From 52439b6eaadac6bc7ea1a45b19a0605c365cb1f3 Mon Sep 17 00:00:00 2001 From: Nick Owens Date: Wed, 7 Dec 2016 10:47:20 -0800 Subject: [PATCH] bump(metadata/glsa): sync with upstream --- .../metadata/glsa/glsa-201612-12.xml | 53 ++++++++++++ .../metadata/glsa/glsa-201612-13.xml | 48 +++++++++++ .../metadata/glsa/glsa-201612-14.xml | 55 +++++++++++++ .../metadata/glsa/glsa-201612-15.xml | 52 ++++++++++++ .../metadata/glsa/glsa-201612-16.xml | 80 +++++++++++++++++++ .../metadata/glsa/glsa-201612-17.xml | 51 ++++++++++++ .../metadata/glsa/glsa-201612-18.xml | 61 ++++++++++++++ .../metadata/glsa/glsa-201612-19.xml | 59 ++++++++++++++ .../metadata/glsa/timestamp.chk | 2 +- 9 files changed, 460 insertions(+), 1 deletion(-) create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-12.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-13.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-14.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-15.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-16.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-17.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-18.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-19.xml diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-12.xml new file mode 100644 index 0000000000..8abe387e43 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-12.xml @@ -0,0 +1,53 @@ + + + + Patch: Denial of Service + Patch is vulnerable to a locally generated Denial of Service + condition. + + patch + December 05, 2016 + December 05, 2016: 1 + 538658 + local + + + 2.7.4 + 2.7.4 + + + +

Patch takes a patch file containing a difference listing produced by the + diff program and applies those differences to one or more original files, + producing patched versions. +

+
+ +

Due to a flaw in Patch, the application can enter an infinite loop when + processing a specially crafted diff file. +

+
+ +

A local attacker could pass a specially crafted diff file to Patch, + possibly resulting in a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All patch users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-devel/patch-2.7.4" + + +
+ + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-13.xml new file mode 100644 index 0000000000..f482089e56 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-13.xml @@ -0,0 +1,48 @@ + + + + nghttp2: Denial of Service + Nghttp2 is vulnerable to a Denial of Service attack. + nghttp2 + December 05, 2016 + December 05, 2016: 1 + 574780 + remote + + + 1.7.1 + 1.7.1 + + + +

Nghttp2 is an implementation of HTTP/2 and its header compression + algorithm HPACK in C. +

+
+ +

Nghttpd, nghttp, and libnghttp2_asio applications do not limit the + memory usage for the incoming HTTP header field. If a peer sends a + specially crafted HTTP/2 HEADERS frame and CONTINUATION frame, they will + crash with an out of memory error. +

+
+ +

A remote attacker could possibly cause a Denial of Service condition.

+
+ +

There is no known workaround at this time.

+
+ +

All nghttp2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/nghttp2-1.7.1" + +
+ + CVE-2016-1544 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-14.xml new file mode 100644 index 0000000000..a6f07494c6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-14.xml @@ -0,0 +1,55 @@ + + + + util-linux: Arbitrary code execution + A vulnerability was discovered in util-linux, which could + potentially lead to the execution of arbitrary code. + + util-linux + December 06, 2016 + December 06, 2016: 1 + 530844 + local + + + 2.26 + 2.26 + + + +

util-linux is a suite of Linux programs including mount and umount, + programs used to mount and unmount filesystems. +

+
+ +

A command injection flaw was discovered in util-linux’s “blkid” + utility. It uses caching files (/dev/.blkid.tab or /run/blkid/blkid.tab) + to store info about the UUID, LABEL etc. it finds on certain devices. + However, it does not strip ‘”’ character, so it can be confused to + build variable names containing shell metacharacters, which it would + usually encode inside the value. +

+
+ +

A local attacker could create a specially crafted partition label + containing arbitrary code which would get executed when the “blkid” + utility processes that value. +

+
+ +

There is no known workaround at this time.

+
+ +

All util-linux users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/util-linux-2.26" + +
+ + CVE-2014-9114 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-15.xml new file mode 100644 index 0000000000..39d087b3a1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-15.xml @@ -0,0 +1,52 @@ + + + + ARJ: Multiple vulnerabilities + Multiple vulnerabilities have been found in ARJ, the worst of which + may allow attackers to execute arbitrary code. + + arj + December 06, 2016 + December 06, 2016: 1 + 535708 + 541500 + local, remote + + + 3.10.22-r5 + 3.10.22-r5 + + + +

Open-source implementation of the ARJ archiver.

+
+ +

Multiple vulnerabilities have been discovered in ARJ. Please review the + CVE identifiers referenced below for details. +

+
+ +

An attacker, using a specially crafted ARJ archive, could possibly + execute arbitrary code with the privileges of the process, or cause a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All ARJ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/arj-3.10.22-r5" + +
+ + CVE-2015-0556 + CVE-2015-0557 + CVE-2015-2782 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-16.xml new file mode 100644 index 0000000000..bc7d206bad --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-16.xml @@ -0,0 +1,80 @@ + + + + OpenSSL: Multiple vulnerabilities + Multiple vulnerabilities have been found in OpenSSL, the worst of + which allows attackers to conduct a time based side-channel attack. + + openssl + December 07, 2016 + December 07, 2016: 1 + 581234 + 585142 + 585276 + 591454 + 592068 + 592074 + 592082 + 594500 + 595186 + local, remote + + + 1.0.2j + 1.0.2j + + + +

OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer + (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general + purpose cryptography library. +

+
+ +

Multiple vulnerabilities have been discovered in OpenSSL. Please review + the CVE identifiers and the International Association for Cryptologic + Research’s (IACR) paper, “Make Sure DSA Signing Exponentiations + Really are Constant-Time” for further details. +

+
+ +

Remote attackers could cause a Denial of Service condition or have other + unspecified impacts. Additionally, a time based side-channel attack may + allow a local attacker to recover a private DSA key. +

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSSL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2j" + +
+ + CVE-2016-2105 + CVE-2016-2106 + CVE-2016-2107 + CVE-2016-2108 + CVE-2016-2109 + CVE-2016-2176 + CVE-2016-2177 + CVE-2016-2178 + CVE-2016-2180 + CVE-2016-2183 + CVE-2016-6304 + CVE-2016-6305 + CVE-2016-6306 + CVE-2016-7052 + Make Sure DSA Signing + Exponentiations Really are Constant-Time + + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-17.xml new file mode 100644 index 0000000000..51e0c94308 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-17.xml @@ -0,0 +1,51 @@ + + + + PECL HTTP: Remote execution of arbitrary code + A buffer overflow in PECL HTTP might allow remote attackers to + execute arbitrary code. + + pecl_http + December 07, 2016 + December 07, 2016: 1 + 587466 + remote + + + 2.5.6 + 2.5.6 + + + +

This HTTP extension aims to provide a convenient and powerful + set of functionality for one of PHPs major applications. +

+
+ +

A buffer overflow can be triggered in the URL parsing functions of the + PECL HTTP extension. This allows overflowing + a buffer with data originating from an arbitrary HTTP request. +

+
+ +

A remote attacker, through a specially crafted URI, could possibly + execute arbitrary code with the privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All PECL HTTP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-php/pecl-http-2.5.6" + +
+ + CVE-2016-5873 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-18.xml new file mode 100644 index 0000000000..e6d11b5b9b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-18.xml @@ -0,0 +1,61 @@ + + + + OpenSSH: Multiple vulnerabilities + Multiple vulnerabilities have been found in OpenSSH, the worst of + which allows remote attackers to cause Denial of Service. + + + December 07, 2016 + December 07, 2016: 1 + 576954 + 580410 + 589088 + 590202 + 595342 + 597360 + remote + + + 7.3_p1-r7 + 7.3_p1-r7 + + + +

OpenSSH is a complete SSH protocol implementation that includes SFTP + client and server support. +

+
+ +

Multiple vulnerabilities have been discovered in OpenSSH. Please review + the CVE identifiers referenced below for details. +

+
+ +

Remote attackers could cause Denial of Service and conduct user + enumeration. +

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSSH users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/openssh-7.3_p1-r7" + +
+ + CVE-2015-8325 + CVE-2016-1908 + CVE-2016-3115 + CVE-2016-6210 + CVE-2016-8858 + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-19.xml new file mode 100644 index 0000000000..00550c7e4e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-19.xml @@ -0,0 +1,59 @@ + + + + Mercurial: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mercurial, the worst of + which could lead to the remote execution of arbitrary code. + + mercurial + December 07, 2016 + December 07, 2016: 1 + 533008 + 544332 + 578546 + 582238 + remote + + + 3.8.4 + 3.8.4 + + + +

Mercurial is a distributed source control management system.

+
+ +

Multiple vulnerabilities have been discovered in Mercurial. Please + review the CVE identifier and bug reports referenced for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All mercurial users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-vcs/mercurial-3.8.4" + + +
+ + CVE-2014-9390 + CVE-2014-9462 + CVE-2016-3068 + CVE-2016-3069 + CVE-2016-3105 + CVE-2016-3630 + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index d3d81ca196..92f073798b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 05 Dec 2016 01:13:17 +0000 +Wed, 07 Dec 2016 18:13:28 +0000