From 75956ab293cf444e4463e0e86a84f7a883ef57bb Mon Sep 17 00:00:00 2001 From: Nick Owens Date: Tue, 22 Nov 2016 11:56:37 -0800 Subject: [PATCH] bump(metadata/glsa): sync with upstream --- .../metadata/glsa/glsa-201611-15.xml | 55 +++++++++++++++ .../metadata/glsa/glsa-201611-16.xml | 56 +++++++++++++++ .../metadata/glsa/glsa-201611-17.xml | 51 ++++++++++++++ .../metadata/glsa/glsa-201611-18.xml | 68 +++++++++++++++++++ .../metadata/glsa/glsa-201611-19.xml | 54 +++++++++++++++ .../metadata/glsa/glsa-201611-20.xml | 57 ++++++++++++++++ .../metadata/glsa/timestamp.chk | 2 +- 7 files changed, 342 insertions(+), 1 deletion(-) create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-15.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-16.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-17.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-18.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-19.xml create mode 100644 sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-20.xml diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-15.xml new file mode 100644 index 0000000000..4a3c457cb7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-15.xml @@ -0,0 +1,55 @@ + + + + Poppler: Multiple vulnerabilities + Multiple vulnerabilities have been found in Poppler, the worst of + which allows remote attackers to execute arbitrary code. + + poppler + November 22, 2016 + November 22, 2016: 3 + 542220 + 579752 + remote + + + 0.42.0 + 0.42.0 + + + +

Poppler is a PDF rendering library based on the xpdf-3.0 code base.

+
+ +

Multiple vulnerabilities have been discovered in Poppler. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted PDF + using Poppler, possibly resulting in execution of arbitrary code with the + privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Poppler users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/poppler-0.42.0" + + +
+ + + CVE-2015-8868 + + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-16.xml new file mode 100644 index 0000000000..25b56ead1e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-16.xml @@ -0,0 +1,56 @@ + + + + Chromium: Multiple vulnerabilities + Multiple vulnerabilities have been found in the Chromium web + browser, the worst of which allows remote attackers to execute arbitrary + code. + + chromium + November 22, 2016 + November 22, 2016: 3 + 599416 + remote + + + 54.0.2840.100 + 54.0.2840.100 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+
+ +

Multiple vulnerabilities have been discovered in the Chromium web + browser. Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, obtain + sensitive information, or bypass security restrictions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-54.0.2840.100" + +
+ + CVE-2016-5199 + CVE-2016-5200 + CVE-2016-5201 + CVE-2016-5202 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-17.xml new file mode 100644 index 0000000000..57fe7d0ad9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-17.xml @@ -0,0 +1,51 @@ + + + + RPCBind: Denial of Service + A buffer overflow in RPCBind might allow remote attackers to cause + a Denial of Service. + + rpcbind + November 22, 2016 + November 22, 2016: 2 + 560990 + remote + + + 0.2.3-r1 + 0.2.3-r1 + + + +

The RPCBind utility is a server that converts RPC program numbers into + universal addresses. +

+
+ +

A use-after-free vulnerability was discovered in RPCBind’s + svc_dodestroy function when trying to free a corrupted xprt->xp_netid + pointer. +

+
+ +

A remote attacker could possibly cause a Denial of Service condition.

+
+ +

There is no known workaround at this time.

+
+ +

All RPCBind users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-nds/rpcbind-0.2.3-r1" + +
+ + CVE-2015-7236 + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-18.xml new file mode 100644 index 0000000000..dd1f7342ee --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-18.xml @@ -0,0 +1,68 @@ + + + + Adobe Flash Player: Multiple vulnerabilities + Multiple vulnerabilities have been found in Adobe Flash Player, the + worst of which allows remote attackers to execute arbitrary code. + + adobe-flash + November 22, 2016 + November 22, 2016: 2 + 599204 + remote + + + 23.0.0.207 + 11.2.202.644 + 23.0.0.207 + + + +

The Adobe Flash Player is a renderer for the SWF file format, which is + commonly used to provide interactive websites. +

+
+ +

Multiple vulnerabilities have been discovered in Adobe Flash Player. + Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All Adobe Flash Player 23.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-23.0.0.207" + + +

All Adobe Flash Player 11.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-11.2.202.644" + +
+ + CVE-2016-7857 + CVE-2016-7858 + CVE-2016-7859 + CVE-2016-7860 + CVE-2016-7861 + CVE-2016-7862 + CVE-2016-7863 + CVE-2016-7864 + CVE-2016-7865 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-19.xml new file mode 100644 index 0000000000..c615310c31 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-19.xml @@ -0,0 +1,54 @@ + + + + Tar: Extract pathname bypass + A path traversal attack in Tar may lead to the remote execution of + arbitrary code. + + tar + November 22, 2016 + November 22, 2016: 2 + 598334 + remote + + + 1.29-r1 + 1.29-r1 + + + +

The Tar program provides the ability to create and manipulate tar + archives. +

+
+ +

Tar attempts to avoid path traversal attacks by removing offending parts + of the element name at extract. This sanitizing leads to a vulnerability + where the attacker can bypass the path name(s) specified on the command + line. +

+
+ +

The attacker can create a crafted tar archive that, if extracted by the + victim, replaces files and directories the victim has access to in the + target directory, regardless of the path name(s) specified on the command + line. +

+
+ +

There is no known workaround at this time.

+
+ +

All Tar users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/tar-1.29-r1" + +
+ + CVE-2016-6321 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-20.xml new file mode 100644 index 0000000000..fdace5c7bc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-20.xml @@ -0,0 +1,57 @@ + + + + TestDisk: User-assisted execution of arbitrary code + A buffer overflow in TestDisk might allow remote attackers to + execute arbitrary code. + + testdisk + November 22, 2016 + November 22, 2016: 2 + 548258 + local, remote + + + 7.0-r2 + 7.0-r2 + + + +

TestDisk is powerful free data recovery software! It was primarily + designed to help recover lost partitions and/or make non-booting disks + bootable again when these symptoms are caused by faulty software: certain + types of viruses or human error (such as accidentally deleting a + Partition Table). Partition table recovery using TestDisk is really easy. +

+
+ +

A buffer overflow can be triggered within TestDisk when a malicious disk + image is attempting to be recovered. +

+
+ +

A remote attacker could coerce the victim to run TestDisk against their + malicious image. This may be leveraged by an attacker to crash TestDisk + and gain control of program execution. +

+
+ +

There is no known workaround at this time.

+
+ +

All TestDisk users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/testdisk-7.0-r2" + + +
+ + + TestDisk check_OS2MB Stack Buffer overflow + + + K_F + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 4d29fa2db3..02d979d411 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 21 Nov 2016 18:13:23 +0000 +Tue, 22 Nov 2016 19:13:27 +0000