diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 7b4574dde4..ec458c168a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 427414 BLAKE2B 03f31e82901c67c54c9e2a393ac3d0d1d25bb342aa53f12ef4cda3b8ecae5db556d030b733bc4f3fdba54171e0a9a96a6e0e3c4ab9239061ea537618ba745ce1 SHA512 01f241123b41771420b69c122806bf7c9c1b4f6f77886ed4e9a9737364198dc0d9cc296f967c056f28a2af511a8d2680a7991527b5ca7723fbd12dcffe525a32 -TIMESTAMP 2018-07-30T15:38:34Z +MANIFEST Manifest.files.gz 428688 BLAKE2B ad7b0e93dc8d25ffce2b6b151e2b2f9d3f4644e2e0bd01b04b2cf32db642d1d55604ebfba538d50e5bffd72012f36cafeebb5fa8b059c51e9495a17ed7d24e61 SHA512 38eef2b8a964d52745f651dc5c44cb508b253654c94f1704d61e63093636d75a72c2f7e2db78f40261fe9fecdede9dacd2401b62f42b01813651f01c9fe87245 +TIMESTAMP 2018-10-07T19:38:41Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAltfMPpfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlu6YMFfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klBgNw//T4p4YyrqTdUXKjPqYDKbPIAY6BLQMU6U2py9pMfpRJy6Mb7Otpfr2KCJ -kM7Fc6KssxErmqes0ivw8FIU6/6NgnTMLETlPC6LPPApd49FmkRrI0JV4qt5CAgR -whUVWRNU7+LGxzL3w9Sj3Z47b6XPRHZwVzsX0F8eXAC4C2prRojGOd+Zs+wilFgE -DiWg3PAiGQQjIOgNq3Jl86d09vD0QkCYNlTJrCil54VW9ct6vXLiyv7Gij5EMmay -gFnhFTNahYgrJkt8EP7R+lRILynopntLOnE1dpsWqWdyqvXaILxNiMWSxQO6c2E+ -lhxvIaD2jZIdldbiy2va3jENhVr7RpqMx9N7mB/CRf0VNhPJc9onqfXWT0h3QCBt -CtosieBoPc8rW3OJYIbvCQmMLzNQ2u4gKVcYwbNGMOwkOiO1oHgevpwHdQ2O5jyK -EDsxINAOG27DHbdHVqWhTfRI5SmxWq47uE6zjM0zKWimbjRY8RFpExVDjM8SCyh0 -J59CYZXLi3h1MpX1Ydi20kGkJKO6O6WzzZzLOn1OK4uBPnD/WYiO36IDH2PjwRSM -XK2pK+UR6bV7Jb9vyK6kdwi+fKMz7BSsJcfXLr67MOAuorx/qq+2vdwghEVmpWj8 -jc6bhGf5mde/MetlAtL2rHWJC1UPNiTBATnZYBIMe1po0zuIjCY= -=OVLH +klBcCw/+KQFZnE+4IPn8ztI2u4v/O0Nsm2Nmv0gKVaRrGLSszOh1NQ7I2/Ran1vH +JH7U1joN/9/se20Sx5nqaXt2ubVNhu4jRYrFVNbbAuDyNqLr8NPi2I0YQPa0pqkW +bxvcNQjcQ5s2tWZTMANkt3DriA117zQidyFjOuZKcZkx5eiTcSq/ICtpF4vQT9U1 +PaB9moOXB7gM+EVvskPYT5D3f16Pe2xTdMPVV7DqDCQFxO7VuiX1tZagVuTkR8Ik +bg5f26ap0TpZOGpCXD56VTOUupb5Yf4K8OJgeg9Q8OQEihXxx2q3fLg69Zf/4E0t +Nwg+uoXvov8EsL8v9W+Tmx9EZTPy1zgTPkqz4e9WsfrVq5QDvro3/tTR28AkhO1i +jzEsR4CZpghnVhl0yejTyrx0u3oP1txkoqpa7DPgUTE3dTICmYiEP/YGtKp7qoIv +/eoUnAA50ojeobe8kx7PxQrgWFZbK4ImWZZvTE+5oTVQrTiUse/vJb4il1Xe0xWU +Dalh9+9K8WrnBfZ6kv7hevdAEmnxZZzX1jPGe1gRLKoBVa/JeXLnmfq8v2li7W53 +uT4nEWZ2Tv+SKSOET8oZfzPL4GjufIyWfNZ1noPjfonXy9J99yb1mkp7Wpcak0c+ +8nMYs6pFmQeaerLMbnRGmitvGkpcipZFw3PJFlsh/xnq+/KCM0Y= +=tYDL -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 2c573718af..aab66931c1 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-01.xml new file mode 100644 index 0000000000..6e5632d69a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-01.xml @@ -0,0 +1,105 @@ + + + + Chromium, Google Chrome: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium and Google + Chrome, the worst of which allows remote attackers to escalate privileges. + + chromium + 2018-08-22 + 2018-08-22 + 657376 + 662436 + remote + + + 68.0.3440.75 + 68.0.3440.75 + + + 68.0.3440.75 + 68.0.3440.75 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+ +

Google Chrome is one fast, simple, and secure browser for all your + devices. +

+
+ +

Multiple vulnerabilities have been discovered in Chromium and Google + Chrome. Please review the referenced CVE identifiers and Google Chrome + Releases for details. +

+
+ +

A remote attacker could escalate privileges, cause a heap buffer + overflow, obtain sensitive information or spoof a URL. +

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-68.0.3440.75" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/google-chrome-68.0.3440.75" + + +
+ + CVE-2018-4117 + CVE-2018-6044 + CVE-2018-6150 + CVE-2018-6151 + CVE-2018-6152 + CVE-2018-6153 + CVE-2018-6154 + CVE-2018-6155 + CVE-2018-6156 + CVE-2018-6157 + CVE-2018-6158 + CVE-2018-6159 + CVE-2018-6160 + CVE-2018-6161 + CVE-2018-6162 + CVE-2018-6163 + CVE-2018-6164 + CVE-2018-6165 + CVE-2018-6166 + CVE-2018-6167 + CVE-2018-6168 + CVE-2018-6169 + CVE-2018-6170 + CVE-2018-6171 + CVE-2018-6172 + CVE-2018-6173 + CVE-2018-6174 + CVE-2018-6175 + CVE-2018-6176 + CVE-2018-6177 + CVE-2018-6178 + CVE-2018-6179 + CVE-2108-6150 + + Google Chrome 68.0.3440.75 release announcement + + + irishluck83 + Zlogene +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-02.xml new file mode 100644 index 0000000000..efe6722f6a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-02.xml @@ -0,0 +1,51 @@ + + + + LinuX Containers user space utilities: Arbitrary file read + A vulnerability has been found in LXC which may allow for arbitrary + file access (read-only). + + lxc + 2018-08-22 + 2018-08-22 + 662780 + local + + + 3.0.1-r1 + 3.0.1-r1 + + + +

LinuX Containers user space utilities.

+
+ +

lxc-user-nic when asked to delete a network interface will + unconditionally open a user provided path. This code path may be used by + an unprivileged user to check for the existence of a path which they + wouldn’t otherwise be able to reach. +

+
+ +

A local unprivileged user could use this flaw to access arbitrary files, + including special device files. +

+
+ +

There is no known workaround at this time.

+
+ +

All LXC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/lxc-3.0.1-r1" + + +
+ + CVE-2018-6556 + + irishluck83 + Zlogene +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-03.xml new file mode 100644 index 0000000000..fbb8ec698c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-03.xml @@ -0,0 +1,61 @@ + + + + NetworkManager VPNC plugin: Privilege escalation + A vulnerability in NetworkManager VPNC plugin allows local users to + escalate privileges. + + networkmanager-vpnc + 2018-08-22 + 2018-08-22 + 661712 + local + + + 1.2.6 + 1.2.6 + + + +

NetworkManager is an universal network configuration daemon for laptops, + desktops, servers and virtualization hosts. +

+ +

The VPNC plugin provides easy access Cisco Concentrator based VPN’s + utilizing NetworkManager. +

+
+ +

When initiating a VPNC connection, NetworkManager spawns a new vpnc + process and passes the configuration via STDIN. By injecting a special + character into a configuration parameter, an attacker can coerce + NetworkManager to set the Password helper option to an attacker + controlled executable file. +

+
+ +

A local attacker is able to escalate privileges via a specially crafted + configuration file. +

+
+ +

There is no known workaround at this time.

+
+ +

All NetworkManager VPNC plugin users should upgrade to the latest + version: +

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=net-misc/networkmanager-vpnc-1.2.6" + + +
+ + CVE-2018-10900 + + irishluck83 + irishluck83 +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-04.xml new file mode 100644 index 0000000000..8427387781 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201808-04.xml @@ -0,0 +1,111 @@ + + + + WebkitGTK+: Multiple vulnerabilities + Multiple vulnerabilities have been found in WebKitGTK+, the worst + of which may lead to arbitrary code execution. + + webkit-gtk + 2018-08-22 + 2018-08-22 + 652820 + 658168 + 662974 + remote + + + 2.20.4 + 2.20.4 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, + suitable for projects requiring any kind of web integration, from hybrid + HTML/CSS applications to full-fledged web browsers. +

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please + review the referenced CVE identifiers for details. +

+
+ +

A remote attacker could execute arbitrary commands or cause a denial of + service condition via a maliciously crafted web content. +

+
+ +

There is no known workaround at this time.

+
+ +

All WebkitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.20.4" + + +
+ + CVE-2018-11646 + CVE-2018-11712 + CVE-2018-11713 + CVE-2018-12293 + CVE-2018-12294 + CVE-2018-4101 + CVE-2018-4113 + CVE-2018-4114 + CVE-2018-4117 + CVE-2018-4118 + CVE-2018-4119 + CVE-2018-4120 + CVE-2018-4121 + CVE-2018-4122 + CVE-2018-4125 + CVE-2018-4127 + CVE-2018-4128 + CVE-2018-4129 + CVE-2018-4133 + CVE-2018-4146 + CVE-2018-4162 + CVE-2018-4163 + CVE-2018-4165 + CVE-2018-4190 + CVE-2018-4192 + CVE-2018-4199 + CVE-2018-4200 + CVE-2018-4201 + CVE-2018-4204 + CVE-2018-4214 + CVE-2018-4218 + CVE-2018-4222 + CVE-2018-4232 + CVE-2018-4233 + CVE-2018-4261 + CVE-2018-4262 + CVE-2018-4263 + CVE-2018-4264 + CVE-2018-4265 + CVE-2018-4266 + CVE-2018-4267 + CVE-2018-4270 + CVE-2018-4272 + CVE-2018-4273 + CVE-2018-4278 + CVE-2018-4284 + WebKitGTK+ + Security Advisory WSA-2018-0003 + + WebKitGTK+ + Security Advisory WSA-2018-0004 + + WebKitGTK+ + Security Advisory WSA-2018-0005 + + WebKitGTK+ + Security Advisory WSA-2018-0006 + + + whissi + irishluck83 +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-01.xml new file mode 100644 index 0000000000..ebe9c30ed5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-01.xml @@ -0,0 +1,115 @@ + + + + Mozilla Firefox: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the + worst of which may allow execution of arbitrary code. + + firefox + 2018-10-02 + 2018-10-02 + 650422 + 657976 + 659432 + 665496 + 666760 + 667612 + remote + + + 60.2.2 + 60.2.2 + + + 60.2.2 + 60.2.2 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla + Project. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please + review the referenced CVE identifiers for details. +

+
+ +

A remote attacker could entice a user to view a specially crafted web + page, possibly resulting in the execution of arbitrary code with the + privileges of the process or a Denial of Service condition. Furthermore, + a remote attacker may be able to perform Man-in-the-Middle attacks, + obtain sensitive information, spoof the address bar, conduct clickjacking + attacks, bypass security restrictions and protection mechanisms, or have + other unspecified impact. +

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-60.2.2" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-60.2.2" + + +
+ + CVE-2017-16541 + CVE-2018-12358 + CVE-2018-12359 + CVE-2018-12360 + CVE-2018-12361 + CVE-2018-12362 + CVE-2018-12363 + CVE-2018-12364 + CVE-2018-12365 + CVE-2018-12366 + CVE-2018-12367 + CVE-2018-12368 + CVE-2018-12369 + CVE-2018-12370 + CVE-2018-12371 + CVE-2018-12376 + CVE-2018-12377 + CVE-2018-12378 + CVE-2018-12379 + CVE-2018-12381 + CVE-2018-12383 + CVE-2018-12385 + CVE-2018-12386 + CVE-2018-12387 + CVE-2018-5125 + CVE-2018-5127 + CVE-2018-5129 + CVE-2018-5130 + CVE-2018-5131 + CVE-2018-5144 + CVE-2018-5150 + CVE-2018-5154 + CVE-2018-5155 + CVE-2018-5156 + CVE-2018-5157 + CVE-2018-5158 + CVE-2018-5159 + CVE-2018-5168 + CVE-2018-5178 + CVE-2018-5183 + CVE-2018-5186 + CVE-2018-5187 + CVE-2018-5188 + CVE-2018-6126 + + whissi + irishluck83 +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-02.xml new file mode 100644 index 0000000000..20bc31cf4a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-02.xml @@ -0,0 +1,59 @@ + + + + SoX: Multiple vulnerabilities + Multiple vulnerabilities have been found in SoX, the worst of which + may lead to a Denial of Service condition. + + sox + 2018-10-06 + 2018-10-06 + 626702 + 627570 + 634450 + 634814 + remote + + + 14.4.2-r1 + 14.4.2-r1 + + + +

SoX is a command line utility that can convert various formats of + computer audio files in to other formats. +

+
+ +

Multiple vulnerabilities have been discovered in SoX. Please review the + referenced CVE identifiers for details. +

+
+ +

A remote attacker, by enticing a user to process a crafted WAV, HCOM, + SND, or AIFF file, could cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All SoX users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-sound/sox-14.4.2-r1" + +
+ + CVE-2017-11332 + CVE-2017-11358 + CVE-2017-11359 + CVE-2017-15370 + CVE-2017-15371 + CVE-2017-15372 + CVE-2017-15642 + + BlueKnight + irishluck83 +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-03.xml new file mode 100644 index 0000000000..9165083ac1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-03.xml @@ -0,0 +1,49 @@ + + + + OpenSSH: User enumeration vulnerability + A vulnerability in OpenSSH might allow remote attackers to + determine valid usernames. + + openssh + 2018-10-06 + 2018-10-06 + 664264 + remote + + + 7.7_p1-r8 + 7.7_p1-r8 + + + +

OpenSSH is a complete SSH protocol implementation that includes SFTP + client and server support. +

+
+ +

It was discovered that OpenSSH was prone to a user enumeration + vulnerability. +

+
+ +

A remote attacker could conduct user enumeration.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSSH users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/openssh-7.7_p1-r8" + + +
+ + CVE-2018-15473 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-04.xml new file mode 100644 index 0000000000..8b1b96e811 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201810-04.xml @@ -0,0 +1,76 @@ + + + + ImageMagick: Security hardening + Due to multiple vulnerabilities in various coders used by + ImageMagick, Gentoo Linux now installs a policy.xml file which will + restrict coder usage by default. + + imagemagick + 2018-10-06 + 2018-10-06 + 664236 + local, remote + + + 6.9.10.10-r1 + 7.0.8.10-r1 + 6.9.10.10-r1 + 7.0.8.10-r1 + + + +

ImageMagick is a collection of tools and libraries for many image + formats. +

+
+ +

If you process an image with ImageMagick and don’t validate the file + before (e.g. check magic byte), ImageMagick will call any coders found in + the given file. So if ImageMagick will find Ghostscript for example, it + will call Ghostscript. +

+ +

Due to multiple -dSAFER sandbox bypass vulnerabilities in Ghostscript, + this can lead to arbitrary code execution. +

+ +

To mitigate this problem we install a policy.xml file by default which + will disable PS, EPS, PDF, and XPS coders. +

+
+ +

A remote attacker, by enticing a user to process a specially crafted + image file, could execute arbitrary code with the privileges of the + process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All ImageMagick 6 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=media-gfx/imagemagick-6.9.10.10-r1" + + +

All ImageMagick 7 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=media-gfx/imagemagick-7.0.8.10-r1" + + +
+ + Ghostscript contains + multiple -dSAFER sandbox bypass vulnerabilities (VU#332928) + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index ff19ea6845..fd16c36c45 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 30 Jul 2018 15:38:31 +0000 +Sun, 07 Oct 2018 19:38:38 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 39d5ceab63..6add75c130 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -bc003b9516bfd3c1d933c8cd919b86b13f8c5548 1532902339 2018-07-29T22:12:19+00:00 +b914ac7ce64b6f61d701c5cf4173dd03fafdca0e 1538845801 2018-10-06T17:10:01+00:00