diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 2696b3f48b..adc8c31162 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 518284 BLAKE2B cb5fac863af3ef8aeec2b30770dcc46b92cbbaa35f883be3558623dd9e5b3307de19f033786959c2acefd089b402b92ae2601f1a2c9fbecd7bfee07eeebbf7b1 SHA512 052cb56c55e024e97ce62af25a94a63d53c61d2136da88877dd492ef68703ac7e8da03f6d57bdbf30b2c7ff7dccedfad2ae627469dda5745354b99d6f6e960d8 -TIMESTAMP 2022-02-14T12:39:14Z +MANIFEST Manifest.files.gz 536244 BLAKE2B 47908e9e54099299278f14e5112b789aac78178d7406b6880e3986163e8e2aeec411757dbe131202da7291c508ea72a7d158f7fe08facf6e36a23a28a992a7d8 SHA512 ef16d73b0d889ec01efae4d55e398ba1b384a7b46066c129d82b336f46e8804d0dd1765c65c49d93842dc829696efc67759ac790655f316a70359fb8847d9e4e +TIMESTAMP 2022-11-18T11:39:56Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmIKTXJfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmN3bwxfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klCAjA/9HwFYsxuRkPGRrV6K8wLfVbDVy/k1z37D9snjOnQ5b7wG3qlFapO+aD5d -qRiqgJGNRmhF6j7YJ9jfTw3jeCxeIn2lR4S6KCSizAofr5Nzl/DNobfSqjNoDWew -k8MZ/zu5WS7iHeSgXfX03fB/dXiwpxQBT14REa8pCfxnnplPKeu+FxyLRY1CCj8S -xS/boQOaJUYwo7X9ODKjM9D2zQbhuQIn9TkCAZMCVDxaz93ITLZUEM+lNAKKRngo -tHIDi3PQorvgCbrbCog5dLXi90Lziv7kpUJpF/rI70RisP4vbKFGXWA5ySs2lKXD -CJTXEV03p0CZx+FN8l8KsaHG9FM3V1f7jVJdbs+x8cAxM9ycVNZYMU3BHJClW7CE -MSUB9bdH+GB94qtj580+d4xq1A/MsWSvsARlWo2YgWoIetvCLlCp6qNSooKUFHiu -UmlyYPVLWaGBtrBYIEkJCWrsBG6TgYweMXVOpXNv0SLuUiv2PfynzThHeF7KqCtY -G/Rd2hO+awkXUS3DnjSw1Ldduvd/gOrwa6TV5KYdfBI5pfvn1CmbrUJFjcscigX2 -mTy1MQuh0HtqYGlUGmGKF6vf7dJiD7RSxM4EGA6ySepCQYtlj62zC+d/smlU9mmJ -4U+j6d1yk0cI518+9Uxj+xlHX6ItY11h18P5UASSIBFbwxajMhw= -=1Nn+ +klBofg//VsVRzTk9MRvuKpQh5uKwkc4MXC+hY/TOxmUKNMuG6ZjaNiXdjz0Z5HXr +R5OlMOiOdRsBp2y9UHAcyjopo8OdIf3g6jzdpbBcEBw/nx+iHsP8ebrsHqiXSLXI +77XS2/pob3vYuSndXbfvLs0ZemqBXOcflneIQ9rkOD/LnpOyH1o3RYPnahoAVqQZ +mytgfss+b7cZjogvbiOCBqjPtTTHn6F8rDq9Jmn7KsbIi6hIzHDcKa4CI/C4f74n +MKi992d5ZLKck+zkOEU+fYXy9xuoALPxxM8tD4LvyfW+2DoVmgtERDw2HPxWTBim +7yB2pmcrkv5sOeNar2ftZdFRS7ZX26OS9wvIE6qZbh6cnjTKJB71mY/DwV3V0sPX +1nQLG0V5Ors9wtM93GbbQY9Qxh8l9WQ6/jpNiwqoZLfPRUcsgo69Q0VxOd/qKXOQ +sKR5opWTozn6qL55+CuqH3msq+agDkWAYSjdmNTiEbEv6inlSx+zJlGuChA6Ve7c +0e7UnJYyQQiyir8bxXtJPZesrIav61Q/eM+X4LtGrxeGFzvAmn/yl6f9uda2w16w +yG64E9BdgHZEX8r2QCIGs9iJE9DZ+7dgc9RwXVmEDxRiZ96395ZzHta++PypIL4B +MkK5S669/ZseQz/2LmceECvdXIKt95dJKvmgVpcs/vU+eCuTu/s= +=/0PV -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index c2498e00e9..1de8930745 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202007-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202007-17.xml index 1234ccc4b9..1260a6ea54 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202007-17.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202007-17.xml @@ -47,8 +47,6 @@ CVE-2019-1010302 CVE-2019-19035 - CVE-2020-6624 - CVE-2020-6625 sam_c sam_c diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-02.xml new file mode 100644 index 0000000000..4052f2b557 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-02.xml @@ -0,0 +1,90 @@ + + + + Chromium, Google Chrome: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium and Google +Chrome, the worst of which could result in the arbitrary execution +of code. + + chromium,google-chrome + 2022-02-20 + 2022-02-20 + 832559 + 833432 + remote + + + 98.0.4758.102 + 98.0.4758.102 + + + 98.0.4758.102 + 98.0.4758.102 + + + +

Chromium is an open-source browser project that aims to build a safer, +faster, and more stable way for all users to experience the web. + +Google Chrome is one, fast, simple, and secure browser for all your +devices. +

+
+ +

Multiple vulnerabilities have been discovered in Chromium and Google +Chrome. Please review the CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-98.0.4758.102" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-98.0.4758.102" + +
+ + CVE-2022-0452 + CVE-2022-0453 + CVE-2022-0454 + CVE-2022-0455 + CVE-2022-0456 + CVE-2022-0457 + CVE-2022-0458 + CVE-2022-0459 + CVE-2022-0460 + CVE-2022-0461 + CVE-2022-0462 + CVE-2022-0463 + CVE-2022-0464 + CVE-2022-0465 + CVE-2022-0466 + CVE-2022-0467 + CVE-2022-0468 + CVE-2022-0469 + CVE-2022-0470 + CVE-2022-0603 + CVE-2022-0604 + CVE-2022-0605 + CVE-2022-0606 + CVE-2022-0607 + CVE-2022-0608 + CVE-2022-0609 + CVE-2022-0610 + + sam + sam +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-03.xml new file mode 100644 index 0000000000..ae075c5b85 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202202-03.xml @@ -0,0 +1,141 @@ + + + + Mozilla Firefox: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. + firefox,firefox-bin + 2022-02-21 + 2022-02-21 + 802768 + 807947 + 813498 + 821385 + 828538 + 831039 + 832992 + remote + + + 91.6.0 + 97.0 + 97.0 + + + 91.6.0 + 97.0 + 97.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-91.6.0:esr" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-91.6.0:esr" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-97.0:rapid" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-97.0:rapid" + +
+ + CVE-2021-29970 + CVE-2021-29972 + CVE-2021-29974 + CVE-2021-29975 + CVE-2021-29976 + CVE-2021-29977 + CVE-2021-29980 + CVE-2021-29981 + CVE-2021-29982 + CVE-2021-29984 + CVE-2021-29985 + CVE-2021-29986 + CVE-2021-29987 + CVE-2021-29988 + CVE-2021-29989 + CVE-2021-29990 + CVE-2021-30547 + CVE-2021-38491 + CVE-2021-38493 + CVE-2021-38495 + CVE-2021-38503 + CVE-2021-38504 + CVE-2021-38506 + CVE-2021-38507 + CVE-2021-38508 + CVE-2021-38509 + CVE-2021-4129 + CVE-2021-4140 + CVE-2021-43536 + CVE-2021-43537 + CVE-2021-43538 + CVE-2021-43539 + CVE-2021-43540 + CVE-2021-43541 + CVE-2021-43542 + CVE-2021-43543 + CVE-2021-43545 + CVE-2021-43546 + CVE-2022-0511 + CVE-2022-22737 + CVE-2022-22738 + CVE-2022-22739 + CVE-2022-22740 + CVE-2022-22741 + CVE-2022-22742 + CVE-2022-22743 + CVE-2022-22745 + CVE-2022-22747 + CVE-2022-22748 + CVE-2022-22751 + CVE-2022-22753 + CVE-2022-22754 + CVE-2022-22755 + CVE-2022-22756 + CVE-2022-22757 + CVE-2022-22758 + CVE-2022-22759 + CVE-2022-22760 + CVE-2022-22761 + CVE-2022-22762 + CVE-2022-22763 + CVE-2022-22764 + MOZ-2021-0004 + MOZ-2021-0005 + MOZ-2021-0006 + MOZ-2021-0007 + MOZ-2021-0008 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202207-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202207-01.xml new file mode 100644 index 0000000000..ecb32ade07 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202207-01.xml @@ -0,0 +1,61 @@ + + + + HashiCorp Vault: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in HashiCorp Vault, the worst of which could result in denial of service. + vault + 2022-07-29 + 2022-07-29 + 768312 + 797244 + 808093 + 817269 + 827945 + 829493 + 835070 + 845405 + remote + + + 1.10.3 + 1.10.3 + + + +

HashiCorp Vault is a tool for managing secrets.

+
+ +

Multiple vulnerabilities have been discovered in HashiCorp Vault. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All HashiCorp Vault users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/vault-1.10.3" + +
+ + CVE-2020-25594 + CVE-2021-27668 + CVE-2021-3024 + CVE-2021-3282 + CVE-2021-32923 + CVE-2021-37219 + CVE-2021-38553 + CVE-2021-38554 + CVE-2021-41802 + CVE-2021-43998 + CVE-2021-45042 + CVE-2022-25243 + CVE-2022-30689 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-01.xml new file mode 100644 index 0000000000..ed2d5810df --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-01.xml @@ -0,0 +1,42 @@ + + + + 3MF Consortium lib3mf: Remote code execution + A vulnerability in lib3mf could lead to remote code execution. + lib3mf + 2022-08-04 + 2022-08-04 + 775362 + remote + + + 2.1.1 + 2.1.1 + + + +

lib3mf is an implementation of the 3D Manufacturing Format file standard.

+
+ +

Incorrect memory handling within lib3mf could result in a use-after-free.

+
+ +

An attacker that can provide malicious input to an application using 3MF Consortium's lib3mf could achieve remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All 3MF Consortium lib3mf users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/lib3mf-2.1.1" + +
+ + CVE-2021-21772 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-02.xml new file mode 100644 index 0000000000..a23a1a3420 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-02.xml @@ -0,0 +1,101 @@ + + + + Go: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution. + go + 2022-08-04 + 2022-08-04 + 754210 + 766216 + 775326 + 788640 + 794784 + 802054 + 806659 + 807049 + 816912 + 821859 + 828655 + 833156 + 834635 + 838130 + 843644 + 849290 + 857822 + 862822 + remote + + + 1.18.5 + 1.18.5 + + + +

Go is an open source programming language that makes it easy to build simple, reliable, and efficient software.

+
+ +

Multiple vulnerabilities have been discovered in Go. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Go users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/go-1.18.5" + + +

In addition, users using Portage 3.0.9 or later should ensure that packages with Go binaries have no vulnerable code statically linked into their binaries by rebuilding the @golang-rebuild set:

+ + + # emerge --ask --oneshot --verbose @golang-rebuild + +
+ + CVE-2020-28366 + CVE-2020-28367 + CVE-2021-27918 + CVE-2021-27919 + CVE-2021-29923 + CVE-2021-3114 + CVE-2021-3115 + CVE-2021-31525 + CVE-2021-33195 + CVE-2021-33196 + CVE-2021-33197 + CVE-2021-33198 + CVE-2021-34558 + CVE-2021-36221 + CVE-2021-38297 + CVE-2021-41771 + CVE-2021-41772 + CVE-2021-44716 + CVE-2021-44717 + CVE-2022-1705 + CVE-2022-23772 + CVE-2022-23773 + CVE-2022-23806 + CVE-2022-24675 + CVE-2022-24921 + CVE-2022-27536 + CVE-2022-28131 + CVE-2022-28327 + CVE-2022-29526 + CVE-2022-30629 + CVE-2022-30630 + CVE-2022-30631 + CVE-2022-30632 + CVE-2022-30633 + CVE-2022-30635 + CVE-2022-32148 + CVE-2022-32189 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-03.xml new file mode 100644 index 0000000000..942101cddc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-03.xml @@ -0,0 +1,42 @@ + + + + Babel: Remote code execution + A vulnerability in Babel could result in remote code execution. + Babel + 2022-08-04 + 2022-08-04 + 786954 + remote + + + 2.9.1 + 2.9.1 + + + +

Babel is a collection of tools for internationalizing Python applications.

+
+ +

Babel does not properly restrict which sources a locale can be loaded from. If Babel loads an attacker-controlled .dat file, arbitrary code execution can be achieved via unsafe Pickle deserialization.

+
+ +

An attacker with filesystem access and control over the locales Babel loads can achieve code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All Babel users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/Babel-2.9.1" + +
+ + CVE-2021-20095 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-04.xml new file mode 100644 index 0000000000..59a03c63d7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-04.xml @@ -0,0 +1,42 @@ + + + + libmcpp: Denial of service + Multiple vulnerabilities in libmcpp could result in a denial of service condition. + libmcpp + 2022-08-04 + 2022-08-04 + 718808 + remote + + + 2.7.2_p5 + 2.7.2_p5 + + + +

libmcpp is a portable C/C++ preprocessor.

+
+ +

A buffer overflow and an out-of-bounds read vulnerability have been discovered in libmcpp, which could be exploited for denial of service.

+
+ +

An attacker that can provide crafted input to libmcpp could achieve denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All libmcpp users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-cpp/libmcpp-2.7.2_p5" + +
+ + CVE-2019-14274 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-05.xml new file mode 100644 index 0000000000..088ef70191 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-05.xml @@ -0,0 +1,46 @@ + + + + Icinga Web 2: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Icinga Web 2, the worst of which could result in remote code execution. + icingaweb2 + 2022-08-04 + 2022-08-04 + 738024 + 834802 + remote + + + 2.9.6 + 2.9.6 + + + +

Icinga Web 2 is a frontend for icinga2.

+
+ +

Multiple vulnerabilities have been discovered in Icinga Web 2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Icinga Web 2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apps/icingaweb2-2.9.6" + +
+ + CVE-2020-24368 + CVE-2022-24714 + CVE-2022-24715 + CVE-2022-24716 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-06.xml new file mode 100644 index 0000000000..825a5a80eb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-06.xml @@ -0,0 +1,48 @@ + + + + lxml: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in lxml, the worst of which could result in denial of service. + lxml + 2022-08-10 + 2022-08-10 + 777579 + 829053 + 856598 + remote + + + 4.9.1 + 4.9.1 + + + +

lxml is a Pythonic binding for the libxml2 and libxslt libraries.

+
+ +

Multiple vulnerabilities have been discovered in lxml. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All lxml users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/lxml-4.9.1" + +
+ + CVE-2021-28957 + CVE-2021-43818 + CVE-2022-2309 + GHSL-2021-1037 + GHSL-2021-1038 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-07.xml new file mode 100644 index 0000000000..7f95f07829 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-07.xml @@ -0,0 +1,42 @@ + + + + LibRaw: Stack buffer overread + A buffer overread in LibRaw might allow an attacker to cause denial of service. + libraw + 2022-08-10 + 2022-08-10 + 793956 + remote + + + 0.20.2 + 0.20.2 + + + +

LibRaw is a library for reading RAW files obtained from digital photo cameras.

+
+ +

LibRaw incorrectly handles parsing DNG fields in some cases, potentially resulting in a buffer overread leading to denial of service.

+
+ +

An attacker capable of providing crafted input to LibRaw could trigger denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All LibRaw users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libraw-0.20.2" + +
+ + CVE-2020-24870 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-08.xml new file mode 100644 index 0000000000..025606af2f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-08.xml @@ -0,0 +1,147 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. + firefox,firefox-bin + 2022-08-10 + 2022-08-10 + 834631 + 834804 + 836866 + 842438 + 846593 + 849044 + 857045 + 861515 + remote + + + 91.12.0 + 103.0 + 103.0 + 91.12.0 + + + 91.12.0 + 103.0 + 91.12.0 + 103.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-91.12.0:esr" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-91.12.0:esr" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-103.0:rapid" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-103.0:rapid" + +
+ + CVE-2022-0843 + CVE-2022-1196 + CVE-2022-1529 + CVE-2022-1802 + CVE-2022-1919 + CVE-2022-2200 + CVE-2022-2505 + CVE-2022-24713 + CVE-2022-26381 + CVE-2022-26382 + CVE-2022-26383 + CVE-2022-26384 + CVE-2022-26385 + CVE-2022-26386 + CVE-2022-26387 + CVE-2022-26485 + CVE-2022-26486 + CVE-2022-28281 + CVE-2022-28282 + CVE-2022-28283 + CVE-2022-28284 + CVE-2022-28285 + CVE-2022-28286 + CVE-2022-28287 + CVE-2022-28288 + CVE-2022-28289 + CVE-2022-29909 + CVE-2022-29910 + CVE-2022-29911 + CVE-2022-29912 + CVE-2022-29914 + CVE-2022-29915 + CVE-2022-29916 + CVE-2022-29917 + CVE-2022-29918 + CVE-2022-31736 + CVE-2022-31737 + CVE-2022-31738 + CVE-2022-31740 + CVE-2022-31741 + CVE-2022-31742 + CVE-2022-31743 + CVE-2022-31744 + CVE-2022-31745 + CVE-2022-31747 + CVE-2022-31748 + CVE-2022-34468 + CVE-2022-34469 + CVE-2022-34470 + CVE-2022-34471 + CVE-2022-34472 + CVE-2022-34473 + CVE-2022-34474 + CVE-2022-34475 + CVE-2022-34476 + CVE-2022-34477 + CVE-2022-34478 + CVE-2022-34479 + CVE-2022-34480 + CVE-2022-34481 + CVE-2022-34482 + CVE-2022-34483 + CVE-2022-34484 + CVE-2022-34485 + CVE-2022-36315 + CVE-2022-36316 + CVE-2022-36318 + CVE-2022-36319 + CVE-2022-36320 + MFSA-2022-14 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-09.xml new file mode 100644 index 0000000000..e692833bfc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-09.xml @@ -0,0 +1,55 @@ + + + + HashiCorp Consul: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in HashiCorp Consul, the worst of which could result in denial of service. + consul + 2022-08-10 + 2022-08-10 + 760696 + 783483 + 802522 + 812497 + 834006 + 838328 + remote + + + 1.9.17 + 1.9.17 + + + +

HashiCorp Consul is a tool for service discovery, monitoring and configuration.

+
+ +

Multiple vulnerabilities have been discovered in HashiCorp Consul. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All HashiCorp Consul users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/consul-1.9.17" + +
+ + CVE-2020-25201 + CVE-2020-25864 + CVE-2020-28053 + CVE-2021-28156 + CVE-2021-32574 + CVE-2021-36213 + CVE-2021-38698 + CVE-2022-24687 + CVE-2022-29153 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-10.xml new file mode 100644 index 0000000000..17cef54e06 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-10.xml @@ -0,0 +1,44 @@ + + + + Spice Server: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Spice Server, the worst of which may result in the remote execution of arbitrary code. + spice + 2022-08-10 + 2022-08-10 + 746920 + 792618 + remote + + + 0.15.0 + 0.15.0 + + + +

Provides a complete open source solution for remote access to virtual machines in a seamless way so you can play videos, record audio, share USB devices and share folders without complications.

+
+ +

Multiple vulnerabilities have been discovered in Spice Server, please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Spice Server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/spice-0.15.0" + +
+ + CVE-2021-14355 + CVE-2021-20201 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-11.xml new file mode 100644 index 0000000000..b81aff9336 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-11.xml @@ -0,0 +1,43 @@ + + + + Yubico pam-u2f: Local PIN Bypass vulnerability + A vulnerability has been discovered in pam-u2f which could allow a local attacker to bypass PIN entry. + pam_u2f + 2022-08-10 + 2022-08-10 + 792270 + local + + + 1.1.1 + 1.1.1 + + + +

Yubico pam-u2f is a PAM module for FIDO2 and U2F keys.

+
+ +

A logic issue in Yubico pam-u2f could result in the bypass of a PIN entry requirement when authenticating with FIDO2.

+
+ +

An attacker with local access to certain applications using pam-u2f for authentication could incorrectly successfully authenticate without entering the authentication PIN.

+
+ +

There is no known workaround at this time.

+
+ +

All Yubico pam-u2f users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-auth/pam_u2f-1.1.1" + +
+ + CVE-2021-31924 + YSA-2021-03 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-12.xml new file mode 100644 index 0000000000..5cb982d78c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-12.xml @@ -0,0 +1,44 @@ + + + + mdbtools: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in mdbtools, the worst of which + mdbtools + 2022-08-10 + 2022-08-10 + 773289 + 830371 + remote + + + 0.9.3 + 0.9.3 + + + +

mdbtools is a set of libraries and utilities for reading Microsoft Access database (MDB) files.

+
+ +

Multiple vulnerabilities have been discovered in mdbtools. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All mdbtools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-office/mdbtools-0.9.3" + +
+ + CVE-2021-45926 + CVE-2021-45927 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-13.xml new file mode 100644 index 0000000000..e0ce4d1345 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-13.xml @@ -0,0 +1,42 @@ + + + + libass: Denial of service + A vulnerability in libass could result in denial of service. + libass + 2022-08-10 + 2022-08-10 + 803119 + remote + + + 0.15.1 + 0.15.1 + + + +

libass is a portable subtitle renderer for the ASS/SSA (Advanced Substation Alpha/Substation Alpha) subtitle format.

+
+ +

A one-byte buffer overwrite in ASS font decoding could trigger an assertion failure resulting in denial of service.

+
+ +

An attacker with control over the ASS track input to libass via an application using it could trigger a denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All libass users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libass-0.15.1" + +
+ + CVE-2020-36430 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-14.xml new file mode 100644 index 0000000000..b9e3341e39 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-14.xml @@ -0,0 +1,165 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in the arbitrary execution of code. + thunderbird,thunderbird-bin + 2022-08-10 + 2022-08-10 + 794085 + 802759 + 807943 + 811912 + 813501 + 822294 + 828539 + 831040 + 833520 + 834805 + 845057 + 846596 + 849047 + 857048 + 864577 + remote + + + 91.12.0 + 91.12.0 + + + 91.12.0 + 91.12.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-91.12.0" + + +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-91.12.0" + +
+ + CVE-2021-4129 + CVE-2021-4140 + CVE-2021-29967 + CVE-2021-29969 + CVE-2021-29970 + CVE-2021-29976 + CVE-2021-29980 + CVE-2021-29984 + CVE-2021-29985 + CVE-2021-29986 + CVE-2021-29988 + CVE-2021-29989 + CVE-2021-30547 + CVE-2021-38492 + CVE-2021-38493 + CVE-2021-38495 + CVE-2021-38503 + CVE-2021-38504 + CVE-2021-38506 + CVE-2021-38507 + CVE-2021-38508 + CVE-2021-38509 + CVE-2021-40529 + CVE-2021-43528 + CVE-2021-43529 + CVE-2021-43536 + CVE-2021-43537 + CVE-2021-43538 + CVE-2021-43539 + CVE-2021-43541 + CVE-2021-43542 + CVE-2021-43543 + CVE-2021-43545 + CVE-2021-43546 + CVE-2022-0566 + CVE-2022-1196 + CVE-2022-1197 + CVE-2022-1520 + CVE-2022-1529 + CVE-2022-1802 + CVE-2022-1834 + CVE-2022-2200 + CVE-2022-2226 + CVE-2022-22737 + CVE-2022-22738 + CVE-2022-22739 + CVE-2022-22740 + CVE-2022-22741 + CVE-2022-22742 + CVE-2022-22743 + CVE-2022-22745 + CVE-2022-22747 + CVE-2022-22748 + CVE-2022-22751 + CVE-2022-22754 + CVE-2022-22756 + CVE-2022-22759 + CVE-2022-22760 + CVE-2022-22761 + CVE-2022-22763 + CVE-2022-22764 + CVE-2022-24713 + CVE-2022-26381 + CVE-2022-26383 + CVE-2022-26384 + CVE-2022-26386 + CVE-2022-26387 + CVE-2022-26485 + CVE-2022-26486 + CVE-2022-28281 + CVE-2022-28282 + CVE-2022-28285 + CVE-2022-28286 + CVE-2022-28289 + CVE-2022-29909 + CVE-2022-29911 + CVE-2022-29912 + CVE-2022-29913 + CVE-2022-29914 + CVE-2022-29916 + CVE-2022-29917 + CVE-2022-31736 + CVE-2022-31737 + CVE-2022-31738 + CVE-2022-31740 + CVE-2022-31741 + CVE-2022-31742 + CVE-2022-31747 + CVE-2022-34468 + CVE-2022-34470 + CVE-2022-34472 + CVE-2022-34478 + CVE-2022-34479 + CVE-2022-34481 + CVE-2022-34484 + CVE-2022-36318 + CVE-2022-36319 + MOZ-2021-0007 + MOZ-2021-0008 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-15.xml new file mode 100644 index 0000000000..dd408fc6a0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-15.xml @@ -0,0 +1,47 @@ + + + + isync: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in isync, the worst of which could result in arbitrary code execution. + isync + 2022-08-10 + 2022-08-10 + 771738 + 794772 + 826902 + remote + + + 1.4.4 + 1.4.4 + + + +

isync is an IMAP and MailDir mailbox synchronizer.

+
+ +

Multiple vulnerabilities have been discovered in isync. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All isync users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-mail/isync-1.4.4" + +
+ + CVE-2021-3578 + CVE-2021-3657 + CVE-2021-20247 + CVE-2021-44143 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-16.xml new file mode 100644 index 0000000000..54bf4f2056 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-16.xml @@ -0,0 +1,42 @@ + + + + faac: Denial of service + A vulnerability in faac could result in denial of service. + faac + 2022-08-10 + 2022-08-10 + 762505 + remote + + + 1.30 + 1.30 + + + +

faac contains free MPEG-4 audio codecs by AudioCoding.com.

+
+ +

An invalid pointer can be dereferenced in the huffcode function of libfaac/huff2.c, leading to a crash.

+
+ +

An attacker with the ability to provide crafted input to faac could cause a denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All faac users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/faac-1.30" + +
+ + CVE-2018-19886 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-17.xml new file mode 100644 index 0000000000..c4ead64272 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-17.xml @@ -0,0 +1,72 @@ + + + + Nextcloud: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Nextcloud, the worst of which could result in denial of service. + nextcloud + 2022-08-10 + 2022-08-10 + 848873 + 835073 + 834803 + 820368 + 812443 + 802096 + 797253 + remote + + + 23.0.4 + 23.0.4 + + + +

Nextcloud is a personal cloud that runs on your own server.

+
+ +

Multiple vulnerabilities have been discovered in Nextcloud. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Nextcloud users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apps/nextcloud-23.0.4" + +
+ + CVE-2021-32653 + CVE-2021-32654 + CVE-2021-32655 + CVE-2021-32656 + CVE-2021-32657 + CVE-2021-32678 + CVE-2021-32679 + CVE-2021-32680 + CVE-2021-32688 + CVE-2021-32703 + CVE-2021-32705 + CVE-2021-32725 + CVE-2021-32726 + CVE-2021-32734 + CVE-2021-32800 + CVE-2021-32801 + CVE-2021-32802 + CVE-2021-41177 + CVE-2021-41178 + CVE-2021-41239 + CVE-2021-41241 + CVE-2022-24741 + CVE-2022-24888 + CVE-2022-24889 + CVE-2022-29243 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-18.xml new file mode 100644 index 0000000000..b1bb9fed49 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-18.xml @@ -0,0 +1,42 @@ + + + + Motion: Denial of service + A vulnerability in Motion allows a remote attacker to cause denial of service. + motion + 2022-08-10 + 2022-08-10 + 760714 + remote + + + 4.3.2 + 4.3.2 + + + +

Motion is a program that monitors the video signal from one or more cameras and is able to detect motions.

+
+ +

The Motion HTTP server does not correctly perform URL decoding. If the HTTP server receives a request for a URL containing an incomplete percent-encoded character, a flaw in parsing results in an infinite loop trying to parse the rest of the character, which eventually results in a denial of service condition when reading out-of-bounds.

+
+ +

A remote attacker can trigger a denial of service condition in Motion.

+
+ +

There is no known workaround at this time.

+
+ +

All Motion users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/motion-4.3.2" + +
+ + CVE-2020-26566 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-19.xml new file mode 100644 index 0000000000..8011cbc8a8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-19.xml @@ -0,0 +1,43 @@ + + + + aiohttp: Open redirect vulnerability + An open redirect vulnerability has been discovered in aiohttp. + aiohttp + 2022-08-10 + 2022-08-10 + 772932 + remote + + + 3.7.4 + 3.7.4 + + + +

aiohttp is an asynchronous HTTP client/server framework for asyncio and Python.

+
+ +

A bug in aiohttp.web_middlewares.normalize_path_middleware creates an open redirect vulnerability.

+
+ +

An attacker use this vulnerability to craft a link that, while appearing to be a link to an aiohttp-based website, redirects users to an arbitrary attacker-controlled URL.

+
+ +

There is no known workaround at this time.

+
+ +

All aiohttp users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/aiohttp-3.7.4" + +
+ + CVE-2021-21330 + GHSA-v6wp-4m6f-gcjg + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-20.xml new file mode 100644 index 0000000000..58744f5a5b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-20.xml @@ -0,0 +1,78 @@ + + + + Apache HTTPD: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Apache Webserver, the worst of which could result in remote code execution. + apache,apache-tools + 2022-08-14 + 2022-08-14 + 813429 + 816399 + 816864 + 829722 + 835131 + 850622 + remote + + + 2.4.54 + 2.4.54 + + + 2.4.54 + 2.4.54 + + + +

The Apache HTTP server is one of the most popular web servers on the Internet.

+
+ +

Multiple vulnerabilities have been discovered in Apache HTTPD. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Apache HTTPD users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.54" + + +

All Apache HTTPD tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/apache-tools-2.4.54" + +
+ + CVE-2021-33193 + CVE-2021-34798 + CVE-2021-36160 + CVE-2021-39275 + CVE-2021-40438 + CVE-2021-41524 + CVE-2021-41773 + CVE-2021-42013 + CVE-2021-44224 + CVE-2021-44790 + CVE-2022-22719 + CVE-2022-22720 + CVE-2022-22721 + CVE-2022-23943 + CVE-2022-26377 + CVE-2022-28614 + CVE-2022-28615 + CVE-2022-29404 + CVE-2022-30522 + CVE-2022-30556 + CVE-2022-31813 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-21.xml new file mode 100644 index 0000000000..3f883725ca --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-21.xml @@ -0,0 +1,42 @@ + + + + libebml: Heap buffer overflow vulnerability + A heap-based buffer overflow in libeml might allow attackers to execute arbitrary code. + libebml + 2022-08-14 + 2022-08-14 + 772272 + remote + + + 1.4.2 + 1.4.2 + + + +

libebml is a C++ library to parse EBML files.

+
+ +

On 32bit builds of libebml, the length of a string is miscalculated, potentially leading to an exploitable heap overflow.

+
+ +

An attacker able to provide arbitrary input to libebml could achieve arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

Users of libebml on 32 bit architectures should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libebml-1.4.2" + +
+ + CVE-2021-3405 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-22.xml new file mode 100644 index 0000000000..5e5f67c918 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-22.xml @@ -0,0 +1,44 @@ + + + + xterm: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in xterm, the worst of which could result in denial of service. + xterm + 2022-08-14 + 2022-08-14 + 769839 + 832409 + remote + + + 371 + 371 + + + +

xterm is a terminal emulator for the X Window system.

+
+ +

Multiple vulnerabilities have been discovered in xterm. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All xterm users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-terms/xterm-371" + +
+ + CVE-2021-27135 + CVE-2022-24130 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-23.xml new file mode 100644 index 0000000000..dcdd731817 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-23.xml @@ -0,0 +1,88 @@ + + + + Xen: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Xen, the worst of which could result in remote code execution (guest sandbox escape). + xen,xen-tools + 2022-08-14 + 2022-08-14 + 810341 + 812485 + 816882 + 825354 + 832039 + 835401 + 850802 + remote + + + 4.15.3 + 4.15.3 + + + 4.15.3 + 4.15.3 + + + +

Xen is a bare-metal hypervisor.

+
+ +

Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Xen users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.15.3" + + +

All Xen tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-tools-4.15.3" + +
+ + CVE-2021-28694 + CVE-2021-28695 + CVE-2021-28696 + CVE-2021-28697 + CVE-2021-28698 + CVE-2021-28699 + CVE-2021-28700 + CVE-2021-28701 + CVE-2021-28702 + CVE-2021-28710 + CVE-2022-21123 + CVE-2022-21125 + CVE-2022-21166 + CVE-2022-23033 + CVE-2022-23034 + CVE-2022-23035 + CVE-2022-26362 + CVE-2022-26363 + CVE-2022-26364 + XSA-378 + XSA-379 + XSA-380 + XSA-382 + XSA-383 + XSA-384 + XSA-386 + XSA-390 + XSA-401 + XSA-402 + XSA-404 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-24.xml new file mode 100644 index 0000000000..68d2b4e545 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-24.xml @@ -0,0 +1,50 @@ + + + + GNU C Library: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service. + glibc + 2022-08-14 + 2022-08-14 + 803437 + 807935 + 831096 + 831212 + remote + + + 2.34 + 2.34 + + + +

The GNU C library is the standard C library used by Gentoo Linux systems. It provides programs with basic facilities and interfaces to system calls. ld.so is the dynamic linker which prepares dynamically linked programs for execution by resolving runtime dependencies and related functions.

+
+ +

Multiple vulnerabilities have been discovered in GNU C Library. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GNU C Library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.34-r7" + +
+ + CVE-2021-3998 + CVE-2021-3999 + CVE-2021-35942 + CVE-2021-38604 + CVE-2022-23218 + CVE-2022-23219 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-25.xml new file mode 100644 index 0000000000..02c46c6d61 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-25.xml @@ -0,0 +1,284 @@ + + + + Chromium, Google Chrome, Microsoft Edge, QtWebEngine: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. + chromium,google-chrome,microsoft-edge,qtwebengine + 2022-08-14 + 2022-08-14 + 828519 + 834477 + 835397 + 836011 + 836381 + 836777 + 838049 + 838433 + 841371 + 843728 + 847370 + 851003 + 853643 + 773040 + 787950 + 800181 + 810781 + 815397 + 829161 + 835761 + 836830 + 847613 + 853229 + 837497 + 838682 + 843035 + 848864 + 851009 + 854372 + remote + + + 5.15.5_p20220618 + 5.15.5_p20220618 + + + 103.0.5060.53 + 103.0.5060.53 + + + 103.0.5060.53 + 103.0.5060.53 + + + 101.0.1210.47 + 101.0.1210.47 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. + +Google Chrome is one fast, simple, and secure browser for all your devices. + +Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-103.0.5060.53" + + +

All Chromium binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-bin-103.0.5060.53" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-103.0.5060.53" + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-103.0.5060.53" + + +

All QtWebEngine users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtwebengine-5.15.5_p20220618" + +
+ + CVE-2021-4052 + CVE-2021-4053 + CVE-2021-4054 + CVE-2021-4055 + CVE-2021-4056 + CVE-2021-4057 + CVE-2021-4058 + CVE-2021-4059 + CVE-2021-4061 + CVE-2021-4062 + CVE-2021-4063 + CVE-2021-4064 + CVE-2021-4065 + CVE-2021-4066 + CVE-2021-4067 + CVE-2021-4068 + CVE-2021-4078 + CVE-2021-4079 + CVE-2021-30551 + CVE-2022-0789 + CVE-2022-0790 + CVE-2022-0791 + CVE-2022-0792 + CVE-2022-0793 + CVE-2022-0794 + CVE-2022-0795 + CVE-2022-0796 + CVE-2022-0797 + CVE-2022-0798 + CVE-2022-0799 + CVE-2022-0800 + CVE-2022-0801 + CVE-2022-0802 + CVE-2022-0803 + CVE-2022-0804 + CVE-2022-0805 + CVE-2022-0806 + CVE-2022-0807 + CVE-2022-0808 + CVE-2022-0809 + CVE-2022-0971 + CVE-2022-0972 + CVE-2022-0973 + CVE-2022-0974 + CVE-2022-0975 + CVE-2022-0976 + CVE-2022-0977 + CVE-2022-0978 + CVE-2022-0979 + CVE-2022-0980 + CVE-2022-1096 + CVE-2022-1125 + CVE-2022-1127 + CVE-2022-1128 + CVE-2022-1129 + CVE-2022-1130 + CVE-2022-1131 + CVE-2022-1132 + CVE-2022-1133 + CVE-2022-1134 + CVE-2022-1135 + CVE-2022-1136 + CVE-2022-1137 + CVE-2022-1138 + CVE-2022-1139 + CVE-2022-1141 + CVE-2022-1142 + CVE-2022-1143 + CVE-2022-1144 + CVE-2022-1145 + CVE-2022-1146 + CVE-2022-1232 + CVE-2022-1305 + CVE-2022-1306 + CVE-2022-1307 + CVE-2022-1308 + CVE-2022-1309 + CVE-2022-1310 + CVE-2022-1311 + CVE-2022-1312 + CVE-2022-1313 + CVE-2022-1314 + CVE-2022-1364 + CVE-2022-1477 + CVE-2022-1478 + CVE-2022-1479 + CVE-2022-1480 + CVE-2022-1481 + CVE-2022-1482 + CVE-2022-1483 + CVE-2022-1484 + CVE-2022-1485 + CVE-2022-1486 + CVE-2022-1487 + CVE-2022-1488 + CVE-2022-1489 + CVE-2022-1490 + CVE-2022-1491 + CVE-2022-1492 + CVE-2022-1493 + CVE-2022-1494 + CVE-2022-1495 + CVE-2022-1496 + CVE-2022-1497 + CVE-2022-1498 + CVE-2022-1499 + CVE-2022-1500 + CVE-2022-1501 + CVE-2022-1633 + CVE-2022-1634 + CVE-2022-1635 + CVE-2022-1636 + CVE-2022-1637 + CVE-2022-1639 + CVE-2022-1640 + CVE-2022-1641 + CVE-2022-1853 + CVE-2022-1854 + CVE-2022-1855 + CVE-2022-1856 + CVE-2022-1857 + CVE-2022-1858 + CVE-2022-1859 + CVE-2022-1860 + CVE-2022-1861 + CVE-2022-1862 + CVE-2022-1863 + CVE-2022-1864 + CVE-2022-1865 + CVE-2022-1866 + CVE-2022-1867 + CVE-2022-1868 + CVE-2022-1869 + CVE-2022-1870 + CVE-2022-1871 + CVE-2022-1872 + CVE-2022-1873 + CVE-2022-1874 + CVE-2022-1875 + CVE-2022-1876 + CVE-2022-2007 + CVE-2022-2010 + CVE-2022-2011 + CVE-2022-2156 + CVE-2022-2157 + CVE-2022-2158 + CVE-2022-2160 + CVE-2022-2161 + CVE-2022-2162 + CVE-2022-2163 + CVE-2022-2164 + CVE-2022-2165 + CVE-2022-22021 + CVE-2022-24475 + CVE-2022-24523 + CVE-2022-26891 + CVE-2022-26894 + CVE-2022-26895 + CVE-2022-26900 + CVE-2022-26905 + CVE-2022-26908 + CVE-2022-26909 + CVE-2022-26912 + CVE-2022-29144 + CVE-2022-29146 + CVE-2022-29147 + CVE-2022-30127 + CVE-2022-30128 + CVE-2022-30192 + CVE-2022-33638 + CVE-2022-33639 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-26.xml new file mode 100644 index 0000000000..5d229495aa --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-26.xml @@ -0,0 +1,47 @@ + + + + libarchive: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libarchive, the worst of which could result in arbitrary code execution. + libarchive + 2022-08-14 + 2022-08-14 + 803128 + 836352 + 837266 + remote + + + 3.6.1 + 3.6.1 + + + +

libarchive is a library for manipulating different streaming archive formats, including certain tar variants, several cpio formats, and both BSD and GNU ar variants.

+
+ +

Multiple vulnerabilities have been discovered in libarchive. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libarchive users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/libarchive-3.6.1" + +
+ + CVE-2021-31566 + CVE-2021-36976 + CVE-2022-26280 + CVE-2022-28066 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-27.xml new file mode 100644 index 0000000000..474faac8ae --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-27.xml @@ -0,0 +1,85 @@ + + + + QEMU: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in QEMU, the worst of which could result in remote code execution (guest sandbox escape). + qemu + 2022-08-14 + 2022-08-14 + 733448 + 736605 + 773220 + 775713 + 780816 + 792624 + 807055 + 810544 + 820743 + 835607 + 839762 + remote + + + 7.0.0 + 7.0.0 + + + +

QEMU is a generic and open source machine emulator and virtualizer.

+
+ +

Multiple vulnerabilities have been discovered in QEMU.Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All QEMU users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/qemu-7.0.0" + +
+ + CVE-2020-15859 + CVE-2020-15863 + CVE-2020-16092 + CVE-2020-35504 + CVE-2020-35505 + CVE-2020-35506 + CVE-2020-35517 + CVE-2021-3409 + CVE-2021-3416 + CVE-2021-3527 + CVE-2021-3544 + CVE-2021-3545 + CVE-2021-3546 + CVE-2021-3582 + CVE-2021-3607 + CVE-2021-3608 + CVE-2021-3611 + CVE-2021-3682 + CVE-2021-3713 + CVE-2021-3748 + CVE-2021-3750 + CVE-2021-3929 + CVE-2021-3930 + CVE-2021-3947 + CVE-2021-4145 + CVE-2021-4158 + CVE-2021-4206 + CVE-2021-4207 + CVE-2021-20203 + CVE-2021-20257 + CVE-2021-20263 + CVE-2022-0358 + CVE-2022-26353 + CVE-2022-26354 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-28.xml new file mode 100644 index 0000000000..9c21b7233f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-28.xml @@ -0,0 +1,48 @@ + + + + Puma: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Puma, the worst of which could result in denial of service. + puma + 2022-08-14 + 2022-08-14 + 794034 + 817893 + 833155 + 836431 + remote + + + 5.6.4 + 5.6.4 + + + +

Puma is a simple, fast, threaded, and highly concurrent HTTP 1.1 server for Ruby/Rack.

+
+ +

Multiple vulnerabilities have been discovered in Puma. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Puma users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/puma-5.6.4" + +
+ + CVE-2021-29509 + CVE-2021-41136 + CVE-2022-23634 + CVE-2022-24790 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-29.xml new file mode 100644 index 0000000000..4e85bcbacc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-29.xml @@ -0,0 +1,46 @@ + + + + Nokogiri: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Nokogiri, the worst of which could result in denial of service. + nokogiri + 2022-08-14 + 2022-08-14 + 846623 + 837902 + 762685 + remote + + + 1.13.6 + 1.13.6 + + + +

Nokogiri is an HTML, XML, SAX, and Reader parser.

+
+ +

Multiple vulnerabilities have been discovered in Nokogiri. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Nokogiri users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-ruby/nokogiri-1.13.6" + +
+ + CVE-2020-26247 + CVE-2022-24836 + CVE-2022-29181 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-30.xml new file mode 100644 index 0000000000..c781bc13ee --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-30.xml @@ -0,0 +1,61 @@ + + + + GNU Binutils: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Binutils, the worst of which could result in denial of service. + binutils,binutils-libs + 2022-08-14 + 2022-08-14 + 778545 + 792342 + 829304 + remote + + + 2.38 + 2.38 + + + 2.38 + 2.38 + + + +

The GNU Binutils are a collection of tools to create, modify and analyse binary files. Many of the files use BFD, the Binary File Descriptor library, to do low-level manipulation.

+
+ +

Multiple vulnerabilities have been discovered in GNU Binutils. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Binutils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-devel/binutils-2.38" + + +

All Binutils library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/binutils-libs-2.38" + +
+ + CVE-2021-3487 + CVE-2021-3530 + CVE-2021-3549 + CVE-2021-20197 + CVE-2021-20284 + CVE-2021-20294 + CVE-2021-45078 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-31.xml new file mode 100644 index 0000000000..1f0163229c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-31.xml @@ -0,0 +1,111 @@ + + + + GStreamer, GStreamer Plugins: Multiple Vulnerabilities + Multiple vulnerabilities have been found in GStreamer and its plugins, the worst of which could result in arbitrary code execution. + gst-plugins-bad,gst-plugins-base,gst-plugins-good,gst-plugins-libav,gst-plugins-ugly,gstreamer + 2022-08-14 + 2022-08-14 + 766336 + 785652 + 785655 + 785658 + 785661 + 835368 + 843770 + 765163 + remote + + + 1.16.3 + 1.16.3 + + + 1.18.4 + 1.18.4 + + + 1.18.4 + 1.18.4 + + + 1.18.4 + 1.18.4 + + + 1.20.2 + 1.20.2 + + + 1.18.4 + 1.18.4 + + + +

GStreamer is an open source multimedia framework.

+
+ +

Multiple vulnerabilities have been found in GStreamer and its plugins. Please review the CVE and GStreamer-SA identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GStreamer users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gstreamer-1.20.2" + + +

All gst-plugins-bad users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-bad-1.20.2" + + +

All gst-plugins-good users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-good-1.20.2" + + +

All gst-plugins-ugly users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-ugly-1.20.2" + + +

All gst-plugins-base users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-base-1.20.2" + + +

All gst-plugins-libav users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-plugins/gst-plugins-libav-1.20.2" + +
+ + CVE-2021-3185 + CVE-2021-3497 + CVE-2021-3498 + CVE-2021-3522 + GStreamer-SA-2021-0001 + GStreamer-SA-2021-0002 + GStreamer-SA-2021-0004 + GStreamer-SA-2021-0005 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-32.xml new file mode 100644 index 0000000000..1ff4b3b3d6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-32.xml @@ -0,0 +1,168 @@ + + + + Vim, gVim: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Vim, the worst of which could result in denial of service. + gvim,vim,vim-core + 2022-08-21 + 2022-08-21 + 811870 + 818562 + 819528 + 823473 + 824930 + 828583 + 829658 + 830106 + 830994 + 833572 + 836432 + 851231 + remote + + + 9.0.0060 + 9.0.0060 + + + 9.0.0060 + 9.0.0060 + + + 9.0.0060 + 9.0.0060 + + + +

Vim is an efficient, highly configurable improved version of the classic ‘vi’ text editor. gVim is the GUI version of Vim.

+
+ +

Multiple vulnerabilities have been discovered in Vim and gVim. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Vim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/vim-9.0.0060" + + +

All gVim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/gvim-9.0.0060" + + +

All vim-core users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.0.0060" + +
+ + CVE-2021-3770 + CVE-2021-3778 + CVE-2021-3796 + CVE-2021-3872 + CVE-2021-3875 + CVE-2021-3927 + CVE-2021-3928 + CVE-2021-3968 + CVE-2021-3973 + CVE-2021-3974 + CVE-2021-3984 + CVE-2021-4019 + CVE-2021-4069 + CVE-2021-4136 + CVE-2021-4166 + CVE-2021-4173 + CVE-2021-4187 + CVE-2021-4192 + CVE-2021-4193 + CVE-2021-46059 + CVE-2022-0128 + CVE-2022-0156 + CVE-2022-0158 + CVE-2022-0213 + CVE-2022-0261 + CVE-2022-0318 + CVE-2022-0319 + CVE-2022-0351 + CVE-2022-0359 + CVE-2022-0361 + CVE-2022-0368 + CVE-2022-0392 + CVE-2022-0393 + CVE-2022-0407 + CVE-2022-0408 + CVE-2022-0413 + CVE-2022-0417 + CVE-2022-0443 + CVE-2022-0554 + CVE-2022-0629 + CVE-2022-0685 + CVE-2022-0714 + CVE-2022-0729 + CVE-2022-0943 + CVE-2022-1154 + CVE-2022-1160 + CVE-2022-1381 + CVE-2022-1420 + CVE-2022-1616 + CVE-2022-1619 + CVE-2022-1620 + CVE-2022-1621 + CVE-2022-1629 + CVE-2022-1674 + CVE-2022-1720 + CVE-2022-1733 + CVE-2022-1735 + CVE-2022-1769 + CVE-2022-1771 + CVE-2022-1785 + CVE-2022-1796 + CVE-2022-1851 + CVE-2022-1886 + CVE-2022-1897 + CVE-2022-1898 + CVE-2022-1927 + CVE-2022-1942 + CVE-2022-1968 + CVE-2022-2000 + CVE-2022-2042 + CVE-2022-2124 + CVE-2022-2125 + CVE-2022-2126 + CVE-2022-2129 + CVE-2022-2175 + CVE-2022-2182 + CVE-2022-2183 + CVE-2022-2206 + CVE-2022-2207 + CVE-2022-2208 + CVE-2022-2210 + CVE-2022-2231 + CVE-2022-2257 + CVE-2022-2264 + CVE-2022-2284 + CVE-2022-2285 + CVE-2022-2286 + CVE-2022-2287 + CVE-2022-2288 + CVE-2022-2289 + CVE-2022-2304 + CVE-2022-2343 + CVE-2022-2344 + CVE-2022-2345 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-33.xml new file mode 100644 index 0000000000..9a40b07937 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-33.xml @@ -0,0 +1,72 @@ + + + + Gnome Shell, gettext, libcroco: Multiple Vulnerabilities + A vulnerability has been found in libcroco which could result in denial of service. + gettext,gnome-shell,libcroco + 2022-08-21 + 2022-08-21 + 722752 + 755848 + 769998 + remote + + + 0.6.13 + 0.6.13 + + + 3.36.7 + 3.36.7 + + + 0.21 + 0.21 + + + +

GNOME Shell provides core user interface functions for the GNOME desktop, like switching to windows and launching applications. + +gettext contains the GNU locale utilities. + +libcroco is a standalone CSS2 parsing and manipulation library.

+
+ +

The cr_parser_parse_any_core function in libcroco's cr-parser.c does not limit recursion, leading to a denial of service via a stack overflow when trying to parse crafted CSS. + +Gnome Shell and gettext bundle libcroco in their own sources and thus are potentially vulnerable as well.

+
+ +

An attacker with control over the input to the library can cause a denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All gettext users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-devel/gettext-0.21" + + +

All Gnome Shell users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=gnome-base/gnome-shell-3.36.7" + + +

All libcroco users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libcroco-0.6.13" + +
+ + CVE-2020-12825 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-34.xml new file mode 100644 index 0000000000..d9d0d45186 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-34.xml @@ -0,0 +1,69 @@ + + + + Apache Tomcat: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Apache Tomcat, the worst of which could result in denial of service. + tomcat + 2022-08-21 + 2022-08-21 + 773571 + 801916 + 818160 + 855971 + remote + + + 10.0.23 + 9.0.65 + 8.5.82 + 10.0.23 + 9.0.65 + 8.5.82 + + + +

Apache Tomcat is a Servlet-3.0/JSP-2.2 Container.

+
+ +

Multiple vulnerabilities have been discovered in Apache Tomcat. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Apache Tomcat 10.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-10.0.23:10" + + +

All Apache Tomcat 9.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-9.0.65:9" + + +

All Apache Tomcat 8.5.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-8.5.82:8.5" + +
+ + CVE-2021-25122 + CVE-2021-25329 + CVE-2021-30639 + CVE-2021-30640 + CVE-2021-33037 + CVE-2021-42340 + CVE-2022-34305 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-35.xml new file mode 100644 index 0000000000..b35642c517 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-35.xml @@ -0,0 +1,126 @@ + + + + Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. + chromium,chromium-bin,google-chrome,microsoft-edge + 2022-08-21 + 2022-08-21 + 858104 + 859442 + 863512 + 865501 + 864723 + remote + + + 104.0.5112.101 + 104.0.5112.101 + + + 104.0.5112.101 + 104.0.5112.101 + + + 104.0.5112.101 + 104.0.5112.101 + + + 104.0.1293.63 + 104.0.1293.63 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. + +Google Chrome is one fast, simple, and secure browser for all your devices. + +Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-104.0.5112.101" + + +

All Chromium binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-bin-104.0.5112.101" + + +

All Google Chrome users should upgrade to tha latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-104.0.5112.101" + + +

All Microsoft Edge users should upgrade to tha latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-104.0.1293.63" + +
+ + CVE-2022-2163 + CVE-2022-2294 + CVE-2022-2295 + CVE-2022-2296 + CVE-2022-2477 + CVE-2022-2478 + CVE-2022-2479 + CVE-2022-2480 + CVE-2022-2481 + CVE-2022-2603 + CVE-2022-2604 + CVE-2022-2605 + CVE-2022-2606 + CVE-2022-2607 + CVE-2022-2608 + CVE-2022-2609 + CVE-2022-2610 + CVE-2022-2611 + CVE-2022-2612 + CVE-2022-2613 + CVE-2022-2614 + CVE-2022-2615 + CVE-2022-2616 + CVE-2022-2617 + CVE-2022-2618 + CVE-2022-2619 + CVE-2022-2620 + CVE-2022-2621 + CVE-2022-2622 + CVE-2022-2623 + CVE-2022-2624 + CVE-2022-2852 + CVE-2022-2853 + CVE-2022-2854 + CVE-2022-2855 + CVE-2022-2856 + CVE-2022-2857 + CVE-2022-2858 + CVE-2022-2859 + CVE-2022-2860 + CVE-2022-2861 + CVE-2022-33636 + CVE-2022-33649 + CVE-2022-35796 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-36.xml new file mode 100644 index 0000000000..04ca82ecc8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-36.xml @@ -0,0 +1,98 @@ + + + + Oracle VirtualBox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Oracle Virtualbox, the worst of which could result in root privilege escalation. + virtualbox,virtualbox-additions,virtualbox-extpack-oracle,virtualbox-guest-additions,virtualbox-modules + 2022-08-31 + 2022-08-31 + 785445 + 803134 + 820425 + 831440 + 839990 + 859391 + remote + + + 6.1.36 + 6.1.36 + + + 6.1.36 + 6.1.36 + + + 6.1.36 + 6.1.36 + + + 6.1.36 + 6.1.36 + + + 6.1.36 + 6.1.36 + + + +

VirtualBox is a powerful virtualization product from Oracle.

+
+ +

Multiple vulnerabilities have been discovered in VirtualBox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All VirtualBox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-6.1.36" + +
+ + CVE-2021-2145 + CVE-2021-2250 + CVE-2021-2264 + CVE-2021-2266 + CVE-2021-2279 + CVE-2021-2280 + CVE-2021-2281 + CVE-2021-2282 + CVE-2021-2283 + CVE-2021-2284 + CVE-2021-2285 + CVE-2021-2286 + CVE-2021-2287 + CVE-2021-2291 + CVE-2021-2296 + CVE-2021-2297 + CVE-2021-2306 + CVE-2021-2309 + CVE-2021-2310 + CVE-2021-2312 + CVE-2021-2409 + CVE-2021-2442 + CVE-2021-2443 + CVE-2021-2454 + CVE-2021-2475 + CVE-2021-35538 + CVE-2021-35540 + CVE-2021-35542 + CVE-2021-35545 + CVE-2022-21394 + CVE-2022-21465 + CVE-2022-21471 + CVE-2022-21487 + CVE-2022-21488 + CVE-2022-21554 + CVE-2022-21571 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-37.xml new file mode 100644 index 0000000000..6ee2426094 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-37.xml @@ -0,0 +1,77 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. + firefox,firefox-bin + 2022-08-31 + 2022-08-31 + 866215 + remote + + + 104 + 91.13.0 + 104 + + + 104 + 91.13.0 + 104 + 91.13.0 + 91.13.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-91.13.0" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-91.13.0" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-104.0" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-104.0" + +
+ + CVE-2022-38472 + CVE-2022-38473 + CVE-2022-38474 + CVE-2022-38475 + CVE-2022-38476 + CVE-2022-38477 + CVE-2022-38478 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-38.xml new file mode 100644 index 0000000000..64917311e7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-38.xml @@ -0,0 +1,57 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, the world of which could result in arbitrary code execution. + thunderbird,thunderbird-bin + 2022-08-31 + 2022-08-31 + 866217 + remote + + + 91.13.0 + 91.13.0 + + + 91.13.0 + 91.13.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.2.0" + + +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.2.0" + +
+ + CVE-2022-38472 + CVE-2022-38473 + CVE-2022-38476 + CVE-2022-38477 + CVE-2022-38478 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-39.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-39.xml new file mode 100644 index 0000000000..1ab9f6c73c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-39.xml @@ -0,0 +1,74 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code. + webkit-gtk + 2022-08-31 + 2022-08-31 + 866494 + 864427 + 856445 + 861740 + 837305 + 845252 + 839984 + 833568 + 832990 + remote + + + 2.36.7 + 2.36.7 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.36.7" + +
+ + CVE-2022-2294 + CVE-2022-22589 + CVE-2022-22590 + CVE-2022-22592 + CVE-2022-22620 + CVE-2022-22624 + CVE-2022-22628 + CVE-2022-22629 + CVE-2022-22662 + CVE-2022-22677 + CVE-2022-26700 + CVE-2022-26709 + CVE-2022-26710 + CVE-2022-26716 + CVE-2022-26717 + CVE-2022-26719 + CVE-2022-30293 + CVE-2022-30294 + CVE-2022-32784 + CVE-2022-32792 + CVE-2022-32893 + WSA-2022-0002 + WSA-2022-0003 + WSA-2022-0007 + WSA-2022-0008 + + sam + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-01.xml new file mode 100644 index 0000000000..1fdcaf71f0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-01.xml @@ -0,0 +1,56 @@ + + + + GNU Gzip, XZ Utils: Arbitrary file write + A vulnerability has been discovered in GNU Gzip and XZ Utils' grep helpers which could result in writes to arbitrary files. + gzip,xz-utils + 2022-09-07 + 2022-09-07 + 837152 + 837155 + remote + + + 1.12 + 1.12 + + + 5.2.5 + 5.2.5 + + + +

GNU Gzip is a popular data compression program. + +XZ Utils is free general-purpose data compression software with a high compression ratio.

+
+ +

GNU Gzip and XZ Utils' grep helpers do not sufficiently validate certain multi-line file names.

+
+ +

In some cases, writing to arbitrary files such as shell initialization files can be escalation to remote code execution.

+
+ +

Ensuring only trusted input is passed to GNU Gzip and XZ Utils' grep helpers minimizes the potential impact.

+
+ +

All GNU Gzip users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/gzip-1.12" + + +

All XZ Utils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/xz-utils-5.2.5" + +
+ + CVE-2022-1271 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-02.xml new file mode 100644 index 0000000000..2c7d26523d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-02.xml @@ -0,0 +1,48 @@ + + + + IBM Spectrum Protect: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in IBM Spectrum Protect, the worst of which could result in arbitrary code execution. + tsm + 2022-09-07 + 2022-09-07 + 788115 + 829189 + 831509 + remote + + + 8.1.13.3 + 8.1.13.3 + + + +

TSM provides the client and the API for IBM Spectrum Protect (formerly known as Tivoli Storage Manager), a backup and archival client/server solution targetting large tape libraries.

+
+ +

Multiple vulnerabilities have been discovered in IBM Spectrum Protect. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All IBM Spectrum Protect users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-backup/tsm-8.1.13.3" + +
+ + CVE-2021-3711 + CVE-2021-3712 + CVE-2021-4104 + CVE-2021-29672 + CVE-2021-39048 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-03.xml new file mode 100644 index 0000000000..c3b22e3de0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-03.xml @@ -0,0 +1,46 @@ + + + + OpenSC: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenSC, the worst of which could result in the execution of arbitrary code. + opensc + 2022-09-07 + 2022-09-07 + 839357 + remote + + + 0.22.0 + 0.22.0 + + + +

OpenSC contains tools and libraries for smart cards.

+
+ +

Multiple vulnerabilities have been discovered in OpenSC. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/opensc-0.22.0" + +
+ + CVE-2021-42778 + CVE-2021-42779 + CVE-2021-42780 + CVE-2021-42781 + CVE-2021-42782 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-04.xml new file mode 100644 index 0000000000..9933cc2cc6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-04.xml @@ -0,0 +1,45 @@ + + + + OpenJPEG: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenJPEG, the worst of which could result in arbitrary code execution. + openjpeg + 2022-09-07 + 2022-09-07 + 783513 + 836969 + 844064 + remote + + + 2.5.0 + 2.5.0 + + + +

OpenJPEG is an open-source JPEG 2000 library.

+
+ +

Multiple vulnerabilities have been discovered in OpenJPEG. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenJPEG 2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/openjpeg-2.5.0" + +
+ + CVE-2021-29338 + CVE-2022-1122 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-05.xml new file mode 100644 index 0000000000..f418dacf84 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-05.xml @@ -0,0 +1,153 @@ + + + + OpenJDK: Multiple Vulnerabilities + Multiple vulnerabilities have been found in OpenJDK, the worst of which could result in denial of service. + openjdk,openjdk-bin,openjdk-jre-bin + 2022-09-07 + 2022-09-07 + 803605 + 831446 + 784611 + remote + + + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + + + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + + + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + 17.0.2_p8 + 11.0.14_p9 + 8.322_p06 + + + +

OpenJDK is an open source implementation of the Java programming language.

+
+ +

Multiple vulnerabilities have been discovered in OpenJDK. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenJDK 8 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-8.322_p06:8" + + +

All OpenJDK 8 JRE binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-8.322_p06:8" + + +

All OpenJDK 8 binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-8.322_p06:8" + + +

All OpenJDK 11 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-11.0.14_p9:11" + + +

All OpenJDK 11 JRE binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-11.0.14_p9:11" + + +

All OpenJDK 11 binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-11.0.14_p9:11" + + +

All OpenJDK 17 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-17.0.2_p8:17" + + +

All OpenJDK 17 JRE binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-17.0.2_p8:17" + + +

All OpenJDK 17 binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-17.0.2_p8:17" + +
+ + CVE-2021-2161 + CVE-2021-2163 + CVE-2021-2341 + CVE-2021-2369 + CVE-2021-2388 + CVE-2021-2432 + CVE-2021-35550 + CVE-2021-35556 + CVE-2021-35559 + CVE-2021-35561 + CVE-2021-35564 + CVE-2021-35565 + CVE-2021-35567 + CVE-2021-35578 + CVE-2021-35586 + CVE-2021-35588 + CVE-2021-35603 + CVE-2022-21248 + CVE-2022-21271 + CVE-2022-21277 + CVE-2022-21282 + CVE-2022-21283 + CVE-2022-21291 + CVE-2022-21293 + CVE-2022-21294 + CVE-2022-21296 + CVE-2022-21299 + CVE-2022-21305 + CVE-2022-21340 + CVE-2022-21341 + CVE-2022-21349 + CVE-2022-21360 + CVE-2022-21365 + CVE-2022-21366 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-06.xml new file mode 100644 index 0000000000..717b6c92ac --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-06.xml @@ -0,0 +1,49 @@ + + + + Rizin: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Rizin, the worst of which could lead to arbitrary code execution. + rizin + 2022-09-25 + 2022-09-25 + 861524 + 868999 + local and remote + + + 0.4.1 + 0.4.1 + + + +

Rizin is a reverse engineering framework for binary analysis.

+
+ +

Multiple vulnerabilities have been discovered in Rizin. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Rizin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/rizin-0.4.1" + +
+ + CVE-2022-34612 + CVE-2022-36039 + CVE-2022-36040 + CVE-2022-36041 + CVE-2022-36042 + CVE-2022-36043 + CVE-2022-36044 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-07.xml new file mode 100644 index 0000000000..556fa69ed9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-07.xml @@ -0,0 +1,40 @@ + + + + Mrxvt: Arbitrary Code Execution + A vulnerability has been discovered in Mrxvt which could allow for arbitrary code execution + mrxvt + 2022-09-25 + 2022-09-25 + 791004 + local and remote + + + 0.5.4 + + + +

Mrxvt is a multi-tabbed rxvt clone with XFT, transparent background and CJK support.

+
+ +

Mrxvt mishandles certain escape sequences, some of which allow for shell command execution.

+
+ +

An attacker with sufficient access to write arbitrary text to the Mrxvt terminal could execute arbitrary code.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Mrxvt. We recommend that users remove it:

+ + + # emerge --ask --depclean "x11-terms/mrxvt" + +
+ + CVE-2021-33477 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-08.xml new file mode 100644 index 0000000000..9687477405 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-08.xml @@ -0,0 +1,41 @@ + + + + Smokeping: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in Smokeping, the worst of which could result in root privilege escalation. + smokeping + 2022-09-25 + 2022-09-25 + 631140 + 602652 + local + + + 2.7.3-r1 + + + +

Smokeping is a powerful latency measurement tool

+
+ +

Multiple vulnerabilities have been discovered in Smokeping. Please review the CVE identifiers referenced below for details.

+
+ +

A local attacker which gains access to the smokeping user could gain root privileges.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Smokeping. We recommend that users remove it:

+ + + # emerge --ask --depclean "net-analyzer/smokeping" + +
+ + CVE-2017-20147 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-09.xml new file mode 100644 index 0000000000..83bd6e71ed --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-09.xml @@ -0,0 +1,47 @@ + + + + Smarty: Multiple vulnerabilities + Multiple vulnerabilities have been found in Smarty, the worst of which could result in remote code execution + smarty + 2022-09-25 + 2022-09-25 + 830980 + 845180 + 870100 + remote + + + 4.2.1 + 4.2.1 + + + +

Smarty is a template engine for PHP. The "template security" feature of Smarty is designed to help reduce the risk of a system compromise when you have untrusted parties editing templates.

+
+ +

Multiple vulnerabilities have been discovered in Smarty. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Smarty users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-php/smarty-4.2.1" + +
+ + CVE-2018-25047 + CVE-2021-21408 + CVE-2021-29454 + CVE-2022-29221 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-10.xml new file mode 100644 index 0000000000..9e9ae3a3bb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-10.xml @@ -0,0 +1,40 @@ + + + + Logcheck: Root privilege escalation + A vulnerability has been discovered in Logcheck's ebuilds which could allow for root privilege escalation. + logcheck + 2022-09-25 + 2022-09-25 + 630752 + remote + + + 1.3.23 + + + +

Logcheck mails anomalies in the system logfiles to the administrator.

+
+ +

The pkg_postinst phase of the Logcheck ebuilds recursively chown the /etc/logcheck and /var/lib/logcheck directories. If the logcheck adds hardlinks to other files in these directories, the chown call will follow the link and transfer ownership of any file to the logcheck user.

+
+ +

A local attacker with access to the logcheck user could escalate to root privileges.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Logcheck. We recommend that users remove it:

+ + + # emerge --ask --depclean "app-admin/logcheck" + +
+ + CVE-2017-20148 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-11.xml new file mode 100644 index 0000000000..d1599df5c7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-11.xml @@ -0,0 +1,44 @@ + + + + HarfBuzz: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in HarfBuzz, the worst of which could result in arbitrary code execution. + harfbuzz + 2022-09-25 + 2022-09-25 + 830372 + 856049 + remote + + + 4.4.0 + 4.4.0 + + + +

HarfBuzz is an OpenType text shaping engine.

+
+ +

Multiple vulnerabilities have been discovered in HarfBuzz. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All HarfBuzz users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/harfbuzz-4.4.0" + +
+ + CVE-2021-45931 + CVE-2022-33068 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-12.xml new file mode 100644 index 0000000000..f7b8e7ebc4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-12.xml @@ -0,0 +1,53 @@ + + + + GRUB: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in GRUB, the worst of which may allow for secureboot bypass. + grub + 2022-09-25 + 2022-09-25 + 850535 + 835082 + local + + + 2.06 + 2.06 + + + +

GNU GRUB is a multiboot boot loader used by most Linux systems.

+
+ +

Multiple vulnerabilities have been discovered in GRUB. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GRUB users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-boot/grub-2.06-r3" + + +

After upgrading, make sure to run the grub-install command with options appropriate for your system. See the GRUB2 Gentoo Wiki page for directions. Your system will be vulnerable until this action is performed.

+
+ + CVE-2021-3695 + CVE-2021-3696 + CVE-2021-3697 + CVE-2021-3981 + CVE-2022-28733 + CVE-2022-28734 + CVE-2022-28735 + CVE-2022-28736 + CVE-2022-28737 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-13.xml new file mode 100644 index 0000000000..507d8dd200 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-13.xml @@ -0,0 +1,42 @@ + + + + libaacplus: Denial of Service + Multiple vulnerabilities have been discovered in libaacplus, the worst of which could result in denial of service. + libaacplus + 2022-09-25 + 2022-09-25 + 618000 + local and remote + + + 2.0.2-r3 + + + +

libaacplus is an HE-AAC+ v2 library, based on the reference implementation.

+
+ +

Multiple vulnerabilities have been discovered in libaacplus. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued suport for libaacplus. We recommend that users remove it:

+ + + # emerge --ask --depclean "media-libs/libaacplus" + +
+ + CVE-2017-7603 + CVE-2017-7604 + CVE-2017-7605 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-14.xml new file mode 100644 index 0000000000..eebe11b4cc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-14.xml @@ -0,0 +1,44 @@ + + + + Fetchmail: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Fetchmail, the worst of which could result in email disclosure to third parties. + fetchmail + 2022-09-25 + 2022-09-25 + 810676 + 804921 + remote + + + 6.4.22 + 6.4.22 + + + +

Fetchmail is a remote mail retrieval and forwarding utility.

+
+ +

Multiple vulnerabilities have been discovered in Fetchmail. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Fetchmail users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.4.22" + +
+ + CVE-2021-36386 + CVE-2021-39272 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-15.xml new file mode 100644 index 0000000000..17ecb3f121 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-15.xml @@ -0,0 +1,64 @@ + + + + Oracle JDK/JRE: Multiple vulnerabilities + Multiple vulnerabilities have been found in Oracle JDK and JRE, the worst of which could result in the arbitrary execution of code. + oracle-jdk-bin,oracle-jre-bin + 2022-09-25 + 2022-09-25 + 732630 + 717638 + remote + + + 11.0.2 + + + 1.8.0.202 + + + +

Java Platform, Standard Edition (Java SE) lets you develop and deploy Java applications on desktops and servers, as well as in today's demanding embedded environments. Java offers the rich user interface, performance, versatility, portability, and security that today's applications require.

+
+ +

Multiple vulnerabilities have been discovered in Oracle's JDK and JRE software suites. Please review the CVE identifiers referenced below for details.

+
+ +

Certain uses of untrusted data by Oracle JDK and JRE could result in arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for the Oracle JDK and JRE. We recommend that users remove it, and use dev-java/openjdk, dev-java/openjdk-bin, or dev-java/openjdk-jre-bin instead:

+ + + # emerge --ask --depclean "dev-java/oracle-jre-bin" + # emerge --ask --depclean "dev-java/oracle-jdk-bin" + +
+ + CVE-2020-2585 + CVE-2020-2755 + CVE-2020-2756 + CVE-2020-2757 + CVE-2020-2773 + CVE-2020-2781 + CVE-2020-2800 + CVE-2020-2803 + CVE-2020-2805 + CVE-2020-14556 + CVE-2020-14562 + CVE-2020-14573 + CVE-2020-14577 + CVE-2020-14578 + CVE-2020-14579 + CVE-2020-14581 + CVE-2020-14583 + CVE-2020-14593 + CVE-2020-14621 + CVE-2020-14664 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-16.xml new file mode 100644 index 0000000000..1f0069fee5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-16.xml @@ -0,0 +1,46 @@ + + + + BlueZ: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in BlueZ, the worst of which could result in arbitrary code execution. + bluez + 2022-09-29 + 2022-09-29 + 797712 + 835077 + remote + + + 5.63 + 5.63 + + + +

BlueZ is the canonical bluetooth tools and system daemons package for Linux.

+
+ +

Multiple vulnerabilities have been discovered in BlueZ. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All BlueZ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-wireless/bluez-5.63" + +
+ + CVE-2020-26558 + CVE-2021-0129 + CVE-2021-3588 + CVE-2022-0204 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-17.xml new file mode 100644 index 0000000000..38ff99dcd5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-17.xml @@ -0,0 +1,60 @@ + + + + Redis: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Redis, the worst of which could result in arbitrary code execution. + redis + 2022-09-29 + 2022-09-29 + 803302 + 816282 + 841404 + 856040 + 859181 + 872278 + remote + + + 7.0.5 + 7.0.5 + + + +

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.

+
+ +

Multiple vulnerabilities have been discovered in Redis. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Redis users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/redis-7.0.5" + +
+ + CVE-2021-32626 + CVE-2021-32627 + CVE-2021-32628 + CVE-2021-32672 + CVE-2021-32675 + CVE-2021-32687 + CVE-2021-32761 + CVE-2021-32762 + CVE-2021-41099 + CVE-2022-24735 + CVE-2022-24736 + CVE-2022-31144 + CVE-2022-33105 + CVE-2022-35951 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-18.xml new file mode 100644 index 0000000000..5c7df9f40c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-18.xml @@ -0,0 +1,59 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, the world of which could result in arbitrary code execution. + thunderbird,thunderbird-bin + 2022-09-29 + 2022-09-29 + 872572 + remote + + + 102.3.0 + 102.3.0 + + + 102.3.0 + 102.3.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.3.0" + + +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.3.0" + +
+ + CVE-2022-3155 + CVE-2022-40956 + CVE-2022-40957 + CVE-2022-40958 + CVE-2022-40959 + CVE-2022-40960 + CVE-2022-40962 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-19.xml new file mode 100644 index 0000000000..1b587ba0e1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-19.xml @@ -0,0 +1,45 @@ + + + + GraphicsMagick: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in GraphicsMagick, the worst of which are fuzzing issues presumed to allow for arbitrary code execution. + graphicsmagick + 2022-09-29 + 2022-09-29 + 721328 + 836283 + 873367 + remote + + + 1.3.38 + 1.3.38 + + + +

GraphicsMagick is a collection of tools and libraries which support reading, writing, and manipulating images in many major formats.

+
+ +

Multiple vulnerabilities have been discovered in GraphicsMagick. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GraphicsMagick users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.3.38" + +
+ + CVE-2020-12672 + CVE-2022-1270 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-20.xml new file mode 100644 index 0000000000..de8287e1ca --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-20.xml @@ -0,0 +1,71 @@ + + + + PHP: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in PHP, the worst of which could result in local root privilege escalation. + php + 2022-09-29 + 2022-09-29 + 799776 + 810526 + 819510 + 833585 + 850772 + 857054 + remote + + + 7.4.30 + 8.0.23 + 8.1.8 + 7.4.30 + 8.0.23 + 8.1.8 + + + +

PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.

+
+ +

Multiple vulnerabilities have been discovered in PHP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All PHP 7.4 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.4.30:7.4" + + +

All PHP 8.0 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-8.0.23:8.0" + + +

All PHP 8.1 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-8.1.8:8.1" + +
+ + CVE-2021-21703 + CVE-2021-21704 + CVE-2021-21705 + CVE-2021-21708 + CVE-2022-31625 + CVE-2022-31626 + CVE-2022-31627 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-21.xml new file mode 100644 index 0000000000..4c938a048e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-21.xml @@ -0,0 +1,43 @@ + + + + Poppler: Arbitrary Code Execution + A vulnerability has been discovered in Poppler which could allow for arbitrary code execution. + poppler + 2022-09-29 + 2022-09-29 + 867958 + remote + + + 22.09.0 + 22.09.0 + + + +

Poppler is a PDF rendering library based on the xpdf-3.0 code base.

+
+ +

Multiple vulnerabilities have been discovered in Poppler. Please review the CVE identifiers referenced below for details.

+
+ +

Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code.

+
+ +

Avoid opening untrusted PDFs.

+
+ +

All Poppler users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/poppler-22.09.0" + +
+ + CVE-2021-30860 + CVE-2022-38784 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-22.xml new file mode 100644 index 0000000000..436a596527 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-22.xml @@ -0,0 +1,42 @@ + + + + Kitty: Arbitrary Code Execution + A vulnerability has been found in Kitty which could allow for arbitrary code execution with user input. + kitty + 2022-09-29 + 2022-09-29 + 868543 + remote + + + 0.26.2 + 0.26.2 + + + +

Kitty is a fast, feature-rich, GPU-based terminal.

+
+ +

Carter Sande discovered that maliciously constructed control sequences can cause Kitty to display a notification that, when clicked, can cause Kitty to execute arbitrary commands.

+
+ +

Kitty can produce notifications that, when clicked, can execute arbitrary commands.

+
+ +

Avoid clicking unexpected notifications.

+
+ +

All Kitty users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-terms/kitty-0.26.2" + +
+ + CVE-2022-41322 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-23.xml new file mode 100644 index 0000000000..58f76d401f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-23.xml @@ -0,0 +1,112 @@ + + + + Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. + chromium,chromium-bin,google-chrome,microsoft-edge + 2022-09-29 + 2022-09-29 + 868156 + 868354 + 872407 + 870142 + remote + + + 105.0.5195.125 + 105.0.5195.125 + + + 105.0.5195.125 + 105.0.5195.125 + + + 105.0.5195.125 + 105.0.5195.125 + + + 105.0.1343.42 + 105.0.1343.42 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. + +Google Chrome is one fast, simple, and secure browser for all your devices. + +Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium, Google Chrome, Microsoft Edge. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-105.0.5195.125" + + +

All Chromium binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-bin-105.0.5195.125" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-105.0.5195.125" + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-105.0.1343.42" + +
+ + CVE-2022-3038 + CVE-2022-3039 + CVE-2022-3040 + CVE-2022-3041 + CVE-2022-3042 + CVE-2022-3043 + CVE-2022-3044 + CVE-2022-3045 + CVE-2022-3046 + CVE-2022-3047 + CVE-2022-3048 + CVE-2022-3049 + CVE-2022-3050 + CVE-2022-3051 + CVE-2022-3052 + CVE-2022-3053 + CVE-2022-3054 + CVE-2022-3055 + CVE-2022-3056 + CVE-2022-3057 + CVE-2022-3058 + CVE-2022-3071 + CVE-2022-3075 + CVE-2022-3195 + CVE-2022-3196 + CVE-2022-3197 + CVE-2022-3198 + CVE-2022-3199 + CVE-2022-3200 + CVE-2022-3201 + CVE-2022-38012 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-24.xml new file mode 100644 index 0000000000..218e97d925 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-24.xml @@ -0,0 +1,61 @@ + + + + Expat: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Expat, the worst of which could result in arbitrary code execution. + expat + 2022-09-29 + 2022-09-29 + 791703 + 830422 + 831918 + 833431 + 870097 + remote + + + 2.4.9 + 2.4.9 + + + +

Expat is a set of XML parsing libraries.

+
+ +

Multiple vulnerabilities have been discovered in Expat. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Expat users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/expat-2.4.9" + +
+ + CVE-2021-45960 + CVE-2021-46143 + CVE-2022-22822 + CVE-2022-22823 + CVE-2022-22824 + CVE-2022-22825 + CVE-2022-22826 + CVE-2022-22827 + CVE-2022-23852 + CVE-2022-23990 + CVE-2022-25235 + CVE-2022-25236 + CVE-2022-25313 + CVE-2022-25314 + CVE-2022-25315 + CVE-2022-40674 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-25.xml new file mode 100644 index 0000000000..29e1792c1e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-25.xml @@ -0,0 +1,42 @@ + + + + Zutty: Arbitrary Code Execution + A vulnerability has been discovered in Zutty which could allow for arbitrary code execution. + zutty + 2022-09-29 + 2022-09-29 + 868495 + remote + + + 0.13 + 0.13 + + + +

Zutty is an X terminal emulator rendering through OpenGL ES Compute Shaders.

+
+ +

Zutty does not correctly handle invalid DECRQSS commands, which can be exploited to run arbitrary commands in the terminal.

+
+ +

Untrusted text written to the Zutty terminal can achieve arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All Zutty users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-terms/zutty-0.13" + +
+ + CVE-2022-41138 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-26.xml new file mode 100644 index 0000000000..aad69644bc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-26.xml @@ -0,0 +1,49 @@ + + + + Go: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Go, the worst of which could result in denial of service. + go + 2022-09-29 + 2022-09-29 + 869002 + remote + + + 1.18.6 + 1.18.6 + + + +

Go is an open source programming language that makes it easy to build simple, reliable, and efficient software.

+
+ +

Multiple vulnerabilities have been discovered in Go. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Go users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/go-1.18.6" + + +

In addition, users using Portage 3.0.9 or later should ensure that packages with Go binaries have no vulnerable code statically linked into their binaries by rebuilding the @golang-rebuild set:

+ + + # emerge --ask --oneshot --verbose @golang-rebuild + +
+ + CVE-2022-27664 + CVE-2022-32190 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-27.xml new file mode 100644 index 0000000000..7b945322ea --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202209-27.xml @@ -0,0 +1,76 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. + firefox,firefox-bin + 2022-09-29 + 2022-09-29 + 872059 + remote + + + 105.0 + 102.3.0 + 105.0 + 102.3.0 + + + 105.0 + 102.3.0 + 105.0 + 102.3.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-102.3.0" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-102.3.0" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-105.0" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-105.0" + +
+ + CVE-2022-40956 + CVE-2022-40957 + CVE-2022-40958 + CVE-2022-40959 + CVE-2022-40960 + CVE-2022-40962 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-01.xml new file mode 100644 index 0000000000..2fdb25ec8e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-01.xml @@ -0,0 +1,42 @@ + + + + Open Asset Import Library ("assimp"): Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Open Asset Import Library, the worst of which could result in denial of service. + assimp + 2022-10-16 + 2022-10-16 + 830374 + remote + + + 5.2.2 + 5.2.2 + + + +

Open Asset Import Library is a library to import and export various 3d-model-formats including scene-post-processing to generate missing render data.

+
+ +

Multiple vulnerabilities have been discovered in Fetchmail, the worst of which could result in email disclosure to third parties.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Open Asset Import Library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/assimp-5.2.2" + +
+ + CVE-2021-45948 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-02.xml new file mode 100644 index 0000000000..5177565570 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-02.xml @@ -0,0 +1,54 @@ + + + + OpenSSL: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenSSL, the worst of which could result in denial of service. + openssl + 2022-10-16 + 2022-10-16 + 741570 + 809980 + 832339 + 835343 + 842489 + 856592 + remote + + + 1.1.1q + 1.1.1q + + + +

OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general purpose cryptography library.

+
+ +

Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSSL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.1.1q" + +
+ + CVE-2020-1968 + CVE-2021-3711 + CVE-2021-3712 + CVE-2021-4160 + CVE-2022-0778 + CVE-2022-1292 + CVE-2022-1473 + CVE-2022-2097 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-03.xml new file mode 100644 index 0000000000..22e5f517c9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-03.xml @@ -0,0 +1,45 @@ + + + + libxml2: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libxml2, the worst of which could result in arbitrary code execution. + libxml2 + 2022-10-16 + 2022-10-16 + 833809 + 842261 + 865727 + remote + + + 2.10.2 + 2.10.2 + + + +

libxml2 is the XML C parser and toolkit developed for the GNOME project.

+
+ +

Multiple vulnerabilities have been discovered in libxml2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libxml2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.10.2" + +
+ + CVE-2022-23308 + CVE-2022-29824 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-04.xml new file mode 100644 index 0000000000..78e40dcfbb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-04.xml @@ -0,0 +1,68 @@ + + + + Wireshark: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Wireshark, the worst of which could result in denial of service. + wireshark + 2022-10-16 + 2022-10-16 + 802216 + 824474 + 830343 + 833294 + 869140 + remote + + + 3.6.8 + 3.6.8 + + + +

Wireshark is a versatile network protocol analyzer.

+
+ +

Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Wireshark users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-3.6.8" + +
+ + CVE-2021-4181 + CVE-2021-4182 + CVE-2021-4183 + CVE-2021-4184 + CVE-2021-4185 + CVE-2021-4186 + CVE-2021-4190 + CVE-2021-22235 + CVE-2021-39920 + CVE-2021-39921 + CVE-2021-39922 + CVE-2021-39924 + CVE-2021-39925 + CVE-2021-39926 + CVE-2021-39928 + CVE-2021-39929 + CVE-2022-0581 + CVE-2022-0582 + CVE-2022-0583 + CVE-2022-0585 + CVE-2022-0586 + WNPA-SEC-2021-06 + WNPA-SEC-2022-06 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-05.xml new file mode 100644 index 0000000000..ef3f453950 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-05.xml @@ -0,0 +1,43 @@ + + + + virglrenderer: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in virglrenderer, the worst of which could result in remote code execution. + virglrenderer + 2022-10-16 + 2022-10-16 + 866821 + remote + + + 0.10.1 + 0.10.1 + + + +

A virtual 3D GPU library, that allows the guest operating system to use the host GPU to accelerate 3D rendering.

+
+ +

Multiple vulnerabilities have been discovered in virglrenderer. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All virglrenderer users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/virglrenderer-0.10.1" + +
+ + CVE-2022-0135 + CVE-2022-0175 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-06.xml new file mode 100644 index 0000000000..2133f4bfc4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-06.xml @@ -0,0 +1,60 @@ + + + + libvirt: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libvirt, the worst of which could result in denial of service. + libvirt,libvirt-python + 2022-10-16 + 2022-10-16 + 746119 + 799713 + 812317 + 836128 + remote + + + 8.2.0 + 8.2.0 + + + 8.2.0 + 8.2.0 + + + +

libvirt is a C toolkit for manipulating virtual machines.

+
+ +

Multiple vulnerabilities have been discovered in libvirt. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libvirt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/libvirt-8.2.0" + + +

All libvirt-python users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/libvirt-python-8.2.0" + +
+ + CVE-2020-14339 + CVE-2020-25637 + CVE-2021-3631 + CVE-2021-3667 + CVE-2022-0897 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-07.xml new file mode 100644 index 0000000000..23531d82ae --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-07.xml @@ -0,0 +1,42 @@ + + + + Deluge: Cross-Site Scripting + A vulnerability has been found in Deluge which could result in XSS. + deluge + 2022-10-16 + 2022-10-16 + 866842 + remote + + + 2.1.1 + 2.1.1 + + + +

Deluge is a BitTorrent client.

+
+ +

Deluge does not sufficiently sanitize crafted torrent file data, leading to the application interpreting untrusted data as HTML.

+
+ +

An attacker can achieve XSS via a crafted torrent file.

+
+ +

There is no known workaround at this time.

+
+ +

All Deluge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-p2p/deluge-2.1.1" + +
+ + CVE-2021-3427 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-08.xml new file mode 100644 index 0000000000..258553a8b8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-08.xml @@ -0,0 +1,54 @@ + + + + Tcpreplay: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Tcpreplay, the worst of which could result in denial of service. + tcpreplay + 2022-10-16 + 2022-10-16 + 833139 + 836240 + remote + + + 4.4.2 + 4.4.2 + + + +

Tcpreplay is a suite of utilities for UNIX systems for editing and replaying network traffic which was previously captured by tools like tcpdump and ethereal/wireshark.

+
+ +

Multiple vulnerabilities have been discovered in Tcpreplay. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Tcpreplay users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/tcpreplay-4.4.2" + +
+ + CVE-2021-45386 + CVE-2021-45387 + CVE-2022-27416 + CVE-2022-27418 + CVE-2022-27939 + CVE-2022-27940 + CVE-2022-27941 + CVE-2022-27942 + CVE-2022-28487 + CVE-2022-37047 + CVE-2022-37048 + CVE-2022-37049 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-09.xml new file mode 100644 index 0000000000..dbb426860d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-09.xml @@ -0,0 +1,76 @@ + + + + Rust: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Rust, the worst of which could result in denial of service. + rust,rust-bin + 2022-10-16 + 2022-10-16 + 870166 + 831638 + 821157 + 807052 + 782367 + remote + + + 1.63.0-r1 + 1.63.0-r1 + + + 1.64.0 + 1.64.0 + + + +

A systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety.

+
+ +

Multiple vulnerabilities have been discovered in Rust. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Rust users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/rust-1.63.0-r1" + + +

All Rust binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/rust-bin-1.64.0" + + +

In addition, users using Portage 3.0.38 or later should ensure that packages with Rust binaries have no vulnerable code statically linked into their binaries by rebuilding the @rust-rebuild set:

+ + + # emerge --ask --oneshot --verbose @rust-rebuild + +
+ + CVE-2021-28875 + CVE-2021-28876 + CVE-2021-28877 + CVE-2021-28878 + CVE-2021-28879 + CVE-2021-29922 + CVE-2021-31162 + CVE-2021-36317 + CVE-2021-36318 + CVE-2021-42574 + CVE-2021-42694 + CVE-2022-21658 + CVE-2022-36113 + CVE-2022-36114 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-10.xml new file mode 100644 index 0000000000..a4dcc0e92c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-10.xml @@ -0,0 +1,57 @@ + + + + LibTIFF: Multiple Vulnerabilities + Multiple vulnerabilities have been found in LibTIFF, the worst of which could result in denial of service. + tiff + 2022-10-31 + 2022-10-31 + 830981 + 837560 + remote + + + 4.4.0 + 4.4.0 + + + +

LibTIFF provides support for reading and manipulating TIFF (Tagged Image File Format) images.

+
+ +

Multiple vulnerabilities have been discovered in LibTIFF. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All LibTIFF users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.4.0" + +
+ + CVE-2022-0561 + CVE-2022-0562 + CVE-2022-0865 + CVE-2022-0891 + CVE-2022-0907 + CVE-2022-0908 + CVE-2022-0909 + CVE-2022-0924 + CVE-2022-1056 + CVE-2022-1210 + CVE-2022-1354 + CVE-2022-1355 + CVE-2022-1622 + CVE-2022-1623 + CVE-2022-22844 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-11.xml new file mode 100644 index 0000000000..7db2fb28e4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-11.xml @@ -0,0 +1,42 @@ + + + + schroot: Denial of Service + A vulnerability has been discovered in schroot which could result in denial of service of the schroot service. + schroot + 2022-10-31 + 2022-10-31 + 867016 + remote + + + 1.6.13_p2 + 1.6.13_p2 + + + +

schroot is a utility to execute commands in a chroot environment.

+
+ +

schroot is unecessarily permissive in rules regarding chroot and session names.

+
+ +

A crafted chroot or session name can break the internal state of the schroot service, leading to denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All schroot users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/schroot-1.6.13" + +
+ + CVE-2022-2787 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-12.xml new file mode 100644 index 0000000000..fe42a61690 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-12.xml @@ -0,0 +1,43 @@ + + + + Lighttpd: Denial of Service + A vulnerability has been discovered in lighttpd which could result in denial of service. + lighttpd + 2022-10-31 + 2022-10-31 + 869890 + remote + + + 1.4.67 + 1.4.67 + + + +

Lighttpd is a lightweight high-performance web server.

+
+ +

Lighttpd's mod_wstunnel does not initialize a handler function pointer if an invalid HTTP request (websocket handshake) is received.

+
+ +

An attacker can trigger a denial of service via making Lighttpd try to call an uninitialized function pointer.

+
+ +

There is no known workaround at this time.

+
+ +

All lighttpd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/lighttpd-1.4.67" + +
+ + CVE-2022-37797 + CVE-2022-41556 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-13.xml new file mode 100644 index 0000000000..2a9427d61d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-13.xml @@ -0,0 +1,45 @@ + + + + libgcrypt: Multiple Vulnerabilities + Multiple vulnerabilities have been found in libgcrypt, the worst of which could result in denial of service. + libgcrypt + 2022-10-31 + 2022-10-31 + 766213 + 795480 + 811900 + remote + + + 1.9.4 + 1.9.4 + + + +

libgcrypt is a general purpose cryptographic library derived out of GnuPG.

+
+ +

Multiple vulnerabilities have been discovered in libgcrypt. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libgcrypt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libgcrypt-1.9.4" + +
+ + CVE-2021-33560 + CVE-2021-40528 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-14.xml new file mode 100644 index 0000000000..e6f40a3325 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-14.xml @@ -0,0 +1,48 @@ + + + + Gitea: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Gitea, the worst of which could lead to denial of service + gitea + 2022-10-31 + 2022-10-31 + 848465 + 857819 + 868996 + 877355 + remote + + + 1.17.3 + 1.17.3 + + + +

Gitea is a painless self-hosted Git service.

+
+ +

Multiple vulnerabilities have been discovered in Gitea. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Gitea users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apps/gitea-1.17.3" + +
+ + CVE-2022-1928 + CVE-2022-32149 + CVE-2022-38183 + CVE-2022-42968 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-15.xml new file mode 100644 index 0000000000..6f78f4a845 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-15.xml @@ -0,0 +1,42 @@ + + + + GDAL: Heap Buffer Overflow + A heap buffer overflow vulnerability has been found in GDAL which could result in denial of service. + gdal + 2022-10-31 + 2022-10-31 + 830370 + remote + + + 3.4.1 + 3.4.1 + + + +

GDAL is a geospatial data abstraction library.

+
+ +

GDAL does not sufficiently sanitize input when loading PCIDSK binary segments.

+
+ +

Loading crafted PCIDSK data via GDAL could result in denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All GDAL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sci-libs/gdal-3.4.1" + +
+ + CVE-2021-45943 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-16.xml new file mode 100644 index 0000000000..90204a61ee --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-16.xml @@ -0,0 +1,106 @@ + + + + Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Chromium and its derivatives, the worst of which could result in remote code execution. + chromium,chromium-bin,google-chrome,microsoft-edge + 2022-10-31 + 2022-10-31 + 873817 + 874855 + 876855 + 873217 + remote + + + 106.0.5249.119 + 106.0.5249.119 + + + 106.0.5249.119 + 106.0.5249.119 + + + 106.0.5249.119 + 106.0.5249.119 + + + 106.0.1370.37 + 106.0.1370.37 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. + +Google Chrome is one fast, simple, and secure browser for all your devices. + +Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium, Google Chrome, and Microsoft Edge. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-106.0.5249.119" + + +

All Chromium binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-bin-106.0.5249.119" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-106.0.5249.119" + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-106.0.1370.37" + +
+ + CVE-2022-3201 + CVE-2022-3304 + CVE-2022-3305 + CVE-2022-3306 + CVE-2022-3307 + CVE-2022-3308 + CVE-2022-3309 + CVE-2022-3310 + CVE-2022-3311 + CVE-2022-3312 + CVE-2022-3313 + CVE-2022-3314 + CVE-2022-3315 + CVE-2022-3316 + CVE-2022-3317 + CVE-2022-3318 + CVE-2022-3370 + CVE-2022-3373 + CVE-2022-3445 + CVE-2022-3446 + CVE-2022-3447 + CVE-2022-3448 + CVE-2022-3449 + CVE-2022-3450 + CVE-2022-41035 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-17.xml new file mode 100644 index 0000000000..244b3eb9ce --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-17.xml @@ -0,0 +1,46 @@ + + + + JHead: Multiple Vulnerabilities + Multiple vulnerabilities have been found in JHead, the worst of which could result in denial of service. + jhead + 2022-10-31 + 2022-10-31 + 730746 + remote + + + 3.06.0.1 + 3.06.0.1 + + + +

JHead is an EXIF JPEG header manipulation tool.

+
+ +

Multiple vulnerabilities have been discovered in JHead. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All JHead users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/jhead-3.06.0.1" + +
+ + CVE-2021-3496 + CVE-2021-28275 + CVE-2021-28276 + CVE-2021-28277 + CVE-2021-28278 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-18.xml new file mode 100644 index 0000000000..02b970e9b3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-18.xml @@ -0,0 +1,44 @@ + + + + Sofia-SIP: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Sofia-SIP, the worst of which could result in remote code execution. + sofia-sip + 2022-10-31 + 2022-10-31 + 848870 + remote + + + 1.13.8 + 1.13.8 + + + +

Sofia-SIP is an RFC3261 compliant SIP User-Agent library.

+
+ +

Multiple vulnerabilities have been discovered in Sofia-SIP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Sofia-SIP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/sofia-sip-1.13.8" + +
+ + CVE-2022-31001 + CVE-2022-31002 + CVE-2022-31003 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-19.xml new file mode 100644 index 0000000000..c76898e3fe --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-19.xml @@ -0,0 +1,42 @@ + + + + Apptainer: Lack of Digital Signature Hash Verification + A vulnerability has been found in Apptainer which could result in the usage of an unexpected of a container. + apptainer + 2022-10-31 + 2022-10-31 + 875869 + remote + + + 1.1.2 + 1.1.2 + + + +

Apptainer is the container system for secure high-performance computing.

+
+ +

The Go module "sif" version 2.8.0 and older, which is a statically linked dependency of Apptainer, does not verify that the hash algorithm(s) used are cryptographically secure when verifying digital signatures.

+
+ +

An image whose verification relies on a cryptographically insecure hash algorithm could be replaced, resulting in users using an image other than the one that was expected.

+
+ +

There is no known workaround at this time.

+
+ +

All Apptainer users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/apptainer-1.1.2" + +
+ + CVE-2022-39237 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-20.xml new file mode 100644 index 0000000000..0efb8be7c4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-20.xml @@ -0,0 +1,42 @@ + + + + Nicotine+: Denial of Service + A vulnerability has been found in Nicotine+ which could result in denial of service. + nicotine+ + 2022-10-31 + 2022-10-31 + 835374 + remote + + + 3.2.1 + 3.2.1 + + + +

Nicotine+ is a fork of nicotine, a Soulseek client in Python.

+
+ +

Nicotine+ does not sufficiently validate file path in download requests.

+
+ +

A file path in a download request which contains a null character will cause a crash of Nicotine+.

+
+ +

There is no known workaround at this time.

+
+ +

All Nicotine+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-p2p/nicotine+-3.2.1" + +
+ + CVE-2021-45848 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-21.xml new file mode 100644 index 0000000000..048f9d1f38 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-21.xml @@ -0,0 +1,43 @@ + + + + FasterXML jackson-databind: Multiple vulnerabilities + Multiple vulnerabilities have been found in FasterXML jackson-databind, the worst of which could result in denial of service. + jackson-databind + 2022-10-31 + 2022-10-31 + 874033 + remote + + + 2.13.4.1 + 2.13.4.1 + + + +

FasterXML jackson-databind is a general data-binding package for Jackson (2.x) which works on streaming API (core) implementation(s).

+
+ +

Multiple vulnerabilities have been discovered in FasterXML jackson-databind. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All FasterXML jackson-databind users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/jackson-databind-2.13.4.1" + +
+ + CVE-2022-42003 + CVE-2022-42004 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-22.xml new file mode 100644 index 0000000000..871a489db2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-22.xml @@ -0,0 +1,46 @@ + + + + RPM: Multiple Vulnerabilities + Multiple vulnerabilities have been found in RPM, the worst of which could lead to root privilege escalation. + rpm + 2022-10-31 + 2022-10-31 + 830380 + 866716 + remote + + + 4.18.0 + 4.18.0 + + + +

The Red Hat Package Manager (RPM) is a command line driven package management system capable of installing, uninstalling, verifying, querying, and updating computer software packages.

+
+ +

Multiple vulnerabilities have been discovered in RPM. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All RPM users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/rpm-4.18.0" + +
+ + CVE-2021-3521 + CVE-2021-35937 + CVE-2021-35938 + CVE-2021-35939 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-23.xml new file mode 100644 index 0000000000..8d0b1439c5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-23.xml @@ -0,0 +1,42 @@ + + + + libksba: Remote Code Execution + An integer overflow vulnerability has been found in libksba which could result in remote code execution. + libksba + 2022-10-31 + 2022-10-31 + 877453 + remote + + + 1.6.2 + 1.6.2 + + + +

Libksba is a X.509 and CMS (PKCS#7) library.

+
+ +

An integer overflow in parsing ASN.1 objects could lead to a buffer overflow.

+
+ +

Crafted ASN.1 objects could trigger an integer overflow and buffer overflow to result in remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All libksba users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libksba-1.6.2" + +
+ + CVE-2022-3515 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-24.xml new file mode 100644 index 0000000000..50c5aee207 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-24.xml @@ -0,0 +1,49 @@ + + + + FreeRDP: Multiple Vulnerabilities + Multiple vulnerabilities have been found in FreeRDP, the worst of which could result in remote code execution. + freerdp + 2022-10-31 + 2022-10-31 + 876905 + 842231 + 819534 + remote + + + 2.8.1 + 2.8.1 + + + +

FreeRDP is a free implementation of the remote desktop protocol.

+
+ +

Multiple vulnerabilities have been discovered in FreeRDP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All FreeRDP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/freerdp-2.8.1" + +
+ + CVE-2021-41159 + CVE-2021-41160 + CVE-2022-24882 + CVE-2022-24883 + CVE-2022-39282 + CVE-2022-39283 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-25.xml new file mode 100644 index 0000000000..e424e32709 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-25.xml @@ -0,0 +1,63 @@ + + + + ISC BIND: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in ISC BIND, the worst of which could result in denial of service. + bind,bind-tools + 2022-10-31 + 2022-10-31 + 820563 + 835439 + 872206 + remote + + + 9.16.33 + 9.16.33 + + + 9.16.33 + 9.16.33 + + + +

ISC BIND is the Internet Systems Consortium implementation of the Domain Name System (DNS) protocol.

+
+ +

Multiple vulnerabilities have been discovered in ISC BIND. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All ISC BIND users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.16.33" + + +

All ISC BIND-tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/bind-tools-9.16.33" + +
+ + CVE-2021-25219 + CVE-2021-25220 + CVE-2022-0396 + CVE-2022-2795 + CVE-2022-2881 + CVE-2022-2906 + CVE-2022-3080 + CVE-2022-38177 + CVE-2022-38178 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-26.xml new file mode 100644 index 0000000000..af8eba5fe7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-26.xml @@ -0,0 +1,42 @@ + + + + Shadow: TOCTOU Race + A TOCTOU race has been discovered in Shadow, which could result in the unauthorized modification of files. + shadow + 2022-10-31 + 2022-10-31 + 830486 + remote + + + 4.12.2 + 4.12.2 + + + +

Shadow contains utilities to deal with user accounts

+
+ +

A TOCTOU race condition was discovered in shadow. A local attacker with write privileges in a directory removed or copied by usermod/userdel could potentially exploit this flaw when the administrator invokes usermod/userdel.

+
+ +

An unauthorized user could potentially modify files which they do not have write permissions for.

+
+ +

There is no known workaround at this time.

+
+ +

All Shadow users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.12.2" + +
+ + CVE-2013-4235 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-27.xml new file mode 100644 index 0000000000..d8bb0cfcd2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-27.xml @@ -0,0 +1,43 @@ + + + + open-vm-tools: Local Privilege Escalation + A vulnerability has been discovered in open-vm-tools which could allow for local privilege escalation. + open-vm-tools + 2022-10-31 + 2022-10-31 + 866227 + remote + + + 12.1.0 + 12.1.0 + + + +

open-vm-tools contains tools for VMware guests.

+
+ +

A pipe accessible to unprivileged users in the VMWare guest does not sufficiently sanitize input.

+
+ +

An unprivileged guest user could achieve root privileges within the guest.

+
+ +

There is no known workaround at this time.

+
+ +

All open-vm-tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/open-vm-tools-12.1.0" + +
+ + CVE-2022-31676 + VMSA-2022-0024.1 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-28.xml new file mode 100644 index 0000000000..c8bdc202aa --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-28.xml @@ -0,0 +1,42 @@ + + + + exif: Denial of Service + A vulnerability has been discovered in exif which could result in denial of service. + exif + 2022-10-31 + 2022-10-31 + 783522 + remote + + + 0.6.22 + 0.6.22 + + + +

libexif is a library for parsing, editing and saving Exif metadata from images. exif is a small command line interface for libexif.

+
+ +

There is a bug in exif's XML output format which can result in a null pointer dereference when outputting crafted JPEG EXIF data.

+
+ +

A crafted JPEG image can trigger a denial of service in the form of a null pointer dereference.

+
+ +

There is no known workaround at this time.

+
+ +

All exif users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/exif-0.6.22" + +
+ + CVE-2021-27815 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-29.xml new file mode 100644 index 0000000000..4f9e39cbb9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-29.xml @@ -0,0 +1,47 @@ + + + + Net-SNMP: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Net-SNMP, the worst of which could result in denial of service. + net-snmp + 2022-10-31 + 2022-10-31 + 855500 + remote + + + 5.9.2 + 5.9.2 + + + +

Net-SNMP is a suite of applications used to implement the Simple Network Management Protocol.

+
+ +

Multiple vulnerabilities have been discovered in Net-SNMP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Net-SNMP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/net-snmp-5.9.2" + +
+ + CVE-2022-24805 + CVE-2022-24806 + CVE-2022-24807 + CVE-2022-24808 + CVE-2022-24809 + CVE-2022-24810 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-30.xml new file mode 100644 index 0000000000..faf6cd204e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-30.xml @@ -0,0 +1,54 @@ + + + + X.Org X server, XWayland: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in the Xorg Server and XWayland, the worst of which can result in remote code execution. + xorg-server,xwayland + 2022-10-31 + 2022-10-31 + 857780 + remote + + + 21.1.4 + 21.1.4 + + + 22.1.3 + 22.1.3 + + + +

The X Window System is a graphical windowing system based on a client/server model.

+
+ +

Multiple vulnerabilities have been discovered in X.Org X server and XWayland. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All X.Org X server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-21.1.4" + + +

All XWayland users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xwayland-22.1.3" + +
+ + CVE-2022-2319 + CVE-2022-2320 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-31.xml new file mode 100644 index 0000000000..2c913f0d4b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-31.xml @@ -0,0 +1,53 @@ + + + + OpenEXR: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenEXR, the worst of which could result in arbitrary code execution. + openexr + 2022-10-31 + 2022-10-31 + 838079 + 830384 + 817431 + 810541 + 801373 + 787452 + remote + + + 3.1.5 + 3.1.5 + + + +

OpenEXR is a high dynamic-range (HDR) image file format developed by Industrial Light & Magic for use in computer imaging applications.

+
+ +

Multiple vulnerabilities have been discovered in OpenEXR. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenEXR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/openexr-3.1.5" + +
+ + CVE-2021-3598 + CVE-2021-3605 + CVE-2021-3933 + CVE-2021-3941 + CVE-2021-20304 + CVE-2021-23169 + CVE-2021-45942 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-32.xml new file mode 100644 index 0000000000..172d593855 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-32.xml @@ -0,0 +1,56 @@ + + + + hiredis, hiredis-py: Multiple Vulnerabilities + An integer overflow has been found in hiredis which could result in arbitrary code execution. + hiredis,hiredis + 2022-10-31 + 2022-10-31 + 873079 + 816318 + remote + + + 1.0.1 + 1.0.1 + + + 2.0.0 + 2.0.0 + + + +

hiredis is a minimalistic C client library for the Redis database. + +hiredis-py is a Python extension that wraps hiredis.

+
+ +

Hiredis is vulnerable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the `calloc()` call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow.

+
+ +

Malicious Redis commands could result in remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All hiredis users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/hiredis-1.0.1" + + +

All hiredis-py users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/hiredis-2.0.0" + +
+ + CVE-2021-32765 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-33.xml new file mode 100644 index 0000000000..a59781932a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-33.xml @@ -0,0 +1,54 @@ + + + + Libtirpc: Denial of Service + A vulnerability has been discovered in Libtirpc which could result in denial of service. + libtirpc + 2022-10-31 + 2022-10-31 + 859634 + remote + + + 1.3.2 + 1.3.2 + + + +

Libtirpc is a port of Sun's Transport-Independent RPC library to Linux.

+
+ +

Currently svc_run does not handle poll timeout and rendezvous_request +does not handle EMFILE error returned from accept(2 as it used to. +These two missing functionality were removed by commit b2c9430f46c4. + +The effect of not handling poll timeout allows idle TCP conections +to remain ESTABLISHED indefinitely. When the number of connections +reaches the limit of the open file descriptors (ulimit -n) then +accept(2) fails with EMFILE. Since there is no handling of EMFILE +error this causes svc_run() to get in a tight loop calling accept(2). +This resulting in the RPC service of svc_run is being down, it's +no longer able to service any requests. + +Due to a lack of handling of certain error cases, connections to Libtirpc could remain ESTABLISHED indefinitely.

+
+ +

Denial of service can be achieved via establishing enough connections to Libtirpc to reach the limit of open file descriptors for the process.

+
+ +

There is no known workaround at this time.

+
+ +

All Libtirpc users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libtirpc-1.3.2" + +
+ + CVE-2021-46828 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-34.xml new file mode 100644 index 0000000000..06c691d6f8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-34.xml @@ -0,0 +1,76 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in arbitrary code execution. + firefox,firefox-bin + 2022-10-31 + 2022-10-31 + 877773 + remote + + + 106.0 + 102.4.0 + 106.0 + 102.4.0 + + + 106.0 + 102.4.0 + 106.0 + 102.4.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-102.4.0" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-102.4.0" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-106.0" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-106.0" + +
+ + CVE-2022-42927 + CVE-2022-42928 + CVE-2022-42929 + CVE-2022-42930 + CVE-2022-42931 + CVE-2022-42932 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-35.xml new file mode 100644 index 0000000000..386fe8be29 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-35.xml @@ -0,0 +1,61 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could result in arbitrary code execution. + thunderbird,thunderbird-bin + 2022-10-31 + 2022-10-31 + 873667 + 878315 + remote + + + 102.4.0 + 102.4.0 + + + 102.4.0 + 102.4.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.4.0" + + +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.4.0" + +
+ + CVE-2022-39236 + CVE-2022-39249 + CVE-2022-39250 + CVE-2022-39251 + CVE-2022-42927 + CVE-2022-42928 + CVE-2022-42929 + CVE-2022-42932 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-36.xml new file mode 100644 index 0000000000..04ac36eb67 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-36.xml @@ -0,0 +1,42 @@ + + + + libjxl: Denial of Service + A vulnerability has been found in libjxl which could result in denial of service. + libjxl + 2022-10-31 + 2022-10-31 + 856037 + remote + + + 0.7.0_pre20220825 + 0.7.0_pre20220825 + + + +

libjxl is the JPEG XL image format reference implementation.

+
+ +

libjxl contains an unecessary assertion in jxl::LowMemoryRenderPipeline::Init.

+
+ +

An attacker can cause a denial of service of the libjxl process via a crafted input file.

+
+ +

There is no known workaround at this time.

+
+ +

All users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libjxl-0.7.0_pre20220825" + +
+ + CVE-2022-34000 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-37.xml new file mode 100644 index 0000000000..2d82af3c3d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-37.xml @@ -0,0 +1,60 @@ + + + + PJSIP: Multiple Vulnerabilities + Multiple vulnerabilities have been found in PJSIP, the worst of which could result in arbitrary code execution. + pjproject + 2022-10-31 + 2022-10-31 + 803614 + 829894 + 875863 + remote + + + 2.12.1 + 2.12.1 + + + +

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE.

+
+ +

Multiple vulnerabilities have been discovered in PJSIP. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All PJSIP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/pjproject-2.12.1" + +
+ + CVE-2021-32686 + CVE-2021-37706 + CVE-2021-41141 + CVE-2021-43804 + CVE-2021-43845 + CVE-2022-21722 + CVE-2022-21723 + CVE-2022-23608 + CVE-2022-24754 + CVE-2022-24763 + CVE-2022-24764 + CVE-2022-24786 + CVE-2022-24792 + CVE-2022-24793 + CVE-2022-31031 + CVE-2022-39244 + CVE-2022-39269 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-38.xml new file mode 100644 index 0000000000..82ab949397 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-38.xml @@ -0,0 +1,42 @@ + + + + Expat: Denial of Service + A vulnerability has been found in Expat which could result in denial of service. + expat + 2022-10-31 + 2022-10-31 + 878271 + remote + + + 2.5.0 + 2.5.0 + + + +

Expat is a set of XML parsing libraries.

+
+ +

In certain out-of-memory situations, Expat may free memory before it should, leading to a use-after-free.

+
+ +

A use-after-free can result in denial of service.

+
+ +

There is no known workaround at this time.

+
+ +

All Expat users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/expat-2.5.0" + +
+ + CVE-2022-43680 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-39.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-39.xml new file mode 100644 index 0000000000..ef2d7e2ae3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-39.xml @@ -0,0 +1,43 @@ + + + + libxml2: Multiple Vulnerabilities + Multiple vulnerabilities have been found in libxml2, the worst of which could result in arbitrary code execution. + libxml2 + 2022-10-31 + 2022-10-31 + 877149 + remote + + + 2.10.3 + 2.10.3 + + + +

libxml2 is the XML C parser and toolkit developed for the GNOME project.

+
+ +

Multiple vulnerabilities have been discovered in libxml2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libxml2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.10.3" + +
+ + CVE-2022-40303 + CVE-2022-40304 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-40.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-40.xml new file mode 100644 index 0000000000..6f4199b223 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-40.xml @@ -0,0 +1,44 @@ + + + + SQLite: Multiple Vulnerabilities + Multiple vulnerabilities have been found in SQLite, the worst of which could result in arbitrary code execution. + sqlite + 2022-10-31 + 2022-10-31 + 777990 + 863431 + remote + + + 3.39.2 + 3.39.2 + + + +

SQLite is a C library that implements an SQL database engine.

+
+ +

Multiple vulnerabilities have been discovered in SQLite. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All SQLite users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/sqlite-3.39.2" + +
+ + CVE-2021-20227 + CVE-2022-35737 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-41.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-41.xml new file mode 100644 index 0000000000..ef96ac8f4e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-41.xml @@ -0,0 +1,43 @@ + + + + android-tools: Multiple Vulnerabilities + Multiple vulnerabilities have been found in android-tools, the worst of which could result in arbitrary code execution. + android-tools + 2022-10-31 + 2022-10-31 + 878281 + remote + + + 33.0.3 + 33.0.3 + + + +

android-tools contains Android platform tools (adb, fastboot, and mkbootimg).

+
+ +

Multiple vulnerabilities have been discovered in android-tools. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All android-tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/android-tools-33.0.3" + +
+ + CVE-2022-3168 + CVE-2022-20128 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-42.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-42.xml new file mode 100644 index 0000000000..608226a9c7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202210-42.xml @@ -0,0 +1,44 @@ + + + + zlib: Multiple vulnerabilities + A buffer overflow in zlib might allow an attacker to cause remote code execution. + zlib + 2022-10-31 + 2022-10-31 + 863851 + 835958 + remote + + + 1.2.12-r3 + 1.2.12-r3 + + + +

zlib is a widely used free and patent unencumbered data compression library.

+
+ +

Multiple vulnerabilities have been discovered in zlib. Please review the CVE identifiers referenced below for details.

+
+ +

Maliciously crafted input handled by zlib may result in remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All zlib users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/zlib-1.2.12-r3" + +
+ + CVE-2018-25032 + CVE-2022-37434 + + sam + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-01.xml new file mode 100644 index 0000000000..b95d1a1de5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-01.xml @@ -0,0 +1,43 @@ + + + + OpenSSL: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenSSL, the worst of which could result in remote code execution. + openssl + 2022-11-01 + 2022-11-01 + 878269 + remote + + + 3.0.7 + 3.0.7 + + + +

OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general purpose cryptography library.

+
+ +

Multiple buffer overflows exist in OpenSSL's handling of TLS certificates for client authentication.

+
+ +

It is believed that, while unlikely, code execution is possible in certain system configurations.

+
+ +

Users operating TLS servers may consider disabling TLS client authentication, if it is being used, until fixes are applied.

+
+ +

All OpenSSL 3 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-3.0.7" + +
+ + CVE-2022-3602 + CVE-2022-3786 + + ajak + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-02.xml new file mode 100644 index 0000000000..982dbfe367 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202211-02.xml @@ -0,0 +1,42 @@ + + + + lesspipe: Arbitrary Code Exeecution + A vulnerability has been found in lesspipe which could result in arbitrary code execution. + lesspipe + 2022-11-10 + 2022-11-10 + 865631 + remote + + + 2.06 + 2.06 + + + +

lesspipe is a preprocessor for less.

+
+ +

lesspipe has support for parsing Perl storable ("PST") files,

+
+ +

A crafted Perl storable file which is passed into lesspipe could result in arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All lesspipe users should update to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/lesspipe-2.06" + +
+ + CVE-2022-44542 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index f83144c1e1..b85b4f37be 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 14 Feb 2022 12:39:11 +0000 +Fri, 18 Nov 2022 11:39:53 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 1ddda011c9..856b1311a2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -d2418b0a913a694a55e21440268b44301931867c 1643686264 2022-02-01T03:31:04+00:00 +d2caa7d73160aa5b9c9cda07665068a8b25fa730 1668098162 2022-11-10T16:36:02+00:00