diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index deda4c07d9..ff83b37170 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 540216 BLAKE2B d30aef090eaffb1f3ce91f96dfcc44f7a5d1a954885fba68126dee1aa21a3de740e45dd7106f5d3ba2b51e48eda29870b954e2a90cc8bfa9dc1ac93912daadef SHA512 f9ff42d8d58ea6e6bae5d32f95af7bcddc333ce0478d31cfefb14e85c8d99eaf4d3d9a0802c961e3f7e7d8f3696894cb1d1d0e81db3807d1796858a550f0351f -TIMESTAMP 2023-05-02T07:09:55Z +MANIFEST Manifest.files.gz 546124 BLAKE2B b8c960a7f19f0cac8ea254b9330e3a1add1f4be28ff0a9b4020f5e68f250a6b511280b7dd1dec4e472c73320abae493b0ab8441075c681803abfb19ea280332e SHA512 0dccc4f920463740ab2803f55b50f1cf0df2af9d58750c12c98fe5963dc8738d5a3e8d6a895c2e0d3ba8230bb61557b6e88b4fa56b2f05f5697577b68a9413df +TIMESTAMP 2023-06-01T06:39:42Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmRQt0NfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmR4PS5fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klD2Fg/+P1LHHdbaCtEumGlsgXOdqMgwb2UVJgi8xWWNc2M4awOg8m2yFxf21PnT -hvscMkY3ndOFXn6hzaLCY87lv/725nxEqDoOm3tgL8hf1V6iCJIpokoHqHGr0RhI -kz4uh2wd5g91yTUooLhtCAtWKckTTuqPgne/4NJc3zPeJbpgzlqcgLNP5srFEuTt -TwoTNt99iIwdpHjIRKu4ECZMEikFSmLft0Kc0mXjZnT5BPNOvhaWY26vRT/3ohQl -kekNv1MXHkBlc9AUUJ75VPxVeRtjJ3HKe5GgSg0QNSS+Aisl9bq/VGmWhS5UBcHs -K736CImufTLCLd2WvapwUGT7v4d/bVC/L+BhGnwZV5rTQ0uCaQ71zSB/vVJdsFVd -cE2Yzh/iKFvQw8AgIsrjcMG7xqJhw3/Auzb6/0Q+rQn3Efq0pR/1NMRkWvXCPBiJ -tj4U4X724O/VhVgOBrO+5IKrfQSj+p9KjmuxwQBQenf77MF+XfOleie6dwNQCf4X -5L3b+q+GEvIrGok1+sXYLOoe+hL/RQpbVmk/HpSqSGR92pCe/DLYxUSp64k0rtaS -CA9BKn5cV0FFd/jTBGckoV2hoF/HsE/vg3qYxvoOy/PN3e+gSa/ZT6GMsCJgHK3U -/AQ2NC8/dHPAW3wU/lonCqTPt03xUq/D1Ed0/NZ7kNovux+kGJ0= -=1Hre +klAHGBAAhvLOFASJCw4R2lcPucKmYekFuZsNeQc6k51XTfI+eeP6fNiLV6nxCDxK +l/Swjoa1ynWIq9W09NsRHlfvX4x7f9k5A/F6b7JRCNbN60T7q4jOmuakaZrR9v88 +0c3xKeaIS2J9KGiIBcioyXsMTSFexZbt2Ts/goUyca3KJUsX/fit6SnY8gI3Bmb3 ++aDc8VLbqX2kNsfCBWQNtMJmytrdzTqr1BeQmaTxYrLGuX52jHU3ecGFcF3tBYLV +PBMTQfE4klf4qAcXWpOCpsa5RFtXolq/UkE43FoO8BUqHhkhc5OL4OjTeE9q6wc5 +Mcxg77Br7q5aWZZcR5rRwHj9LgVP8H78FmgdCY0RhGHg6EZ5eZNp+6OtzCkwI6et +n6z5rqSdER/1Z5vRPgmYgQ1i718XKiEkCQeTJraMD6AWJAjNTtu9eJA9Kz0Mplk+ +KV0ibpIr87aOxAs/FyCn5XibLSw3tAjMlalldpervMM9N4imzHdiHkVVCURCUAFM +TP4cq4B0QGTl+OUk83KQCo5LaKICd0YyB7dPETlMVMyl7RFdok4NxlS5LWTYFpOa +fook5SuScNiA/U+iNguBqizJiNYsWzm2lBooiZjhXeMSKMtdsZiqLMULyd++Xbwb +ajHbRoolz7wfTLtOXJtmsO1ELTs7K8jlmzGzbQAVH3rG9oyVAgY= +=SDuX -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index a630e1c41e..b00ee056dd 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-07.xml index 045ffe019c..c642e5c2ff 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-07.xml @@ -5,13 +5,13 @@ An integer overflow vulnerability has been found in sysstat which could result in arbitrary code execution. sysstat 2022-11-22 - 2022-11-22 + 2023-05-29 880543 local - 12.7.1 - 12.7.1 + 12.6.2-r1 + 12.6.2-r1 @@ -31,7 +31,7 @@ # emerge --sync - # emerge --ask --oneshot --verbose ">=app-admin/sysstat-12.7.1" + # emerge --ask --oneshot --verbose ">=app-admin/sysstat-12.6.2-r1" @@ -39,4 +39,4 @@ ajak ajak - \ No newline at end of file + diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-01.xml new file mode 100644 index 0000000000..3edf350cf5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-01.xml @@ -0,0 +1,52 @@ + + + + AtomicParsley: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in AtomicParsley, the worst of which could result in arbitrary code execution. + atomicparsley,atomicparsley-wez + 2023-05-03 + 2023-05-03 + 806845 + remote + + + 0.9.6_p20210715_p151551 + 0.9.6_p20210715_p151551 + + + 0.9.6 + + + +

AtomicParsley is a command line program for manipulating iTunes-style metadata in MPEG4 files.

+
+ +

Multiple vulnerabilities have been discovered in AtomicParsley. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

Users can pass only trusted input to AtomicParsley.

+
+ +

Previously, the "wez" AtomicParsley fork was packaged in Gentoo as media-video/atomicparsley-wez. This fork is now packaged as media-video/atomicparsley, so users of the fork's package should now depclean it:

+ + + # emerge --ask --depclean "media-video/atomicparsley-wez" + + +

All AtomicParsley users should upgrade to the latest version, which is a packaging of the "wez" AtomicParsley fork:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/atomicparsley-0.9.6_p20210715_p151551" + +
+ + CVE-2021-37231 + CVE-2021-37232 + + ajak + sam +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-02.xml new file mode 100644 index 0000000000..8683f8757b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-02.xml @@ -0,0 +1,107 @@ + + + + Python, PyPy3: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Python and PyPy, the worst of which could result in arbitrary code execution. + pypy3,python + 2023-05-03 + 2023-05-03 + 880629 + 878385 + 877851 + 876815 + 864747 + 838250 + 835443 + 834533 + 787260 + 811165 + 793833 + local and remote + + + 3.8.15_p3 + 3.9.15_p3 + 3.10.8_p3 + 3.11.0_p2 + 3.12.0_alpha1_p2 + 3.8.15_p3 + 3.9.15_p3 + 3.10.8_p3 + 3.11.0_p2 + 3.12.0_alpha1_p2 + + + 7.3.9_p9 + 7.3.9_p9 + + + +

Python is an interpreted, interactive, object-oriented, cross-platform programming language.

+
+ +

Multiple vulnerabilities have been discovered in Python and PyPy3. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Python 3.8 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/python-3.8.15_p3:3.8" + + +

All Python 3.9 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/python-3.9.15_p3:3.9" + + +

All Python 3.10 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/python-3.10.8_p3:3.10" + + +

All Python 3.11 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/python-3.11.0_p2:3.11" + + +

All Python 3.12 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/python-3.12.0_alpha1_p2" + + +

All PyPy3 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/pypy3-7.3.9_p9" + +
+ + CVE-2015-20107 + CVE-2021-3654 + CVE-2021-28363 + CVE-2021-28861 + CVE-2021-29921 + CVE-2022-0391 + CVE-2022-37454 + CVE-2022-42919 + CVE-2022-45061 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-03.xml new file mode 100644 index 0000000000..256ecb1d9a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-03.xml @@ -0,0 +1,42 @@ + + + + ProFTPd: Memory Disclosure + A vulnerability has been discovered in ProFTPd which could result in memory disclosure. + proftpd + 2023-05-03 + 2023-05-03 + 811495 + remote + + + 1.3.7c + 1.3.7c + + + +

ProFTPD is an advanced and very configurable FTP server.

+
+ +

ProFTPd unconditionally sends passwords to Radius servers for authentication in multiples of 16 bytes. If a password is not of a length that is a multiple of 16 bytes, ProFTPd will read beyond the end of the password string and send bytes beyond the end of the string buffer.

+
+ +

Radius servers used for authentication can receive the contents of the ProFTPd process' memory.

+
+ +

There is no known workaround at this time.

+
+ +

All ProFTPd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.7c" + +
+ + CVE-2021-46854 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-04.xml new file mode 100644 index 0000000000..b5937284e3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-04.xml @@ -0,0 +1,43 @@ + + + + dbus-broker: Multiple Vulnerabilities + Multiple vulnerabilities have been found in dbus-broker, the worst of which could result in denial of service. + dbus-broker + 2023-05-03 + 2023-05-03 + 851696 + remote + + + 31 + 31 + + + +

dbus-broker is a Linux D-Bus message broker.

+
+ +

Multiple vulnerabilities have been discovered in dbus-broker. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All dbus-broker users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/dbus-broker-31" + +
+ + CVE-2022-31212 + CVE-2022-31213 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-05.xml new file mode 100644 index 0000000000..d03be8aaa8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-05.xml @@ -0,0 +1,42 @@ + + + + xfce4-settings: Browser Argument Injection + A vulnerability has been discovered in xfce4-settings which could result in universal cross site scripting ("uXSS"). + xfce4-settings + 2023-05-03 + 2023-05-03 + 880257 + remote + + + 4.17.1 + 4.17.1 + + + +

xfce4-settings contains the configuration system for the Xfce desktop environment.

+
+ +

xfce4-settings does not sufficiently sanitize URLs opened via xdg4-mime-helper-tool (which is called when a user clicks a link in e.g. Firefox).

+
+ +

The vulnerability can be leveraged into 1-click universal cross site scripting in some browsers, or potentially other unspecified impact.

+
+ +

There is no known workaround at this time.

+
+ +

All xfce4-settings users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=xfce-base/xfce4-settings-4.17.1" + +
+ + CVE-2022-45062 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-06.xml new file mode 100644 index 0000000000..1f1a927ee3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-06.xml @@ -0,0 +1,92 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. + firefox,firefox-bin + 2023-05-03 + 2023-05-03 + 885813 + 891213 + remote + + + 102.7.0 + 109.0 + 102.7.0 + 109.0 + + + 102.7.0 + 109.0 + 102.7.0 + 109.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-102.7.0:esr" + + +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-102.7.0:esr" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-109.0:rapid" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-109.0:rapid" + +
+ + CVE-2022-46871 + CVE-2022-46872 + CVE-2022-46873 + CVE-2022-46874 + CVE-2022-46875 + CVE-2022-46877 + CVE-2022-46878 + CVE-2022-46879 + CVE-2022-46880 + CVE-2022-46881 + CVE-2022-46882 + CVE-2023-23597 + CVE-2023-23598 + CVE-2023-23599 + CVE-2023-23600 + CVE-2023-23601 + CVE-2023-23602 + CVE-2023-23603 + CVE-2023-23604 + CVE-2023-23605 + CVE-2023-23606 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-07.xml new file mode 100644 index 0000000000..ea0624a6d1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-07.xml @@ -0,0 +1,42 @@ + + + + slixmpp: Insufficient Certificate Validation + A vulnerability has been discovered in slixmpp which can result in successful man-in-the-middle attacks. + slixmpp + 2023-05-03 + 2023-05-03 + 881181 + remote + + + 1.8.3 + 1.8.3 + + + +

slixmpp is a Python 3 library for XMPP.

+
+ +

slixmpp does not validate hostnames in certificates used by connected servers.

+
+ +

An attacker could perform a man-in-the-middle attack on users' connections to servers with slixmpp.

+
+ +

There is no known workaround at this time.

+
+ +

All slixmpp users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --upgrade --verbose ">=dev-python/slixmpp-1.8.3" + +
+ + CVE-2022-45197 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-08.xml new file mode 100644 index 0000000000..4bc05bd570 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-08.xml @@ -0,0 +1,44 @@ + + + + D-Bus: Multiple Vulnerabilities + Multiple vulnerabilities have been found in D-Bus, the worst of which could result in denial of service. + dbus + 2023-05-03 + 2023-05-03 + 875518 + remote + + + 1.14.4 + 1.14.4 + + + +

D-Bus is a daemon providing a framework for applications to communicate with one another.

+
+ +

Multiple vulnerabilities have been discovered in D-Bus. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All D-Bus users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/dbus-1.14.4" + +
+ + CVE-2022-42010 + CVE-2022-42011 + CVE-2022-42012 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-09.xml new file mode 100644 index 0000000000..9bf31f312e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-09.xml @@ -0,0 +1,42 @@ + + + + syslog-ng: Denial of Service + A denial of service vulnerability was discovered in rsyslog related to syslog input over the network. + syslog-ng + 2023-05-03 + 2023-05-03 + 891941 + remote + + + 3.38.1 + 3.38.1 + + + +

syslog replacement with advanced filtering features.

+
+ +

An integer overflow in the RFC3164 parser allows remote attackers to cause a denial of service via crafted syslog input that is mishandled by the tcp or network function.

+
+ +

Attackers with access to input syslogs over syslog-ng's network functionality can cause a denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All syslog-ng users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/syslog-ng-3.38.1" + +
+ + CVE-2022-38725 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-10.xml new file mode 100644 index 0000000000..02f988fa36 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-10.xml @@ -0,0 +1,143 @@ + + + + Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. + chromium,chromium-bin,google-chrome,microsoft-edge + 2023-05-03 + 2023-05-03 + 876855 + 878825 + 883031 + 883697 + 885851 + 890726 + 886479 + 890728 + 891501 + 891503 + remote + + + 109.0.5414.74-r1 + 109.0.5414.74-r1 + + + 109.0.5414.74 + 109.0.5414.74 + + + 109.0.5414.74 + 109.0.5414.74 + + + 109.0.1518.61 + 109.0.1518.61 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. + +Google Chrome is one fast, simple, and secure browser for all your devices. + +Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium, Google Chrome, Microsoft Edge. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-109.0.5414.74-r1" + + +

All Chromium binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-bin-109.0.5414.74" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-109.0.5414.74" + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-109.0.1518.61" + +
+ + CVE-2022-3445 + CVE-2022-3446 + CVE-2022-3447 + CVE-2022-3448 + CVE-2022-3449 + CVE-2022-3450 + CVE-2022-3723 + CVE-2022-4135 + CVE-2022-4174 + CVE-2022-4175 + CVE-2022-4176 + CVE-2022-4177 + CVE-2022-4178 + CVE-2022-4179 + CVE-2022-4180 + CVE-2022-4181 + CVE-2022-4182 + CVE-2022-4183 + CVE-2022-4184 + CVE-2022-4185 + CVE-2022-4186 + CVE-2022-4187 + CVE-2022-4188 + CVE-2022-4189 + CVE-2022-4190 + CVE-2022-4191 + CVE-2022-4192 + CVE-2022-4193 + CVE-2022-4194 + CVE-2022-4195 + CVE-2022-4436 + CVE-2022-4437 + CVE-2022-4438 + CVE-2022-4439 + CVE-2022-4440 + CVE-2022-41115 + CVE-2022-44688 + CVE-2022-44708 + CVE-2023-0128 + CVE-2023-0129 + CVE-2023-0130 + CVE-2023-0131 + CVE-2023-0132 + CVE-2023-0133 + CVE-2023-0134 + CVE-2023-0135 + CVE-2023-0136 + CVE-2023-0137 + CVE-2023-0138 + CVE-2023-0139 + CVE-2023-0140 + CVE-2023-0141 + CVE-2023-21719 + CVE-2023-21775 + CVE-2023-21795 + CVE-2023-21796 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-11.xml new file mode 100644 index 0000000000..5b7a54c72d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-11.xml @@ -0,0 +1,49 @@ + + + + Tor: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Tor, the worst of which could result in denial of service. + tor + 2023-05-03 + 2023-05-03 + 808681 + 852821 + 890618 + remote + + + 0.4.7.13 + 0.4.7.13 + + + +

Tor is an implementation of second generation Onion Routing, a connection-oriented anonymizing communication service.

+
+ +

Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Tor users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-vpn/tor-0.4.7.13" + +
+ + CVE-2021-38385 + CVE-2022-33903 + CVE-2023-23589 + TROVE-2021-007 + TROVE-2022-001 + TROVE-2022-002 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-12.xml new file mode 100644 index 0000000000..4522165ae5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-12.xml @@ -0,0 +1,42 @@ + + + + sudo: Root Privilege Escalation + A vulnerability has been discovered in sudo which could result in root privilege escalation. + sudo + 2023-05-03 + 2023-05-03 + 891335 + remote + + + 1.9.12_p2 + 1.9.12_p2 + + + +

sudo allows a system administrator to give users the ability to run commands as other users.

+
+ +

The sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process.

+
+ +

The improper processing of user's environment variables could lead to the editing of arbitrary files as root, potentially leading to root privilege escalation.

+
+ +

There is no known workaround at this time.

+
+ +

All sudo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.9.12_p2" + +
+ + CVE-2023-22809 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-13.xml new file mode 100644 index 0000000000..31de2ec7a1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-13.xml @@ -0,0 +1,68 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. + thunderbird,thunderbird-bin + 2023-05-03 + 2023-05-03 + 885815 + 891217 + remote + + + 102.7.0 + 102.7.0 + + + 102.7.0 + 102.7.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.7.0" + + +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.7.0" + +
+ + CVE-2022-46871 + CVE-2022-46872 + CVE-2022-46874 + CVE-2022-46875 + CVE-2022-46877 + CVE-2022-46878 + CVE-2022-46880 + CVE-2022-46881 + CVE-2022-46882 + CVE-2023-23598 + CVE-2023-23599 + CVE-2023-23601 + CVE-2023-23602 + CVE-2023-23603 + CVE-2023-23605 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-14.xml new file mode 100644 index 0000000000..f42e1eb0ac --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-14.xml @@ -0,0 +1,42 @@ + + + + uptimed: Root Privilege Escalation + A vulnerability has been discovered in uptimed which could result in root privilege escalation. + uptimed + 2023-05-03 + 2023-05-03 + 630810 + remote + + + 0.4.6-r1 + 0.4.6-r1 + + + +

uptimed is a system uptime record daemon that keeps track of your highest uptimes.

+
+ +

Via unnecessary file ownership modifications in the pkg_postinst ebuild phase, the uptimed user could change arbitrary files to be owned by the uptimed user at emerge-time.

+
+ +

The uptimed user could achieve root privileges when the uptimed package is emerged.

+
+ +

There is no known workaround at this time.

+
+ +

All uptimed users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-misc/uptimed-0.4.6-r1" + +
+ + CVE-2020-36657 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-15.xml new file mode 100644 index 0000000000..fe69020612 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-15.xml @@ -0,0 +1,68 @@ + + + + systemd: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in systemd, the worst of which could result in denial of service. + systemd,systemd-tmpfiles,systemd-utils,udev + 2023-05-03 + 2023-05-03 + 880547 + 830967 + remote + + + 251.3 + 251.3 + + + 250 + + + 251.3 + 251.3 + + + 250 + + + +

A system and service manager.

+
+ +

Multiple vulnerabilities have been discovered in systemd. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All systemd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/systemd-251.3" + + +

All systemd-utils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/systemd-utils-251.3" + + +

Gentoo has discontinued support for sys-apps/systemd-tmpfiles, sys-boot/systemd-boot, and sys-fs/udev. See the 2022-04-19-systemd-utils news item. Users should unmerge it in favor of sys-apps/systemd-utils on non-systemd systems:

+ + + # emerge --ask --depclean --verbose "sys-apps/systemd-tmpfiles" "sys-boot/systemd-boot" "sys-fs/udev" + # emerge --ask --verbose --oneshot ">=sys-apps/systemd-utils-251.3" + +
+ + CVE-2021-3997 + CVE-2022-3821 + + ajak + sam +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-16.xml new file mode 100644 index 0000000000..4f71e42cd3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-16.xml @@ -0,0 +1,155 @@ + + + + Vim, gVim: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Vim, the worst of which could result in denial of service. + gvim,vim,vim-core + 2023-05-03 + 2023-05-03 + 851231 + 861092 + 869359 + 879257 + 883681 + 889730 + remote + + + 9.0.1157 + 9.0.1157 + + + 9.0.1157 + 9.0.1157 + + + 9.0.1157 + 9.0.1157 + + + +

Vim is an efficient, highly configurable improved version of the classic ‘vi’ text editor. gVim is the GUI version of Vim.

+
+ +

Multiple vulnerabilities have been discovered in Vim, gVim. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Vim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/vim-9.0.1157" + + +

All gVim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/gvim-9.0.1157" + + +

All vim-core users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.0.1157" + +
+ + CVE-2022-1154 + CVE-2022-1160 + CVE-2022-1381 + CVE-2022-1420 + CVE-2022-1616 + CVE-2022-1619 + CVE-2022-1620 + CVE-2022-1621 + CVE-2022-1629 + CVE-2022-1674 + CVE-2022-1720 + CVE-2022-1725 + CVE-2022-1733 + CVE-2022-1735 + CVE-2022-1769 + CVE-2022-1771 + CVE-2022-1785 + CVE-2022-1796 + CVE-2022-1851 + CVE-2022-1886 + CVE-2022-1897 + CVE-2022-1898 + CVE-2022-1927 + CVE-2022-1942 + CVE-2022-1968 + CVE-2022-2000 + CVE-2022-2042 + CVE-2022-2124 + CVE-2022-2125 + CVE-2022-2126 + CVE-2022-2129 + CVE-2022-2175 + CVE-2022-2182 + CVE-2022-2183 + CVE-2022-2206 + CVE-2022-2207 + CVE-2022-2208 + CVE-2022-2210 + CVE-2022-2231 + CVE-2022-2257 + CVE-2022-2264 + CVE-2022-2284 + CVE-2022-2285 + CVE-2022-2286 + CVE-2022-2287 + CVE-2022-2288 + CVE-2022-2289 + CVE-2022-2304 + CVE-2022-2343 + CVE-2022-2344 + CVE-2022-2345 + CVE-2022-2522 + CVE-2022-2816 + CVE-2022-2817 + CVE-2022-2819 + CVE-2022-2845 + CVE-2022-2849 + CVE-2022-2862 + CVE-2022-2874 + CVE-2022-2889 + CVE-2022-2923 + CVE-2022-2946 + CVE-2022-2980 + CVE-2022-2982 + CVE-2022-3016 + CVE-2022-3099 + CVE-2022-3134 + CVE-2022-3153 + CVE-2022-3234 + CVE-2022-3235 + CVE-2022-3256 + CVE-2022-3278 + CVE-2022-3296 + CVE-2022-3297 + CVE-2022-3324 + CVE-2022-3352 + CVE-2022-3491 + CVE-2022-3520 + CVE-2022-3591 + CVE-2022-3705 + CVE-2022-4141 + CVE-2022-4292 + CVE-2022-4293 + CVE-2022-47024 + CVE-2023-0049 + CVE-2023-0051 + CVE-2023-0054 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-17.xml new file mode 100644 index 0000000000..579fc43f15 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-17.xml @@ -0,0 +1,56 @@ + + + + libsdl: Multiple Vulnerabilities + Multiple vulnerabilities have been found in libsdl, the worst of which could result in arbitrary code execution. + libsdl + 2023-05-03 + 2023-05-03 + 692388 + 836665 + 861809 + remote + + + 1.2.15_p20221201 + 1.2.15_p20221201 + + + +

Simple DirectMedia Layer is a cross-platform development library designed to provide low level access to audio, keyboard, mouse, joystick, and graphics hardware via OpenGL and Direct3D.

+
+ +

Multiple vulnerabilities have been discovered in SDL. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libsdl users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libsdl-1.2.15_p20221201" + +
+ + CVE-2019-7572 + CVE-2019-7573 + CVE-2019-7574 + CVE-2019-7575 + CVE-2019-7576 + CVE-2019-7577 + CVE-2019-7578 + CVE-2019-7635 + CVE-2019-7636 + CVE-2019-7638 + CVE-2019-13616 + CVE-2021-33657 + CVE-2022-34568 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-18.xml new file mode 100644 index 0000000000..8a572e5fec --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-18.xml @@ -0,0 +1,44 @@ + + + + libsdl2: Multiple Vulnerabilities + Multiple vulnerabilities have been found in libsdl2, the worst of which could result in arbitrary code execution. + libsdl2 + 2023-05-03 + 2023-05-03 + 836665 + 890614 + remote + + + 2.26.0 + 2.26.0 + + + +

Simple DirectMedia Layer is a cross-platform development library designed to provide low level access to audio, keyboard, mouse, joystick, and graphics hardware via OpenGL and Direct3D.

+
+ +

Multiple vulnerabilities have been discovered in libsdl2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libsdl2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libsdl2-2.26.0" + +
+ + CVE-2021-33657 + CVE-2022-4743 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-19.xml new file mode 100644 index 0000000000..52d2b681f6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-19.xml @@ -0,0 +1,51 @@ + + + + Firejail: Local Privilege Escalation + A vulnerability has been discovered in Firejail which could result in local root privilege escalation. + firejail,firejail-lts + 2023-05-03 + 2023-05-03 + 850748 + remote + + + 0.9.70 + 0.9.70 + + + 0.9.56.2-r1 + + + +

A SUID program that reduces the risk of security breaches by restricting the running environment of untrusted applications using Linux namespaces and seccomp-bpf.

+
+ +

Firejail does not sufficiently validate the user's environment prior to using it as the root user when using the --join command line option.

+
+ +

An unprivileged user can exploit this vulnerability to achieve local root privileges.

+
+ +

System administrators can mitigate this vulnerability via adding either "force-nonewprivs yes" or "join no" to the Firejail configuration file in /etc/firejail/firejail.config.

+
+ +

Gentoo has discontinued support for sys-apps/firejail-lts. Users should unmerge it in favor of sys-apps/firejail:

+ + + # emerge --ask --depclean --verbose "sys-apps/firejail-lts" + # emerge --ask --verbose "sys-apps/firejail" + + +

All Firejail users should upgrade to the latest version:

+ + + # emerge --ask --oneshot --verbose ">=sys-apps/firejail-0.9.70" + +
+ + CVE-2022-31214 + + ajak + sam +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-20.xml new file mode 100644 index 0000000000..2b7cf1b8d5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-20.xml @@ -0,0 +1,42 @@ + + + + libapreq2: Buffer Overflow + A buffer overflow vulnerability has been discovered in libapreq2 which could result in denial of service. + libapreq2 + 2023-05-03 + 2023-05-03 + 866536 + remote + + + 2.17 + 2.17 + + + +

libapreq is a shared library with associated modules for manipulating client request data via the Apache API.

+
+ +

A buffer overflow could occur when processing multipart form uploads.

+
+ +

An attacker could submit a crafted multipart form to trigger the buffer overflow and cause a denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All libapreq2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apache/libapreq2-2.17" + +
+ + CVE-2022-22728 + + ajak + sam +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-21.xml new file mode 100644 index 0000000000..2fff2cab64 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-21.xml @@ -0,0 +1,42 @@ + + + + Cairo: Buffer Overflow Vulnerability + A buffer overflow vulnerability has been discovered in Cairo which could result in denial of service. + cairo + 2023-05-03 + 2023-05-03 + 777123 + remote + + + 1.17.6 + 1.17.6 + + + +

Cairo is a 2D vector graphics library with cross-device output support.

+
+ +

An attacker with the ability to provide input to Cairo's image-compositor can cause a buffer overwrite.

+
+ +

Malicious input to Cairo's image-compositor can result in denial of service of the application using such Cairo functionality.

+
+ +

There is no known workaround at this time.

+
+ +

All Cairo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/cairo-1.17.6" + +
+ + CVE-2020-35492 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-22.xml new file mode 100644 index 0000000000..7498701d25 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-22.xml @@ -0,0 +1,45 @@ + + + + ISC DHCP: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in ISC DHCP, the worst of which could result in denial of service. + dhcp + 2023-05-03 + 2023-05-03 + 875521 + 792324 + remote + + + 4.4.3_p1 + 4.4.3_p1 + + + +

ISC DHCP is ISC's reference implementation of all aspects of the Dynamic Host Configuration Protocol.

+
+ +

Multiple vulnerabilities have been discovered in ISC DHCP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All ISC DHCP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/dhcp-4.4.3_p1" + +
+ + CVE-2021-25217 + CVE-2022-2928 + CVE-2022-2929 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-23.xml new file mode 100644 index 0000000000..e86eb729ad --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-23.xml @@ -0,0 +1,65 @@ + + + + Lua: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Lua, the worst of which could result in arbitrary code execution. + lua + 2023-05-03 + 2023-05-03 + 837521 + 831053 + 520480 + remote + + + 5.4.4-r103 + 5.2.3 + 5.1.5-r200 + 5.4.4-r103 + 5.2.3 + 5.1.5-r200 + 5.1.5-r4 + + + +

Lua is a powerful, efficient, lightweight, embeddable scripting language. It supports procedural programming, object-oriented programming, functional programming, data-driven programming, and data description.

+
+ +

Multiple vulnerabilities have been discovered in Lua. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Lua 5.1 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/lua-5.1.5-r200" + + +

All Lua 5.3 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/lua-5.2.3" + + +

All Lua 5.4 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/lua-5.4.4-r103" + +
+ + CVE-2014-5461 + CVE-2021-44647 + CVE-2022-28805 + + ajak + sam +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-24.xml new file mode 100644 index 0000000000..26691b0291 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-24.xml @@ -0,0 +1,67 @@ + + + + MediaWiki: Multiple Vulnerabilities + Multiple vulnerabilities have been found in MediaWiki, the worst of which could result in denial of service. + mediawiki + 2023-05-21 + 2023-05-21 + 815376 + 829302 + 836430 + 855965 + 873385 + 888041 + remote + + + 1.38.5 + 1.38.5 + + + +

MediaWiki is a collaborative editing software, used by big projects like Wikipedia.

+
+ +

Multiple vulnerabilities have been discovered in MediaWiki. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All MediaWiki users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apps/mediawiki-1.38.5" + +
+ + CVE-2021-41798 + CVE-2021-41799 + CVE-2021-41800 + CVE-2021-44854 + CVE-2021-44855 + CVE-2021-44856 + CVE-2021-44857 + CVE-2021-44858 + CVE-2021-45038 + CVE-2022-28202 + CVE-2022-28205 + CVE-2022-28206 + CVE-2022-28209 + CVE-2022-31090 + CVE-2022-31091 + CVE-2022-34911 + CVE-2022-34912 + CVE-2022-41765 + CVE-2022-41766 + CVE-2022-41767 + CVE-2022-47927 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-25.xml new file mode 100644 index 0000000000..c4eecf0252 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-25.xml @@ -0,0 +1,47 @@ + + + + OWASP ModSecurity Core Rule Set: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in ModSecurity Core Rule Set, the worst of which could result in bypassing the WAF. + modsecurity-crs + 2023-05-21 + 2023-05-21 + 822003 + 872077 + remote + + + 3.3.4 + 3.3.4 + + + +

Modsecurity Core Rule Set is the OWASP ModSecurity Core Rule Set.

+
+ +

Multiple vulnerabilities have been discovered in OWASP ModSecurity Core Rule Set. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OWASP ModSecurity Core Rule Set users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apache/modsecurity-crs-3.3.4" + +
+ + CVE-2021-35368 + CVE-2022-39955 + CVE-2022-39956 + CVE-2022-39957 + CVE-2022-39958 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-26.xml new file mode 100644 index 0000000000..2d1baf019b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-26.xml @@ -0,0 +1,48 @@ + + + + LibreCAD: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in LibreCAD, the worst of which could result in denial of service. + librecad + 2023-05-21 + 2023-05-21 + 825362 + 832210 + remote + + + 2.1.3-r7 + 2.1.3-r7 + + + +

LibreCAD is a generic 2D CAD program.

+
+ +

Multiple vulnerabilities have been discovered in LibreCAD. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All LibreCAD users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/librecad-2.1.3-r7" + +
+ + CVE-2021-21898 + CVE-2021-21899 + CVE-2021-21900 + CVE-2021-45341 + CVE-2021-45342 + CVE-2021-45343 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-27.xml new file mode 100644 index 0000000000..4880ff970c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-27.xml @@ -0,0 +1,42 @@ + + + + Tinyproxy: Memory Disclosure + A vulnerability has been discovered in Tinyproxy which could be used to achieve memory disclosure. + tinyproxy + 2023-05-21 + 2023-05-21 + 871924 + remote + + + 1.11.1_p20220908 + 1.11.1_p20220908 + + + +

Tinyproxy is a light-weight HTTP/HTTPS proxy daemon for POSIX operating systems.

+
+ +

Tinyproxy's request processing does not sufficiently null-initialize variables used in error pages.

+
+ +

Contents of the Tinyproxy server's memory could be disclosed via generated error pages.

+
+ +

There is no known workaround at this time.

+
+ +

All Tinyproxy users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-proxy/tinyproxy-1.11.1_p20220908" + +
+ + CVE-2022-40468 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-28.xml new file mode 100644 index 0000000000..a49a0f6107 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-28.xml @@ -0,0 +1,47 @@ + + + + snakeyaml: Multiple Vulnerabilities + Multiple vulnerabilities have been found in snakeyaml, the worst of which could result in denial of service. + snakeyaml + 2023-05-21 + 2023-05-21 + 776796 + 868621 + remote + + + 1.33 + 1.33 + + + +

snakeyaml is a YAML 1.1 parser and emitter for Java.

+
+ +

Multiple vulnerabilities have been discovered in snakeyaml. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All snakeyaml users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/snakeyaml-1.33" + +
+ + CVE-2017-18640 + CVE-2022-38749 + CVE-2022-38750 + CVE-2022-38751 + CVE-2022-38752 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-29.xml new file mode 100644 index 0000000000..7e7de5c334 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-29.xml @@ -0,0 +1,44 @@ + + + + squashfs-tools: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in squashfs-tools, the worst of which can result in an arbitrary file write. + squashfs-tools + 2023-05-30 + 2023-05-30 + 810706 + 813654 + remote + + + 4.5_p20210914 + 4.5_p20210914 + + + +

Squashfs is a compressed read-only filesystem for Linux. Squashfs is intended for general read-only filesystem use, for archival use (i.e. in cases where a .tar.gz file may be used), and in constrained block device/memory systems (e.g. embedded systems) where low overhead is needed.

+
+ +

Multiple vulnerabilities have been discovered in squashfs-tools. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All squashfs-tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-fs/squashfs-tools-4.5_p20210914" + +
+ + CVE-2021-40153 + CVE-2021-41072 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-30.xml new file mode 100644 index 0000000000..502bd0aefb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-30.xml @@ -0,0 +1,73 @@ + + + + X.Org X server, XWayland: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution. + xorg-server,xwayland + 2023-05-30 + 2023-05-30 + 829208 + 877459 + 885825 + 893438 + 903547 + remote + + + 21.1.8 + 21.1.8 + + + 23.1.1 + 23.1.1 + + + +

The X Window System is a graphical windowing system based on a client/server model.

+
+ +

Multiple vulnerabilities have been discovered in X.Org X server, XWayland. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All X.Org X server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-21.1.8" + + +

All XWayland users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xwayland-23.1.1" + +
+ + CVE-2021-4008 + CVE-2021-4009 + CVE-2021-4010 + CVE-2021-4011 + CVE-2022-3550 + CVE-2022-3551 + CVE-2022-3553 + CVE-2022-4283 + CVE-2022-46283 + CVE-2022-46340 + CVE-2022-46341 + CVE-2022-46342 + CVE-2022-46343 + CVE-2022-46344 + CVE-2023-0494 + CVE-2023-1393 + ZDI-CAN-19596 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-31.xml new file mode 100644 index 0000000000..6a035f95e1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-31.xml @@ -0,0 +1,53 @@ + + + + LibTIFF: Multiple Vulnerabilities + Multiple vulnerabilities have been found in LibTIFF, the worst of which could result in arbitrary code execution. + tiff + 2023-05-30 + 2023-05-30 + 891839 + 895900 + remote + + + 4.5.0-r2 + 4.5.0-r2 + + + +

LibTIFF provides support for reading and manipulating TIFF (Tagged Image File Format) images.

+
+ +

Multiple vulnerabilities have been discovered in LibTIFF. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All LibTIFF users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.5.0-r2" + +
+ + CVE-2022-48281 + CVE-2023-0795 + CVE-2023-0796 + CVE-2023-0797 + CVE-2023-0798 + CVE-2023-0799 + CVE-2023-0800 + CVE-2023-0801 + CVE-2023-0802 + CVE-2023-0803 + CVE-2023-0804 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-32.xml new file mode 100644 index 0000000000..c5c8459f06 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-32.xml @@ -0,0 +1,80 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in arbitrary code execution. + webkit-gtk + 2023-05-30 + 2023-05-30 + 871732 + 879571 + 888563 + 905346 + 905349 + 905351 + remote + + + 2.40.1 + 2.40.1 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.40.1" + +
+ + CVE-2022-32885 + CVE-2022-32886 + CVE-2022-32888 + CVE-2022-32891 + CVE-2022-32923 + CVE-2022-42799 + CVE-2022-42823 + CVE-2022-42824 + CVE-2022-42826 + CVE-2022-42852 + CVE-2022-42856 + CVE-2022-42863 + CVE-2022-42867 + CVE-2022-46691 + CVE-2022-46692 + CVE-2022-46698 + CVE-2022-46699 + CVE-2022-46700 + CVE-2023-23517 + CVE-2023-23518 + CVE-2023-23529 + CVE-2023-25358 + CVE-2023-25360 + CVE-2023-25361 + CVE-2023-25362 + CVE-2023-25363 + CVE-2023-27932 + CVE-2023-27954 + CVE-2023-28205 + WSA-2022-0009 + WSA-2022-0010 + WSA-2023-0001 + WSA-2023-0002 + WSA-2023-0003 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-33.xml new file mode 100644 index 0000000000..a4f315de27 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-33.xml @@ -0,0 +1,85 @@ + + + + OpenImageIO: Multiple Vulnerabilities + Multiple vulnerabilities have been found in OpenImageIO, the worst of which could result in arbitrary code execution. + openimageio + 2023-05-30 + 2023-05-30 + 879255 + 884085 + 888045 + remote + + + 2.4.6.0 + 2.4.6.0 + + + +

OpenImageIO is a library for reading and writing images.

+
+ +

Multiple vulnerabilities have been discovered in OpenImageIO. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenImageIO users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/openimageio-2.4.6.0" + +
+ + CVE-2022-4198 + CVE-2022-36354 + CVE-2022-38143 + CVE-2022-41639 + CVE-2022-41649 + CVE-2022-41684 + CVE-2022-41794 + CVE-2022-41837 + CVE-2022-41838 + CVE-2022-41977 + CVE-2022-41981 + CVE-2022-41988 + CVE-2022-41999 + CVE-2022-43592 + CVE-2022-43593 + CVE-2022-43594 + CVE-2022-43595 + CVE-2022-43596 + CVE-2022-43597 + CVE-2022-43598 + CVE-2022-43599 + CVE-2022-43600 + CVE-2022-43601 + CVE-2022-43602 + CVE-2022-43603 + TALOS-2022-1626 + TALOS-2022-1627 + TALOS-2022-1628 + TALOS-2022-1629 + TALOS-2022-1630 + TALOS-2022-1632 + TALOS-2022-1633 + TALOS-2022-1634 + TALOS-2022-1635 + TALOS-2022-1643 + TALOS-2022-1651 + TALOS-2022-1652 + TALOS-2022-1653 + TALOS-2022-1654 + TALOS-2022-1655 + TALOS-2022-1656 + TALOS-2022-1657 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-34.xml new file mode 100644 index 0000000000..602cbbcbd7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-34.xml @@ -0,0 +1,85 @@ + + + + CGAL: Multiple Vulnerabilities + Multiple vulnerabilities have been found in CGAL, the worst of which could result in arbitrary code execution. + cgal + 2023-05-30 + 2023-05-30 + 774261 + remote + + + 5.4.1 + 5.4.1 + + + +

CGAL is a C++ library for geometric algorithms and data structures.

+
+ +

Multiple vulnerabilities have been discovered in CGAL. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All CGAL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sci-mathematics/cgal-5.4.1" + +
+ + CVE-2020-28601 + CVE-2020-28602 + CVE-2020-28603 + CVE-2020-28604 + CVE-2020-28605 + CVE-2020-28606 + CVE-2020-28607 + CVE-2020-28608 + CVE-2020-28610 + CVE-2020-28611 + CVE-2020-28612 + CVE-2020-28613 + CVE-2020-28614 + CVE-2020-28615 + CVE-2020-28616 + CVE-2020-28617 + CVE-2020-28618 + CVE-2020-28619 + CVE-2020-28620 + CVE-2020-28621 + CVE-2020-28622 + CVE-2020-28623 + CVE-2020-28624 + CVE-2020-28625 + CVE-2020-28626 + CVE-2020-28627 + CVE-2020-28628 + CVE-2020-28629 + CVE-2020-28630 + CVE-2020-28631 + CVE-2020-28632 + CVE-2020-28633 + CVE-2020-28634 + CVE-2020-28635 + CVE-2020-28636 + CVE-2020-35628 + CVE-2020-35629 + CVE-2020-35630 + CVE-2020-35631 + CVE-2020-35632 + CVE-2020-35633 + CVE-2020-35634 + CVE-2020-35635 + CVE-2020-35636 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-35.xml new file mode 100644 index 0000000000..46e5337b62 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-35.xml @@ -0,0 +1,115 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. + firefox,firefox-bin + 2023-05-30 + 2023-05-30 + 895962 + 903618 + 905889 + remote + + + 102.10.0 + 112.0 + 102.10.0 + 112.0 + + + 102.10.0 + 112.0 + 102.10.0 + 112.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-102.10.0:esr" + + +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-102.10.0:esr" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-112.0:rapid" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-112.0:rapid" + +
+ + CVE-2023-0767 + CVE-2023-1945 + CVE-2023-1999 + CVE-2023-25728 + CVE-2023-25729 + CVE-2023-25730 + CVE-2023-25731 + CVE-2023-25732 + CVE-2023-25734 + CVE-2023-25735 + CVE-2023-25737 + CVE-2023-25738 + CVE-2023-25739 + CVE-2023-25742 + CVE-2023-25746 + CVE-2023-25748 + CVE-2023-25749 + CVE-2023-25750 + CVE-2023-25751 + CVE-2023-25752 + CVE-2023-28159 + CVE-2023-28160 + CVE-2023-28161 + CVE-2023-28162 + CVE-2023-28163 + CVE-2023-28164 + CVE-2023-28176 + CVE-2023-28177 + CVE-2023-29533 + CVE-2023-29535 + CVE-2023-29536 + CVE-2023-29537 + CVE-2023-29538 + CVE-2023-29539 + CVE-2023-29540 + CVE-2023-29541 + CVE-2023-29543 + CVE-2023-29544 + CVE-2023-29547 + CVE-2023-29548 + CVE-2023-29549 + CVE-2023-29550 + CVE-2023-29551 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-36.xml new file mode 100644 index 0000000000..efba568c15 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-36.xml @@ -0,0 +1,88 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. + thunderbird,thunderbird-bin + 2023-05-30 + 2023-05-30 + 895960 + 903619 + 905890 + remote + + + 102.10.0 + 102.10.0 + + + 102.10.0 + 102.10.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.10.0" + + +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.10.0" + +
+ + CVE-2023-0616 + CVE-2023-0767 + CVE-2023-1945 + CVE-2023-1999 + CVE-2023-25728 + CVE-2023-25729 + CVE-2023-25730 + CVE-2023-25732 + CVE-2023-25734 + CVE-2023-25735 + CVE-2023-25737 + CVE-2023-25738 + CVE-2023-25739 + CVE-2023-25740 + CVE-2023-25741 + CVE-2023-25742 + CVE-2023-25743 + CVE-2023-25744 + CVE-2023-25745 + CVE-2023-25746 + CVE-2023-25751 + CVE-2023-25752 + CVE-2023-28162 + CVE-2023-28163 + CVE-2023-28164 + CVE-2023-28176 + CVE-2023-28427 + CVE-2023-29533 + CVE-2023-29535 + CVE-2023-29536 + CVE-2023-29539 + CVE-2023-29541 + CVE-2023-29548 + CVE-2023-29550 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-37.xml new file mode 100644 index 0000000000..1ce4a1d0b9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-37.xml @@ -0,0 +1,52 @@ + + + + Apache Tomcat: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Apache Tomcat, the worst of which could result in denial of service. + tomcat + 2023-05-30 + 2023-05-31 + 878911 + 889596 + 896370 + 907387 + remote + + + 8.5.88 + 8.5.88 + 9.0.74 + 9.0.74 + 10.1.8 + 10.1.8 + + + +

Apache Tomcat is a Servlet-3.0/JSP-2.2 Container.

+
+ +

Multiple vulnerabilities have been discovered in Apache Tomcat. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Apache Tomcat users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-10.1.8" + +
+ + CVE-2022-42252 + CVE-2022-45143 + CVE-2023-24998 + CVE-2023-28709 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 57331a9aa7..a8713f6d04 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Tue, 02 May 2023 07:09:52 +0000 +Thu, 01 Jun 2023 06:39:40 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index e80ce1ae2c..cfc786be50 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -da9b5483883fcc611753d44d34c0ede9188ce21c 1673414531 2023-01-11T05:22:11+00:00 +023c3018165ffad6f1f6a874561e1c3c555cb505 1685499625 2023-05-31T02:20:25+00:00