diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 9831d8bd7f..56f0dbbc3f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 433135 BLAKE2B 08bfc4178f110d18daf9e50c33952a85a482c64d23c2c125c97f8cec66852a409145a06cdb11a9133f11f551652f71ca3c6cff6f9ad86e0e250b41b9cd1b5224 SHA512 68d673cc2f0e4949c03c21be733250173baa6252b489b636a97186f2e5bd182f13f09c79c29136d620f6ec56097de0dd794676970976fc7c502ce23ac7fe7e66 -TIMESTAMP 2018-11-29T02:38:38Z +MANIFEST Manifest.files.gz 434883 BLAKE2B 437fd719358cb224888b8071f01d60b1548cd1a82f20093903aa74e9fe63671e56f03a20ed426aae11e7d6fdd7027beb57804429044781bc9dc3557ccbbcb5a8 SHA512 16828091dc592888ea79b76c0a3e0ec358317e4c345386d11d12983b85a84ed74ba2d650d8af4f0f90a313afdad1a7fd1808666df2dca69ee70f2802b663b733 +TIMESTAMP 2018-12-21T15:08:37Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlv/US5fFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlwdAfVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klBVPxAAtqZBAZOfA5rfftfNz/J8MfutHu4vqupcbntkksfNWVH+TqgKpG1cEnpt -Ej5fl0F4dAYBS/O3jO3eS/K6aNqKGpbYtOu2N3U4Hi9hb427AobakMjuSnIWWalr -L546Wto4+JvFZZeuEdlHVwZk1RE2g/9itzrlW+yKayCnSnXAUxz+jGE9Tv2FjlUG -OBu6aqh1W3tNj49gCVfvgGZICm9w7d0AdNyN5sVDaU7eOPTHxCxOLHoIsa8mnbA4 -N/s9JuCccLXpKwE9w774+/kidFcHvc88v9Bd8BcIJTtFkGILkD+qdZy1o/50iufh -H/GATcmP+VgLdbydrQ7Dp5y37jZfXeFUVbZrKb3wjP3jR9qsAFmaJm8H4SBVsdnX -owiEoZQRuCMvE+885UGP3vszAQ5lyS/Z4Tcp/KQim8rxPSrXu/98g1fFnwzynCzd -3CEHXc0U2M0zSO8vPdpcLqxGpxikXjSSEGlR3m7WaHjHkSqZIeD28q88qCWGPsQC -8kkzs5uObEOIj6k9EXJmo6nnKmYNh97InQV5ryurzuhYfHY2UTDU1J6qAIALu4/9 -yNqlx8ljo42MVva9V6RmevmdL9Jh0+JQgRLgYeWCtsHYKxKqVBUB+BCgd5f44e+E -LdJAP1sNWAbODF4Ju1bmyf2FBrJA+3eFmLnSeWjVQt9TqsJE9E8= -=RYxc +klCKNg//dCIBDp+4caJgLpkB4vH2SC244vRQmnQiKQREG+3OXgizDV9ZrS/FIREr +gTPFzuUvsxuuvvPwVDG04eLyu5LK05v4ngj/QF3le+WWh+q9HNGdf0h2gK8iIQ5d +DJvwHNux7ACcW10sdSzdPro6vh2H3iNNrki0zLQKp3c4GkWOOWBaxBIJTrkjB4t0 +EIBKESKLW/vNB7De8ewXJ2OdKu4gJF84jbeAMxs36rkidirJ3hZRbZ4F7Xbyo4QP +KOktgqEKY1SV0r9rr2LIi0KlGTfeEApwzZGoZWt8KoGFzbeEaEaFJ1TokmQJ6Igr +ACY+IOrqZw7ItO7U8+oYCj/CydT6OyEQ1LcO7HBN1eDwcazaTYrtmjm5tEypv2Mx +1ZN7GTTKa/f0ug04fPHwg8cPLeUjW87qc3x5PMI90fIreIw8gSANQbQJJJB4Cnym +hYqGiax+uchoSRiKC+wfJ6ytfn6JFuIWqtKVZAl40/GoS453Qb6+l/+TzwiThbIR +gSwiA8w1pQ42UIAHJvTftBdO6kNqtaMdBHV3Cmr0Ty7WDZBqfWORpNyXqzUextlJ +1m8hxTbM1e3MrpW9Djn7n3/Ec5XwODhIpdBfLWxDGdYwMWSNHBBwdjgRNtw4uAyR +/17jtMxe2dw3ax3SHB/5Q5iRWchgX4E6AGsmJAzQoqfC0hYtA+0= +=Ofjz -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index f186beb924..5d40da8109 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201811-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201811-23.xml new file mode 100644 index 0000000000..0d34b1b9a6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201811-23.xml @@ -0,0 +1,63 @@ + + + + libsndfile: Multiple vulnerabilities + Multiple vulnerabilities have been found in libsndfile, the worst + of which might allow remote attackers to cause a Denial of Service + condition. + + libsndfile + 2018-11-30 + 2018-11-30 + 618016 + 624814 + 627152 + 631634 + 660452 + remote + + + 1.0.28-r4 + 1.0.28-r4 + + + +

libsndfile is a C library for reading and writing files containing + sampled sound. +

+
+ +

Multiple vulnerabilities have been discovered in libsndfile. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by enticing a user to open a specially crafted file, + could cause a Denial of Service condition or have other unspecified + impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All libsndfile users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.28-r4" + +
+ + CVE-2017-12562 + CVE-2017-14634 + CVE-2017-6892 + CVE-2017-8361 + CVE-2017-8362 + CVE-2017-8363 + CVE-2017-8365 + CVE-2018-13139 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201811-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201811-24.xml new file mode 100644 index 0000000000..212d0afcbe --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201811-24.xml @@ -0,0 +1,94 @@ + + + + PostgreSQL: SQL injection + A SQL injection in PostgreSQL may allow attackers to execute + arbitrary SQL statements. + + postgresql + 2018-11-30 + 2018-12-03 + 670724 + remote + + + 9.3.25 + 9.4.20 + 9.5.15 + 9.6.11 + 10.6 + 11.1 + 9.3.25 + 9.4.20 + 9.5.15 + 9.6.11 + 10.6 + 11.1 + + + +

PostgreSQL is an open source object-relational database management + system. +

+
+ +

A vulnerability was discovered in PostgreSQL’s pg_upgrade and pg_dump.

+
+ +

An attacker, by enticing a user to process a specially crafted trigger + definition, can execute arbitrary SQL statements with superuser + privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All PostgreSQL 9.3.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.3.25" + + +

All PostgreSQL 9.4.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.4.20" + + +

All PostgreSQL 9.5.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.5.15" + + +

All PostgreSQL 9.6.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.6.11" + + +

All PostgreSQL 10.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-10.6" + + +

All PostgreSQL 11.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-11.1" + +
+ + CVE-2018-16850 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-01.xml new file mode 100644 index 0000000000..7ad1abf85e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-01.xml @@ -0,0 +1,82 @@ + + + + PHP: Multiple vulnerabilities + Multiple vulnerabilities have been found in PHP, the worst of which + could result in a Denial of Service condition. + + php + 2018-12-02 + 2018-12-03 + 658092 + 666256 + local, remote + + + 5.6.38 + 7.0.32 + 7.1.22 + 7.2.10 + 5.6.38 + 7.0.32 + 7.1.22 + 7.2.10 + + + +

PHP is an open source general-purpose scripting language that is + especially suited for web development. +

+
+ +

Multiple vulnerabilities have been discovered in PHP. Please review the + referenced CVE identifiers for details. +

+
+ +

An attacker could cause a Denial of Service condition or obtain + sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All PHP 5.6.X users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.6.38" + + +

All PHP 7.0.X users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.0.32" + + +

All PHP 7.1.X users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.1.22" + + +

All PHP 7.2.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.2.10" + +
+ + CVE-2018-10545 + CVE-2018-10546 + CVE-2018-10548 + CVE-2018-10549 + CVE-2018-17082 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-02.xml new file mode 100644 index 0000000000..b4cd500b40 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-02.xml @@ -0,0 +1,50 @@ + + + + ConnMan: Multiple vulnerabilities + Multiple vulnerabilities have been found in ConnMan, the worst of + which could result in the remote execution of code. + + connman + 2018-12-02 + 2018-12-02 + 628566 + 630028 + remote + + + 1.35-r1 + 1.35-r1 + + + +

ConnMan provides a daemon for managing Internet connections.

+
+ +

Multiple vulnerabilities have been discovered in ConnMan. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, via a crafted DNS packet, could remotely execute code + or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All ConnMan users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/connman-1.35-r1" + +
+ + CVE-2017-12865 + CVE-2017-5716 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-03.xml new file mode 100644 index 0000000000..859d27b0cf --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-03.xml @@ -0,0 +1,48 @@ + + + + Nagios: Privilege escalation + A vulnerability in Nagios allows local users to escalate + privileges. + + nagios + 2018-12-02 + 2018-12-02 + 629380 + local + + + 4.3.4 + 4.3.4 + + + +

Nagios is an open source host, service and network monitoring program.

+
+ +

A vulnerability in Nagios was discovered due to the improper handling of + configuration files which can be owned by a non-root user. +

+
+ +

A local attacker can escalate privileges to root by leveraging access to + a non-root owned configuration file. +

+
+ +

There is no known workaround at this time.

+
+ +

All Nagios users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-4.3.4" + +
+ + CVE-2017-14312 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-04.xml new file mode 100644 index 0000000000..11749f2722 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-04.xml @@ -0,0 +1,74 @@ + + + + WebkitGTK+: Multiple vulnerabilities + Multiple vulnerabilities have been found in WebKitGTK+, the worst + of which may lead to arbitrary code execution. + + webkitgtk + 2018-12-02 + 2018-12-02 + 667892 + remote + + + 2.22.0 + 2.22.0 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, + suitable for projects requiring any kind of web integration, from hybrid + HTML/CSS applications to full-fledged web browsers. +

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please + review the referenced CVE identifiers for details. +

+
+ +

A remote attacker could execute arbitrary commands or cause a Denial of + Service condition via maliciously crafted web content. +

+
+ +

There is no known workaround at this time.

+
+ +

All WebkitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.22.0" + +
+ + CVE-2018-4191 + CVE-2018-4197 + CVE-2018-4207 + CVE-2018-4208 + CVE-2018-4209 + CVE-2018-4210 + CVE-2018-4212 + CVE-2018-4213 + CVE-2018-4299 + CVE-2018-4306 + CVE-2018-4309 + CVE-2018-4311 + CVE-2018-4312 + CVE-2018-4314 + CVE-2018-4315 + CVE-2018-4316 + CVE-2018-4317 + CVE-2018-4318 + CVE-2018-4319 + CVE-2018-4323 + CVE-2018-4328 + CVE-2018-4358 + CVE-2018-4359 + CVE-2018-4361 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-05.xml new file mode 100644 index 0000000000..a40c55455c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-05.xml @@ -0,0 +1,48 @@ + + + + EDE: Privilege escalation + A vulnerability in EDE could result in privilege escalation. + ede, emacs + 2018-12-06 + 2018-12-06 + 398241 + local + + + 1.07 + 1.07 + + + +

A package that simplifies the task of creating, building, and debugging + large programs with Emacs. It provides some of the features of an IDE, or + Integrated Development Environment, in Emacs. +

+
+ +

An untrusted search path vulnerability was discovered in EDE.

+
+ +

A local attacker could escalate his privileges via a specially crafted + Lisp expression in a Project.ede file in the directory or a parent + directory of an opened file. +

+
+ +

There is no known workaround at this time.

+
+ +

All EDE users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-xemacs/ede-1.07" + +
+ + CVE-2012-0035 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-06.xml new file mode 100644 index 0000000000..6cae9b0ffc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-06.xml @@ -0,0 +1,51 @@ + + + + CouchDB: Multiple vulnerabilities + Multiple vulnerabilities have been found in CouchDB, the worst of + which could lead to the remote execution of code. + + couchdb + 2018-12-15 + 2018-12-15 + 630796 + 660908 + 663164 + remote + + + 2.1.2 + + + +

Apache CouchDB is a distributed, fault-tolerant and schema-free + document-oriented database. +

+
+ +

Multiple vulnerabilities have been discovered in CouchDB. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could execute arbitrary code or escalate privileges.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for CouchDB and recommends that users + unmerge the package: +

+ + + # emerge --unmerge "dev-db/couchdb" + +
+ + CVE-2018-11769 + CVE-2018-8007 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-07.xml new file mode 100644 index 0000000000..85756596a1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-07.xml @@ -0,0 +1,52 @@ + + + + SpamAssassin: Multiple vulnerabilities + Multiple vulnerabilities have been found in SpamAssassin, the worst + of which may lead to remote code execution. + + spamassassin + 2018-12-15 + 2018-12-15 + 666348 + remote + + + 3.4.2-r2 + 3.4.2-r2 + + + +

SpamAssassin is an extensible email filter used to identify junk email.

+
+ +

Multiple vulnerabilities have been discovered in SpamAssassin. Please + review the referenced CVE identifiers for details. +

+
+ +

A remote attacker could execute arbitrary code, escalate privileges, or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All SpamAssassin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=mail-filter/spamassassin-3.4.2-r2" + +
+ + CVE-2016-1238 + CVE-2017-15705 + CVE-2018-11780 + CVE-2018-11781 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-08.xml new file mode 100644 index 0000000000..b7bbb1f774 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-08.xml @@ -0,0 +1,46 @@ + + + + Scala: Privilege escalation + A vulnerability in Scala could result in privilege escalation. + scala + 2018-12-15 + 2018-12-15 + 637940 + local + + + 2.12.4 + 2.12.4 + + + +

Scala combines object-oriented and functional programming in one + concise, high-level language. +

+
+ +

It was discovered that Scala’s compilation daemon does not properly + manage permissions for private files. +

+
+ +

A local attacker could escalate privileges.

+
+ +

There is no known workaround at this time.

+
+ +

All Scala users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/scala-2.12.4" + +
+ + CVE-2017-15288 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-09.xml new file mode 100644 index 0000000000..e8bfec595a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201812-09.xml @@ -0,0 +1,56 @@ + + + + Go: Multiple vulnerabilities + Multiple vulnerabilities have been found in Go, the worst which + could lead to the execution of arbitrary code. + + go + 2018-12-21 + 2018-12-21 + 673234 + remote + + + 1.10.7 + 1.10.7 + + + +

Go is an open source programming language that makes it easy to build + simple, reliable, and efficient software. +

+
+ +

Multiple vulnerabilities have been discovered in Go. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker could cause arbitrary code execution by passing + specially crafted Go packages the ‘go get -u’ command. +

+ +

The remote attacker could also craft pathological inputs causing a CPU + based Denial of Service condition via the crypto/x509 package. +

+
+ +

There is no known workaround at this time.

+
+ +

All Go users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/go-1.10.7" + +
+ + CVE-2018-16873 + CVE-2018-16874 + CVE-2018-16875 + + Zlogene + Zlogene +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index a721b61821..f5984957b6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Thu, 29 Nov 2018 02:38:34 +0000 +Fri, 21 Dec 2018 15:08:33 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 7893dbcc0e..15938ec9fb 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -948748bd6e80dceb3f96d8040bee52380c2f2fe8 1543445572 2018-11-28T22:52:52+00:00 +50b59faac05c76419ff9b3a69d1e89f8a5c99678 1545393597 2018-12-21T11:59:57+00:00