinfo = ( [$type_constant, "\\\@code{\$2}"], -+ [$type_func, "\\\@code{\$1}"], -+ [$type_struct, "\\\@code{\$1}"], -+ [$type_param, "\\\@code{\$1}"] ); - $blankline_texinfo = ""; - --%highlights_tex = ( $type_constant, "{\\\\it \$2}", -- $type_func, "{\\\\bf \$1}", -- $type_struct, "{\\\\it \$1}", -- $type_param, "{\\\\bf \$1}" ); -+@highlights_tex = ( [$type_constant, "{\\\\it \$2}"], -+ [$type_func, "{\\\\bf \$1}"], -+ [$type_struct, "{\\\\it \$1}"], -+ [$type_param, "{\\\\bf \$1}"] ); - $blankline_tex = "\\\\"; - - # sgml, docbook format --%highlights_sgml = ( $type_constant, "\$2", -- $type_func, "\$1", -- $type_struct, "\$1", -- $type_env, "\$1", -- $type_param, "\$1" ); -+@highlights_sgml = ( [$type_constant, "\$2"], -+ [$type_func, "\$1"], -+ [$type_struct, "\$1"], -+ [$type_env, "\$1"], -+ [$type_param, "\$1"] ); - $blankline_sgml = "\n"; - - # these are pretty rough --%highlights_man = ( $type_constant, "\\\\fB\$2\\\\fP", -- $type_func, "\\\\fB\$1\\\\fP", -- $type_struct, "\\\\fB\$1\\\\fP", -- $type_param, "\\\\fI\$1\\\\fP" ); -+@highlights_man = ( [$type_constant, "\\\\fB\$2\\\\fP"], -+ [$type_func, "\\\\fB\$1\\\\fP"], -+ [$type_struct, "\\\\fB\$1\\\\fP"], -+ [$type_param, "\\\\fI\$1\\\\fP"] ); - $blankline_man = ""; - - # text-mode --%highlights_text = ( $type_constant, "\$2", -- $type_func, "\$1", -- $type_struct, "\$1", -- $type_param, "\$1" ); -+@highlights_text = ( [$type_constant, "\$2"], -+ [$type_func, "\$1"], -+ [$type_struct, "\$1"], -+ [$type_param, "\$1"] ); - $blankline_text = ""; - - -@@ -201,7 +203,7 @@ - - $verbose = 0; - $output_mode = "man"; --%highlights = %highlights_man; -+@highlights = @highlights_man; - $blankline = $blankline_man; - $modulename = "API Documentation"; - $sourceversion = strftime "%Y-%m-%d", localtime; -@@ -210,27 +212,27 @@ - $cmd = shift @ARGV; - if ($cmd eq "-html") { - $output_mode = "html"; -- %highlights = %highlights_html; -+ @highlights = @highlights_html; - $blankline = $blankline_html; - } elsif ($cmd eq "-man") { - $output_mode = "man"; -- %highlights = %highlights_man; -+ @highlights = @highlights_man; - $blankline = $blankline_man; - } elsif ($cmd eq "-tex") { - $output_mode = "tex"; -- %highlights = %highlights_tex; -+ @highlights = @highlights_tex; - $blankline = $blankline_tex; - } elsif ($cmd eq "-texinfo") { - $output_mode = "texinfo"; - %highlights = %highlights_texinfo; -- $blankline = $blankline_texinfo; -+ @blankline = @blankline_texinfo; - } elsif ($cmd eq "-text") { - $output_mode = "text"; - %highlights = %highlights_text; -- $blankline = $blankline_text; -+ @blankline = @blankline_text; - } elsif ($cmd eq "-docbook") { - $output_mode = "sgml"; -- %highlights = %highlights_sgml; -+ @highlights = @highlights_sgml; - $blankline = $blankline_sgml; - } elsif ($cmd eq "-listfunc") { - $output_mode = "listfunc"; -@@ -322,9 +324,10 @@ - my $line; - my $ret = ""; - -- foreach $pattern (keys %highlights) { -+ foreach $highlight (@highlights) { -+ my ($pattern, $replace) = @$highlight; - # print "scanning pattern $pattern ($highlights{$pattern})\n"; -- $contents =~ s:$pattern:repstr($pattern, $highlights{$pattern}, $1, $2, $3, $4):gse; -+ $contents =~ s:$pattern:repstr($pattern, $replace, $1, $2, $3, $4):gse; - } - foreach $line (split "\n", $contents) { - if ($line eq ""){ diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-gl-tests-getaddrinfo-skip-if-no-network.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-gl-tests-getaddrinfo-skip-if-no-network.patch deleted file mode 100644 index 6d04ccbdcd..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-gl-tests-getaddrinfo-skip-if-no-network.patch +++ /dev/null @@ -1,30 +0,0 @@ -From 4b3252d59ef2d73118e2de6743ba58e2cbafa008 Mon Sep 17 00:00:00 2001 -From: Alon Bar-Lev -Date: Sat, 8 Mar 2014 22:13:51 +0200 -Subject: [PATCH] tests: getaddrinfo: skip if no network - -When running tests under network sandbox, there is no connectivity to -the DNS, in this case function returns system error and ECONNREFUSED -this should result in skipping test. - -Signed-off-by: Alon Bar-Lev ---- - tests/test-getaddrinfo.c | 2 +- - 1 file changed, 1 insertion(+), 1 deletion(-) - -diff --git a/gl/tests/test-getaddrinfo.c b/gl/tests/test-getaddrinfo.c -index acf9cd6..b155410 100644 ---- a/gl/tests/test-getaddrinfo.c -+++ b/gl/tests/test-getaddrinfo.c -@@ -85,7 +85,7 @@ simple (char const *host, char const *service) - /* EAI_AGAIN is returned if no network is available. Don't fail - the test merely because someone is down the country on their - in-law's farm. */ -- if (res == EAI_AGAIN) -+ if (res == EAI_AGAIN || (res == EAI_SYSTEM && err == ECONNREFUSED)) - { - skip++; - fprintf (stderr, "skipping getaddrinfo test: no network?\n"); --- -1.8.3.2 - diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-hppa.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-hppa.patch deleted file mode 100644 index 16981cf2e9..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-2.12.23-hppa.patch +++ /dev/null @@ -1,44 +0,0 @@ -From 043fe2c28a5f6b3ec6202090faaf7933b247e40c Mon Sep 17 00:00:00 2001 -From: Alon Bar-Lev -Date: Mon, 17 Jun 2013 13:27:55 +0300 -Subject: [PATCH] build: fix hppa compile - -gentoo#471914 - -O_SYNC : 262144 -O_DSYNC: 262144 -O_RSYNC: 524288 ---- - gl/tests/test-fcntl-h.c | 2 +- - lib/gl/tests/test-fcntl-h.c | 2 +- - 2 files changed, 2 insertions(+), 2 deletions(-) - -diff --git a/gl/tests/test-fcntl-h.c b/gl/tests/test-fcntl-h.c -index a6c9621..9e13491 100644 ---- a/gl/tests/test-fcntl-h.c -+++ b/gl/tests/test-fcntl-h.c -@@ -111,7 +111,7 @@ main (void) - #if O_RSYNC && O_RSYNC != O_DSYNC - case O_RSYNC: - #endif --#if O_SYNC && O_SYNC != O_RSYNC -+#if O_SYNC && O_SYNC != O_RSYNC && O_SYNC != O_DSYNC - case O_SYNC: - #endif - #if O_TTY_INIT -diff --git a/lib/gl/tests/test-fcntl-h.c b/lib/gl/tests/test-fcntl-h.c -index a6c9621..9e13491 100644 ---- a/lib/gl/tests/test-fcntl-h.c -+++ b/lib/gl/tests/test-fcntl-h.c -@@ -111,7 +111,7 @@ main (void) - #if O_RSYNC && O_RSYNC != O_DSYNC - case O_RSYNC: - #endif --#if O_SYNC && O_SYNC != O_RSYNC -+#if O_SYNC && O_SYNC != O_RSYNC && O_SYNC != O_DSYNC - case O_SYNC: - #endif - #if O_TTY_INIT --- -1.8.1.5 - diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-3.3.19-build-allow-installing-man-1-even-with-disable-doc.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-3.3.19-build-allow-installing-man-1-even-with-disable-doc.patch deleted file mode 100644 index dda8bfced6..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-3.3.19-build-allow-installing-man-1-even-with-disable-doc.patch +++ /dev/null @@ -1,94 +0,0 @@ -From 0f230c6375fd3680837d98f20ee3862e9041af3d Mon Sep 17 00:00:00 2001 -From: Alon Bar-Lev -Date: Fri, 18 Dec 2015 12:14:08 +0200 -Subject: [PATCH] build: allow installing man(1) even with --disable-doc - -Currently these man pages are installed only if --enable-doc -is provided, while these are not actually docs, do not require any -special dependency, nor consume large space. - -This adds --enable-manpages to enable/disable manpages installation, and -install the man(1) regardless of --disable-doc. - -Signed-off-by: Alon Bar-Lev -Signed-off-by: Nikos Mavrogiannopoulos - ---- - Makefile.am | 3 +++ - configure.ac | 10 ++++++++++ - doc/Makefile.am | 2 +- - doc/manpages/Makefile.am | 2 ++ - 5 files changed, 17 insertions(+), 1 deletion(-) - -diff --git a/Makefile.am b/Makefile.am -index d446711..6e19f26 100644 ---- a/Makefile.am -+++ b/Makefile.am -@@ -28,6 +28,9 @@ SUBDIRS += libdane - endif - - SUBDIRS += po src -+if ENABLE_MANPAGES -+SUBDIRS += doc/manpages -+endif - if ENABLE_DOC - SUBDIRS += doc - endif -diff --git a/configure.ac b/configure.ac -index c7a83b8..d161c05 100644 ---- a/configure.ac -+++ b/configure.ac -@@ -152,6 +152,15 @@ AC_ARG_ENABLE(doc, - enable_doc=$enableval, enable_doc=yes) - AM_CONDITIONAL(ENABLE_DOC, test "$enable_doc" != "no") - -+AC_ARG_ENABLE(manpages, -+ AS_HELP_STRING([--enable-manpages], [install manpages even if disable-doc is given]), -+ enable_manpages=$enableval,enable_manpages=auto) -+ -+if test "${enable_manpages}" = "auto";then -+ enable_manpages="${enable_doc}" -+fi -+AM_CONDITIONAL(ENABLE_MANPAGES, test "$enable_manpages" != "no") -+ - AC_ARG_ENABLE(tests, - AS_HELP_STRING([--disable-tests], [don't compile or run any tests]), - enable_tests=$enableval, enable_tests=yes) -@@ -838,6 +847,7 @@ AC_MSG_NOTICE([summary of build options: - Local libtasn1: ${included_libtasn1} - Use nettle-mini: ${mini_nettle} - nettle-version: ${nettle_version} -+ Documentation: ${enable_doc} (manpages: ${enable_manpages}) - ]) - - AC_MSG_NOTICE([External hardware support: -diff --git a/doc/Makefile.am b/doc/Makefile.am -index d9b4022..492a74a 100644 ---- a/doc/Makefile.am -+++ b/doc/Makefile.am -@@ -24,7 +24,7 @@ EXTRA_DIST = TODO certtool.cfg gnutls.pdf gnutls.html \ - gnutls-guile.pdf gnutls-guile.html stamp_enums stamp_functions \ - doc.mk - --SUBDIRS = examples cyclo scripts manpages credentials latex -+SUBDIRS = examples cyclo scripts credentials latex - if ENABLE_GTK_DOC - SUBDIRS += reference - endif -diff --git a/doc/manpages/Makefile.am b/doc/manpages/Makefile.am -index 6d16787..2840197 100644 ---- a/doc/manpages/Makefile.am -+++ b/doc/manpages/Makefile.am -@@ -1053,7 +1053,9 @@ APIMANS += gnutls_x509_trust_list_verify_crt.3 - APIMANS += gnutls_x509_trust_list_verify_crt2.3 - APIMANS += gnutls_x509_trust_list_verify_named_crt.3 - -+if ENABLE_DOC - dist_man_MANS += $(APIMANS) -+endif - - $(APIMANS): stamp_mans - --- -2.4.10 - diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-3.4.7-build-allow-installing-man-1-even-with-disable-doc.patch b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-3.4.7-build-allow-installing-man-1-even-with-disable-doc.patch deleted file mode 100644 index cf108f07a0..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/files/gnutls-3.4.7-build-allow-installing-man-1-even-with-disable-doc.patch +++ /dev/null @@ -1,96 +0,0 @@ -From 86f039f8c78f87edd6346265010abc679d9283a9 Mon Sep 17 00:00:00 2001 -From: Alon Bar-Lev -Date: Fri, 18 Dec 2015 12:14:08 +0200 -Subject: [PATCH] build: allow installing man(1) even with --disable-doc - -Currently these man pages are installed only if --enable-doc -is provided, while these are not actually docs, do not require any -special dependency, nor consume large space. - -This adds --enable-manpages to enable/disable manpages installation, and -install the man(1) regardless of --disable-doc. - -Signed-off-by: Alon Bar-Lev -Signed-off-by: Nikos Mavrogiannopoulos - ---- - Makefile.am | 4 ++++ - configure.ac | 11 +++++++++++ - doc/Makefile.am | 2 +- - doc/manpages/Makefile.am | 2 ++ - 5 files changed, 19 insertions(+), 1 deletion(-) - -diff --git a/Makefile.am b/Makefile.am -index 19fcb90..b94af06 100644 ---- a/Makefile.am -+++ b/Makefile.am -@@ -42,6 +42,10 @@ if HAVE_GUILE - SUBDIRS += guile - endif - -+if ENABLE_MANPAGES -+SUBDIRS += doc/manpages -+endif -+ - if ENABLE_DOC - SUBDIRS += doc - endif -diff --git a/configure.ac b/configure.ac -index e634236..0b1625b 100644 ---- a/configure.ac -+++ b/configure.ac -@@ -51,6 +51,16 @@ AC_ARG_ENABLE(doc, - enable_doc=$enableval, enable_doc=yes) - AM_CONDITIONAL(ENABLE_DOC, test "$enable_doc" != "no") - -+AC_ARG_ENABLE(manpages, -+ AS_HELP_STRING([--enable-manpages], [install manpages even if disable-doc is given]), -+ enable_manpages=$enableval,enable_manpages=auto) -+ -+if test "${enable_manpages}" = "auto";then -+ enable_manpages="${enable_doc}" -+fi -+ -+AM_CONDITIONAL(ENABLE_MANPAGES, test "$enable_manpages" != "no") -+ - AC_ARG_ENABLE(tools, - AS_HELP_STRING([--disable-tools], [don't compile any tools]), - enable_tools=$enableval, enable_tools=yes) -@@ -920,6 +930,7 @@ AC_MSG_NOTICE([summary of build options: - Local libopts: ${included_libopts} - Local libtasn1: ${included_libtasn1} - Use nettle-mini: ${mini_nettle} -+ Documentation: ${enable_doc} (manpages: ${enable_manpages}) - ]) - - AC_MSG_NOTICE([External hardware support: -diff --git a/doc/Makefile.am b/doc/Makefile.am -index 1e99dd0..05c2188 100644 ---- a/doc/Makefile.am -+++ b/doc/Makefile.am -@@ -24,7 +24,7 @@ EXTRA_DIST = TODO certtool.cfg gnutls.pdf gnutls.html \ - gnutls-guile.pdf gnutls-guile.html stamp_enums stamp_functions \ - doc.mk - --SUBDIRS = examples cyclo scripts manpages credentials latex -+SUBDIRS = examples cyclo scripts credentials latex - if ENABLE_GTK_DOC - SUBDIRS += reference - endif -diff --git a/doc/manpages/Makefile.am b/doc/manpages/Makefile.am -index 8a1613d..10365a9 100644 ---- a/doc/manpages/Makefile.am -+++ b/doc/manpages/Makefile.am -@@ -1127,7 +1127,9 @@ APIMANS += gnutls_x509_trust_list_verify_crt.3 - APIMANS += gnutls_x509_trust_list_verify_crt2.3 - APIMANS += gnutls_x509_trust_list_verify_named_crt.3 - -+if ENABLE_DOC - dist_man_MANS += $(APIMANS) -+endif - - $(APIMANS): stamp_mans - --- -2.4.10 - diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.17.1.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.17.1.ebuild deleted file mode 100644 index 2f1cfb76a6..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.17.1.ebuild +++ /dev/null @@ -1,174 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=5 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0" -KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-2.7:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - sys-devel/autogen - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.20.7[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - # support user patches - epatch_user - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --htmldir="${EPREFIX}/usr/share/doc/${PF}/html" \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) - - if multilib_is_native_abi; then - ln -s "${S}"/doc/reference/html doc/reference/html || die - fi -} - -multilib_src_compile() { - if multilib_is_native_abi; then - default - - # symlink certtool for use in other ABIs - if use test; then - ln -s "${BUILD_DIR}"/src "${T}"/native-tools || die - fi - else - emake -C gl - emake -C lib - emake -C extra - use dane && emake -C libdane - fi -} - -multilib_src_test() { - if multilib_is_native_abi; then - # parallel testing often fails - emake -j1 check - else - # use native ABI tools - ln -s "${T}"/native-tools/{certtool,gnutls-{serv,cli}} \ - "${BUILD_DIR}"/src/ || die - - emake -C gl -j1 check - emake -C tests -j1 check - fi -} - -multilib_src_install() { - if multilib_is_native_abi; then - emake DESTDIR="${D}" install - else - emake -C lib DESTDIR="${D}" install - emake -C extra DESTDIR="${D}" install - use dane && emake -C libdane DESTDIR="${D}" install - fi -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.18.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.18.ebuild deleted file mode 100644 index 12700eb2d2..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.18.ebuild +++ /dev/null @@ -1,174 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=5 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-2.7:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - sys-devel/autogen - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.20.7[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - # support user patches - epatch_user - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --htmldir="${EPREFIX}/usr/share/doc/${PF}/html" \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) - - if multilib_is_native_abi; then - ln -s "${S}"/doc/reference/html doc/reference/html || die - fi -} - -multilib_src_compile() { - if multilib_is_native_abi; then - default - - # symlink certtool for use in other ABIs - if use test; then - ln -s "${BUILD_DIR}"/src "${T}"/native-tools || die - fi - else - emake -C gl - emake -C lib - emake -C extra - use dane && emake -C libdane - fi -} - -multilib_src_test() { - if multilib_is_native_abi; then - # parallel testing often fails - emake -j1 check - else - # use native ABI tools - ln -s "${T}"/native-tools/{certtool,gnutls-{serv,cli}} \ - "${BUILD_DIR}"/src/ || die - - emake -C gl -j1 check - emake -C tests -j1 check - fi -} - -multilib_src_install() { - if multilib_is_native_abi; then - emake DESTDIR="${D}" install - else - emake -C lib DESTDIR="${D}" install - emake -C extra DESTDIR="${D}" install - use dane && emake -C libdane DESTDIR="${D}" install - fi -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.19-r1.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.19-r1.ebuild deleted file mode 100644 index c26d74c898..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.19-r1.ebuild +++ /dev/null @@ -1,177 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=5 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-2.7:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - sys-devel/autogen - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.20.7[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - epatch "${FILESDIR}/${P}-build-allow-installing-man-1-even-with-disable-doc.patch" - - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - # support user patches - epatch_user - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --htmldir="${EPREFIX}/usr/share/doc/${PF}/html" \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) - - if multilib_is_native_abi; then - ln -s "${S}"/doc/reference/html doc/reference/html || die - fi -} - -multilib_src_compile() { - if multilib_is_native_abi; then - default - - # symlink certtool for use in other ABIs - if use test; then - ln -s "${BUILD_DIR}"/src "${T}"/native-tools || die - fi - else - emake -C gl - emake -C lib - emake -C extra - use dane && emake -C libdane - fi -} - -multilib_src_test() { - if multilib_is_native_abi; then - # parallel testing often fails - emake -j1 check - else - # use native ABI tools - ln -s "${T}"/native-tools/{certtool,gnutls-{serv,cli}} \ - "${BUILD_DIR}"/src/ || die - - emake -C gl -j1 check - emake -C tests -j1 check - fi -} - -multilib_src_install() { - if multilib_is_native_abi; then - emake DESTDIR="${D}" install - else - emake -C lib DESTDIR="${D}" install - emake -C extra DESTDIR="${D}" install - use dane && emake -C libdane DESTDIR="${D}" install - fi -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.19.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.19.ebuild deleted file mode 100644 index 12700eb2d2..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.19.ebuild +++ /dev/null @@ -1,174 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=5 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-2.7:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - sys-devel/autogen - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.20.7[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - # support user patches - epatch_user - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --htmldir="${EPREFIX}/usr/share/doc/${PF}/html" \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) - - if multilib_is_native_abi; then - ln -s "${S}"/doc/reference/html doc/reference/html || die - fi -} - -multilib_src_compile() { - if multilib_is_native_abi; then - default - - # symlink certtool for use in other ABIs - if use test; then - ln -s "${BUILD_DIR}"/src "${T}"/native-tools || die - fi - else - emake -C gl - emake -C lib - emake -C extra - use dane && emake -C libdane - fi -} - -multilib_src_test() { - if multilib_is_native_abi; then - # parallel testing often fails - emake -j1 check - else - # use native ABI tools - ln -s "${T}"/native-tools/{certtool,gnutls-{serv,cli}} \ - "${BUILD_DIR}"/src/ || die - - emake -C gl -j1 check - emake -C tests -j1 check - fi -} - -multilib_src_install() { - if multilib_is_native_abi; then - emake DESTDIR="${D}" install - else - emake -C lib DESTDIR="${D}" install - emake -C extra DESTDIR="${D}" install - use dane && emake -C libdane DESTDIR="${D}" install - fi -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.20.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.20.ebuild deleted file mode 100644 index 0369f36ff0..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.20.ebuild +++ /dev/null @@ -1,177 +0,0 @@ -# Copyright 1999-2016 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=5 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-2.7:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - sys-devel/autogen - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.20.7[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - epatch "${FILESDIR}/${PN}-3.3.19-build-allow-installing-man-1-even-with-disable-doc.patch" - - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - # support user patches - epatch_user - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --htmldir="${EPREFIX}/usr/share/doc/${PF}/html" \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) - - if multilib_is_native_abi; then - ln -s "${S}"/doc/reference/html doc/reference/html || die - fi -} - -multilib_src_compile() { - if multilib_is_native_abi; then - default - - # symlink certtool for use in other ABIs - if use test; then - ln -s "${BUILD_DIR}"/src "${T}"/native-tools || die - fi - else - emake -C gl - emake -C lib - emake -C extra - use dane && emake -C libdane - fi -} - -multilib_src_test() { - if multilib_is_native_abi; then - # parallel testing often fails - emake -j1 check - else - # use native ABI tools - ln -s "${T}"/native-tools/{certtool,gnutls-{serv,cli}} \ - "${BUILD_DIR}"/src/ || die - - emake -C gl -j1 check - emake -C tests -j1 check - fi -} - -multilib_src_install() { - if multilib_is_native_abi; then - emake DESTDIR="${D}" install - else - emake -C lib DESTDIR="${D}" install - emake -C extra DESTDIR="${D}" install - use dane && emake -C libdane DESTDIR="${D}" install - fi -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.21.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.21.ebuild deleted file mode 100644 index 41ffb01ff6..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.21.ebuild +++ /dev/null @@ -1,177 +0,0 @@ -# Copyright 1999-2016 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=6 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-2.7:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - sys-devel/autogen - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.20.7[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -PATCHES=( - "${FILESDIR}/${PN}-3.3.19-build-allow-installing-man-1-even-with-disable-doc.patch" -) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - default - - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) - - if multilib_is_native_abi; then - ln -s "${S}"/doc/reference/html doc/reference/html || die - fi -} - -multilib_src_compile() { - if multilib_is_native_abi; then - default - - # symlink certtool for use in other ABIs - if use test; then - ln -s "${BUILD_DIR}"/src "${T}"/native-tools || die - fi - else - emake -C gl - emake -C lib - emake -C extra - use dane && emake -C libdane - fi -} - -multilib_src_test() { - if multilib_is_native_abi; then - # parallel testing often fails - emake -j1 check - else - # use native ABI tools - ln -s "${T}"/native-tools/{certtool,gnutls-{serv,cli}} \ - "${BUILD_DIR}"/src/ || die - - emake -C gl -j1 check - emake -C tests -j1 check - fi -} - -multilib_src_install() { - if multilib_is_native_abi; then - emake DESTDIR="${D}" install - else - emake -C lib DESTDIR="${D}" install - emake -C extra DESTDIR="${D}" install - use dane && emake -C libdane DESTDIR="${D}" install - fi -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.22.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.22.ebuild deleted file mode 100644 index 41ffb01ff6..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.22.ebuild +++ /dev/null @@ -1,177 +0,0 @@ -# Copyright 1999-2016 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=6 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-2.7:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - sys-devel/autogen - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.20.7[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -PATCHES=( - "${FILESDIR}/${PN}-3.3.19-build-allow-installing-man-1-even-with-disable-doc.patch" -) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - default - - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) - - if multilib_is_native_abi; then - ln -s "${S}"/doc/reference/html doc/reference/html || die - fi -} - -multilib_src_compile() { - if multilib_is_native_abi; then - default - - # symlink certtool for use in other ABIs - if use test; then - ln -s "${BUILD_DIR}"/src "${T}"/native-tools || die - fi - else - emake -C gl - emake -C lib - emake -C extra - use dane && emake -C libdane - fi -} - -multilib_src_test() { - if multilib_is_native_abi; then - # parallel testing often fails - emake -j1 check - else - # use native ABI tools - ln -s "${T}"/native-tools/{certtool,gnutls-{serv,cli}} \ - "${BUILD_DIR}"/src/ || die - - emake -C gl -j1 check - emake -C tests -j1 check - fi -} - -multilib_src_install() { - if multilib_is_native_abi; then - emake DESTDIR="${D}" install - else - emake -C lib DESTDIR="${D}" install - emake -C extra DESTDIR="${D}" install - use dane && emake -C libdane DESTDIR="${D}" install - fi -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.23.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.23.ebuild deleted file mode 100644 index 41ffb01ff6..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.3.23.ebuild +++ /dev/null @@ -1,177 +0,0 @@ -# Copyright 1999-2016 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=6 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0" -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-2.7:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - sys-devel/autogen - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.20.7[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -PATCHES=( - "${FILESDIR}/${PN}-3.3.19-build-allow-installing-man-1-even-with-disable-doc.patch" -) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - default - - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) - - if multilib_is_native_abi; then - ln -s "${S}"/doc/reference/html doc/reference/html || die - fi -} - -multilib_src_compile() { - if multilib_is_native_abi; then - default - - # symlink certtool for use in other ABIs - if use test; then - ln -s "${BUILD_DIR}"/src "${T}"/native-tools || die - fi - else - emake -C gl - emake -C lib - emake -C extra - use dane && emake -C libdane - fi -} - -multilib_src_test() { - if multilib_is_native_abi; then - # parallel testing often fails - emake -j1 check - else - # use native ABI tools - ln -s "${T}"/native-tools/{certtool,gnutls-{serv,cli}} \ - "${BUILD_DIR}"/src/ || die - - emake -C gl -j1 check - emake -C tests -j1 check - fi -} - -multilib_src_install() { - if multilib_is_native_abi; then - emake DESTDIR="${D}" install - else - emake -C lib DESTDIR="${D}" install - emake -C extra DESTDIR="${D}" install - use dane && emake -C libdane DESTDIR="${D}" install - fi -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.10.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.10.ebuild deleted file mode 100644 index ed0dc89880..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.10.ebuild +++ /dev/null @@ -1,135 +0,0 @@ -# Copyright 1999-2016 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=6 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0/30" # libgnutls.so number -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-3.1:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - tools? ( sys-devel/autogen ) - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.23.1[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -PATCHES=( - "${FILESDIR}/${PN}-3.4.7-build-allow-installing-man-1-even-with-disable-doc.patch" -) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - default - - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable tools) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(multilib_native_use_enable test tests) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.13.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.13.ebuild deleted file mode 100644 index ed0dc89880..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.13.ebuild +++ /dev/null @@ -1,135 +0,0 @@ -# Copyright 1999-2016 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=6 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0/30" # libgnutls.so number -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-3.1:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - tools? ( sys-devel/autogen ) - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.23.1[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -PATCHES=( - "${FILESDIR}/${PN}-3.4.7-build-allow-installing-man-1-even-with-disable-doc.patch" -) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - default - - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable tools) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(multilib_native_use_enable test tests) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.5.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.5.ebuild deleted file mode 100644 index b0bc173612..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.5.ebuild +++ /dev/null @@ -1,132 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=5 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0/30" # libgnutls.so number -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-3.1:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - tools? ( sys-devel/autogen ) - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.23.1[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - # support user patches - epatch_user - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --htmldir="${EPREFIX}/usr/share/doc/${PF}/html" \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_use_enable tools) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(multilib_native_use_enable test tests) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.6.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.6.ebuild deleted file mode 100644 index b0bc173612..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.6.ebuild +++ /dev/null @@ -1,132 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=5 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0/30" # libgnutls.so number -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-3.1:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - tools? ( sys-devel/autogen ) - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.23.1[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - # support user patches - epatch_user - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --htmldir="${EPREFIX}/usr/share/doc/${PF}/html" \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_use_enable tools) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(multilib_native_use_enable test tests) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.7-r1.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.7-r1.ebuild deleted file mode 100644 index 89d3fc4ac1..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.7-r1.ebuild +++ /dev/null @@ -1,135 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=5 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0/30" # libgnutls.so number -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-3.1:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - tools? ( sys-devel/autogen ) - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.23.1[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - epatch "${FILESDIR}/${P}-build-allow-installing-man-1-even-with-disable-doc.patch" - - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - # support user patches - epatch_user - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --htmldir="${EPREFIX}/usr/share/doc/${PF}/html" \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable tools) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(multilib_native_use_enable test tests) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.7.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.7.ebuild deleted file mode 100644 index b0bc173612..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.7.ebuild +++ /dev/null @@ -1,132 +0,0 @@ -# Copyright 1999-2015 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=5 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0/30" # libgnutls.so number -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-3.1:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - tools? ( sys-devel/autogen ) - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.23.1[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - # support user patches - epatch_user - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --htmldir="${EPREFIX}/usr/share/doc/${PF}/html" \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_use_enable tools) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(multilib_native_use_enable test tests) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.8.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.8.ebuild deleted file mode 100644 index 17058b1d24..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.8.ebuild +++ /dev/null @@ -1,135 +0,0 @@ -# Copyright 1999-2016 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=5 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0/30" # libgnutls.so number -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-3.1:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - tools? ( sys-devel/autogen ) - crywrap? ( net-dns/libidn ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.23.1[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - epatch "${FILESDIR}/${PN}-3.4.7-build-allow-installing-man-1-even-with-disable-doc.patch" - - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - # support user patches - epatch_user - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --htmldir="${EPREFIX}/usr/share/doc/${PF}/html" \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable tools) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(multilib_native_use_enable test tests) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.1.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.1.ebuild deleted file mode 100644 index efe688485a..0000000000 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.1.ebuild +++ /dev/null @@ -1,127 +0,0 @@ -# Copyright 1999-2016 Gentoo Foundation -# Distributed under the terms of the GNU General Public License v2 -# $Id$ - -EAPI=6 - -inherit autotools libtool eutils multilib-minimal versionator - -DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" -HOMEPAGE="http://www.gnutls.org/" -SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" - -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" -SLOT="0/30" # libgnutls.so number -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" -IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf - -# NOTICE: sys-devel/autogen is required at runtime as we -# use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] - >=dev-libs/nettle-3.1:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] - tools? ( sys-devel/autogen ) - dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) - nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) - pkcs11? ( >=app-crypt/p11-kit-0.23.1[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) - abi_x86_32? ( - !<=app-emulation/emul-linux-x86-baselibs-20140508 - !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] - )" -DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 - >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) - nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" - -pkg_setup() { - # bug#520818 - export TZ=UTC -} - -src_prepare() { - default - - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - - # force regeneration of autogen-ed files - local file - for file in $(grep -l AutoGen-ed src/*.c) ; do - rm src/$(basename ${file} .c).{c,h} || die - done - - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - eautoreconf - - # Use sane .so versioning on FreeBSD. - elibtoolize - - # bug 497472 - use cxx || epunt_cxx -} - -multilib_src_configure() { - LINGUAS="${LINGUAS//en/en@boldquot en@quot}" - - # TPM needs to be tested before being enabled - # hardware-accell is disabled on OSX because the asm files force - # GNU-stack (as doesn't support that) and when that's removed ld - # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ - $(use_enable cxx) \ - $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable tools) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable test tests) \ - $(use_enable nls) \ - $(use_enable openssl openssl-compatibility) \ - $(use_enable static-libs static) \ - $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) -} - -multilib_src_install_all() { - einstalldocs - prune_libtool_files --all - - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - - if use examples; then - docinto examples - dodoc doc/examples/*.c - fi -} diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.9.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.13.ebuild similarity index 53% rename from sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.9.ebuild rename to sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.13.ebuild index ed0dc89880..d927832a49 100644 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.9.ebuild +++ b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.13.ebuild @@ -1,102 +1,99 @@ -# Copyright 1999-2016 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI=6 -inherit autotools libtool eutils multilib-minimal versionator +inherit libtool ltprune multilib-minimal versionator DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" HOMEPAGE="http://www.gnutls.org/" SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" +LICENSE="GPL-3 LGPL-2.1" SLOT="0/30" # libgnutls.so number -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" +KEYWORDS="alpha amd64 arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf +IUSE="+cxx dane doc examples guile +idn nls openpgp +openssl pkcs11 sslv2 sslv3 seccomp static-libs test test-full +tls-heartbeat tools valgrind zlib ${IUSE_LINGUAS// / linguas_}" + +REQUIRED_USE=" + test-full? ( guile pkcs11 openpgp openssl idn seccomp tools zlib )" # NOTICE: sys-devel/autogen is required at runtime as we # use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] +RDEPEND=">=dev-libs/libtasn1-4.9:=[${MULTILIB_USEDEP}] + dev-libs/libunistring:=[${MULTILIB_USEDEP}] >=dev-libs/nettle-3.1:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] + >=dev-libs/gmp-5.1.3-r1:=[${MULTILIB_USEDEP}] tools? ( sys-devel/autogen ) - crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) + guile? ( >=dev-scheme/guile-1.8:=[networking] ) nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[${MULTILIB_USEDEP}] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) + idn? ( >=net-dns/libidn2-0.16-r1[${MULTILIB_USEDEP}] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] )" DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) + doc? ( dev-util/gtk-doc ) nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" + valgrind? ( dev-util/valgrind ) + test? ( + seccomp? ( sys-libs/libseccomp ) + ) + test-full? ( + guile? ( >=dev-scheme/guile-2 ) + app-crypt/dieharder + app-misc/datefudge + dev-libs/softhsm:2[-bindist] + net-dialup/ppp + net-misc/socat + )" -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -PATCHES=( - "${FILESDIR}/${PN}-3.4.7-build-allow-installing-man-1-even-with-disable-doc.patch" +DOCS=( + README.md + doc/certtool.cfg ) +HTML_DOCS=() + pkg_setup() { # bug#520818 export TZ=UTC + + use doc && HTML_DOCS+=( + doc/gnutls.html + ) } src_prepare() { default - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - # force regeneration of autogen-ed files local file for file in $(grep -l AutoGen-ed src/*.c) ; do rm src/$(basename ${file} .c).{c,h} || die done - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - eautoreconf - # Use sane .so versioning on FreeBSD. elibtoolize - - # bug 497472 - use cxx || epunt_cxx } multilib_src_configure() { LINGUAS="${LINGUAS//en/en@boldquot en@quot}" + # remove magic of library detection + # bug#438222 + local libconf=($("${S}/configure" --help | grep -- '--without-.*-prefix' | sed -e 's/^ *\([^ ]*\) .*/\1/g')) + # TPM needs to be tested before being enabled # hardware-accell is disabled on OSX because the asm files force # GNU-stack (as doesn't support that) and when that's removed ld # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --disable-valgrind-tests \ + ECONF_SOURCE=${S} econf \ --without-included-libtasn1 \ - --enable-heartbeat-support \ $(use_enable cxx) \ $(use_enable dane libdane) \ $(multilib_native_enable manpages) \ @@ -104,15 +101,25 @@ multilib_src_configure() { $(multilib_native_use_enable doc) \ $(multilib_native_use_enable doc gtk-doc) \ $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ $(multilib_native_use_enable test tests) \ + $(multilib_native_use_enable seccomp seccomp-tests) \ + $(multilib_native_use_enable valgrind valgrind-tests) \ + $(multilib_native_use_enable test-full full-test-suite) \ $(use_enable nls) \ + $(use_enable openpgp openpgp-authentication) \ $(use_enable openssl openssl-compatibility) \ + $(use_enable openssl openssl-compatibility) \ + $(use_enable tls-heartbeat heartbeat-support) \ + $(use_enable sslv2 ssl2-support) \ + $(use_enable sslv3 ssl3-support) \ $(use_enable static-libs static) \ $(use_with pkcs11 p11-kit) \ $(use_with zlib) \ + $(use_with idn) \ + $(use_with idn libidn2) \ --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ + --with-unbound-root-key-file="${EPREFIX}/etc/dnssec/root-anchors.txt" \ + "${libconf[@]}" \ $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) } @@ -120,14 +127,6 @@ multilib_src_install_all() { einstalldocs prune_libtool_files --all - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - if use examples; then docinto examples dodoc doc/examples/*.c diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.11.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.15.ebuild similarity index 50% rename from sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.11.ebuild rename to sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.15.ebuild index ed0dc89880..1b9622d368 100644 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.4.11.ebuild +++ b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.15.ebuild @@ -1,133 +1,136 @@ -# Copyright 1999-2016 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI=6 -inherit autotools libtool eutils multilib-minimal versionator +inherit libtool ltprune multilib-minimal versionator DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" HOMEPAGE="http://www.gnutls.org/" SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" +LICENSE="GPL-3 LGPL-2.1" SLOT="0/30" # libgnutls.so number -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" +KEYWORDS="~alpha ~amd64 ~arm ~arm64 hppa ia64 ~m68k ~mips ppc ppc64 ~s390 ~sh sparc x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~sparc64-solaris ~x64-solaris ~x86-solaris" IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx +crywrap dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf +IUSE="+cxx dane doc examples guile +idn nls openpgp +openssl pkcs11 seccomp sslv2 sslv3 static-libs test test-full +tls-heartbeat tools valgrind zlib ${IUSE_LINGUAS// / linguas_}" + +REQUIRED_USE=" + test-full? ( guile pkcs11 openpgp openssl idn seccomp tools zlib )" # NOTICE: sys-devel/autogen is required at runtime as we # use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] +RDEPEND=">=dev-libs/libtasn1-4.9:=[${MULTILIB_USEDEP}] + dev-libs/libunistring:=[${MULTILIB_USEDEP}] >=dev-libs/nettle-3.1:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] + >=dev-libs/gmp-5.1.3-r1:=[${MULTILIB_USEDEP}] tools? ( sys-devel/autogen ) - crywrap? ( net-dns/libidn ) dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) + guile? ( >=dev-scheme/guile-1.8:=[networking] ) nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[${MULTILIB_USEDEP}] ) zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) + idn? ( >=net-dns/libidn2-0.16-r1[${MULTILIB_USEDEP}] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] )" DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) + doc? ( dev-util/gtk-doc ) nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" + valgrind? ( dev-util/valgrind ) + test? ( + seccomp? ( sys-libs/libseccomp ) + ) + test-full? ( + guile? ( >=dev-scheme/guile-2 ) + app-crypt/dieharder + app-misc/datefudge + dev-libs/softhsm:2[-bindist] + net-dialup/ppp + net-misc/socat + )" -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -PATCHES=( - "${FILESDIR}/${PN}-3.4.7-build-allow-installing-man-1-even-with-disable-doc.patch" +DOCS=( + README.md + doc/certtool.cfg ) +HTML_DOCS=() + pkg_setup() { # bug#520818 export TZ=UTC + + use doc && HTML_DOCS+=( + doc/gnutls.html + ) } src_prepare() { default - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - # force regeneration of autogen-ed files local file for file in $(grep -l AutoGen-ed src/*.c) ; do rm src/$(basename ${file} .c).{c,h} || die done - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - eautoreconf - # Use sane .so versioning on FreeBSD. elibtoolize - - # bug 497472 - use cxx || epunt_cxx } multilib_src_configure() { LINGUAS="${LINGUAS//en/en@boldquot en@quot}" + # remove magic of library detection + # bug#438222 + local libconf=($("${S}/configure" --help | grep -- '--without-.*-prefix' | sed -e 's/^ *\([^ ]*\) .*/\1/g')) + # TPM needs to be tested before being enabled + libconf+=( --without-tpm ) + # hardware-accell is disabled on OSX because the asm files force # GNU-stack (as doesn't support that) and when that's removed ld # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ + [[ ${CHOST} == *-darwin* ]] && libconf+=( --disable-hardware-acceleration ) + + # Cygwin as does not understand these asm files at all + [[ ${CHOST} == *-cygwin* ]] && libconf+=( --disable-hardware-acceleration ) + + ECONF_SOURCE=${S} econf \ + $(multilib_native_enable manpages) \ + $(multilib_native_use_enable doc gtk-doc) \ + $(multilib_native_use_enable doc) \ + $(multilib_native_use_enable guile) \ + $(multilib_native_use_enable seccomp seccomp-tests) \ + $(multilib_native_use_enable test tests) \ + $(multilib_native_use_enable test-full full-test-suite) \ + $(multilib_native_use_enable tools) \ + $(multilib_native_use_enable valgrind valgrind-tests) \ $(use_enable cxx) \ $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable tools) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable crywrap) \ - $(multilib_native_use_enable test tests) \ $(use_enable nls) \ + $(use_enable openpgp openpgp-authentication) \ $(use_enable openssl openssl-compatibility) \ + $(use_enable sslv2 ssl2-support) \ + $(use_enable sslv3 ssl3-support) \ $(use_enable static-libs static) \ + $(use_enable tls-heartbeat heartbeat-support) \ + $(use_with idn libidn2) \ + $(use_with idn) \ $(use_with pkcs11 p11-kit) \ $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) + --with-unbound-root-key-file="${EPREFIX}/etc/dnssec/root-anchors.txt" \ + --without-included-libtasn1 \ + "${libconf[@]}" } multilib_src_install_all() { einstalldocs prune_libtool_files --all - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - if use examples; then docinto examples dodoc doc/examples/*.c diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.0.ebuild b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.6.0.ebuild similarity index 53% rename from sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.0.ebuild rename to sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.6.0.ebuild index 0f42068ecf..c8182318d3 100644 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.5.0.ebuild +++ b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/gnutls-3.6.0.ebuild @@ -1,131 +1,132 @@ -# Copyright 1999-2016 Gentoo Foundation +# Copyright 1999-2017 Gentoo Foundation # Distributed under the terms of the GNU General Public License v2 -# $Id$ EAPI=6 -inherit autotools libtool eutils multilib-minimal versionator +inherit libtool ltprune multilib-minimal versionator DESCRIPTION="A TLS 1.2 and SSL 3.0 implementation for the GNU project" HOMEPAGE="http://www.gnutls.org/" SRC_URI="mirror://gnupg/gnutls/v$(get_version_component_range 1-2)/${P}.tar.xz" -# LGPL-3 for libgnutls library and GPL-3 for libgnutls-extra library. -# soon to be relicensed as LGPL-2.1 unless heartbeat extension enabled. -LICENSE="GPL-3 LGPL-3" +LICENSE="GPL-3 LGPL-2.1" SLOT="0/30" # libgnutls.so number -KEYWORDS="~alpha ~amd64 ~arm ~arm64 ~hppa ~ia64 ~m68k ~mips ~ppc ~ppc64 ~s390 ~sh ~sparc ~x86 ~amd64-fbsd ~sparc-fbsd ~x86-fbsd ~x86-interix ~amd64-linux ~arm-linux ~x86-linux ~ppc-macos ~x64-macos ~x86-macos ~sparc-solaris ~x86-solaris" +KEYWORDS="" IUSE_LINGUAS=" en cs de fi fr it ms nl pl sv uk vi zh_CN" -IUSE="+cxx dane doc examples guile nls +openssl pkcs11 static-libs test +tools zlib ${IUSE_LINGUAS// / linguas_}" -# heartbeat support is not disabled until re-licensing happens fullyf +IUSE="+cxx dane doc examples guile +idn nls +openssl pkcs11 seccomp sslv2 sslv3 static-libs test test-full +tls-heartbeat tools valgrind ${IUSE_LINGUAS// / linguas_}" + +REQUIRED_USE=" + test-full? ( cxx dane doc examples guile idn nls openssl pkcs11 seccomp tls-heartbeat tools )" # NOTICE: sys-devel/autogen is required at runtime as we # use system libopts -RDEPEND=">=dev-libs/libtasn1-4.3[${MULTILIB_USEDEP}] +RDEPEND=">=dev-libs/libtasn1-4.9:=[${MULTILIB_USEDEP}] + dev-libs/libunistring:=[${MULTILIB_USEDEP}] >=dev-libs/nettle-3.1:=[gmp,${MULTILIB_USEDEP}] - >=dev-libs/gmp-5.1.3-r1[${MULTILIB_USEDEP}] + >=dev-libs/gmp-5.1.3-r1:=[${MULTILIB_USEDEP}] tools? ( sys-devel/autogen ) dane? ( >=net-dns/unbound-1.4.20[${MULTILIB_USEDEP}] ) - guile? ( >=dev-scheme/guile-1.8:*[networking] ) + guile? ( >=dev-scheme/guile-1.8:=[networking] ) nls? ( >=virtual/libintl-0-r1[${MULTILIB_USEDEP}] ) pkcs11? ( >=app-crypt/p11-kit-0.23.1[${MULTILIB_USEDEP}] ) - zlib? ( >=sys-libs/zlib-1.2.8-r1[${MULTILIB_USEDEP}] ) + idn? ( >=net-dns/libidn2-0.16-r1[${MULTILIB_USEDEP}] ) abi_x86_32? ( !<=app-emulation/emul-linux-x86-baselibs-20140508 !app-emulation/emul-linux-x86-baselibs[-abi_x86_32(-)] )" DEPEND="${RDEPEND} - >=sys-devel/automake-1.11.6 >=virtual/pkgconfig-0-r1[${MULTILIB_USEDEP}] - doc? ( - sys-apps/texinfo - dev-util/gtk-doc - ) + doc? ( dev-util/gtk-doc ) nls? ( sys-devel/gettext ) - test? ( app-misc/datefudge )" + valgrind? ( dev-util/valgrind ) + test? ( + seccomp? ( sys-libs/libseccomp ) + ) + test-full? ( + guile? ( >=dev-scheme/guile-2 ) + app-crypt/dieharder + app-misc/datefudge + dev-libs/softhsm:2[-bindist] + net-dialup/ppp + net-misc/socat + )" -DOCS=( AUTHORS ChangeLog NEWS README THANKS doc/TODO ) - -PATCHES=( - "${FILESDIR}/${P}-build.patch" +DOCS=( + README.md + doc/certtool.cfg ) +HTML_DOCS=() + pkg_setup() { # bug#520818 export TZ=UTC + + use doc && HTML_DOCS+=( + doc/gnutls.html + ) } src_prepare() { default - sed -i \ - -e 's/imagesdir = $(infodir)/imagesdir = $(htmldir)/' \ - doc/Makefile.am || die - # force regeneration of autogen-ed files local file for file in $(grep -l AutoGen-ed src/*.c) ; do rm src/$(basename ${file} .c).{c,h} || die done - # force regeneration of makeinfo files - # have no idea why on some system these files are not - # accepted as-is, see bug#520818 - for file in $(grep -l "produced by makeinfo" doc/*.info) ; do - rm "${file}" || die - done - - eautoreconf - # Use sane .so versioning on FreeBSD. elibtoolize - - # bug 497472 - use cxx || epunt_cxx } multilib_src_configure() { LINGUAS="${LINGUAS//en/en@boldquot en@quot}" + # remove magic of library detection + # bug#438222 + local libconf=($("${S}/configure" --help | grep -- '--without-.*-prefix' | sed -e 's/^ *\([^ ]*\) .*/\1/g')) + # TPM needs to be tested before being enabled + libconf+=( --without-tpm ) + # hardware-accell is disabled on OSX because the asm files force # GNU-stack (as doesn't support that) and when that's removed ld # complains about duplicate symbols - ECONF_SOURCE=${S} \ - econf \ - --disable-valgrind-tests \ - --without-included-libtasn1 \ - --enable-heartbeat-support \ + [[ ${CHOST} == *-darwin* ]] && libconf+=( --disable-hardware-acceleration ) + + # Cygwin as does not understand these asm files at all + [[ ${CHOST} == *-cygwin* ]] && libconf+=( --disable-hardware-acceleration ) + + ECONF_SOURCE=${S} econf \ + $(multilib_native_enable manpages) \ + $(multilib_native_use_enable doc gtk-doc) \ + $(multilib_native_use_enable doc) \ + $(multilib_native_use_enable guile) \ + $(multilib_native_use_enable seccomp seccomp-tests) \ + $(multilib_native_use_enable test tests) \ + $(multilib_native_use_enable test-full full-test-suite) \ + $(multilib_native_use_enable tools) \ + $(multilib_native_use_enable valgrind valgrind-tests) \ $(use_enable cxx) \ $(use_enable dane libdane) \ - $(multilib_native_enable manpages) \ - $(multilib_native_use_enable tools) \ - $(multilib_native_use_enable doc) \ - $(multilib_native_use_enable doc gtk-doc) \ - $(multilib_native_use_enable guile) \ - $(multilib_native_use_enable test tests) \ $(use_enable nls) \ $(use_enable openssl openssl-compatibility) \ + $(use_enable sslv2 ssl2-support) \ + $(use_enable sslv3 ssl3-support) \ $(use_enable static-libs static) \ + $(use_enable tls-heartbeat heartbeat-support) \ + $(use_with idn) \ $(use_with pkcs11 p11-kit) \ - $(use_with zlib) \ - --without-tpm \ - --with-unbound-root-key-file=/etc/dnssec/root-anchors.txt \ - $([[ ${CHOST} == *-darwin* ]] && echo --disable-hardware-acceleration) + --with-unbound-root-key-file="${EPREFIX}/etc/dnssec/root-anchors.txt" \ + --without-included-libtasn1 \ + "${libconf[@]}" } multilib_src_install_all() { einstalldocs prune_libtool_files --all - dodoc doc/certtool.cfg - - if use doc; then - dohtml doc/gnutls.html - else - rm -fr "${ED}/usr/share/doc/${PF}/html" - fi - if use examples; then docinto examples dodoc doc/examples/*.c diff --git a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/metadata.xml b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/metadata.xml index 615fc411a9..85804ccbea 100644 --- a/sdk_container/src/third_party/portage-stable/net-libs/gnutls/metadata.xml +++ b/sdk_container/src/third_party/portage-stable/net-libs/gnutls/metadata.xml @@ -6,13 +6,13 @@ Crypto - - Build the crywrap TLS proxy service - - + Build libgnutls-dane, implementing DNS-based Authentication of Named Entities. Requires net-dns/unbound + + Enable openpgp support + Build openssl compatibility libraries @@ -22,6 +22,21 @@ Build extra tools + + Enable the Heartbeat Extension in TLS and DTLS + + + Support for the old/insecure SSLv2 protocol + + + Support for the old/insecure SSLv3 protocol + + + Enable full test mode + + + Enable usage of dev-util/valgrind in debug + Reflect ABI compatibility of libgnutls.so