diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 1b5eaf0ded..77b7017207 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 563604 BLAKE2B d497f4e02c0349649ea1fd84297af45ff253c185da14e6dba30f010f40d1ab86fdeb750087d23d7e892d4b2a6c45bb36baacd75348d2a50c0dc3c70213c1836e SHA512 c8b2f6bb87969de216a6075f22dc589f34d03bc0cd503b9bbedb9672f2aa19209f4d1236cd3f9aaf54428705e66f266c37a1f0bdb30c6fdae78df87761e4d8da -TIMESTAMP 2024-02-01T06:41:25Z +MANIFEST Manifest.files.gz 569494 BLAKE2B 475196fd0ff28d6023f45e6c22284bded2028bbe891778e3828fb75c3727438168bcd5ab63fe48683bb5874710c096e12470eee93163ae90c07d1f9d79810710 SHA512 94822c7f83b3b68b28e1885c442c2d9b5794eb5f861b8a0862162601a2c2b03cdc2bb6144d8b4a1d61befedf2ff1952e540c518e34c7f15ff5af14b7dc567fcb +TIMESTAMP 2024-04-01T06:40:39Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmW7PRVfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmYKVudfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klB4QRAAmmnYvk0FaooM922vBqTuhwuoLVbDtysDcvBsJHLxoL+AQlp+0romn4tJ -rHDAcIPSjxMPzei60/FKb8/lWyAwDtRJJ6W0NLOBe5K0SRUKTLKQz4OZ3aHFNl2t -Yp18kfnUgMyZ7l3v2CrKEE3oC+hWpULJ9GF+uuvpSHUXDOqIkbm6vhWQWRzDwCrA -0RacuWPedLm34CiqwiZSEsnzOzvBb8A7tbmKtSyqhBTKyam7wy0/Tn99Wp5tnDGu -Vtp7rgT1wMmGFOEYt2I+QM1fWGxf/GN3CNPNrNRQoQHcs9BadB8hn+auklc8zOc2 -RxEgAaESWhDLSsHkI1xp4osi9OTBqME1wUcjHPQr8d9JAdzsg5L8wW7rJE8YflM6 -uUrchSczds2gc34nG/ZYBC88EpvnU6U2AqZZ22LwOCi5qWo3GQZOc4jZqIuumogi -faLkvuNCX2JKYKZdQQ4Byz9WMN+4X5dWLnQfJT9nHc0F/rTsV4ZcpDUApBCiqCD0 -lHY6ZPKcVL7d8cqQ2h6SjRkO0FrytUbBZm97g861/jX/evt1wY8Jx1e+FAxQksq+ -uPTXpriBil+N5YWzpHbuOZYjAQ7fv7fx50HM3RVNz2wwa7OUxhIFaE7/vBNbPL1F -axrmSl59VEi9APSEmapOVVZR5tloRvDacB0elAhfpbqCb2BCO9E= -=EZVX +klBWrg//cxk8dWFEYLuuzfXLVmmEZmb3IPhBpMDKhQkoNbb4yGkCNuZUP42QdZzt +f9qKIN4MD71/C9n5pt3UQBYH2fw2BBPDi2mpIVAdSQxydQCOimOF1BVTGDBBvNXd +W64uDqqLnLAUVikdexeTCfHFvoOrqI8xALviM7U+EaXq+9a5s0CjvCFvYWkCKR0B +ytl9J6eD0u7MWWQoNa5wrolHgRidVFtKfIbiOwAOmkWeXrcZ5s5h5eJg+UF9+UxS +i7+sh9NZ4OAoTXszcf9x4L4RGkqWbTHpG6MBqhATI8N6jVsxXtJv3TlvS/OKi9Yn +Dj+GUuok7WdbFGARfAASDGwolspDCacYXj618kioIySnaQrKuUTwFWPveAkfNLWc +k79bwmBbmc6ILRhaYCpuN4hAC14gkL6xxrwGfuY7VxtjRockWTSUTLm9ACnjI7SY +7r4dVvgQQqqu7F5+mpN8gV9yfu7hXvhAaZU8ptzJV6stjEpK/MW0h1BDimMArowI +sGVSPMVkp80BNSHIPwiVM4sQTK1tDsdx9AjHz9hn/UV4uHSobiYvKE5/TUzhJoUO +ERD9VRcyvpat+jNkmQD8a3ZBSbnK8rRee3sC5LhbOh/YeeZwCCBo3ai6LoeFkH4W +c7yTtKfDg7Vb7tODZRG4DdVIHMxDUIT7v8Qi65Rntj6IxFlnMhQ= +=BHZC -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 44241c9c7a..ae360fd1f8 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-24.xml index 68d2b4e545..18b576d5bc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-24.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202208-24.xml @@ -5,7 +5,7 @@ Multiple vulnerabilities have been discovered in the GNU C Library, the worst of which could result in denial of service. glibc 2022-08-14 - 2022-08-14 + 2024-02-18 803437 807935 831096 @@ -13,8 +13,8 @@ remote - 2.34 - 2.34 + 2.34-r7 + 2.34-r7 @@ -47,4 +47,4 @@ ajak sam - \ No newline at end of file + diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-15.xml index fe69020612..e71f13f8c2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202305-15.xml @@ -5,7 +5,7 @@ Multiple vulnerabilities have been discovered in systemd, the worst of which could result in denial of service. systemd,systemd-tmpfiles,systemd-utils,udev 2023-05-03 - 2023-05-03 + 2024-02-11 880547 830967 remote @@ -15,14 +15,14 @@ 251.3 - 250 + 250 251.3 251.3 - 250 + 250 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-33.xml index df49bf28b7..7a6ccd196e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-33.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202401-33.xml @@ -8,6 +8,7 @@ 2024-01-31 915222 918667 + 920667 remote @@ -54,4 +55,4 @@ graaff graaff - \ No newline at end of file + diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-01.xml new file mode 100644 index 0000000000..7fa0e51147 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-01.xml @@ -0,0 +1,49 @@ + + + + glibc: Multiple Vulnerabilities + Multiple vulnerabilities in glibc could result in Local Privilege Escalation. + glibc + 2024-02-02 + 2024-02-02 + 918412 + 923352 + local and remote + + + 2.38-r10 + 2.38-r10 + + + +

glibc is a package that contains the GNU C library.

+
+ +

Multiple vulnerabilities have been discovered in glibc. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All glibc users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.38-r10" + +
+ + CVE-2023-5156 + CVE-2023-6246 + CVE-2023-6779 + CVE-2023-6780 + GLIBC-SA-2024-0001 + GLIBC-SA-2024-0002 + GLIBC-SA-2024-0003 + + sam + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-02.xml new file mode 100644 index 0000000000..ddbace0e73 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-02.xml @@ -0,0 +1,53 @@ + + + + SDDM: Privilege Escalation + A vulnerability has been discovered in SDDM which can lead to privilege escalation. + sddm + 2024-02-03 + 2024-02-03 + 753104 + local + + + 0.18.1-r6 + 0.18.1-r6 + + + +

SDDM is a modern display manager for X11 and Wayland sessions aiming to be fast, simple and beautiful. It uses modern technologies like QtQuick, which in turn gives the designer the ability to create smooth, animated user interfaces.

+
+ +

A vulnerability has been discovered in SDDM. Please review the CVE identifier referenced below for details.

+
+ +

SDDM passes the -auth and -displayfd command line arguments when +starting the Xserver. It then waits for the display number to be +received from the Xserver via the `displayfd`, before the Xauthority +file specified via the `-auth` parameter is actually written. This +results in a race condition, creating a time window in which no valid +Xauthority file is existing while the Xserver is already running. + +The X.Org server, when encountering a non-existing, empty or +corrupt/incomplete Xauthority file, will grant any connecting client +access to the Xorg display. A local unprivileged attacker can thus +create an unauthorized connection to the Xserver and grab e.g. keyboard +input events from other legitimate users accessing the Xserver.

+
+ +

There is no known workaround at this time.

+
+ +

All SDDM users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-misc/sddm-0.18.1-r6" + +
+ + CVE-2020-28049 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-03.xml new file mode 100644 index 0000000000..0d941d010d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-03.xml @@ -0,0 +1,44 @@ + + + + QtGui: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in QtGui which can lead to remote code execution. + qtgui + 2024-02-03 + 2024-02-03 + 808531 + 907119 + remote + + + 5.15.9-r1 + 5.15.9-r1 + + + +

QtGui is a module for the Qt toolkit.

+
+ +

Multiple vulnerabilities have been discovered in QtGui. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All QtGui users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtgui-5.15.9-r1" + +
+ + CVE-2021-38593 + CVE-2023-32763 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-04.xml new file mode 100644 index 0000000000..c72905f004 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-04.xml @@ -0,0 +1,40 @@ + + + + GNAT Ada Suite: Remote Code Execution + A vulnerability has been discovered in GNAT Ada Suite which can lead to remote code execution. + gnat-suite-bin + 2024-02-03 + 2024-02-11 + 787440 + remote + + + 2019-r2 + + + +

The GNAT Ada Suite is an Ada development environment.

+
+ +

A vulnerability has been discovered in GNAT Ada Suite. Please review the CVE identifier referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for GNAT Ada Suite. We recommend that users unmerge it:

+ + + # emerge --ask --depclean "dev-ada/gnat-suite-bin" + +
+ + CVE-2020-27619 + + graaff + ajak +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-05.xml new file mode 100644 index 0000000000..1a13d09e43 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-05.xml @@ -0,0 +1,60 @@ + + + + Microsoft Edge: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Microsoft Edge, the worst of which could lead to remote code execution. + microsoft-edge + 2024-02-03 + 2024-02-03 + 907817 + 908518 + 918586 + 919495 + remote + + + 120.0.2210.61 + 120.0.2210.61 + + + +

Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Microsoft Edge. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-120.0.2210.61" + +
+ + CVE-2023-29345 + CVE-2023-33143 + CVE-2023-33145 + CVE-2023-35618 + CVE-2023-36022 + CVE-2023-36029 + CVE-2023-36034 + CVE-2023-36409 + CVE-2023-36559 + CVE-2023-36562 + CVE-2023-36727 + CVE-2023-36735 + CVE-2023-36741 + CVE-2023-36787 + CVE-2023-36880 + CVE-2023-38174 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-06.xml new file mode 100644 index 0000000000..b36fa0e6fe --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-06.xml @@ -0,0 +1,46 @@ + + + + FreeType: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in FreeType, the worst of which can lead to remote code execution. + freetype + 2024-02-03 + 2024-02-03 + 840224 + 881443 + local and remote + + + 2.13.0 + 2.13.0 + + + +

FreeType is a high-quality and portable font engine.

+
+ +

Multiple vulnerabilities have been discovered in FreeType. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All FreeType users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.13.0" + +
+ + CVE-2022-27404 + CVE-2022-27405 + CVE-2022-27406 + CVE-2023-2004 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-07.xml new file mode 100644 index 0000000000..9570204656 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-07.xml @@ -0,0 +1,112 @@ + + + + Xen: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Xen, the worst of which can lead to arbitrary code execution. + xen + 2024-02-04 + 2024-02-04 + 754105 + 757126 + 826998 + 837575 + 858122 + 876790 + 879031 + 903624 + 905389 + 915970 + remote + + + 4.16.6_pre1 + 4.16.6_pre1 + + + +

Xen is a bare-metal hypervisor.

+
+ +

Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Xen users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.16.6_pre1" + +
+ + CVE-2021-28703 + CVE-2021-28704 + CVE-2021-28705 + CVE-2021-28706 + CVE-2021-28707 + CVE-2021-28708 + CVE-2021-28709 + CVE-2022-23816 + CVE-2022-23824 + CVE-2022-23825 + CVE-2022-26356 + CVE-2022-26357 + CVE-2022-26358 + CVE-2022-26359 + CVE-2022-26360 + CVE-2022-26361 + CVE-2022-27672 + CVE-2022-29900 + CVE-2022-29901 + CVE-2022-33746 + CVE-2022-33747 + CVE-2022-33748 + CVE-2022-33749 + CVE-2022-42309 + CVE-2022-42310 + CVE-2022-42319 + CVE-2022-42320 + CVE-2022-42321 + CVE-2022-42322 + CVE-2022-42323 + CVE-2022-42324 + CVE-2022-42325 + CVE-2022-42326 + CVE-2022-42327 + CVE-2022-42330 + CVE-2022-42331 + CVE-2022-42332 + CVE-2022-42333 + CVE-2022-42334 + CVE-2022-42335 + XSA-351 + XSA-355 + XSA-385 + XSA-387 + XSA-388 + XSA-389 + XSA-397 + XSA-399 + XSA-400 + XSA-407 + XSA-412 + XSA-414 + XSA-415 + XSA-416 + XSA-417 + XSA-418 + XSA-419 + XSA-420 + XSA-421 + XSA-422 + XSA-425 + XSA-430 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-08.xml new file mode 100644 index 0000000000..5c208e784b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-08.xml @@ -0,0 +1,63 @@ + + + + OpenSSL: Multiple Vulnerabilities + Multiple vulnerabilities have been found in OpenSSL, the worst of which could result in denial of service. + openssl + 2024-02-04 + 2024-02-04 + 876787 + 893446 + 902779 + 903545 + 907413 + 910556 + 911560 + remote + + + 3.0.10 + 3.0.10 + + + +

OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general purpose cryptography library.

+
+ +

Multiple vulnerabilities have been discovered in OpenSSL. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSSL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-3.0.10" + +
+ + CVE-2022-3358 + CVE-2022-4203 + CVE-2022-4304 + CVE-2022-4450 + CVE-2023-0215 + CVE-2023-0216 + CVE-2023-0217 + CVE-2023-0286 + CVE-2023-0401 + CVE-2023-0464 + CVE-2023-0465 + CVE-2023-0466 + CVE-2023-2650 + CVE-2023-2975 + CVE-2023-3446 + CVE-2023-3817 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-09.xml new file mode 100644 index 0000000000..2d07a381fb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-09.xml @@ -0,0 +1,46 @@ + + + + Wireshark: Multiple Vulnerabilities + Multiple out-of-bounds read vulnerabilities have been discovered in Wireshark. + wireshark + 2024-02-04 + 2024-02-04 + 915224 + 917421 + remote + + + 4.0.11 + 4.0.11 + + + +

Wireshark is a versatile network protocol analyzer.

+
+ +

Multiple vulnerabilities have been discovered in Wireshark. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Wireshark users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-4.0.11" + +
+ + CVE-2023-5371 + CVE-2023-6174 + WNPA-SEC-2023-27 + WNPA-SEC-2023-28 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-10.xml new file mode 100644 index 0000000000..19a5db39fc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-10.xml @@ -0,0 +1,43 @@ + + + + NBD Tools: Multiple Vulnerabilities + Multiple vulnerabilities have been found in NBD Tools, the worst of which could result in arbitary code execution. + nbd + 2024-02-04 + 2024-02-04 + 834678 + remote + + + 3.24 + 3.24 + + + +

The NBD Tools are the Network Block Device utilities allowing one to use remote block devices over a TCP/IP network. It includes a userland NBD server.

+
+ +

Multiple vulnerabilities have been discovered in NBD Tools. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All NBD Tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-block/nbd-3.24" + +
+ + CVE-2022-26495 + CVE-2022-26496 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-11.xml new file mode 100644 index 0000000000..27cc1d01a7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-11.xml @@ -0,0 +1,55 @@ + + + + libxml2: Multiple Vulnerabilities + Multiple denial of service vulnerabilities have been found in libxml2. + libxml2 + 2024-02-09 + 2024-02-09 + 904202 + 905399 + 915351 + 923806 + remote + + + 2.12.5 + 2.12.5 + + + +

libxml2 is the XML C parser and toolkit developed for the GNOME project.

+
+ +

Multiple vulnerabilities have been discovered in libxml2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libxml2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.12.5" + + +

If you cannot update to libxml2-2.12 yet you can update to the latest 2.11 version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libxml2-2.11.7 =dev-libs/libxml2-2.11*" + +
+ + CVE-2023-28484 + CVE-2023-29469 + CVE-2023-45322 + CVE-2024-25062 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-12.xml new file mode 100644 index 0000000000..d89aba3114 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-12.xml @@ -0,0 +1,42 @@ + + + + GNU Tar: Out of Bounds Read + A vulnerability has been discovered in GNU Tar which may lead to an out of bounds read. + tar + 2024-02-18 + 2024-02-18 + 898176 + remote + + + 1.34-r3 + 1.34-r3 + + + +

The GNU Tar program provides the ability to create tar archives, as well as various other kinds of manipulation.

+
+ +

A vulnerability have been discovered in GNU Tar. Please review the CVE identifier referenced below for details.

+
+ +

GNU Tar has a one-byte out-of-bounds read that results in use of uninitialized memory for a conditional jump. Exploitation to change the flow of control has not been demonstrated. The issue occurs via a V7 archive in which mtime has approximately 11 whitespace characters.

+
+ +

There is no known workaround at this time.

+
+ +

All GNU Tar users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/tar-1.34-r3" + +
+ + CVE-2022-48303 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-13.xml new file mode 100644 index 0000000000..40fbcc08b3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-13.xml @@ -0,0 +1,40 @@ + + + + TACACS+: Remote Code Execution + A vulnerability has been discovered in TACACS+ which could lead to remote code execution. + tac_plus + 2024-02-18 + 2024-02-18 + 918536 + remote + + + 4.0.4.27a-r3 + + + +

An updated version of Cisco's TACACS+ server.

+
+ +

A vulnerabilitiy has been discovered in TACACS+. Please review the CVE identifier referenced below for details.

+
+ +

A lack of input validation exists in tac_plus which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for TACACS+. We recommend that users unmerge it:

+ + + # emerge --ask --depclean "net-nds/tac_plus" + +
+ + CVE-2023-45239 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-14.xml new file mode 100644 index 0000000000..654226d9c4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-14.xml @@ -0,0 +1,69 @@ + + + + QtWebEngine: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to remote code execution. + qtwebengine + 2024-02-18 + 2024-02-18 + 922189 + remote + + + 5.15.12_p20240122 + 5.15.12_p20240122 + + + +

QtWebEngine is a library for rendering dynamic web content in Qt5 and Qt6 C++ and QML applications.

+
+ +

Multiple vulnerabilities have been discovered in QtWebEngine. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All QtWebEngine users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtwebengine-5.15.12_p20240122" + +
+ + CVE-2023-5997 + CVE-2023-6112 + CVE-2023-6345 + CVE-2023-6346 + CVE-2023-6347 + CVE-2023-6348 + CVE-2023-6350 + CVE-2023-6351 + CVE-2023-6508 + CVE-2023-6509 + CVE-2023-6510 + CVE-2023-6511 + CVE-2023-6512 + CVE-2023-6702 + CVE-2023-6703 + CVE-2023-6704 + CVE-2023-6705 + CVE-2023-6706 + CVE-2023-6707 + CVE-2023-7024 + CVE-2024-0222 + CVE-2024-0223 + CVE-2024-0224 + CVE-2024-0225 + CVE-2024-0333 + CVE-2024-0517 + CVE-2024-0518 + CVE-2024-0519 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-15.xml new file mode 100644 index 0000000000..8dc685cdf4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-15.xml @@ -0,0 +1,42 @@ + + + + e2fsprogs: Arbitrary Code Execution + A vulnerability has been discovered in e2fsprogs which can lead to arbitrary code execution. + e2fsprogs + 2024-02-18 + 2024-02-18 + 838388 + local + + + 1.46.6 + 1.46.6 + + + +

e2fsprogs is a set of utilities for maintaining the ext2, ext3 and ext4 file systems.

+
+ +

Multiple vulnerabilities have been discovered in e2fsprogs. Please review the CVE identifiers referenced below for details.

+
+ +

An out-of-bounds read/write vulnerability was found in e2fsprogs. This issue leads to a segmentation fault and possibly arbitrary code execution via a specially crafted filesystem.

+
+ +

There is no known workaround at this time.

+
+ +

All e2fsprogs users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-fs/e2fsprogs-1.46.6" + +
+ + CVE-2022-1304 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-16.xml new file mode 100644 index 0000000000..30c11b549f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-16.xml @@ -0,0 +1,44 @@ + + + + Apache Log4j: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Apache Log4j, the worst of which can lead to remote code execution. + log4j + 2024-02-18 + 2024-02-18 + 719146 + remote + + + 1.2.17 + + + +

Log4j is a Java logging framework that supports various use cases with a rich set of components, a separate API, and a performance-optimized implementation.

+
+ +

Multiple vulnerabilities hav been discovered in Apache Log4j. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for log4j. We recommend that users unmerge it:

+ + + # emerge --ask --depclean "dev-java/log4j" + +
+ + CVE-2019-17571 + CVE-2020-9488 + CVE-2020-9493 + CVE-2022-23302 + CVE-2022-23305 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-17.xml new file mode 100644 index 0000000000..76cd78a60d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-17.xml @@ -0,0 +1,48 @@ + + + + CUPS: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in CUPS, the worst of which can lead to arbitrary code execution. + cups + 2024-02-18 + 2024-02-18 + 847625 + 907675 + 909018 + 914781 + local + + + 2.4.7 + 2.4.7 + + + +

CUPS, the Common Unix Printing System, is a full-featured print server.

+
+ +

Multiple vulnerabilities have been discovered in CUPS. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All CUPS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-print/cups-2.4.7" + +
+ + CVE-2022-26691 + CVE-2023-4504 + CVE-2023-32324 + CVE-2023-34241 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-18.xml new file mode 100644 index 0000000000..a30f61f476 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-18.xml @@ -0,0 +1,53 @@ + + + + Exim: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Exim, the worst of which can lead to remote code execution. + exim + 2024-02-18 + 2024-02-18 + 914923 + 921520 + remote + + + 4.97.1 + 4.97.1 + + + +

Exim is a message transfer agent (MTA) designed to be a a highly configurable, drop-in replacement for sendmail.

+
+ +

Multiple vulnerabilities have been discovered in Exim. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Exim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-mta/exim-4.97.1" + +
+ + CVE-2023-42114 + CVE-2023-42115 + CVE-2023-42116 + CVE-2023-42117 + CVE-2023-42119 + CVE-2023-51766 + ZDI-CAN-17433 + ZDI-CAN-17434 + ZDI-CAN-17515 + ZDI-CAN-17554 + ZDI-CAN-17643 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-19.xml new file mode 100644 index 0000000000..b1f1e58a0e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-19.xml @@ -0,0 +1,42 @@ + + + + libcaca: Arbitary Code Execution + A vulnerability has been discovered in libcaca which can lead to arbitrary code execution. + libcaca + 2024-02-18 + 2024-02-18 + 772317 + remote + + + 0.99_beta19-r4 + 0.99_beta19-r4 + + + +

libcaca is a library that creates colored ASCII-art graphics.

+
+ +

A vulnerability has been discovered in libcaca. Please review the CVE identifier referenced below for details.

+
+ +

A buffer overflow issue in caca_resize function in libcaca/caca/canvas.c may lead to local execution of arbitrary code in the user context.

+
+ +

There is no known workaround at this time.

+
+ +

All libcaca users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libcaca-0.99_beta19-r4" + +
+ + CVE-2021-3410 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-20.xml new file mode 100644 index 0000000000..c6349dc427 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-20.xml @@ -0,0 +1,45 @@ + + + + Thunar: Arbitrary Code Execution + A vulnerability has been discovered in Thunar which may lead to arbitrary code execution + thunar + 2024-02-18 + 2024-02-18 + 789396 + local + + + 4.17.3 + 4.17.3 + + + +

Thunar is a modern file manager for the Xfce Desktop Environment. Thunar has been designed from the ground up to be fast and easy to use. Its user interface is clean and intuitive and does not include any confusing or useless options by default. Thunar starts up quickly and navigating through files and folders is fast and responsive.

+
+ +

A vulnerability has been discovered in Thunar. Please review the CVE identifier referenced below for details.

+
+ +

When called with a regular file as command line argument, Thunar +would delegate to some other program without user confirmation +based on the file type. This could be exploited to trigger code +execution in a chain of vulnerabilities.

+
+ +

There is no known workaround at this time.

+
+ +

All Thunar users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=xfce-base/thunar-4.17.3" + +
+ + CVE-2021-32563 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-21.xml new file mode 100644 index 0000000000..a2480c2755 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-21.xml @@ -0,0 +1,55 @@ + + + + QtNetwork: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in QtNetwork, the worst of which could lead to execution of arbitrary code. + qtbase,qtnetwork + 2024-02-18 + 2024-02-18 + 907120 + 921292 + local and remote + + + 6.6.1-r2 + 6.6.1-r2 + + + 5.15.12-r1 + 5.15.12-r1 + + + +

QtNetwork provides a set of APIs for programming applications that use TCP/IP. It is part of the Qt framework.

+
+ +

Multiple vulnerabilities have been discovered in QtNetwork. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Qt 5 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtnetwork-5.15.12-r1" + + +

All Qt 6 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtbase-6.6.1-r2" + +
+ + CVE-2023-32762 + CVE-2023-51714 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-22.xml new file mode 100644 index 0000000000..789dcb2815 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-22.xml @@ -0,0 +1,44 @@ + + + + intel-microcode: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in intel-microcode, the worst of which can lead to privilege escalation. + intel-microcode + 2024-02-19 + 2024-02-19 + 832985 + 894474 + local + + + 20230214_p20230212 + 20230214_p20230212 + + + +

Intel IA32/IA64 microcode update data.

+
+ +

Multiple vulnerabilities have been discovered in NVIDIA Drivers. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All intel-microcode users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-firmware/intel-microcode-20230214_p20230212" + +
+ + CVE-2021-0127 + CVE-2021-0146 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-23.xml new file mode 100644 index 0000000000..237b585827 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-23.xml @@ -0,0 +1,84 @@ + + + + Chromium, Google Chrome, Microsoft Edge: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. + chromium,google-chrome,microsoft-edge + 2024-02-19 + 2024-02-19 + 922062 + 922340 + 922903 + 923370 + remote + + + 121.0.6167.139 + 121.0.6167.139 + + + 121.0.6167.139 + 121.0.6167.139 + + + 121.0.2277.83 + 121.0.2277.83 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. Google Chrome is one fast, simple, and secure browser for all your devices. Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier.

+
+ +

Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-121.0.6167.139" + + +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-121.0.6167.139" + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-121.0.2277.83" + +
+ + CVE-2024-0333 + CVE-2024-0517 + CVE-2024-0518 + CVE-2024-0519 + CVE-2024-0804 + CVE-2024-0805 + CVE-2024-0806 + CVE-2024-0807 + CVE-2024-0808 + CVE-2024-0809 + CVE-2024-0810 + CVE-2024-0811 + CVE-2024-0812 + CVE-2024-0813 + CVE-2024-0814 + CVE-2024-1059 + CVE-2024-1060 + CVE-2024-1077 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-24.xml new file mode 100644 index 0000000000..d46938afd0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-24.xml @@ -0,0 +1,42 @@ + + + + Seamonkey: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Seamonkey, the worst of which can lead to remote code execution. + seamonkey + 2024-02-19 + 2024-02-19 + 767400 + 828479 + remote + + + 2.53.10.2 + 2.53.10.2 + + + +

The Seamonkey project is a community effort to deliver production-quality releases of code derived from the application formerly known as the ‘Mozilla Application Suite’.

+
+ +

Multiple vulnerabilities have been discovered in Seamonkey. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Seamonkey users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/seamonkey-2.53.10.2" + +
+ + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-25.xml new file mode 100644 index 0000000000..0c7703a83f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-25.xml @@ -0,0 +1,129 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. + thunderbird,thunderbird-bin + 2024-02-19 + 2024-02-19 + 918444 + 920508 + 924845 + remote + + + 115.7.0 + 115.7.0 + + + 115.7.0 + 115.7.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-115.7.0" + + +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-115.7.0" + +
+ + CVE-2023-3417 + CVE-2023-3600 + CVE-2023-4045 + CVE-2023-4046 + CVE-2023-4047 + CVE-2023-4048 + CVE-2023-4049 + CVE-2023-4050 + CVE-2023-4051 + CVE-2023-4052 + CVE-2023-4053 + CVE-2023-4054 + CVE-2023-4055 + CVE-2023-4056 + CVE-2023-4057 + CVE-2023-4573 + CVE-2023-4574 + CVE-2023-4575 + CVE-2023-4576 + CVE-2023-4577 + CVE-2023-4578 + CVE-2023-4580 + CVE-2023-4581 + CVE-2023-4582 + CVE-2023-4583 + CVE-2023-4584 + CVE-2023-4585 + CVE-2023-5168 + CVE-2023-5169 + CVE-2023-5171 + CVE-2023-5174 + CVE-2023-5176 + CVE-2023-5721 + CVE-2023-5724 + CVE-2023-5725 + CVE-2023-5726 + CVE-2023-5727 + CVE-2023-5728 + CVE-2023-5730 + CVE-2023-5732 + CVE-2023-6204 + CVE-2023-6205 + CVE-2023-6206 + CVE-2023-6207 + CVE-2023-6208 + CVE-2023-6209 + CVE-2023-6212 + CVE-2023-6856 + CVE-2023-6857 + CVE-2023-6858 + CVE-2023-6859 + CVE-2023-6860 + CVE-2023-6861 + CVE-2023-6862 + CVE-2023-6863 + CVE-2023-6864 + CVE-2023-37201 + CVE-2023-37202 + CVE-2023-37207 + CVE-2023-37208 + CVE-2023-37211 + CVE-2023-50761 + CVE-2023-50762 + CVE-2024-0741 + CVE-2024-0742 + CVE-2024-0746 + CVE-2024-0747 + CVE-2024-0749 + CVE-2024-0750 + CVE-2024-0751 + CVE-2024-0753 + CVE-2024-0755 + MFSA-2024-01 + MFSA-2024-02 + MFSA-2024-04 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-26.xml new file mode 100644 index 0000000000..07596137d7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-26.xml @@ -0,0 +1,88 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could result in arbitrary code execution. + firefox,firefox-bin + 2024-02-19 + 2024-02-19 + 924844 + remote + + + 122.0 + 115.7.0 + 122.0 + 115.7.0 + + + 122.0 + 115.7.0 + 122.0 + 115.7.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-115.7.0:esr" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-115.7.0:esr" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-122.0:rapid" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-122.0:rapid" + +
+ + CVE-2024-0741 + CVE-2024-0742 + CVE-2024-0743 + CVE-2024-0744 + CVE-2024-0745 + CVE-2024-0746 + CVE-2024-0747 + CVE-2024-0748 + CVE-2024-0749 + CVE-2024-0750 + CVE-2024-0751 + CVE-2024-0752 + CVE-2024-0753 + CVE-2024-0754 + CVE-2024-0755 + MFSA-2024-01 + MFSA-2024-02 + MFSA-2024-04 + + ajak + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-27.xml new file mode 100644 index 0000000000..4fd31aef7a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-27.xml @@ -0,0 +1,42 @@ + + + + Glade: Denial of Service + A vulnerability has been discovered in Glade which can lead to a denial of service. + glade + 2024-02-19 + 2024-02-19 + 747451 + local and remote + + + 3.38.2 + 3.38.2 + + + +

Glade is a RAD tool to enable quick & easy development of user interfaces for the GTK+ toolkit (Version 3 only) and the GNOME desktop environment.

+
+ +

A vulnerability has been found in Glade which can lead to a denial of service when working with specific glade files.

+
+ +

A crafted file may lead to crashes in Glade.

+
+ +

There is no known workaround at this time.

+
+ +

All Glade users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/glade-3.38.2" + +
+ + CVE-2020-36774 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-28.xml new file mode 100644 index 0000000000..f8a410fa3a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-28.xml @@ -0,0 +1,54 @@ + + + + Samba: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Samba, the worst of which can lead to remote code execution. + samba + 2024-02-19 + 2024-02-19 + 891267 + 910606 + 915556 + remote + + + 4.18.9 + 4.18.9 + + + +

Samba is a suite of SMB and CIFS client/server programs.

+
+ +

Multiple vulnerabilities have been discovered in Samba. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Samba users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-fs/samba-4.18.9" + +
+ + CVE-2018-14628 + CVE-2022-2127 + CVE-2023-3347 + CVE-2023-3961 + CVE-2023-4091 + CVE-2023-4154 + CVE-2023-34966 + CVE-2023-34967 + CVE-2023-34968 + CVE-2023-42669 + CVE-2023-42670 + + graaff + ajak +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-29.xml new file mode 100644 index 0000000000..fd8acde0a1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-29.xml @@ -0,0 +1,54 @@ + + + + LibreOffice: Multiple Vulnerabilities + Multiple vulnerabilities have been found in LibreOffice, the worst of which could result in user-assisted code execution. + libreoffice,libreoffice-bin + 2024-02-21 + 2024-02-21 + 919894 + remote + + + 7.5.9.2 + 7.5.9.2 + + + 7.5.9.2 + 7.5.9.2 + + + +

LibreOffice is a powerful office suite; its clean interface and powerful tools let you unleash your creativity and grow your productivity.

+
+ +

Multiple vulnerabilities have been discovered in LibreOffice. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All LibreOffice binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-office/libreoffice-bin-7.5.9.2" + + +

All LibreOffice users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-office/libreoffice-7.5.9.2" + +
+ + CVE-2023-6185 + CVE-2023-6186 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-30.xml new file mode 100644 index 0000000000..74d9fc5d70 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-30.xml @@ -0,0 +1,41 @@ + + + + Glances: Arbitrary Code Execution + A vulnerability has been found in Glances which may lead to arbitrary code execution. + glances + 2024-02-26 + 2024-02-26 + 791565 + remote + + + 3.1.7 + 3.1.7 + + + +

Glances is an open-source system cross-platform monitoring tool. It allows real-time monitoring of various aspects of your system such as CPU, memory, disk, network usage etc.

+
+ +

A vulnerability in XML parsing may lead to a variety of XML attacks.

+
+ +

A vulnerability in XML parsing may lead to a variety of XML attacks.

+
+ +

There is no known workaround at this time.

+
+ +

All Glances users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-process/glances-3.1.7" + +
+ + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-31.xml new file mode 100644 index 0000000000..b428da9ddf --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-31.xml @@ -0,0 +1,42 @@ + + + + GNU Aspell: Heap Buffer Overflow + A vulnerability has been discovered in GNU Aspell which leads to a heap buffer overflow. + aspell + 2024-02-26 + 2024-02-26 + 803113 + remote + + + 0.60.8-r3 + 0.60.8-r3 + + + +

GNU Aspell is a popular spell-checker. Dictionaries are available for many languages.

+
+ +

Multiple vulnerabilities have been discovered in GNU Aspell. Please review the CVE identifiers referenced below for details.

+
+ +

GNU Aspell has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list)

+
+ +

There is no known workaround at this time.

+
+ +

All aspell users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/aspell-0.60.8-r3" + +
+ + CVE-2019-25051 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-32.xml new file mode 100644 index 0000000000..e5b64a52ae --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-32.xml @@ -0,0 +1,42 @@ + + + + btrbk: Remote Code Execution + A vulnerability has been discovered in btrbk which can lead to remote code execution. + btrbk + 2024-02-26 + 2024-02-26 + 806962 + remote + + + 0.31.2 + 0.31.2 + + + +

btrbk is a backup tool for btrfs subvolumes, taking advantage of btrfs specific capabilities to create atomic snapshots and transfer them incrementally to your backup locations.

+
+ +

A vulnerability has been discovered in btrbk. Please review the CVE identifier referenced below for details.

+
+ +

Specialy crafted commands may be executed without being propely checked. Applies to remote hosts filtering ssh commands using ssh_filter_btrbk.sh in authorized_keys.

+
+ +

There is no known workaround at this time.

+
+ +

All btrbk users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-backup/btrbk-0.31.2" + +
+ + CVE-2021-38173 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-33.xml new file mode 100644 index 0000000000..237f071fc3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202402-33.xml @@ -0,0 +1,42 @@ + + + + PyYAML: Arbitrary Code Execution + A vulnerability has been found in PyYAML which can lead to arbitrary code execution. + pyyaml + 2024-02-26 + 2024-02-26 + 766228 + remote + + + 5.4 + 5.4 + + + +

PyYAML is a YAML parser and emitter for Python.

+
+ +

A vulnerability has been discovered in PyYAML. Please review the CVE identifier referenced below for details.

+
+ +

A vulnerability was discovered in the PyYAML library, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.

+
+ +

There is no known workaround at this time.

+
+ +

All PyYAML users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/pyyaml-5.4" + +
+ + CVE-2020-14343 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-01.xml new file mode 100644 index 0000000000..ff38fb24f4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-01.xml @@ -0,0 +1,42 @@ + + + + Tox: Remote Code Execution + A vulnerability has been discovered in Tox which may lead to remote code execution. + tox + 2024-03-03 + 2024-03-03 + 829650 + remote + + + 0.2.13 + 0.2.13 + + + +

Tox is easy-to-use software that connects you with friends and family without anyone else listening in.

+
+ +

A vulnerability has been discovered in btrbk. Please review the CVE identifier referenced below for details.

+
+ +

A stack-based buffer overflow allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.

+
+ +

There is no known workaround at this time.

+
+ +

All Tox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/tox-0.2.13" + +
+ + CVE-2021-44847 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-02.xml new file mode 100644 index 0000000000..9d8b742fb3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-02.xml @@ -0,0 +1,44 @@ + + + + Blender: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Blender, the worst of which could lead to arbitrary code execution. + blender + 2024-03-03 + 2024-03-03 + 834011 + remote + + + 3.1.0 + 3.1.0 + + + +

Blender is a 3D Creation/Animation/Publishing System.

+
+ +

Multiple vulnerabilities have been discovered in Blender. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Blender users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/blender-3.1.0" + +
+ + CVE-2022-0544 + CVE-2022-0545 + CVE-2022-0546 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-03.xml new file mode 100644 index 0000000000..3e441fbc8a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-03.xml @@ -0,0 +1,43 @@ + + + + UltraJSON: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in UltraJSON, the worst of which could lead to key confusion and value overwriting. + ujson + 2024-03-03 + 2024-03-03 + 855689 + remote + + + 5.4.0 + 5.4.0 + + + +

UltraJSON is an ultra fast JSON encoder and decoder written in pure C with bindings for Python 3.8+.

+
+ +

Affected versions were found to improperly decode certain characters. JSON strings that contain escaped surrogate characters not part of a proper surrogate pair were decoded incorrectly. Besides corrupting strings, this allowed for potential key confusion and value overwriting in dictionaries. All users parsing JSON from untrusted sources are vulnerable. From version 5.4.0, UltraJSON decodes lone surrogates in the same way as the standard library's `json` module does, preserving them in the parsed output.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All UltraJSON users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/ujson-5.4.0" + +
+ + CVE-2022-31116 + CVE-2022-31117 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-04.xml new file mode 100644 index 0000000000..abe207438c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202403-04.xml @@ -0,0 +1,47 @@ + + + + XZ utils: Backdoor in release tarballs + A backdoor has been discovered in XZ utils that could lead to remote compromise of systems. + xz-utils + 2024-03-29 + 2024-03-29 + 928134 + remote + + + 5.6.0 + 5.6.0 + + + +

XZ Utils is free general-purpose data compression software with a high compression ratio.

+
+ +

A backdoor has been discovered in XZ utils. Please review the CVE identifier referenced below for details.

+
+ +

Our current understanding of the backdoor is that is does not affect Gentoo systems, because + +1. the backdoor only appears to be included on specific systems and Gentoo does not qualify; +2. the backdoor as it is currently understood targets OpenSSH patched to work with systemd-notify support. Gentoo does not support or include these patches; + +Analysis is still ongoing, however, and additional vectors may still be identified. For this reason we are still issuing this advisory as if that will be the case.

+
+ +

There is no known workaround at this time.

+
+ +

All XZ utils users should downgrade to the latest version before the backdoor was introduced:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose "<app-arch/xz-utils-5.6.0" + +
+ + CVE-2024-3094 + + graaff + graaff +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 81367c0d47..ca2d03051d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Thu, 01 Feb 2024 06:41:20 +0000 +Mon, 01 Apr 2024 06:40:34 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 7a936a895a..2db000c912 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -8064a0b694d29fb2fca491d65494098fb43c2ffa 1706715575 2024-01-31T15:39:35+00:00 +ad7cf37eb216318a2076f79b7aceee6389bc887b 1711749190 2024-03-29T21:53:10+00:00