diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-06.xml index 2945ac200f..e456fb64f7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201605-06.xml @@ -7,14 +7,16 @@ the worst of which may allow remote execution of arbitrary code. firefox - May 31, 2016 - May 31, 2016: 1 + 2016-05-31 + 2017-01-20: 4 549356 + 550288 557590 559186 561246 563230 564834 + 571086 573074 574596 576862 @@ -138,6 +140,8 @@ CVE-2015-2717 CVE-2015-2718 CVE-2015-2718 + CVE-2015-2721 + CVE-2015-4000 CVE-2015-4473 CVE-2015-4473 CVE-2015-4474 @@ -181,6 +185,7 @@ CVE-2015-7181 CVE-2015-7182 CVE-2015-7183 + CVE-2015-7575 CVE-2016-1523 CVE-2016-1523 CVE-2016-1930 @@ -302,8 +307,6 @@ CVE-2016-2802 CVE-2016-2802 - - BlueKnight - - b-man + BlueKnight + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-36.xml index 7b2749e1d5..379d9ec58d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-36.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-36.xml @@ -7,7 +7,7 @@ apache 2017-01-15 - 2017-01-17 + 2017-01-17: 02 529130 589226 601736 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-43.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-43.xml new file mode 100644 index 0000000000..2fb4ac9ec6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-43.xml @@ -0,0 +1,79 @@ + + + + IcedTea: Multiple vulnerabilities + Multiple vulnerabilities have been found in IcedTea allowing remote + attackers to affect confidentiality, integrity, and availability through + various vectors. + + icedtea, java + 2017-01-19 + 2017-01-19: 01 + 590590 + 600224 + remote + + + 7.2.6.8 + 3.2.0 + 7.2.6.8 + + + +

IcedTea’s aim is to provide OpenJDK in a form suitable for easy + configuration, compilation and distribution with the primary goal of + allowing inclusion in GNU/Linux distributions. +

+
+ +

Various OpenJDK attack vectors in IcedTea, such as 2D, Corba, Hotspot, + Libraries, and JAXP, exist which allows remote attackers to affect the + confidentiality, integrity, and availability of vulnerable systems. Many + of the vulnerabilities can only be exploited through sandboxed Java Web + Start applications and java applets. Please review the CVE identifiers + referenced below for details. +

+
+ +

Remote attackers may execute arbitrary code, compromise information, or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All IcedTea-bin 7.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-7.2.6.8:7" + + +

All IcedTea-bin 3.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/icedtea-bin-3.2.0:8" + +
+ + CVE-2016-3458 + CVE-2016-3485 + CVE-2016-3500 + CVE-2016-3508 + CVE-2016-3550 + CVE-2016-3587 + CVE-2016-3598 + CVE-2016-3606 + CVE-2016-3610 + CVE-2016-5542 + CVE-2016-5554 + CVE-2016-5568 + CVE-2016-5573 + CVE-2016-5582 + CVE-2016-5597 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-44.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-44.xml new file mode 100644 index 0000000000..6836a1c70b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-44.xml @@ -0,0 +1,52 @@ + + + + CVS: Heap-based overflow + A heap-based buffer overflow in CVS might allow remote attackers to + execute + arbitrary code. + + cvs + 2017-01-19 + 2017-01-19: 01 + 402593 + remote + + + 1.12.12-r11 + 1.12.12-r11 + + + +

CVS (Concurrent Versions System) is an open-source network-transparent + version control system. It contains both a client utility and a server. +

+
+ +

A heap-based buffer overflow was discovered in the proxy_connect + function in src/client.c in CVS. +

+
+ +

An attacker, utilizing a remote HTTP proxy server, could cause a Denial + of Service condition or possibly execute arbitrary code via a crafted + HTTP response. +

+
+ +

There is no known workaround at this time.

+
+ +

All CVS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-vcs/cvs-1.12.12-r11" + +
+ + CVE-2012-0804 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-45.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-45.xml new file mode 100644 index 0000000000..62625cae4e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-45.xml @@ -0,0 +1,51 @@ + + + + irssi: Multiple vulnerabilities + Multiple vulnerabilities have been found in irssi, the worst of + which could allow remote attackers to execute arbitrary code. + + irssi + 2017-01-19 + 2017-01-19: 01 + 604772 + remote + + + 0.8.21 + 0.8.21 + + + +

irssi is a modular textUI IRC client with IPv6 support.

+
+ +

Multiple vulnerabilities have been discovered in irssi. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All irssi users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-irc/irssi-0.8.21" + +
+ + CVE-2017-5193 + CVE-2017-5194 + CVE-2017-5195 + CVE-2017-5196 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-46.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-46.xml new file mode 100644 index 0000000000..f20c8f2c34 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-46.xml @@ -0,0 +1,62 @@ + + + + Mozilla Network Security Service (NSS): Multiple vulnerabilities + Multiple vulnerabilities have been found in NSS, the worst of which + could allow remote attackers to obtain access to private key information. + + mozilla, nss + 2017-01-19 + 2017-01-19: 01 + 550288 + 571086 + 604916 + remote + + + 3.28 + 3.28 + + + +

The Mozilla Network Security Service (NSS) is a library implementing + security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS + #12, S/MIME and X.509 certificates. +

+
+ +

Multiple vulnerabilities have been discovered in NSS. Please review the + CVE identifiers and technical papers referenced below for details. +

+
+ +

Remote attackers could conduct man-in-the-middle attacks, obtain access + to private key information, or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All NSS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.28" + +
+ + CVE-2015-2721 + CVE-2015-4000 + CVE-2015-7575 + CVE-2016-1938 + CVE-2016-5285 + CVE-2016-8635 + CVE-2016-9074 + SLOTH Attack Technical + Paper + + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-47.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-47.xml new file mode 100644 index 0000000000..13ef6a00be --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-47.xml @@ -0,0 +1,80 @@ + + + + cURL: Multiple vulnerabilities + Multiple vulnerabilities have been found in cURL, the worst of + which could allow remote attackers to execute arbitrary code. + + curl + 2017-01-19 + 2017-01-19: 01 + 536014 + 573102 + 583394 + 590482 + 592974 + 593716 + 597760 + 603370 + 603574 + remote + + + 7.52.1 + 7.52.1 + + + +

cURL is a tool and libcurl is a library for transferring data with URL + syntax. +

+
+ +

Multiple vulnerabilities have been discovered in cURL. Please review the + CVE identifiers and bug reports referenced for details. +

+
+ +

Remote attackers could conduct a Man-in-the-Middle attack to obtain + sensitive information, cause a Denial of Service condition, or execute + arbitrary code. +

+
+ +

There is no known workaround at this time.

+
+ +

All cURL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.52.1" + +
+ + CVE-2014-8150 + CVE-2014-8151 + CVE-2016-0755 + CVE-2016-3739 + CVE-2016-5419 + CVE-2016-5420 + CVE-2016-5421 + CVE-2016-7141 + CVE-2016-7167 + CVE-2016-8615 + CVE-2016-8616 + CVE-2016-8617 + CVE-2016-8618 + CVE-2016-8619 + CVE-2016-8620 + CVE-2016-8621 + CVE-2016-8622 + CVE-2016-8623 + CVE-2016-8624 + CVE-2016-8625 + CVE-2016-9586 + CVE-2016-9594 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-48.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-48.xml new file mode 100644 index 0000000000..c4c6e8a03b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-48.xml @@ -0,0 +1,54 @@ + + + + Quagga: Multiple vulnerabilities + Multiple vulnerabilities have been found in Quagga, the worst of + which could allow remote attackers to execute arbitrary code. + + quagga + 2017-01-21 + 2017-01-21: 1 + 581526 + 597410 + remote + + + 1.1.0-r2 + 1.1.0-r2 + + + +

Quagga is a free routing daemon replacing Zebra supporting RIP, OSPF and + BGP. +

+
+ +

Multiple vulnerabilities have been discovered in Quagga. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could send a specially crafted packet possibly + resulting in the execution of arbitrary code with the privileges of the + process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Quagga users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/quagga-1.1.0-r2" + + +
+ + CVE-2016-1245 + CVE-2016-4049 + + pinkbyte + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-49.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-49.xml new file mode 100644 index 0000000000..7879ff8d59 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-49.xml @@ -0,0 +1,75 @@ + + + + QEMU: Multiple vulnerabilities + Multiple vulnerabilities have been found in QEMU, the worst of + which could cause a Denial of Service condition. + + qemu + 2017-01-23 + 2017-01-23: 1 + 598330 + 601450 + 601824 + 601826 + 601830 + 601832 + 602626 + 602628 + 602630 + 602632 + 602634 + 603444 + local + + + 2.8.0 + 2.8.0 + + + +

QEMU is a generic and open source machine emulator and virtualizer.

+
+ +

Multiple vulnerabilities have been discovered in QEMU. Please review the + CVE identifiers referenced below for details. +

+
+ +

A privileged user/process within a guest QEMU environment can cause a + Denial of Service condition against the QEMU guest process or the host. +

+
+ +

There is no known workaround at this time.

+
+ +

All QEMU users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.8.0" + +
+ + + CVE-2016-10028 + + CVE-2016-9101 + CVE-2016-9776 + CVE-2016-9845 + CVE-2016-9846 + CVE-2016-9907 + CVE-2016-9908 + CVE-2016-9911 + CVE-2016-9912 + CVE-2016-9913 + CVE-2016-9914 + CVE-2016-9915 + CVE-2016-9916 + CVE-2016-9921 + CVE-2016-9923 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-50.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-50.xml new file mode 100644 index 0000000000..5cee7984eb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-50.xml @@ -0,0 +1,46 @@ + + + + PPP: Buffer overflow + A buffer overflow in PPP might allow remote attackers to cause a + Denial of Service condition. + + ppp + 2017-01-23 + 2017-01-23: 1 + 546554 + remote + + + 2.4.7-r3 + 2.4.7-r3 + + + +

PPP is a Unix implementation of the Point-to-Point Protocol

+
+ +

A buffer overflow was discovered in the rc_mksid function in + plugins/radius/util.c in PPP when the PID for pppd is greater than 65535. +

+
+ +

A remote attacker could cause a Denial of Service condition.

+
+ +

There is no known workaround at this time.

+
+ +

All PPP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dialup/ppp-2.4.7-r3" + +
+ + CVE-2015-3310 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-51.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-51.xml new file mode 100644 index 0000000000..4835710404 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-51.xml @@ -0,0 +1,54 @@ + + + + DBD::mysql: Multiple vulnerabilities + Multiple vulnerabilities have been found in DBD::mysql, the worst + of which might allow an attacker to execute arbitrary code. + + dbd,mysql + 2017-01-23 + 2017-01-23: 2 + 589818 + 596424 + 600180 + 601144 + local, remote + + + 4.41.0 + 4.41.0 + + + +

MySQL driver for the Perl5 Database Interface (DBI)

+
+ +

Multiple vulnerabilities have been discovered in DBD::mysql. Please + review the CVE identifiers referenced below for details. +

+
+ +

An attacker could cause a Denial of Service condition, execute arbitrary + code, or have other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All DBD::mysql users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-perl/DBD-mysql-4.41.0" + +
+ + CVE-2015-8949 + CVE-2016-1246 + CVE-2016-1249 + CVE-2016-1251 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-52.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-52.xml new file mode 100644 index 0000000000..140c40fc66 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-52.xml @@ -0,0 +1,50 @@ + + + + libupnp: Multiple vulnerabilities + Multiple vulnerabilities have been found in libupnp, the worst of + which could lead to the execution of arbitrary code. + + libupnp + 2017-01-23 + 2017-01-23: 1 + 589136 + 598202 + remote + + + 1.6.21 + 1.6.21 + + + +

libupnp is a portable, open source, UPnP development kit.

+
+ +

Multiple vulnerabilities have been discovered in libupnp. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attack could arbitrarily write files to a users file system, + cause a Denial of Service condition, or execute arbitrary code. +

+
+ +

There is no known workaround at this time.

+
+ +

All libupnp users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libupnp-1.6.21" + +
+ + CVE-2016-6255 + CVE-2016-8863 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-53.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-53.xml new file mode 100644 index 0000000000..5dac963bc2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-53.xml @@ -0,0 +1,53 @@ + + + + Lua: Buffer overflow + A buffer overflow in Lua might allow context-dependent attackers to + execute arbitrary code. + + lua + 2017-01-23 + 2017-01-23: 1 + 520480 + local, remote + + + 5.1.5-r4 + 5.1.5-r4 + + + +

Lua is a powerful, efficient, lightweight, embeddable scripting + language. It supports procedural programming, object-oriented + programming, functional programming, data-driven programming, and data + description. +

+
+ +

A buffer overflow was discovered in the vararg functions in ldo.c in + Lua. +

+
+ +

Context-dependent could cause a Denial of Service condition or execute + arbitrary code. +

+
+ +

There is no known workaround at this time.

+
+ +

All Lua users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/lua-5.1.5-r4" + + +
+ + CVE-2014-5461 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-54.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-54.xml new file mode 100644 index 0000000000..6a1c4c21cc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-54.xml @@ -0,0 +1,46 @@ + + + + DCRaw: Buffer overflow + A buffer overflow in DCRaw might allow remote attackers to cause a + Denial of Service condition. + + dcraw + 2017-01-23 + 2017-01-23: 1 + 549336 + remote + + + 9.26.0 + 9.26.0 + + + +

Command-line decoder for raw digital photos.

+
+ +

An integer overflow was discovered in the ljpeg_start function in DCRaw.

+
+ +

Remote attackers, by enticing a user to open a specially crafted image, + could cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All DCRaw users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/dcraw-9.26.0" + +
+ + CVE-2015-3885 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-55.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-55.xml new file mode 100644 index 0000000000..618bc533c6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-55.xml @@ -0,0 +1,51 @@ + + + + DirectFB: Multiple vulnerabilities + Multiple vulnerabilities have been found in DirectFB, all of which + could allow remote attackers to execute arbitrary code. + + directfb + 2017-01-23 + 2017-01-23: 1 + 510472 + remote + + + 1.7.5 + 1.7.5 + + + +

DirectFB (Direct Frame Buffer) is a set of graphics APIs implemented on + top of the Linux Frame Buffer (fbdev) abstraction layer. +

+
+ +

Multiple vulnerabilities have been discovered in DirectFB. Please review + the CVE identifiers referenced below for details. +

+
+ +

Remote attackers could cause a Denial of Service condition or execute + arbitrary code via the Voodoo interface. +

+
+ +

There is no known workaround at this time.

+
+ +

All DirectFB users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/DirectFB-1.7.5" + +
+ + CVE-2014-2977 + CVE-2014-2978 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-56.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-56.xml new file mode 100644 index 0000000000..5e954de111 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-56.xml @@ -0,0 +1,51 @@ + + + + zlib: Multiple vulnerabilities + Multiple vulnerabilities have been found in zlib, the worst of + which could allow attackers to cause a Denial of Service condition. + + zlib + 2017-01-23 + 2017-01-23: 1 + 601828 + local, remote + + + 1.2.9 + 1.2.9 + + + +

zlib is a widely used free and patent unencumbered data compression + library. +

+
+ +

Multiple vulnerabilities have been discovered in zlib. Please review the + CVE identifiers referenced below for details. +

+
+ +

An attacker could cause a Denial of Service condition.

+
+ +

There is no known workaround at this time.

+
+ +

All zlib users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/zlib-1.2.9" + +
+ + CVE-2016-9840 + CVE-2016-9841 + CVE-2016-9842 + CVE-2016-9843 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-57.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-57.xml new file mode 100644 index 0000000000..d653fddf97 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-57.xml @@ -0,0 +1,55 @@ + + + + T1Lib: : Multiple vulnerabilities + Multiple vulnerabilities have been discovered in T1Lib, the worst + of which could lead to remote execution of arbitrary code. + + t1lib + 2017-01-23 + 2017-01-23: 1 + 358667 + remote + + + 5.1.2-r1 + 5.1.2-r1 + + + +

T1Lib is a library for rasterizing bitmaps from Adobe Type 1 fonts.

+
+ +

Multiple vulnerabilities have been discovered in T1Lib. Please review + the CVE identifiers referenced below for details. +

+
+ +

Remote attackers, by coercing users to process specially crafted AFM + font or PDF file, could cause a Denial of Service condition or execute + arbitrary code. +

+
+ +

There is no known workaround at this time.

+
+ +

All T1Lib users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/t1lib-5.1.2-r1" + +
+ + CVE-2010-2642 + CVE-2011-0433 + CVE-2011-0764 + CVE-2011-1552 + CVE-2011-1553 + CVE-2011-1554 + CVE-2011-5244 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-58.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-58.xml new file mode 100644 index 0000000000..dad26e863a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-58.xml @@ -0,0 +1,59 @@ + + + + ICU: Multiple vulnerabilities + Multiple vulnerabilities have been found in ICU, the worst of which + could cause a Denial of Service condition. + + icu + 2017-01-24 + 2017-01-24: 1 + 589814 + 594494 + 601396 + remote + + + 58.1 + 58.1 + + + +

ICU is a mature, widely used set of C/C++ and Java libraries providing + Unicode and Globalization support for software applications. +

+
+ +

Multiple vulnerabilities have been discovered in ICU. Please review the + CVE identifiers referenced below for details. +

+
+ +

Remote attackers could cause a Denial of Service condition or possibly + have other unspecified impacts via a long locale string or + httpAcceptLanguage argument. Additionally, A remote attacker, via a + specially crafted file, could cause an application using ICU to parse + untrusted font files resulting in a Denial of Service condition. + Finally, remote attackers could affect confidentiality via unknown + vectors related to 2D. +

+
+ +

There is no known workaround at this time.

+
+ +

All ICU users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/icu-58.1" + +
+ + CVE-2015-2632 + CVE-2016-6293 + CVE-2016-7415 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-59.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-59.xml new file mode 100644 index 0000000000..6841f0f18f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-59.xml @@ -0,0 +1,51 @@ + + + + ADOdb: Multiple vulnerabilities + Multiple vulnerabilities have been found in ADOdb, all of which + could allow remote attackers to execute arbitrary code. + + adodb + 2017-01-24 + 2017-01-24: 1 + 604714 + remote + + + 5.20.9 + 5.20.9 + + + +

ADOdb is an abstraction library for PHP creating a common API for a wide + range of database backends. +

+
+ +

Multiple vulnerabilities have been discovered in ADOdb. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, through the use of SQL injection or Cross Site + Scripting (XSS) attacks, could execute arbitrary code. +

+
+ +

There is no known workaround at this time.

+
+ +

All ADOdb users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-php/adodb-5.20.9" + +
+ + CVE-2016-4855 + CVE-2016-7405 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-60.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-60.xml new file mode 100644 index 0000000000..3174878f5c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-60.xml @@ -0,0 +1,51 @@ + + + + LibRaw: Multiple vulnerabilities + Multiple vulnerabilities have been found in LibRaw, the worst of + which may allow attackers to execute arbitrary code. + + libraw + 2017-01-24 + 2017-01-24: 1 + 567254 + local, remote + + + 0.17.1 + 0.17.1 + + + +

LibRaw is a library for reading RAW files obtained from digital photo + cameras. +

+
+ +

Multiple vulnerabilities have been discovered in LibRaw. Please review + the CVE identifiers referenced below for details. +

+
+ +

An attacker could execute arbitrary code, cause a Denial of Service + condition, or have other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All LibRaw users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libraw-0.17.1" + +
+ + CVE-2015-8366 + CVE-2015-8367 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-61.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-61.xml new file mode 100644 index 0000000000..cfac3b1409 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-61.xml @@ -0,0 +1,49 @@ + + + + WebP: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in WebP, the worst of + which could allow a remote attacker to cause a Denial of Service condition. + + webp + 2017-01-24 + 2017-01-24: 3 + 598208 + remote + + + 0.5.2 + 0.5.2 + + + +

WebP is an image format employing both lossy and lossless compression.

+
+ +

Multiple vulnerabilities have been discovered in WebP’s gif2webp tool. + Please review the CVE identifier and bug reference for details. +

+
+ +

A remote attacker, by enticing a user to process a specially crafted + file using WebP’s gif2webp tool, could possibly cause a Denial of + Service condition or other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All WebP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libwebp-0.5.2" + +
+ + CVE-2016-9085 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-62.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-62.xml new file mode 100644 index 0000000000..f16a28c59b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-62.xml @@ -0,0 +1,64 @@ + + + + Firejail: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in Firejail, the + worst of which may allow privilege escalation. + + firejail + 2017-01-24 + 2017-01-24: 1 + 604758 + local, remote + + + 0.9.44.4 + 0.9.44.4 + + + 0.9.38.8 + 0.9.38.8 + + + +

A SUID program that reduces the risk of security breaches by restricting + the running environment of untrusted applications using Linux namespaces + and seccomp-bpf. +

+
+ +

Multiple vulnerabilities have been discovered in Firejail. Please review + the CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly bypass sandbox protection, cause a Denial of + Service condition, or escalate privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All Firejail users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/firejail-0.9.44.4" + + +

All Firejail-lts users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/firejail-lts-0.9.38.8" + +
+ + CVE-2017-5180 + CVE-2017-5206 + CVE-2017-5207 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-63.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-63.xml new file mode 100644 index 0000000000..82e8f8eed4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-63.xml @@ -0,0 +1,69 @@ + + + + Graphite: Multiple vulnerabilities + Multiple vulnerabilities have been found in Graphite, the worst of + which could lead to the remote execution of arbitrary code. + + graphite + 2017-01-24 + 2017-01-24: 1 + 574276 + 576864 + remote + + + 1.3.7 + 1.3.7 + + + +

Graphite is a “smart font” system developed specifically to handle + the complexities of lesser-known languages of the world. +

+
+ +

Multiple vulnerabilities have been discovered in Graphite. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, or obtain + sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All Graphite users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/graphite2-1.3.7" + +
+ + CVE-2016-1521 + CVE-2016-1522 + CVE-2016-1523 + CVE-2016-1526 + CVE-2016-1977 + CVE-2016-2790 + CVE-2016-2791 + CVE-2016-2792 + CVE-2016-2793 + CVE-2016-2794 + CVE-2016-2795 + CVE-2016-2796 + CVE-2016-2797 + CVE-2016-2798 + CVE-2016-2799 + CVE-2016-2800 + CVE-2016-2801 + CVE-2016-2802 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 781b45073a..cc05544a46 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Tue, 17 Jan 2017 18:43:18 +0000 +Tue, 24 Jan 2017 22:13:22 +0000