diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 97017d50f6..1b5eaf0ded 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 558197 BLAKE2B dde0fd5bc1749affc0b48b285b7ab9bd0a7216628f650cd3cbf0e6b2a1788ebd2dc667afbfee3491b42c071ba583d8c7e204468384a8f639b22206d6cbf47903 SHA512 6a3cf3862910d3680e54853c513e07b7a7d791fa5a5732653e79584f351498dd0ac5f7c244cf38dd9920afd7da27fd2c1e7a51770500da41d964a2a5ddd6ec92 -TIMESTAMP 2024-01-01T06:39:54Z +MANIFEST Manifest.files.gz 563604 BLAKE2B d497f4e02c0349649ea1fd84297af45ff253c185da14e6dba30f010f40d1ab86fdeb750087d23d7e892d4b2a6c45bb36baacd75348d2a50c0dc3c70213c1836e SHA512 c8b2f6bb87969de216a6075f22dc589f34d03bc0cd503b9bbedb9672f2aa19209f4d1236cd3f9aaf54428705e66f266c37a1f0bdb30c6fdae78df87761e4d8da +TIMESTAMP 2024-02-01T06:41:25Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmWSXjpfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmW7PRVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klB20BAAqVFxMgUnpYZN3TY1cE1pYHAycfbddPzAPAx0I3yPolECfSJpH5UP5EEF -r23EVYdedYTG4cj4cXLRRr0cWdI5/2xHN5YzXqMQdAiNekIjeNc/d/bz+fKXbAZv -a2hGFz71burELuaLhtUOgHhxTPZGA7dZ82k2ZkrHdd3zVyxp6rzS1uQOWj6uKib6 -2dGfgRR+sUdAgIFTexJuCRCt861U5LXEeE7kj8tGXE0kc93JXG5QS3b2NmDvY7GZ -COv3ZeAjYVGkfDQtQtzekL+Sd4UyvICHEZ2M1vPVc5RFFjNUuyC2q7P73DoKXKvD -2RQ4SL7/w9EoBtA+8/glaX59LdnOzIQYtwcmBjfhVn1628RwJesKpAFFVag1hYED -uxh2vlcC/PkvqCf/yYExNh6Krm1agmm4ZJ1l56GckCQWgGgRAwkVt3tjlsNdUoxX -55gRtYMLj153y/2Z2ULpMmB6wOvPNwzSbZ5h9+EMt6UnK6QtDVqO5zc5fVPfpNj5 -0mMNdF1XEfcm64fYeu5IRc2B8MIFGr9c9cFKP4hWXXCMEjB78UtICqwDihgD0s4T -T1zRCMhX5gJv77xwNy6OHe9voXkhV5i3XLyW8fpRTIgWx9WooiFCsDPQLDr/4Qv1 -kqUMaIxkUBmAdOh28ouAd4w2gKe1AqeLLr9quaN7LTItxG77BaI= -=4bYj +klB4QRAAmmnYvk0FaooM922vBqTuhwuoLVbDtysDcvBsJHLxoL+AQlp+0romn4tJ +rHDAcIPSjxMPzei60/FKb8/lWyAwDtRJJ6W0NLOBe5K0SRUKTLKQz4OZ3aHFNl2t +Yp18kfnUgMyZ7l3v2CrKEE3oC+hWpULJ9GF+uuvpSHUXDOqIkbm6vhWQWRzDwCrA +0RacuWPedLm34CiqwiZSEsnzOzvBb8A7tbmKtSyqhBTKyam7wy0/Tn99Wp5tnDGu +Vtp7rgT1wMmGFOEYt2I+QM1fWGxf/GN3CNPNrNRQoQHcs9BadB8hn+auklc8zOc2 +RxEgAaESWhDLSsHkI1xp4osi9OTBqME1wUcjHPQr8d9JAdzsg5L8wW7rJE8YflM6 +uUrchSczds2gc34nG/ZYBC88EpvnU6U2AqZZ22LwOCi5qWo3GQZOc4jZqIuumogi +faLkvuNCX2JKYKZdQQ4Byz9WMN+4X5dWLnQfJT9nHc0F/rTsV4ZcpDUApBCiqCD0 +lHY6ZPKcVL7d8cqQ2h6SjRkO0FrytUbBZm97g861/jX/evt1wY8Jx1e+FAxQksq+ +uPTXpriBil+N5YWzpHbuOZYjAQ7fv7fx50HM3RVNz2wwa7OUxhIFaE7/vBNbPL1F +axrmSl59VEi9APSEmapOVVZR5tloRvDacB0elAhfpbqCb2BCO9E= +=EZVX -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index c1be36f2d9..44241c9c7a 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-01.xml new file mode 100644 index 0000000000..0909c59e0b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-01.xml @@ -0,0 +1,47 @@ + + + + Joblib: Arbitrary Code Execution + A vulnerability has been found in Joblib which allows for arbitrary code execution. + joblib + 2024-01-02 + 2024-01-02 + 873151 + remote + + + 1.2.0 + 1.2.0 + + + +

Joblib is a set of tools to provide lightweight pipelining in Python. In particular: + +1. transparent disk-caching of functions and lazy re-evaluation (memoize pattern) +2. easy simple parallel computing + +Joblib is optimized to be fast and robust on large data in particular and has specific optimizations for numpy arrays.

+
+ +

A vulnerability has been discovered in Joblib. Please review the CVE identifier referenced below for details.

+
+ +

Joblib is vulnerable to arbitrary code execution via the pre_dispatch flag in Parallel() class due to the eval() statement.

+
+ +

There is no known workaround at this time.

+
+ +

All Joblib users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/joblib-1.2.0" + +
+ + CVE-2022-21797 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-02.xml new file mode 100644 index 0000000000..ff38eed4e5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-02.xml @@ -0,0 +1,50 @@ + + + + c-ares: Multiple Vulnerabilities + Multiple vulnerabilities have been found in c-ares, the worst of which could result in the loss of confidentiality or integrity. + c-ares + 2024-01-05 + 2024-01-05 + 807604 + 807775 + 892489 + 905341 + remote + + + 1.19.0 + 1.19.0 + + + +

c-ares is a C library for asynchronous DNS requests (including name resolves).

+
+ +

Multiple vulnerabilities have been discovered in c-ares. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All c-ares users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/c-ares-1.19.0" + +
+ + CVE-2021-3672 + CVE-2021-22930 + CVE-2021-22931 + CVE-2021-22939 + CVE-2021-22940 + CVE-2022-4904 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-03.xml new file mode 100644 index 0000000000..e9e5d75505 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-03.xml @@ -0,0 +1,42 @@ + + + + BlueZ: Privilege Escalation + Multiple vulnerabilities have been discovered in Bluez, the worst of which can lead to privilege escalation. + bluez + 2024-01-05 + 2024-01-05 + 919383 + remote + + + 5.70-r1 + 5.70-r1 + + + +

BlueZ is the canonical bluetooth tools and system daemons package for Linux.

+
+ +

Multiple vulnerabilities have been discovered in BlueZ. Please review the CVE identifiers referenced below for details.

+
+ +

An attacker may inject unauthenticated keystrokes via Bluetooth, leading to privilege escalation or denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All BlueZ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-wireless/bluez-5.70-r1" + +
+ + CVE-2023-45866 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-04.xml new file mode 100644 index 0000000000..e900d76586 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-04.xml @@ -0,0 +1,68 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Several vulnerabilities have been found in WebKitGTK+, the worst of which can lead to remote code execution. + webkit-gtk + 2024-01-05 + 2024-01-05 + 907818 + 909663 + 910656 + 918087 + 918099 + 919290 + remote + + + 2.42.3 + 2.42.3 + 2.42.3 + 2.42.3 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.42.3" + +
+ + CVE-2023-28198 + CVE-2023-28204 + CVE-2023-32370 + CVE-2023-32373 + CVE-2023-32393 + CVE-2023-32439 + CVE-2023-37450 + CVE-2023-38133 + CVE-2023-38572 + CVE-2023-38592 + CVE-2023-38594 + CVE-2023-38595 + CVE-2023-38597 + CVE-2023-38599 + CVE-2023-38600 + CVE-2023-38611 + CVE-2023-40397 + CVE-2023-42916 + CVE-2023-42917 + WSA-2023-0006 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-05.xml new file mode 100644 index 0000000000..b1ce5562b5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-05.xml @@ -0,0 +1,42 @@ + + + + RDoc: Command Injection + A vulnerability has been found in RDoc which allows for command injection. + rdoc + 2024-01-05 + 2024-01-05 + 801301 + remote + + + 6.3.2 + 6.3.2 + + + +

RDoc produces HTML and command-line documentation for Ruby projects.

+
+ +

A vulnerability has been discovered in RDoc. Please review the CVE identifier referenced below for details.

+
+ +

RDoc used to call Kernel#open to open a local file. If a Ruby project has a file whose name starts with | and ends with tags, the command following the pipe character is executed. A malicious Ruby project could exploit it to run an arbitrary command execution against a user who attempts to run the rdoc command.

+
+ +

There is no known workaround at this time.

+
+ +

All RDoc users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-ruby/rdoc-6.3.2" + +
+ + CVE-2021-31799 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-06.xml new file mode 100644 index 0000000000..0fccef02e6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-06.xml @@ -0,0 +1,43 @@ + + + + CUPS filters: Remote Code Execution + A vulnerability has been found in CUPS filters where remote code execution is possible via the beh filter. + cups-filters + 2024-01-05 + 2024-01-05 + 906944 + remote + + + 1.28.17-r2 + 1.28.17-r2 + + + +

CUPS filters provides backends, filters, and other software that was once part of the core CUPS distribution.

+
+ +

A vulnerability has been discovered in cups-filters. Please review the CVE identifier referenced below for details.

+
+ +

If you use beh to create an accessible network printer, this security vulnerability can cause remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All cups-filters users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-print/cups-filters-1.28.17-r2" + +
+ + CVE-2023-24805 + GHSA-gpxc-v2m8-fr3x + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-07.xml new file mode 100644 index 0000000000..bab052a4c4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-07.xml @@ -0,0 +1,42 @@ + + + + R: Directory Traversal + A vulnerability was found in R which could allow for remote code execution. + R + 2024-01-06 + 2024-01-06 + 765361 + remote + + + 4.0.4 + 4.0.4 + + + +

R is a language and environment for statistical computing and graphics.

+
+ +

The native R package installation mechanisms do not sufficiently validate installed source packages for path traversal.

+
+ +

Installation of a malicious R package could result in an arbitrary file overwrite which could result in arbitrary code execution, as might be seen with the overwrite of an authorized_keys file.

+
+ +

There is no known workaround at this time.

+
+ +

All R users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/R-4.0.4" + +
+ + CVE-2020-27637 + + ajak + graaff +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-08.xml new file mode 100644 index 0000000000..3253401f11 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-08.xml @@ -0,0 +1,47 @@ + + + + util-linux: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in util-linux which can lead to denial of service or information disclosure. + util-linux + 2024-01-07 + 2024-01-07 + 806070 + 831978 + 833365 + remote + + + 2.37.4 + 2.37.4 + + + +

util-linux is a suite of Linux programs including mount and umount, programs used to mount and unmount filesystems.

+
+ +

Multiple vulnerabilities have been discovered in util-linux. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All util-linux users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/util-linux-2.37.4" + +
+ + CVE-2021-3995 + CVE-2021-3996 + CVE-2021-37600 + CVE-2022-0563 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-09.xml new file mode 100644 index 0000000000..af3682ee36 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-09.xml @@ -0,0 +1,44 @@ + + + + Eclipse Mosquitto: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Eclipse Mosquitto which could result in denial of service. + mosquitto + 2024-01-07 + 2024-01-07 + 918540 + remote + + + 2.0.17 + 2.0.17 + + + +

Eclipse Mosquitto is an open source MQTT v3 broker.

+
+ +

Multiple vulnerabilities have been discovered in Eclipse Mosquitto. Please review the CVE identifier referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Eclipse Mosquitto users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-misc/mosquitto-2.0.17" + +
+ + CVE-2023-0809 + CVE-2023-3592 + CVE-2023-28366 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-10.xml new file mode 100644 index 0000000000..ea5f16ba40 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-10.xml @@ -0,0 +1,134 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could lead to remote code execution. + firefox,firefox-bin + 2024-01-07 + 2024-01-07 + 908245 + 914073 + 918433 + 920507 + remote + + + 121.0 + 115.6.0 + 121.0 + 115.6.0 + + + 121.0 + 115.6.0 + 121.0 + 115.6.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-115.6.0:esr" + + +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-115.6.0:esr" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-121.0:rapid" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-121.0:rapid" + +
+ + CVE-2023-3482 + CVE-2023-4058 + CVE-2023-4579 + CVE-2023-4863 + CVE-2023-5129 + CVE-2023-5170 + CVE-2023-5172 + CVE-2023-5173 + CVE-2023-5175 + CVE-2023-5722 + CVE-2023-5723 + CVE-2023-5729 + CVE-2023-5731 + CVE-2023-5758 + CVE-2023-6135 + CVE-2023-6210 + CVE-2023-6211 + CVE-2023-6213 + CVE-2023-6856 + CVE-2023-6857 + CVE-2023-6858 + CVE-2023-6859 + CVE-2023-6860 + CVE-2023-6861 + CVE-2023-6862 + CVE-2023-6863 + CVE-2023-6864 + CVE-2023-6865 + CVE-2023-6866 + CVE-2023-6867 + CVE-2023-6868 + CVE-2023-6869 + CVE-2023-6870 + CVE-2023-6871 + CVE-2023-6872 + CVE-2023-6873 + CVE-2023-32205 + CVE-2023-32206 + CVE-2023-32207 + CVE-2023-32208 + CVE-2023-32209 + CVE-2023-32210 + CVE-2023-32211 + CVE-2023-32212 + CVE-2023-32213 + CVE-2023-32214 + CVE-2023-32215 + CVE-2023-32216 + CVE-2023-34414 + CVE-2023-34415 + CVE-2023-34416 + CVE-2023-34417 + CVE-2023-37203 + CVE-2023-37204 + CVE-2023-37205 + CVE-2023-37206 + CVE-2023-37209 + CVE-2023-37210 + CVE-2023-37212 + MFSA-2023-40 + MFSA-TMP-2023-0002 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-11.xml new file mode 100644 index 0000000000..049860c19e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-11.xml @@ -0,0 +1,53 @@ + + + + Apache Batik: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Apache Batik, the worst of which could result in arbitrary code execution. + batik + 2024-01-07 + 2024-01-07 + 724534 + 872689 + 918088 + remote + + + 1.17 + 1.17 + + + +

Apache Batik is a Java-based toolkit for applications or applets that want to use images in the Scalable Vector Graphics (SVG) format for various purposes, such as display, generation or manipulation.

+
+ +

Multiple vulnerabilities have been discovered in Apache Batik. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Apache Batik users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/batik-1.17" + +
+ + CVE-2018-8013 + CVE-2019-17566 + CVE-2020-11987 + CVE-2022-38398 + CVE-2022-38648 + CVE-2022-40146 + CVE-2022-41704 + CVE-2022-42890 + CVE-2022-44729 + CVE-2022-44730 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-12.xml new file mode 100644 index 0000000000..840328ed08 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-12.xml @@ -0,0 +1,46 @@ + + + + Synapse: Multiple Vulnerabilities + Multiple vulnerabilites have been found in Synapse, the worst of which could result in information leaks. + synapse + 2024-01-07 + 2024-01-07 + 914765 + 916609 + remote + + + 1.96.0 + 1.96.0 + + + +

Synapse is a Matrix homeserver written in Python/Twisted.

+
+ +

Multiple vulnerabilities have been discovered in Synapse. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Synapse users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-im/synapse-1.96.0" + +
+ + CVE-2023-41335 + CVE-2023-42453 + CVE-2023-43796 + CVE-2023-45129 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-13.xml new file mode 100644 index 0000000000..8b6fbe173b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-13.xml @@ -0,0 +1,43 @@ + + + + FAAD2: Multiple Vulnerabilities + Multiple denial of service vulnerabilities have been found in FAAD2. + faad2 + 2024-01-10 + 2024-01-10 + 918558 + remote + + + 2.11.0 + 2.11.0 + + + +

FAAD2 is an open source MPEG-4 and MPEG-2 AAC decoder.

+
+ +

Multiple vulnerabilities have been discovered in FAAD2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All FAAD2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/faad2-2.11.0" + +
+ + CVE-2023-38857 + CVE-2023-38858 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-14.xml new file mode 100644 index 0000000000..8489fd1909 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-14.xml @@ -0,0 +1,42 @@ + + + + RedCloth: ReDoS Vulnerability + A denial of service vulnerability has been found in RedCloth. + redcloth + 2024-01-10 + 2024-01-10 + 908035 + remote + + + 4.3.2-r5 + 4.3.2-r5 + + + +

RedCloth is a module for using Textile in Ruby

+
+ +

A vulnerability has been discovered in RedCloth. Please review the CVE identifier referenced below for details.

+
+ +

RedCloth is vulnerable to a regular expression denial of service ("ReDoS") attack via the sanitize_html function.

+
+ +

There is no known workaround at this time.

+
+ +

All RedCloth users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-ruby/redcloth-4.3.2-r5" + +
+ + CVE-2023-31606 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-15.xml new file mode 100644 index 0000000000..0521e2c30a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-15.xml @@ -0,0 +1,42 @@ + + + + Prometheus SNMP Exporter: Basic Authentication Bypass + A vulnerability has been found in Prometheus SNMP Exporter which could allow for authentication bypass. + snmp_exporter + 2024-01-12 + 2024-01-12 + 883649 + remote + + + 0.24.1 + 0.24.1 + + + +

The Prometheus SNMP Exporter is the recommended way to expose SNMP data in a format which Prometheus can ingest.

+
+ +

A vulnerability has been discovered in Prometheus SNMP Exporter. Please review the CVE identifier referenced below for details.

+
+ +

A user who knows the password hash of a user capable of performing HTTP basic authentication with a vulnerable exporter can use the hash to successfully authenticate as that user via cache manipulation, without knowing the password from which the hash was derived.

+
+ +

There is no known workaround at this time.

+
+ +

All Prometheus SNMP Exporter users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-metrics/snmp_exporter-0.24.1" + +
+ + CVE-2022-46146 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-16.xml new file mode 100644 index 0000000000..8deff5eccb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-16.xml @@ -0,0 +1,66 @@ + + + + FreeRDP: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in FreeRDP, the worst of which could result in code execution. + freerdp + 2024-01-12 + 2024-01-12 + 881525 + 918546 + remote + + + 2.11.0 + 2.11.0 + + + +

FreeRDP is a free implementation of the remote desktop protocol.

+
+ +

Multiple vulnerabilities have been discovered in FreeRDP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All FreeRDP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/freerdp-2.11.0" + +
+ + CVE-2022-39316 + CVE-2022-39317 + CVE-2022-39318 + CVE-2022-39319 + CVE-2022-39320 + CVE-2022-39347 + CVE-2022-41877 + CVE-2023-39350 + CVE-2023-39351 + CVE-2023-39352 + CVE-2023-39353 + CVE-2023-39354 + CVE-2023-39355 + CVE-2023-39356 + CVE-2023-40181 + CVE-2023-40186 + CVE-2023-40187 + CVE-2023-40188 + CVE-2023-40567 + CVE-2023-40569 + CVE-2023-40574 + CVE-2023-40575 + CVE-2023-40576 + CVE-2023-40589 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-17.xml new file mode 100644 index 0000000000..ca67fc87bb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-17.xml @@ -0,0 +1,42 @@ + + + + libgit2: Privilege Escalation Vulnerability + A vulnerability has been found in libgit2 which could result in privilege escalation. + libgit2 + 2024-01-14 + 2024-01-14 + 857792 + local + + + 1.4.4 + 1.4.4 + + + +

libgit2 is a portable, pure C implementation of the Git core methods provided as a re-entrant linkable library with a solid API.

+
+ +

A vulnerability has been discovered in libgit2. Please review the CVE identifier referenced below for details.

+
+ +

Usages of a malicious crafted Git repository could allow the creator of the repository to elevate privileges to those of the user accessing the repository.

+
+ +

Administrators can ensure that their usages of libgit2 only interact with repositories which have only been modified by trusted users.

+
+ +

All libgit2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libgit2-1.4.4" + +
+ + CVE-2022-29187 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-18.xml new file mode 100644 index 0000000000..73fa6e0953 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-18.xml @@ -0,0 +1,42 @@ + + + + zlib: Buffer Overflow + A vulnerability has been found in zlib that can lead to a heap-based buffer overflow. + zlib + 2024-01-15 + 2024-01-15 + 916484 + remote + + + 1.2.13-r2 + 1.2.13-r2 + + + +

zlib is a widely used free and patent unencumbered data compression library.

+
+ +

A vulnerability has been discovered in zlib. Please review the CVE identifier referenced below for details.

+
+ +

MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in ZipOpenNewFileInZip4_64 via a long filename, comment, or extra field.

+
+ +

There is no known workaround at this time.

+
+ +

All zlib users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/zlib-1.2.13-r2" + +
+ + CVE-2023-45853 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-19.xml new file mode 100644 index 0000000000..c8072c96b5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-19.xml @@ -0,0 +1,53 @@ + + + + Opera: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Opera, the worst of which can lead to remote code execution. + opera,opera-beta + 2024-01-15 + 2024-01-15 + 750929 + remote + + + 73.0.3856.284 + 73.0.3856.284 + + + 73.0.3856.284 + 73.0.3856.284 + + + +

Opera is a fast web browser that is available free of charge.

+
+ +

Multiple vulnerabilities have been discovered in Opera. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Opera users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/opera-73.0.3856.284" + + +

All Opera users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/opera-beta-73.0.3856.284" + +
+ + CVE-2020-15999 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-20.xml new file mode 100644 index 0000000000..7600622922 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-20.xml @@ -0,0 +1,42 @@ + + + + QPDF: Buffer Overflow + A vulnerability has been found in QPDF which can lead to a heap-based buffer overflow. + qpdf + 2024-01-15 + 2024-01-15 + 803110 + remote + + + 10.1.0 + 10.1.0 + + + +

QPDF: A content-preserving PDF document transformer.

+
+ +

A vulnerability has been discovered in QPDF. Please review the CVE identifier referenced below for details.

+
+ +

QPDF has a heap-based buffer overflow in Pl_ASCII85Decoder::write (called from Pl_AES_PDF::flush and Pl_AES_PDF::finish) when a certain downstream write fails.

+
+ +

There is no known workaround at this time.

+
+ +

All QPDF users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/qpdf-10.1.0" + +
+ + CVE-2021-36978 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-21.xml new file mode 100644 index 0000000000..1ceef006bd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-21.xml @@ -0,0 +1,42 @@ + + + + KTextEditor: Arbitrary Local Code Execution + A vulnerability has been found in KTextEditor where local code can be executed without user interaction. + ktexteditor + 2024-01-15 + 2024-01-15 + 832447 + remote + + + 5.90.0-r2 + 5.90.0-r2 + + + +

Framework providing a full text editor component for KDE.

+
+ +

A vulnerability has been discovered in KTextEditor. Please review the CVE identifiers referenced below for details.

+
+ +

KTextEditor executes binaries without user interaction in a few cases, e.g. KTextEditor will try to check on external file modification via invoking the "git" binary if the file is known in the repository with the new content.

+
+ +

There is no known workaround at this time.

+
+ +

All KTextEditor users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=kde-frameworks/ktexteditor-5.90.0-r2" + +
+ + CVE-2022-23853 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-22.xml new file mode 100644 index 0000000000..bbffaf3089 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-22.xml @@ -0,0 +1,44 @@ + + + + libspf2: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in libspf2, the worst of which can lead to remote code execution. + libspf2 + 2024-01-15 + 2024-01-15 + 807739 + remote + + + 1.2.11 + 1.2.11 + + + +

libspf2 is a library that implements the Sender Policy Framework, allowing mail transfer agents to make sure that an email is authorized by the domain name that it is coming from.

+
+ +

Multiple vulnerabilities have been discovered in libspf2. Please review the CVE identifiers referenced below for details.

+
+ +

Various buffer overflows have been identified that can lead to denial of service and possibly arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All libspf2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-filter/libspf2-1.2.11" + +
+ + CVE-2021-20314 + CVE-2021-33912 + CVE-2021-33913 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-23.xml new file mode 100644 index 0000000000..240a1ffe32 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-23.xml @@ -0,0 +1,42 @@ + + + + libuv: Buffer Overread + A buffer overread vulnerability has been found in libuv. + libuv + 2024-01-16 + 2024-01-16 + 800986 + remote + + + 1.41.1 + 1.41.1 + + + +

libuv is a multi-platform support library with a focus on asynchronous I/O.

+
+ +

libuv fails to ensure that a pointer lies within the bounds of a defined buffer in the uv__idna_toascii() function before reading and manipulating the memory at that address.

+
+ +

The overread can result in information disclosure or application crash.

+
+ +

There is no known workaround at this time.

+
+ +

All libuv users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libuv-1.41.1" + +
+ + CVE-2021-22918 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-24.xml new file mode 100644 index 0000000000..24d0c28c7e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-24.xml @@ -0,0 +1,44 @@ + + + + Nettle: Denial of Service + Multiple denial of service vulnerabilities have been discovered in Nettle. + nettle + 2024-01-16 + 2024-01-16 + 806839 + 907673 + remote + + + 3.9.1 + 3.9.1 + + + +

Nettle is a cryptographic library that is designed to fit easily in almost any context: In cryptographic toolkits for object-oriented languages, such as C++, Python, or Pike, in applications like lsh or GnuPG, or even in kernel space.

+
+ +

Multiple vulnerabilities have been discovered in Nettle. Please review the CVE identifiers referenced below for details.

+
+ +

A flaw was found in the way nettle's RSA decryption functions handled specially crafted ciphertext. An attacker could use this flaw to provide a manipulated ciphertext leading to application crash and denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All Nettle users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/nettle-3.9.1" + +
+ + CVE-2021-3580 + CVE-2023-36660 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-25.xml new file mode 100644 index 0000000000..97103d77ad --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-25.xml @@ -0,0 +1,99 @@ + + + + OpenJDK: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenJDK, the worst of which can lead to remote code execution. + openjdk,openjdk-bin,openjdk-jre-bin + 2024-01-17 + 2024-01-17 + 859376 + 859400 + 877597 + 891323 + 908243 + remote + + + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + + + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + + + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + 8.372_p07 + 11.0.19_p7 + 17.0.7_p7 + + + +

OpenJDK is an open source implementation of the Java programming language.

+
+ +

Multiple vulnerabilities have been discovered in OpenJDK. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenJDK users should upgrade to the latest versions:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-8.372_p07" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-11.0.19_p7" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-17.0.7_p7" + + +

All OpenJDK JRE binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-8.372_p07" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-11.0.19_p7" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-17.0.7_p7" + + +

All OpenJDK binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-8.372_p07" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-11.0.19_p7" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-17.0.7_p7" + +
+ + CVE-2022-21540 + CVE-2022-21541 + CVE-2022-21549 + CVE-2022-21618 + CVE-2022-21619 + CVE-2022-21624 + CVE-2022-21626 + CVE-2022-21628 + CVE-2022-34169 + CVE-2022-39399 + CVE-2022-42920 + CVE-2023-21830 + CVE-2023-21835 + CVE-2023-21843 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-26.xml new file mode 100644 index 0000000000..56b9740e67 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-26.xml @@ -0,0 +1,42 @@ + + + + Apache XML-RPC: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Apache XML-RPC, the worst of which could result in arbitrary code execution. + xmlrpc + 2024-01-22 + 2024-01-22 + 713098 + remote + + + 3.1.3 + + + +

Apache XML-RPC (previously known as Helma XML-RPC) is a Java implementation of XML-RPC, a popular protocol that uses XML over HTTP to implement remote procedure calls.

+
+ +

Multiple vulnerabilities have been discovered in Apache XML-RPC. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Apache XML-RPC. We recommend that users unmerge it:

+ + + # emerge --ask --depclean "dev-java/xmlrpc" + +
+ + CVE-2016-5002 + CVE-2016-5003 + CVE-2019-17570 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-27.xml new file mode 100644 index 0000000000..d1863a0904 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-27.xml @@ -0,0 +1,65 @@ + + + + Ruby: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in Ruby, the worst of which could lead to execution of arbitrary code. + ruby + 2024-01-24 + 2024-01-24 + 747007 + 801061 + 827251 + 838073 + 882893 + 903630 + local and remote + + + 3.1.4 + 3.2.2 + 2.5.9 + 2.6.10 + 2.7.8 + 3.0.6 + 3.1.4 + 3.2.2 + + + +

Ruby is an interpreted scripting language for quick and easy object-oriented programming. It comes bundled with a HTTP server ("WEBrick").

+
+ +

Multiple vulnerabilities have been discovered in Ruby. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Ruby users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --depclean ruby:2.5 ruby:2.6 ruby:2.7 ruby:3.0 + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-3.1.4:3.1" + # emerge --ask --oneshot --verbose ">=dev-lang/ruby-3.2.2:3.2" + +
+ + CVE-2020-25613 + CVE-2021-31810 + CVE-2021-32066 + CVE-2021-33621 + CVE-2021-41816 + CVE-2021-41817 + CVE-2021-41819 + CVE-2022-28738 + CVE-2022-28739 + CVE-2023-28755 + CVE-2023-28756 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-28.xml new file mode 100644 index 0000000000..c119a331b6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-28.xml @@ -0,0 +1,42 @@ + + + + GOCR: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in GOCR, the worst of which could lead to arbitrary code execution. + gocr + 2024-01-24 + 2024-01-24 + 824290 + remote + + + 0.52-r1 + + + +

GOCR is an OCR (Optical Character Recognition) program, developed under the GNU Public License. It converts scanned images of text back to text files.

+
+ +

Multiple vulnerabilities have been discovered in GOCR. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for GOCR. We recommend that users unmerge it:

+ + + # emerge --ask --depclean "app-text/gocr" + +
+ + CVE-2021-33479 + CVE-2021-33480 + CVE-2021-33481 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-29.xml new file mode 100644 index 0000000000..fdac8be5d9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-29.xml @@ -0,0 +1,42 @@ + + + + sudo: Memory Manipulation + A vulnerability has been discovered in sudo which can lead to execution manipulation through rowhammer-style memory manipulation. + sudo + 2024-01-24 + 2024-01-24 + 920510 + remote + + + 1.9.15_p2 + 1.9.15_p2 + + + +

sudo allows a system administrator to give users the ability to run commands as other users.

+
+ +

Multiple vulnerabilities have been discovered in sudo. Please review the CVE identifiers referenced below for details.

+
+ +

Stack/register variables can be flipped via fault injection, affecting execution flow in security-sensitive code.

+
+ +

There is no known workaround at this time.

+
+ +

All sudo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.9.15_p2" + +
+ + CVE-2023-42465 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-30.xml new file mode 100644 index 0000000000..527cd4cfe3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-30.xml @@ -0,0 +1,64 @@ + + + + X.Org X Server, XWayland: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in privilege escalation or remote code execution. + xorg-server,xwayland + 2024-01-31 + 2024-01-31 + 916254 + 919803 + 922395 + remote + + + 21.1.11 + 21.1.11 + + + 23.2.4 + 23.2.4 + + + +

The X Window System is a graphical windowing system based on a client/server model.

+
+ +

Multiple vulnerabilities have been discovered in X.Org X Server and XWayland. Please review the CVE identifiers referenced below for details.

+
+ +

The X server can be crashed by a malicious client, or potentially be compromised for remote code execution in environments with X11 forwarding.

+
+ +

Users can ensure no untrusted clients can access the running X implementation.

+
+ +

All X.Org X Server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-21.1.11" + + +

All XWayland users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xwayland-23.2.4" + +
+ + CVE-2023-5367 + CVE-2023-5380 + CVE-2023-6377 + CVE-2023-6478 + CVE-2023-6816 + CVE-2024-0229 + CVE-2024-0408 + CVE-2024-0409 + CVE-2024-21885 + CVE-2024-21886 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-31.xml new file mode 100644 index 0000000000..7ee14da846 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-31.xml @@ -0,0 +1,52 @@ + + + + containerd: Multiple Vulnerabilities + Multiple vulnerabilities have been found in containerd, the worst of which could result in privilege escalation. + containerd + 2024-01-31 + 2024-01-31 + 802948 + 816315 + 834689 + 835917 + 850124 + 884803 + remote + + + 1.6.14 + 1.6.14 + + + +

containerd is a daemon with an API and a command line client, to manage containers on one machine. It uses runC to run containers according to the OCI specification.

+
+ +

Multiple vulnerabilities have been discovered in containerd. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All containerd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/containerd-1.6.14" + +
+ + CVE-2021-32760 + CVE-2021-41103 + CVE-2022-23471 + CVE-2022-23648 + CVE-2022-24769 + CVE-2022-31030 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-32.xml new file mode 100644 index 0000000000..39f01254c5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-32.xml @@ -0,0 +1,52 @@ + + + + libaom: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libaom, the worst of which can lead to remote code execution. + libaom + 2024-01-31 + 2024-01-31 + 793932 + 798126 + 828112 + local and remote + + + 3.2.0 + 3.2.0 + + + +

libaom is the Alliance for Open Media's AV1 Codec SDK.

+
+ +

Multiple vulnerabilities have been discovered in libaom. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libaom users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libaom-3.2.0" + +
+ + CVE-2020-36129 + CVE-2020-36130 + CVE-2020-36131 + CVE-2020-36133 + CVE-2020-36134 + CVE-2020-36135 + CVE-2021-30473 + CVE-2021-30474 + CVE-2021-30475 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-33.xml new file mode 100644 index 0000000000..df49bf28b7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-33.xml @@ -0,0 +1,57 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Multiple vulnerabilities have been found in WebKitGTK+, the worst of which may lead to remote code execution. + webkit-gtk + 2024-01-31 + 2024-01-31 + 915222 + 918667 + remote + + + 2.42.2 + 2.42.2 + 2.42.2 + 2.42.2 + 2.42.2 + 2.42.2 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.42.2" + +
+ + CVE-2023-32359 + CVE-2023-35074 + CVE-2023-39434 + CVE-2023-39928 + CVE-2023-40451 + CVE-2023-41074 + CVE-2023-41983 + CVE-2023-41993 + CVE-2023-42852 + CVE-2023-42890 + WSA-2023-0009 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-34.xml new file mode 100644 index 0000000000..8670819ff0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-34.xml @@ -0,0 +1,229 @@ + + + + Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. + chromium,google-chrome,microsoft-edge + 2024-01-31 + 2024-01-31 + 907999 + 908471 + 909283 + 910522 + 911675 + 912364 + 913016 + 913710 + 914350 + 914871 + 915137 + 915560 + 915961 + 916252 + 916620 + 917021 + 917357 + 918882 + 919321 + 919802 + 920442 + 921337 + remote + + + 120.0.6099.109 + 120.0.6099.109 + + + 120.0.6099.109 + 120.0.6099.109 + + + 120.0.2210.133 + 120.0.2210.133 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. + +Google Chrome is one fast, simple, and secure browser for all your devices. + +Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-120.0.6099.109" + + +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-120.0.6099.109" + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-120.0.2210.133" + +
+ + CVE-2023-2312 + CVE-2023-2929 + CVE-2023-2930 + CVE-2023-2931 + CVE-2023-2932 + CVE-2023-2933 + CVE-2023-2934 + CVE-2023-2935 + CVE-2023-2936 + CVE-2023-2937 + CVE-2023-2938 + CVE-2023-2939 + CVE-2023-2940 + CVE-2023-2941 + CVE-2023-3079 + CVE-2023-3214 + CVE-2023-3215 + CVE-2023-3216 + CVE-2023-3217 + CVE-2023-3420 + CVE-2023-3421 + CVE-2023-3422 + CVE-2023-3727 + CVE-2023-3728 + CVE-2023-3730 + CVE-2023-3732 + CVE-2023-3733 + CVE-2023-3734 + CVE-2023-3735 + CVE-2023-3736 + CVE-2023-3737 + CVE-2023-3738 + CVE-2023-3740 + CVE-2023-4068 + CVE-2023-4069 + CVE-2023-4070 + CVE-2023-4071 + CVE-2023-4072 + CVE-2023-4073 + CVE-2023-4074 + CVE-2023-4075 + CVE-2023-4076 + CVE-2023-4077 + CVE-2023-4078 + CVE-2023-4349 + CVE-2023-4350 + CVE-2023-4351 + CVE-2023-4352 + CVE-2023-4353 + CVE-2023-4354 + CVE-2023-4355 + CVE-2023-4356 + CVE-2023-4357 + CVE-2023-4358 + CVE-2023-4359 + CVE-2023-4360 + CVE-2023-4361 + CVE-2023-4362 + CVE-2023-4363 + CVE-2023-4364 + CVE-2023-4365 + CVE-2023-4366 + CVE-2023-4367 + CVE-2023-4368 + CVE-2023-4427 + CVE-2023-4428 + CVE-2023-4429 + CVE-2023-4430 + CVE-2023-4431 + CVE-2023-4572 + CVE-2023-4761 + CVE-2023-4762 + CVE-2023-4763 + CVE-2023-4764 + CVE-2023-4900 + CVE-2023-4901 + CVE-2023-4902 + CVE-2023-4903 + CVE-2023-4904 + CVE-2023-4905 + CVE-2023-4906 + CVE-2023-4907 + CVE-2023-4908 + CVE-2023-4909 + CVE-2023-5186 + CVE-2023-5187 + CVE-2023-5217 + CVE-2023-5218 + CVE-2023-5346 + CVE-2023-5472 + CVE-2023-5473 + CVE-2023-5474 + CVE-2023-5475 + CVE-2023-5476 + CVE-2023-5477 + CVE-2023-5478 + CVE-2023-5479 + CVE-2023-5480 + CVE-2023-5481 + CVE-2023-5482 + CVE-2023-5483 + CVE-2023-5484 + CVE-2023-5485 + CVE-2023-5486 + CVE-2023-5487 + CVE-2023-5849 + CVE-2023-5850 + CVE-2023-5851 + CVE-2023-5852 + CVE-2023-5853 + CVE-2023-5854 + CVE-2023-5855 + CVE-2023-5856 + CVE-2023-5857 + CVE-2023-5858 + CVE-2023-5859 + CVE-2023-5996 + CVE-2023-5997 + CVE-2023-6112 + CVE-2023-6345 + CVE-2023-6346 + CVE-2023-6347 + CVE-2023-6348 + CVE-2023-6350 + CVE-2023-6351 + CVE-2023-6508 + CVE-2023-6509 + CVE-2023-6510 + CVE-2023-6511 + CVE-2023-6512 + CVE-2023-6702 + CVE-2023-6703 + CVE-2023-6704 + CVE-2023-6705 + CVE-2023-6706 + CVE-2023-6707 + CVE-2023-7024 + CVE-2024-0222 + CVE-2024-0223 + CVE-2024-0224 + CVE-2024-0225 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 0634b94f03..81367c0d47 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 01 Jan 2024 06:39:51 +0000 +Thu, 01 Feb 2024 06:41:20 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 3525270838..7a936a895a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -3dfe782899716a3480c9481c69bca8c231c663a7 1703730129 2023-12-28T02:22:09+00:00 +8064a0b694d29fb2fca491d65494098fb43c2ffa 1706715575 2024-01-31T15:39:35+00:00