diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index bcec7da2c7..296b96193c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 412859 BLAKE2B 29f22611257846c43da3f994e05684673fa1caa957a4b148f39ff19bc84f3682e8490d97c111e7eccbdb376d70136a0d0906ef152ce3abf044f4fb391eb520c4 SHA512 49d32fc5be9c59d40fa5555276aaf748a6274c5421c12e450644629355174f7bb6f7e77103a5571ae8f5e28bcd53505531ac68ed8f7957c3debfc9196bd152cd -TIMESTAMP 2017-12-15T14:38:51Z +MANIFEST Manifest.files.gz 414446 BLAKE2B 5b433dfd85097ead79bccfcdc5ac71450a49f0cd04217ea95a0da4d9b3a14d6a0df186361cf5d3a4ff24547968a8bdb79ea1e31d21aa21b86708e0885a152525 SHA512 2410eac2ebdd40b883f4296ea6c8ebefb16545c125c9ecb039ba9a79dc2d32f43aaaa01673cb98557d5d7aa414d7d0c72e688610d9b127a0d56cb1584e16cf5c +TIMESTAMP 2018-01-08T14:09:18Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAloz3ntfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlpTe45fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klChjw//YTiUDD4Fm0n7wQTnP+T2uP/k5D8u5GxF+dTXC8apVyGVlVq2LLUTTCPL -uLV+HWbXNvh11bjZpDrZU8TtI410H19iaK8+6vzpRhea2v5ClabU7J2MmaDZoOc7 -p+UyEntdtrw7DU/SNxHSdeAQ+ll0lers1pxMaoW+FFT1tvMUJBkO73QuZu6lApad -PORPMc2ibAju/EY1TiuKsSM9V2Vz9iKWNtjQzObCUCfZEKq39HhAEY+0ldqI/TDz -NgXr8MbYgIV/WxkOaDdNy2s4Q/AA1TdgJUHBH4d8qNl3m456p+maYiEwKJIpdbgx -R1h7ofef6I7Z/qmafUtfuNkpaZpl0o+Od2142Lfu5Ux0C67LRC2wMzztaPIkcuDs -4xkPDLQ+Hjzo9ix3Uk+J1iziHkdtf450Q4C2q0jdxWO0mkMf0DWc/uhd1GnWHJ4I -o1IflamHKQBAKC0+7zQw+hZ+pksEvuqboeC3Xh3Nxe9TQqRWje8+hs911N5QtYU9 -XqNIhuaEiSIi0b5Ld8lT6S4HP9KRnEM2L3WI7SRzIkEQl920MVybkyHq7ElhWGyg -Ma1U6ulPo8ExHZigdMF7kjM2A/8YRqyKLMiyfSea1e/waNqlmqXHIPAgz8RePuF6 -/cB49iydB/jcLzPmnkQ0up0ivOUwX/Wizk3aWRr83Zcc2+4ULi0= -=AvJa +klDADw//Y0MSMH/w88YmIdFIFhAFkVaiucRv0Y3ghNhw8ygK7XZZOgEjuY3drvfW +utdtH01gKMFQcv1aM+1N9m9qzvQM6sNwx/NPUi/eUil4XWlbqF1jJgvFavD5DEVW +3lLEx3ZvZG4IC39GtVOIlExMt5OOduP5xGCg6vKJXNRUKM3Y+h+4wFcEqi4ZCXOk +x2LNDnfFlndvaDAu/mYOVRxxBYffvJD5WYn6XCAMot3ZHaqAXKklVkwSSr2DGNwS +MG+tfo25tUstvkExRbnfOogZwQDbXXlHhe+a1swxuRSUCk3ZzRaWXHAAG1hGAlgP +MujuK2+Sflrbukf2bQcjIbUkL/6c/qIBA+t484cY8WLjCPD2f8Go0DlmEpCuB1s9 +kjMgpolbXFjE73F9PLOaM7svYQCKB6GbJGcmo6BL7vuwfhS2YZZpoKMbO6EdYimk +2NhHGpBSAOfZMKUgV/ll0meAZesOZXxf1f+e+QG19iiFHUMj//Nux04QUVyAuTy4 +R9DLOClKPOnMr1ODMRYznzSWDCAPaRTaBvrYK/yOk0AUerfCUt9F92ypbPTxD1qw +JaBUMmObEYMI5oj7wN1iigFCvnLmgcEjVXhXMB1Gzywi3N2T2KPk2ANcCjWxTyvn +D+b/1KH9cWusFhl87Axt3R4JRAD0SRT6X/08+eybXcS2Ow+jJaI= +=sXyp -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 6fc5b55366..895c448658 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-01.xml new file mode 100644 index 0000000000..edcda87e98 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-01.xml @@ -0,0 +1,137 @@ + + + + Binutils: Multiple vulnerabilities + Multiple vulnerabilities have been found in Binutils, the worst of + which may allow remote attackers to cause a Denial of Service condition. + + binutils + 2018-01-07 + 2018-01-07: 1 + 624700 + 627516 + 628538 + 629344 + 629922 + 631324 + 632100 + 632132 + 632384 + 632668 + 633988 + 635218 + 635692 + 635860 + 635968 + local, remote + + + 2.29.1-r1 + 2.29.1-r1 + + + +

The GNU Binutils are a collection of tools to create, modify and analyse + binary files. Many of the files use BFD, the Binary File Descriptor + library, to do low-level manipulation. +

+
+ +

Multiple vulnerabilities have been discovered in Binutils. Please review + the referenced CVE identifiers for details. +

+
+ +

A remote attacker, by enticing a user to compile/execute a specially + crafted ELF, tekhex, PE, or binary file, could possibly cause a Denial of + Service condition. +

+
+ +

There are no known workarounds at this time.

+
+ +

All Binutils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-devel/binutils-2.29.1-r1" + +
+ + + CVE-2017-12456 + + + CVE-2017-12799 + + + CVE-2017-12967 + + + CVE-2017-14128 + + + CVE-2017-14129 + + + CVE-2017-14130 + + + CVE-2017-14333 + + + CVE-2017-15023 + + + CVE-2017-15938 + + + CVE-2017-15939 + + + CVE-2017-15996 + + + CVE-2017-7209 + + + CVE-2017-7210 + + + CVE-2017-7223 + + + CVE-2017-7224 + + + CVE-2017-7225 + + + CVE-2017-7227 + + + CVE-2017-9743 + + + CVE-2017-9746 + + + CVE-2017-9749 + + + CVE-2017-9750 + + + CVE-2017-9751 + + + CVE-2017-9755 + + + CVE-2017-9756 + + + jmbailey + jmbailey +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-02.xml new file mode 100644 index 0000000000..1e7fbff303 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-02.xml @@ -0,0 +1,57 @@ + + + + OptiPNG: Multiple vulnerabilities + Multiple vulnerabilities have been found in OptiPNG, the worst of + which may allow execution of arbitrary code. + + optipng + 2018-01-07 + 2018-01-07: 1 + 637936 + 639690 + remote + + + 0.7.6-r2 + 0.7.6-r2 + + + +

OptiPNG is a PNG optimizer that re-compresses image files to a smaller + size, without losing any information. +

+
+ +

Multiple vulnerabilities have been discovered in OptiPNG. Please review + the referenced CVE identifiers for details. +

+
+ +

A remote attacker could entice a user to process a specially crafted + image file, possibly resulting in execution of arbitrary code with the + privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All OptiPNG users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/optipng-0.7.6-r2" + +
+ + + CVE-2017-1000229 + + + CVE-2017-16938 + + + jmbailey + jmbailey +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-03.xml new file mode 100644 index 0000000000..67a86a6d18 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-03.xml @@ -0,0 +1,134 @@ + + + + Chromium, Google Chrome: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium and Google + Chrome, the worst of which could result in the execution of arbitrary code. + + chromium,google-chrome + 2018-01-07 + 2018-01-07: 1 + 640334 + 641376 + local, remote + + + 63.0.3239.108 + 63.0.3239.108 + + + 63.0.3239.108 + 63.0.3239.108 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+ +

Google Chrome is one fast, simple, and secure browser for all your + devices +

+
+ +

Multiple vulnerabilities have been discovered in Chromium and Google + Chrome. Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, bypass + content security controls, or conduct URL spoofing. +

+
+ +

There are no known workarounds at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-63.0.3239.108" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/google-chrome-63.0.3239.108" + +
+ + + CVE-2017-15407 + + + CVE-2017-15408 + + + CVE-2017-15409 + + + CVE-2017-15410 + + + CVE-2017-15411 + + + CVE-2017-15412 + + + CVE-2017-15413 + + + CVE-2017-15415 + + + CVE-2017-15416 + + + CVE-2017-15417 + + + CVE-2017-15418 + + + CVE-2017-15419 + + + CVE-2017-15420 + + + CVE-2017-15422 + + + CVE-2017-15423 + + + CVE-2017-15424 + + + CVE-2017-15425 + + + CVE-2017-15426 + + + CVE-2017-15427 + + + CVE-2017-15429 + + + Google Chrome Release 20171206 + + + Google Chrome Release 20171214 + + + jmbailey + jmbailey +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-04.xml new file mode 100644 index 0000000000..e49cf9f436 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-04.xml @@ -0,0 +1,51 @@ + + + + LibXcursor: User-assisted execution of arbitrary code + A vulnerability in LibXcursor might allow remote attackers to + execute arbitrary code. + + LibXcursor + 2018-01-07 + 2018-01-07: 1 + 639062 + local, remote + + + 1.1.15 + 1.1.15 + + + +

X.Org X11 libXcursor runtime library.

+
+ +

It was discovered that libXcursor is prone to several heap overflows + when parsing malicious files. +

+
+ +

A remote attacker, by enticing a user to process a specially crafted + cursor file, could possibly execute arbitrary code with the privileges of + the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All LibXcursor users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/libXcursor-1.1.15" + +
+ + + CVE-2017-16612 + + + jmbailey + jmbailey +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-05.xml new file mode 100644 index 0000000000..0522284c6e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-05.xml @@ -0,0 +1,50 @@ + + + + OpenSSH: Permission issue + A flaw has been discovered in OpenSSH which could allow a remote + attacker to create zero-length files. + + OpenSSH + 2018-01-07 + 2018-01-07: 1 + 633428 + remote + + + 7.5_p1-r3 + 7.5_p1-r3 + + + +

OpenSSH is a complete SSH protocol implementation that includes SFTP + client and server support. +

+
+ +

The process_open function in sftp-server.c in OpenSSH did not properly + prevent write operations in readonly mode. +

+
+ +

A remote attacker could cause the creation of zero-length files.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSSH users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/openssh-7.5_p1-r3" + +
+ + + CVE-2017-15906 + + + jmbailey + jmbailey +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-06.xml new file mode 100644 index 0000000000..a0725d7cc0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-06.xml @@ -0,0 +1,51 @@ + + + + Back In Time: Command injection + A command injection vulnerability in 'Back in Time' may allow for + the execution of arbitrary shell commands. + + backintime + 2018-01-07 + 2018-01-07: 1 + 636974 + local, remote + + + 1.1.24 + 1.1.24 + + + +

A simple backup tool for Linux, inspired by “flyback project”.

+
+ +

‘Back in Time’ did improper escaping/quoting of file paths used as + arguments to the ‘notify-send’ command leading to some parts of file + paths being executed as shell commands within an os.system call. +

+
+ +

A context-dependent attacker could execute arbitrary shell commands via + a specially crafted file. +

+
+ +

There is no known workaround at this time.

+
+ +

All ‘Back In Time’ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-backup/backintime-1.1.24" + +
+ + + CVE-2017-16667 + + + jmbailey + jmbailey +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-07.xml new file mode 100644 index 0000000000..48b58e98c0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-07.xml @@ -0,0 +1,68 @@ + + + + GNU Emacs: Command injection + A vulnerability has been found in Emacs which may allow for + arbitrary command execution. + + Emacs + 2018-01-07 + 2018-01-08: 2 + 630680 + remote + + + 23.4-r16 + 24.5-r4 + 25.2-r1 + 23.4-r16 + 24.5-r4 + 25.2-r1 + + + +

GNU Emacs is a highly extensible and customizable text editor.

+
+ +

A command injection flaw within the Emacs “enriched mode” handling + has been discovered. +

+
+ +

A remote attacker, by enticing a user to open a specially crafted file, + could execute arbitrary commands with the privileges of process. +

+
+ +

There is no known workaround at this time.

+
+ +

All GNU Emacs 23.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/emacs-23.4-r16:23" + + +

All GNU Emacs 24.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/emacs-24.5-r4:24" + + +

All GNU Emacs 25.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/emacs-25.2-r1:25" + +
+ + + CVE-2017-14482 + + + jmbailey + jmbailey +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-08.xml new file mode 100644 index 0000000000..71a3eac590 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-08.xml @@ -0,0 +1,53 @@ + + + + MiniUPnPc: Arbitrary code execution + A vulnerability in MiniUPnPc might allow remote attackers to + execute arbitrary code. + + MiniUPnP + 2018-01-07 + 2018-01-07: 1 + 562684 + remote + + + 2.0.20170509 + 2.0.20170509 + + + +

The client library, enabling applications to access the services + provided by an UPnP “Internet Gateway Device” present on the network. +

+
+ +

An exploitable buffer overflow vulnerability exists in the XML parser + functionality of the MiniUPnP library. +

+
+ +

A remote attacker, by enticing a user to connect to a malicious server, + could cause the execution of arbitrary code with the privileges of the + user running a MiniUPnPc linked application. +

+
+ +

There is no known workaround at this time.

+
+ +

All MiniUPnPc users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/miniupnpc-2.0.20170509" + +
+ + + CVE-2015-6031 + + + jmbailey + jmbailey +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-09.xml new file mode 100644 index 0000000000..e76b2d5028 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-09.xml @@ -0,0 +1,63 @@ + + + + WebkitGTK+: Multiple vulnerabilities + Multiple vulnerabilities have been found in WebkitGTK+, the worst + of which may lead to arbitrary code execution. + + WebkitGTK+ + 2018-01-07 + 2018-01-07: 1 + 641752 + remote + + + 2.18.4 + 2.18.4 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine.

+
+ +

Multiple vulnerabilities have been discovered in WebkitGTK+. Please + review the referenced CVE Identifiers for details. +

+
+ +

An attacker, by enticing a user to visit maliciously crafted web + content, may be able to execute arbitrary code or cause memory + corruption. +

+
+ +

There are no known workarounds at this time.

+
+ +

All WebkitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.18.4:4" + +
+ + + CVE-2017-13856 + + + CVE-2017-13866 + + + CVE-2017-13870 + + + CVE-2017-7156 + + + CVE-2017-7157 + + + jmbailey + jmbailey +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-10.xml new file mode 100644 index 0000000000..329c01883b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201801-10.xml @@ -0,0 +1,62 @@ + + + + LibXfont, LibXfont2: Arbitrary file access + A vulnerability has been found in LibXfont and LibXfont2 which may + allow for arbitrary file access. + + LibXfont, LibXfont2 + 2018-01-08 + 2018-01-08: 1 + 639064 + local + + + 1.5.4 + 1.5.4 + + + 2.0.3 + 2.0.3 + + + +

X.Org Xfont library.

+
+ +

It was discovered that libXfont incorrectly followed symlinks when + opening font files. +

+
+ +

A local unprivileged user could use this flaw to cause the X server to + access arbitrary files, including special device files. +

+
+ +

There is no known workaround at this time.

+
+ +

All LibXfont users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/libXfont-1.5.4" + + +

All LibXfont2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/libXfont2-2.0.3" + + +
+ + + CVE-2017-16611 + + + jmbailey + jmbailey +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index d9651b1869..51d96747a0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Fri, 15 Dec 2017 14:38:47 +0000 +Mon, 08 Jan 2018 14:09:15 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 632542b5e1..aaca69940e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -30b0a682c74fee092dcec1e6356f4afc7fa14625 1513277071 2017-12-14T18:44:31+00:00 +83b03abfd2cbeb32bafb0df4d1a742e9717c33a3 1515417463 2018-01-08T13:17:43+00:00