diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml index d8ddccf41d..a4b3619c55 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-02.xml @@ -7,13 +7,13 @@ game-music-emu 2017-07-08 - 2017-07-08: 1 + 2017-08-06: 2 603092 remote - 0.6.1 - 0.6.1 + 0.6.1 + 0.6.1 @@ -52,5 +52,5 @@ CVE-2016-9961 BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-03.xml index 22c2e86e5f..0ed67cc4cc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-03.xml @@ -7,15 +7,15 @@ phpmyadmin 2017-07-08 - 2017-07-08: 1 + 2017-08-06: 2 614522 remote - 4.0.10.20 - 4.7.0 - 4.0.10.20 - 4.7.0 + 4.0.10.20 + 4.7.0 + 4.0.10.20 + 4.7.0 @@ -62,5 +62,5 @@ PMASA-2017-8 BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml index f89c27b13d..56c18c13a0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-04.xml @@ -7,13 +7,13 @@ libsndfile 2017-07-08 - 2017-07-08: 1 + 2017-08-06: 2 618010 remote - 1.0.28 - 1.0.28 + 1.0.28 + 1.0.28 @@ -51,5 +51,5 @@ CVE-2017-7742 BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml index dfaad4135c..0cb33cdece 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-05.xml @@ -8,7 +8,7 @@ OpenSLP 2017-07-08 - 2017-07-08: 1 + 2017-08-06: 3 360061 434918 583396 @@ -16,8 +16,8 @@ remote - 2.0.0-r4 - 2.0.0-r4 + 2.0.0-r4 + 2.0.0-r4 @@ -53,5 +53,5 @@ CVE-2016-7567 BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml index 7b201894bf..d0e10b87ae 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-06.xml @@ -8,7 +8,7 @@ virglrenderer 2017-07-08 - 2017-07-08: 1 + 2017-08-06: 2 606996 607022 608734 @@ -24,8 +24,8 @@ local - 0.6.0 - 0.6.0 + 0.6.0 + 0.6.0 @@ -71,5 +71,5 @@ CVE-2017-6386 BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml index 153c637eb8..3883bc8dff 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-07.xml @@ -7,7 +7,7 @@ JasPer 2017-07-08 - 2017-07-08: 1 + 2017-08-06: 2 559164 559168 571256 @@ -16,8 +16,8 @@ remote - 2.0.12 - 2.0.12 + 2.0.12 + 2.0.12 @@ -54,5 +54,5 @@ CVE-2016-9591 BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml index ebfc4a64b9..e995761da1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-08.xml @@ -7,13 +7,13 @@ feh 2017-07-08 - 2017-07-08: 1 + 2017-08-06: 2 616470 remote - 2.18.3 - 2.18.3 + 2.18.3 + 2.18.3 @@ -47,5 +47,5 @@ CVE-2017-7875 BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml index d8ac9db00f..50abfa74d7 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-09.xml @@ -7,13 +7,13 @@ nm-applet 2017-07-08 - 2017-07-08: 1 + 2017-08-06: 2 613768 local - 1.4.6-r1 - 1.4.6-r1 + 1.4.6-r1 + 1.4.6-r1 @@ -49,5 +49,5 @@ CVE-2017-6590 BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml index 65b6e49ae0..caa2d69882 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-12.xml @@ -7,13 +7,13 @@ man-db 2017-07-09 - 2017-07-09: 1 + 2017-08-06: 2 602588 local - 2.7.6.1-r2 - 2.7.6.1-r2 + 2.7.6.1-r2 + 2.7.6.1-r2 @@ -40,12 +40,12 @@ # emerge --sync - # emerge --ask --oneshot --verbose ">=sys-apps/man-db-2.7.6.1-r2" + # emerge --ask --oneshot --verbose ">=sys-apps/man-db-2.7.6.1-r2:0" CVE-2015-1336 whissi - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml index 1f63cb9e5a..1b3fb1d53a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-13.xml @@ -7,13 +7,13 @@ libcroco 2017-07-09 - 2017-07-09: 1 + 2017-08-06: 3 618012 remote - 0.6.12-r1 - 0.6.12-r1 + 0.6.12-r1 + 0.6.12-r1 @@ -46,5 +46,5 @@ CVE-2017-7961 BlueKnight - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-14.xml new file mode 100644 index 0000000000..47f06c0368 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-14.xml @@ -0,0 +1,51 @@ + + + + Gajim: Information disclosure + A vulnerability in Gajim might allow remote attackers to intercept + encrypted communications. + + gajim + 2017-07-10 + 2017-07-10: 1 + 620146 + remote + + + 0.16.6-r1 + 0.16.6-r1 + + + +

Gajim is a Jabber/XMPP client which uses GTK+.

+
+ +

Gajim unconditionally implements the “XEP-0146: Remote Controlling + Clients” extension. +

+
+ +

Remote attackers, by enticing a user to connect to a malicious XMPP + server, could extract plaintext from Off The Record (OTR) encrypted + sessions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Gajim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-im/gajim-0.16.6-r1" + +
+ + + CVE-2016-10376 + + + BlueKnight + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-15.xml new file mode 100644 index 0000000000..a70694e589 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201707-15.xml @@ -0,0 +1,63 @@ + + + + Adobe Flash Player: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Adobe Flash Player, the + worst of which allows remote attackers to execute arbitrary code. + + adobeflashplayer + 2017-07-21 + 2017-07-21: 1 + 621680 + 624620 + remote + + + 26.0.0.137 + 26.0.0.137 + + + +

The Adobe Flash Player is a renderer for the SWF file format, which is + commonly used to provide interactive websites. +

+
+ +

Multiple vulnerabilities have been discovered in Adobe Flash Player. + Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or bypass security restrictions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Adobe Flash users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-26.0.0.137" + +
+ + CVE-2017-3075 + CVE-2017-3076 + CVE-2017-3077 + CVE-2017-3078 + CVE-2017-3079 + CVE-2017-3080 + CVE-2017-3081 + CVE-2017-3082 + CVE-2017-3083 + CVE-2017-3084 + CVE-2017-3099 + CVE-2017-3100 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-01.xml new file mode 100644 index 0000000000..a3b2606f44 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-01.xml @@ -0,0 +1,61 @@ + + + + BIND: Multiple vulnerabilities + Multiple vulnerabilities have been found in BIND, the worst of + which allows remote attackers to cause a Denial of Service condition. + + bind + 2017-08-17 + 2017-08-17: 1 + 605454 + 608740 + 615420 + 621730 + remote + + + 9.11.1_p1 + 9.11.1_p1 + + + +

BIND (Berkeley Internet Name Domain) is a Name Server.

+
+ +

Multiple vulnerabilities have been discovered in BIND. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker could send a specially crafted DNS request to the BIND + resolver resulting in a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All BIND users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.11.1_p1" + + +
+ + CVE-2016-9131 + CVE-2016-9147 + CVE-2016-9444 + CVE-2016-9778 + CVE-2017-3135 + CVE-2017-3136 + CVE-2017-3137 + CVE-2017-3138 + CVE-2017-3140 + CVE-2017-3141 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-02.xml new file mode 100644 index 0000000000..3c99f7323b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-02.xml @@ -0,0 +1,57 @@ + + + + TNEF: Multiple vulnerabilities + Multiple vulnerabilities have been found in TNEF, the worst of + which allows remote attackers to cause a Denial of Service condition. + + tnef + 2017-08-17 + 2017-08-17: 1 + 611426 + 618658 + remote + + + 1.4.15 + 1.4.15 + + + +

TNEF is a program for unpacking MIME attachments of type + “application/ms-tnef”. +

+
+ +

Multiple vulnerabilities have been discovered in TNEF. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to process a specially crafted + MIME attachment of type “application/ms-tnef” using TNEF, possibly + resulting in a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All TNEF users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-mail/tnef-1.4.15" + + +
+ + CVE-2017-6307 + CVE-2017-6308 + CVE-2017-6309 + CVE-2017-6310 + CVE-2017-8911 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-04.xml new file mode 100644 index 0000000000..09bf5c4fc7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-04.xml @@ -0,0 +1,49 @@ + + + + Ked Password Manager: Information leak + An insecure file usage has been reported in Ked Password Manager + possibly allowing confidential information to be disclosed. + + kedpm + 2017-08-21 + 2017-08-21: 1 + 616690 + local, remote + + + 0.4.0-r2 + + + +

Helps to manage large numbers of passwords and related information and + simplifies the tasks of searching and entering password data. +

+
+ +

A history file in ~/.kedpm/history is written in clear text. All of the + commands performed in the password manager are written there. This can + lead to the disclosure of the master password if the “password” + command is used with an argument. The names of the password entries + created and consulted are also accessible in clear text. +

+
+ +

An attacker could obtain confidential information.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo Security recommends that users unmerge Ked Password Manager:

+ + + # emerge --unmerge "app-admin/kedpm" + +
+ + CVE-2017-8296 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-05.xml new file mode 100644 index 0000000000..72e79c5cc7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-05.xml @@ -0,0 +1,65 @@ + + + + RAR and UnRAR: User-assisted execution of arbitrary code + An integer overflow in RAR and UnRAR might allow remote attackers + to execute arbitrary code. + + rar,unrar + 2017-08-21 + 2017-08-21: 1 + 622342 + 622382 + remote + + + 5.5.0_beta4_p20170628 + 5.5.0_beta4_p20170628 + + + 5.5.5 + 5.5.5 + + + +

RAR and UnRAR provide command line interfaces for compressing and + decompressing RAR files. +

+
+ +

A VMSF_DELTA memory corruption was discovered in which an integer + overflow can be caused in DataSize+CurChannel. The result is a negative + value of the “DestPos” variable which allows writing out of bounds + when setting Mem[DestPos]. +

+
+ +

A remote attacker, by enticing a user to open a specially crafted + archive, could execute arbitrary code with the privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All RAR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-arch/rar-5.5.0_beta4_p20170628" + + +

All UnRAR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/unrar-5.5.5" + +
+ + CVE-2012-6706 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-06.xml new file mode 100644 index 0000000000..916c67fcc2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-06.xml @@ -0,0 +1,64 @@ + + + + GPL Ghostscript: Multiple vulnerabilities + Multiple vulnerabilities have been found in GPL Ghostscript, the + worst of which can resulting in the execution of arbitrary code. + + ghostscriptgpl + 2017-08-21 + 2017-08-21: 1 + 616814 + 617016 + 617018 + 617020 + 617022 + 618818 + remote + + + 9.21 + 9.21 + + + +

Ghostscript is an interpreter for the PostScript language and for PDF.

+
+ +

Multiple vulnerabilities have been discovered in GPL Ghostscript. Please + review the CVE identifiers referenced below for additional information. +

+
+ +

A context-dependent attacker could entice a user to open a specially + crafted PostScript file or PDF document using GPL Ghostscript possibly + resulting in the execution of arbitrary code with the privileges of the + process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All GPL Ghostscript users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gpl-9.21" + +
+ + + CVE-2016-10219 + + + CVE-2016-10220 + + CVE-2017-5951 + CVE-2017-6196 + CVE-2017-7207 + CVE-2017-8291 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-07.xml new file mode 100644 index 0000000000..4db322cb46 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-07.xml @@ -0,0 +1,49 @@ + + + + evilvte: User-assisted execution of arbitrary code + Improper hypertext validation might allow remote attackers to + execute arbitrary code. + + evilvte + 2017-08-21 + 2017-08-21: 1 + 611290 + remote + + + 0.5.1 + + + +

VTE based, highly customizable terminal emulator

+
+ +

Steve Kemp of Debian identified a flaw in evilvte which does not + properly validate hypertext links. Please review the Debian bug report + referenced below. +

+
+ +

Remote attackers could execute arbitrary code by enticing a user to + click a hyperlink in their terminal. +

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo Security recommends that users unmerge evilvte:

+ + + # emerge --unmerge "x11-terms/evilvte" + +
+ + Debian + Bug #854585 + + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-08.xml new file mode 100644 index 0000000000..1055905bd4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201708-08.xml @@ -0,0 +1,53 @@ + + + + bzip2: Denial of Service + An use-after-free vulnerability has been found in bzip2 that could + allow remote attackers to cause a Denial of Service condition. + + bzip2 + 2017-08-21 + 2017-08-21: 1 + 620466 + remote + + + 1.0.6-r8 + 1.0.6-r8 + + + +

bzip2 is a high-quality data compressor used extensively by Gentoo + Linux. +

+
+ +

A use-after-free flaw was found in bzip2recover, leading to a null + pointer dereference, or a write to a closed file descriptor. Please + review the CVE identifier referenced below for details. +

+
+ +

A remote attacker could entice a user to process a specially crafted + bzip2 archive using bzip2recover, possibly resulting in a Denial of + Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All bzip2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/bzip2-1.0.6-r8" + + +
+ + CVE-2016-3189 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 63616b079e..87171a4dae 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Sun, 09 Jul 2017 23:40:01 +0000 +Mon, 21 Aug 2017 16:39:23 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 700f29fc7e..2c23e69a25 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -0d1886fce079a5b039baee6ef4287f5a55945dea 1499633121 2017-07-09T20:45:21+00:00 +e6b03f4f47a8d3f64f4dc686f054a6ecc4d23f8e 1503278719 2017-08-21T01:25:19+00:00