diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201010-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201010-01.xml index 2a8c8f502a..b692f80b3c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201010-01.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201010-01.xml @@ -7,7 +7,7 @@ libpng October 05, 2010 - June 06, 2015: 8 + January 03, 2017: 9 307637 324153 335887 @@ -25,6 +25,7 @@ 1.2.54 1.2.55 1.2.56 + 1.2.57 1.4.3 @@ -88,6 +89,6 @@ craig - system - system + system + system diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-15.xml index 9914eaa102..083631f827 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-15.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201206-15.xml @@ -7,7 +7,7 @@ libpng June 22, 2012 - June 06, 2015: 4 + January 03, 2017: 5 373967 386185 401987 @@ -24,7 +24,8 @@ 1.2.53 1.2.54 1.2.55 - 1.2.56 + 1.2.56 + 1.2.57 1.5.10 @@ -110,5 +111,5 @@ underling - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-10.xml index 47912c3c6b..b7b0800e4d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201502-10.xml @@ -7,7 +7,7 @@ libpng February 15, 2015 - June 06, 2015: 2 + January 03, 2017: 3 531264 533358 local, remote @@ -24,6 +24,7 @@ 1.5.23 1.5.24 1.5.25 + 1.2.57 1.6.16 @@ -78,5 +79,5 @@ BlueKnight - ackle + ackle diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-20.xml index 4827cfbbbf..602e69c8c2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-20.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201507-20.xml @@ -8,7 +8,7 @@ postgresql July 18, 2015 - August 22, 2015: 2 + January 03, 2017: 3 539018 550172 remote @@ -32,12 +32,14 @@ 9.3.10 9.3.11 9.3.12 + 9.3.14 + 9.3.15 9.4.3

PostgreSQL is an open source object-relational database management - system. + system.

@@ -103,5 +105,5 @@ BlueKnight - Zlogene + Zlogene diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-56.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-56.xml index d9a1c98e73..3d8a5ee137 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-56.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-56.xml @@ -7,12 +7,13 @@ xen December 31, 2016 - December 31, 2016: 1 + January 03, 2017: 2 600382 600662 601248 601250 601986 + 603420 local @@ -91,5 +92,5 @@ CVE-2016-9932 b-man - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-14.xml new file mode 100644 index 0000000000..9810594fe3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-14.xml @@ -0,0 +1,56 @@ + + + + LZO: Multiple vulnerabilities + An integer overflow in LZO might allow remote attackers to execute + arbitrary code or cause a Denial of Service condition. + + lzo + January 02, 2017 + January 02, 2017: 1 + 515238 + remote + + + 2.08 + 2.08 + + + +

LZO is an extremely fast compression and decompression library

+
+ +

LZO is vulnerable to an integer overflow condition in the + “lzo1x_decompress_safe” function which could result in a possible + buffer overrun when processing maliciously crafted compressed input data. +

+
+ +

A remote attacker could send specially crafted compressed input data + possibly resulting in a Denial of Service condition or arbitrary code + execution. +

+ +
+ +

There is no known workaround at this time.

+
+ +

All LZO users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/lzo-2.08" + + +
+ + CVE-2014-4607 + + + BlueKnight + + + BlueKnight + +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-15.xml new file mode 100644 index 0000000000..5209b61727 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-15.xml @@ -0,0 +1,169 @@ + + + + Mozilla Firefox, Thunderbird: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox and + Thunderbird the worst of which could lead to the execution of arbitrary + code. + + firefox, thunderbird + January 03, 2017 + January 04, 2017: 2 + 581326 + 590330 + 594616 + 599924 + 601320 + 602576 + 604024 + remote + + + 45.6.0 + 45.6.0 + + + 45.6.0 + 45.6.0 + + + 45.6.0 + 45.6.0 + + + 45.6.0 + 45.6.0 + + + +

Mozilla Firefox is a cross-platform web browser from Mozilla. The + Mozilla Thunderbird mail client is a redesign of the Mozilla Mail + component. The goal is to produce a cross-platform stand-alone mail + application using XUL (XML User Interface Language). +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox and + Thunderbird. Please review the CVE identifiers referenced below for + details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or cause a Denial of Service condition via + multiple vectors. +

+
+ +

There is no known workaround at this time.

+
+ +

All Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-45.6.0" + + +

All Firefox-bin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-45.6.0" + + +

All Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-45.6.0" + + +

All Thunderbird-bin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=mail-client/thunderbird-bin-45.6.0" + +
+ + CVE-2016-2804 + CVE-2016-2805 + CVE-2016-2806 + CVE-2016-2807 + CVE-2016-2808 + CVE-2016-2809 + CVE-2016-2810 + CVE-2016-2811 + CVE-2016-2812 + CVE-2016-2813 + CVE-2016-2814 + CVE-2016-2816 + CVE-2016-2817 + CVE-2016-2820 + CVE-2016-2827 + CVE-2016-2830 + CVE-2016-2835 + CVE-2016-2836 + CVE-2016-2837 + CVE-2016-2838 + CVE-2016-2839 + CVE-2016-5250 + CVE-2016-5251 + CVE-2016-5252 + CVE-2016-5253 + CVE-2016-5254 + CVE-2016-5255 + CVE-2016-5256 + CVE-2016-5257 + CVE-2016-5258 + CVE-2016-5259 + CVE-2016-5260 + CVE-2016-5261 + CVE-2016-5262 + CVE-2016-5263 + CVE-2016-5264 + CVE-2016-5265 + CVE-2016-5266 + CVE-2016-5267 + CVE-2016-5268 + CVE-2016-5270 + CVE-2016-5271 + CVE-2016-5272 + CVE-2016-5273 + CVE-2016-5274 + CVE-2016-5275 + CVE-2016-5276 + CVE-2016-5277 + CVE-2016-5278 + CVE-2016-5279 + CVE-2016-5280 + CVE-2016-5281 + CVE-2016-5282 + CVE-2016-5283 + CVE-2016-5284 + CVE-2016-5290 + CVE-2016-5291 + CVE-2016-5293 + CVE-2016-5294 + CVE-2016-5296 + CVE-2016-5297 + CVE-2016-9064 + CVE-2016-9066 + CVE-2016-9074 + CVE-2016-9079 + CVE-2016-9893 + CVE-2016-9895 + CVE-2016-9897 + CVE-2016-9898 + CVE-2016-9899 + CVE-2016-9900 + CVE-2016-9901 + CVE-2016-9902 + CVE-2016-9904 + CVE-2016-9905 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-16.xml new file mode 100644 index 0000000000..69174de786 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-16.xml @@ -0,0 +1,111 @@ + + + + libTIFF: Multiple vulnerabilities + Multiple vulnerabilities have been found in libTIFF, the worst of + which may allow execution of arbitrary code. + + tiff + January 09, 2017 + January 09, 2017: 2 + 484542 + 534108 + 538318 + 561880 + 572876 + 585274 + 585508 + 599746 + remote + + + 4.0.7 + 4.0.7 + + + +

The TIFF library contains encoding and decoding routines for the Tag + Image File Format. It is called by numerous programs, including GNOME and + KDE applications, to interpret TIFF images. +

+
+ +

Multiple vulnerabilities have been discovered in libTIFF. Please review + the CVE identifier and bug reports referenced for details. +

+
+ +

A remote attacker could entice a user to process a specially crafted + image file, possibly resulting in execution of arbitrary code with the + privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libTIFF users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/tiff-4.0.7" + +
+ + CVE-2013-4243 + CVE-2014-8127 + CVE-2014-8128 + CVE-2014-8129 + CVE-2014-8130 + CVE-2014-9330 + CVE-2014-9655 + CVE-2015-1547 + CVE-2015-7313 + CVE-2015-7554 + CVE-2015-8665 + CVE-2015-8668 + CVE-2015-8683 + CVE-2015-8781 + CVE-2015-8782 + CVE-2015-8783 + CVE-2015-8784 + CVE-2016-3186 + CVE-2016-3619 + CVE-2016-3620 + CVE-2016-3621 + CVE-2016-3622 + CVE-2016-3623 + CVE-2016-3624 + CVE-2016-3625 + CVE-2016-3631 + CVE-2016-3632 + CVE-2016-3633 + CVE-2016-3634 + CVE-2016-3658 + CVE-2016-3945 + CVE-2016-3990 + CVE-2016-3991 + CVE-2016-5102 + CVE-2016-5314 + CVE-2016-5315 + CVE-2016-5316 + CVE-2016-5317 + CVE-2016-5318 + CVE-2016-5319 + CVE-2016-5320 + CVE-2016-5321 + CVE-2016-5322 + CVE-2016-5323 + CVE-2016-5652 + CVE-2016-5875 + CVE-2016-6223 + CVE-2016-8331 + CVE-2016-9273 + CVE-2016-9297 + CVE-2016-9448 + CVE-2016-9453 + CVE-2016-9532 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-17.xml new file mode 100644 index 0000000000..51d85c4049 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-17.xml @@ -0,0 +1,71 @@ + + + + Adobe Flash Player: Multiple vulnerabilities + Multiple vulnerabilities have been found in Adobe Flash Player, the + worst of which allows remote attackers to execute arbitrary code. + + adobe-flash + January 10, 2017 + January 10, 2017: 1 + 602546 + remote + + + 24.0.0.186 + 24.0.0.186 + + + +

The Adobe Flash Player is a renderer for the SWF file format, which is + commonly used to provide interactive websites. +

+
+ +

Multiple vulnerabilities have been discovered in Adobe Flash Player. + Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or bypass security restrictions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Adobe Flash Player users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-24.0.0.186" + + +
+ + + APSB16-39 + + CVE-2016-7867 + CVE-2016-7868 + CVE-2016-7869 + CVE-2016-7870 + CVE-2016-7871 + CVE-2016-7872 + CVE-2016-7873 + CVE-2016-7874 + CVE-2016-7875 + CVE-2016-7876 + CVE-2016-7877 + CVE-2016-7878 + CVE-2016-7879 + CVE-2016-7880 + CVE-2016-7881 + CVE-2016-7890 + CVE-2016-7892 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-18.xml new file mode 100644 index 0000000000..13225b5fae --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-18.xml @@ -0,0 +1,72 @@ + + + + Python: Multiple vulnerabilities + Multiple vulnerabilities have been found in Python, the worst of + which could lead to arbitrary code execution. + + python + January 10, 2017 + January 10, 2017: 1 + 531002 + 585910 + 585946 + remote + + + 2.7.12 + 3.4.5 + 3.4.5 + + + +

Python is an interpreted, interactive, object-oriented programming + language. +

+
+ +

Multiple vulnerabilities have been discovered in Python. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted index + file using Python’s dumbdbm module, possibly resulting in execution of + arbitrary code with the privileges of the process. +

+ +

A remote attacker could entice a user to process a specially crafted + input stream using Python’s zipimporter module, possibly allowing + attackers to cause unspecified impact. +

+ +

A man in the middle attacker could strip out the STARTTLS command + without generating an exception on the Python SMTP client application, + preventing the establishment of the TLS layer. +

+
+ +

There is no known workaround at this time.

+
+ +

All Python 2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/python-2.7.12:2.7" + + +

All Python 3 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/python-3.4.5:3.4" + +
+ + CVE-2016-0772 + CVE-2016-5636 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-19.xml new file mode 100644 index 0000000000..d80778d086 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-19.xml @@ -0,0 +1,55 @@ + + + + NTFS-3G: Privilege escalation + A vulnerability in NTFS-3G allows local users to gain root + privileges. + + ntfs3g + January 11, 2017 + January 11, 2017: 1 + 550970 + local + + + 2016.2.22 + 2016.2.22 + + + +

NTFS-3G is a stable, full-featured, read-write NTFS driver for various + operating systems. +

+
+ +

NTFS-3G is affected by the same vulnerability as reported in “GLSA + 201603-04” when the bundled fuse-lite implementation is used. +

+
+ +

A local user could gain root privileges.

+
+ +

There is no known workaround at this time. However, on Gentoo when the + “external-fuse” USE flag is set or the “suid” USE flag is not set + then NTFS-3G is not affected. Both of these cases are the default + configuration. +

+
+ +

All NTFS-3G users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-fs/ntfs3g-2016.2.22" + +
+ + CVE-2015-3202 + GLSA 201603-04 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-20.xml new file mode 100644 index 0000000000..a6f49ee828 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-20.xml @@ -0,0 +1,61 @@ + + + + D-Bus: Format string vulnerability + A vulnerability has been found in D-Bus possibly resulting in a + local Denial of Service. + + dbus + January 11, 2017 + January 11, 2017: 1 + 596772 + local + + + 1.10.12 + 1.10.12 + + + +

D-Bus is a message bus system, a simple way for applications to talk to + one another. +

+
+ +

It was discovered that D-Bus incorrectly handles certain format strings.

+ +

The impact of this new vulnerability is believed to not be exploitable + if D-Bus is patched against CVE-2015-0245. The previous vulnerability + (CVE-2015-0245) was addressed in GLSA-201503-02 referenced below. +

+
+ +

A local attacker could cause a Denial of Service condition or possibly + execute arbitrary code. +

+
+ +

The vulnerable D-Bus interface is intended only for use by systemd + running as root. +

+ +

The administrator can install a policy which denies sending from + org.freedesktop.systemd1.Activator” to D-Bus. This will prevent + non-root attackers from reaching the interface in order to exercise this + flaw. +

+
+ +

All D-Bus users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/dbus-1.10.12" + +
+ + GLSA-201503-02 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-21.xml new file mode 100644 index 0000000000..e17ca4872d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-21.xml @@ -0,0 +1,61 @@ + + + + Expat: Multiple vulnerabilities + Multiple vulnerabilities have been found in Expat, the worst of + which may allow execution of arbitrary code. + + expat + January 11, 2017 + January 11, 2017: 1 + 458742 + 555642 + 577928 + 583268 + 585510 + remote + + + 2.2.0-r1 + 2.2.0-r1 + + + +

Expat is a set of XML parsing libraries.

+
+ +

Multiple vulnerabilities have been discovered in Expat. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by enticing a user to process a specially crafted XML + file, could execute arbitrary code with the privileges of the process or + cause a Denial of Service condition. This attack could also be used + against automated systems that arbitrarily process XML files. +

+
+ +

There is no known workaround at this time.

+
+ +

All Expat users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/expat-2.2.0-r1" + +
+ + CVE-2012-6702 + CVE-2013-0340 + CVE-2015-1283 + CVE-2016-0718 + CVE-2016-4472 + CVE-2016-5300 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-22.xml new file mode 100644 index 0000000000..8853a74581 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-22.xml @@ -0,0 +1,58 @@ + + + + NGINX: Privilege escalation + Gentoo's NGINX ebuilds are vulnerable to privilege escalation due + to the way log files are handled. + + nginx + January 11, 2017 + January 11, 2017: 1 + 605008 + local + + + 1.10.2-r3 + 1.10.2-r3 + + + +

nginx is a robust, small, and high performance HTTP and reverse proxy + server. +

+
+ +

It was discovered that Gentoo’s default NGINX installation applied + similar problematic permissions on “/var/log/nginx” as Debian + (DSA-3701) and is therefore vulnerable to the same attack described in + CVE-2016-1247. +

+
+ +

A local attacker, who either is already NGINX’s system user or belongs + to NGINX’s group, could potentially escalate privileges. +

+
+ +

Ensure that no untrusted user can create files in directories which are + used by NGINX (or an NGINX vhost) to store log files. +

+
+ +

All NGINX users should upgrade to the latest ebuild revision:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/nginx-1.10.2-r3" + +
+ + CVE-2016-1247 + DSA-3701 + + Technical analysis + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-23.xml new file mode 100644 index 0000000000..255d0dca15 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-23.xml @@ -0,0 +1,49 @@ + + + + Botan: Multiple vulnerabilities + Multiple vulnerabilities have been found in Botan, the worst of + which might allow remote attackers to obtain ECDSA secret keys. + + botan + January 11, 2017 + January 11, 2017: 1 + 581324 + remote + + + 1.10.13 + 1.10.13 + + + +

Botan (Japanese for peony) is a cryptography library written in C++11.

+
+ +

Multiple vulnerabilities have been discovered in Botan. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker might obtain ECDSA secret keys via a timing + side-channel attack or could possibly bypass TLS policy. +

+
+ +

There is no known workaround at this time.

+
+ +

All Botan users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/botan-1.10.13" + +
+ + CVE-2016-2849 + CVE-2016-2850 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-24.xml new file mode 100644 index 0000000000..90a33c7402 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-24.xml @@ -0,0 +1,52 @@ + + + + PgBouncer: Multiple vulnerabilities + Multiple vulnerabilities have been found in PgBouncer, the worst of + which may allow an attacker to bypass authentication. + + pgbouncer + January 11, 2017 + January 11, 2017: 1 + 550124 + 600184 + remote + + + 1.7.2 + 1.7.2 + + + +

PgBouncer is a lightweight connection pooler for PostgreSQL.

+
+ +

Multiple vulnerabilities have been discovered in PgBouncer. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker might send a specially crafted package possibly + resulting in a Denial of Service condition. Furthermore, a remote + attacker might bypass authentication in configurations using the + “auth_user” feature. +

+
+ +

There is no known workaround at this time.

+
+ +

All PgBouncer users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/pgbouncer-1.7.2" + +
+ + CVE-2015-4054 + CVE-2015-6817 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-25.xml new file mode 100644 index 0000000000..d7af4d7091 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-25.xml @@ -0,0 +1,54 @@ + + + + phpBB: Multiple vulnerabilities + Multiple vulnerabilities have been found in phpBB, the worst of + which may allow remote attackers to inject arbitrary web script or HTML. + + phpBB + January 11, 2017 + January 11, 2017: 1 + 538360 + remote + + + 3.1.10 + + + +

phpBB is an Open Source bulletin board package.

+
+ +

Multiple vulnerabilities have been discovered in phpBB. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker may be able to change settings, inject arbitrary web + script or HTML, or conduct cross-site request forgery (CSRF) attacks. +

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo Security support has been discontinued due to phpBB being dropped + to unstable. As such, we recommend that users unmerge phpBB: +

+ + + # emerge --unmerge "www-apps/phpBB" + + +

NOTE: Users could alternatively upgrade to + “>=www-apps/phpBB-3.1.10”, however, these packages are not + currently marked stable. +

+
+ + CVE-2015-1431 + CVE-2015-1432 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-26.xml new file mode 100644 index 0000000000..bf8f1bd641 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-26.xml @@ -0,0 +1,49 @@ + + + + BIND: Denial of Service + A vulnerability in BIND might allow remote attackers to cause a + Denial of Service condition. + + bind + January 11, 2017 + January 11, 2017: 1 + 598750 + remote + + + 9.10.4_p4 + 9.10.4_p4 + + + +

BIND (Berkeley Internet Name Domain) is a Name Server.

+
+ +

A defect in BIND’s handling of responses containing a DNAME answer can + cause a resolver to exit after encountering an assertion failure in db.c + or resolver.c. +

+
+ +

A remote attacker could send a specially crafted DNS request to the BIND + resolver possibly resulting in a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All BIND users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.10.4_p4" + +
+ + CVE-2016-8864 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-27.xml new file mode 100644 index 0000000000..604624ab6f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-27.xml @@ -0,0 +1,53 @@ + + + + 7-Zip: Multiple vulnerabilities + Multiple vulnerabilities have been found in 7-Zip, the worst of + which may allow execution of arbitrary code. + + 7zip + January 11, 2017 + January 11, 2017: 1 + 582832 + remote + + + 16.02-r1 + 16.02-r1 + + + +

7-Zip is an open-source file archiver, an application used primarily to + compress files. 7-Zip uses its own 7z archive format, but can read and + write several other archive formats. +

+
+ +

Multiple vulnerabilities have been discovered in 7-Zip. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted + archive file possibly resulting in execution of arbitrary code with the + privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All 7-Zip users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/p7zip-16.02-r1" + +
+ + CVE-2016-2334 + CVE-2016-2335 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-28.xml new file mode 100644 index 0000000000..705cb7c7d6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-28.xml @@ -0,0 +1,52 @@ + + + + c-ares: Heap-based buffer overflow + A heap-based buffer overflow in c-ares might allow remote attackers + to cause a Denial of Service condition. + + c-ares + January 11, 2017 + January 11, 2017: 1 + 595536 + remote + + + 1.12.0 + 1.12.0 + + + +

c-ares is a C library for asynchronous DNS requests (including name + resolves). +

+
+ +

A hostname with an escaped trailing dot (such as “hello\.”) would + have its size calculated incorrectly leading to a single byte written + beyond the end of a buffer on the heap. +

+
+ +

A remote attacker, able to provide a specially crafted hostname to an + application using c-ares, could potentially cause a Denial of Service + condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All c-ares users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/c-ares-1.12.0" + +
+ + CVE-2016-5180 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-29.xml new file mode 100644 index 0000000000..fe20830585 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-29.xml @@ -0,0 +1,65 @@ + + + + Vim, gVim: Remote execution of arbitrary code + A vulnerability has been found in Vim and gVim concerning how + certain modeline options are treated. + + vim, gvim + January 11, 2017 + January 11, 2017: 1 + 600650 + remote + + + 8.0.0106 + 8.0.0106 + + + 8.0.0106 + 8.0.0106 + + + +

Vim is an efficient, highly configurable improved version of the classic + ‘vi’ text editor. gVim is the GUI version of Vim. +

+
+ +

Vim and gVim do not properly validate values for the ‘filetype’, + ‘syntax’, and ‘keymap’ options. +

+
+ +

A remote attacker could entice a user to open a specially crafted file + using Vim/gVim with certain modeline options enabled possibly resulting + in execution of arbitrary code with the privileges of the process. +

+
+ +

Disabling modeline support in .vimrc by adding “set nomodeline” will + prevent exploitation of this flaw. By default, modeline is enabled for + ordinary users but disabled for root. +

+
+ +

All Vim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/vim-8.0.0106" + + +

All gVim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/gvim-8.0.0106" + +
+ + CVE-2016-1248 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-30.xml new file mode 100644 index 0000000000..f157c7d8a7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-30.xml @@ -0,0 +1,54 @@ + + + + vzctl: Security bypass + A vulnerability in vzctl might allow attackers to gain control over + ploop containers. + + vzctl + January 11, 2017 + January 11, 2017: 1 + 560522 + local, remote + + + 4.9.4 + 4.9.4 + + + +

vzctl is a set of control tools for the OpenVZ server virtualization + solution. +

+
+ +

It was discovered that vzctl determined the virtual environment (VE) + layout based on the presence of root.hdd/DiskDescriptor.xml in the VE + private directory. This allows local simfs container (CT) root users to + change the root password for arbitrary ploop containers. This is + demonstrated by a symlink attack on the ploop container root.hdd file + which can then be used to access a control panel. +

+
+ +

An attacker with root privileges, in a simfs-based container, could gain + control over ploop-based containers. +

+
+ +

There is no known workaround at this time.

+
+ +

All vzctl users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-cluster/vzctl-4.9.4" + +
+ + CVE-2015-6927 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-31.xml new file mode 100644 index 0000000000..542858851b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-31.xml @@ -0,0 +1,61 @@ + + + + flex: Potential insecure code generation + Flex might generate code with a buffer overflow making applications + using such scanners vulnerable to the execution of arbitrary code. + + flex + January 11, 2017 + January 11, 2017: 1 + 589820 + remote + + + 2.6.1 + 2.6.1 + + + +

flex is a programming tool used to generate scanners (programs which + recognize lexical patterns in text). +

+
+ +

A heap-based buffer overflow in the yy_get_next_buffer function in Flex + might allow context-dependent attackers to cause a denial of service or + possibly execute arbitrary code via vectors involving num_to_read. +

+
+ +

Context-dependent attackers could cause a Denial of Service condition or + possibly execute arbitrary code with the privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All flex users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-devel/flex-2.6.1" + + +

Packages which depend on flex may need to be recompiled. Tools such as + qdepends (included in app-portage/portage-utils) may assist in + identifying these packages: +

+ + + # emerge --oneshot --ask --verbose $(qdepends -CQ sys-devel/flex | sed + 's/^/=/') + +
+ + CVE-2016-6354 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-32.xml new file mode 100644 index 0000000000..1e77c325a1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-32.xml @@ -0,0 +1,117 @@ + + + + phpMyAdmin: Multiple vulnerabilities + Multiple vulnerabilities have been found in phpMyAdmin, the worst + of which could lead to arbitrary code execution. + + phpMyAdmin + January 11, 2017 + January 11, 2017: 1 + 586964 + 593582 + 600814 + remote + + + 4.6.5.1 + 4.6.5.1 + + + +

phpMyAdmin is a web-based management tool for MySQL databases.

+
+ +

Multiple vulnerabilities have been discovered in phpMyAdmin. Please + review the CVE identifiers referenced below for details. +

+
+ +

A authenticated remote attacker could exploit these vulnerabilities to + execute arbitrary PHP Code, inject SQL code, or to conduct Cross-Site + Scripting attacks. +

+ +

In certain configurations, an unauthenticated remote attacker could + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All phpMyAdmin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/phpmyadmin-4.6.5.1" + +
+ + CVE-2016-4412 + CVE-2016-5097 + CVE-2016-5098 + CVE-2016-5099 + CVE-2016-5701 + CVE-2016-5702 + CVE-2016-5703 + CVE-2016-5704 + CVE-2016-5705 + CVE-2016-5706 + CVE-2016-5730 + CVE-2016-5731 + CVE-2016-5732 + CVE-2016-5733 + CVE-2016-5734 + CVE-2016-5739 + CVE-2016-6606 + CVE-2016-6607 + CVE-2016-6608 + CVE-2016-6609 + CVE-2016-6610 + CVE-2016-6611 + CVE-2016-6612 + CVE-2016-6613 + CVE-2016-6614 + CVE-2016-6615 + CVE-2016-6616 + CVE-2016-6617 + CVE-2016-6618 + CVE-2016-6619 + CVE-2016-6620 + CVE-2016-6622 + CVE-2016-6623 + CVE-2016-6624 + CVE-2016-6625 + CVE-2016-6626 + CVE-2016-6627 + CVE-2016-6628 + CVE-2016-6629 + CVE-2016-6630 + CVE-2016-6631 + CVE-2016-6632 + CVE-2016-6633 + CVE-2016-9847 + CVE-2016-9848 + CVE-2016-9849 + CVE-2016-9850 + CVE-2016-9851 + CVE-2016-9852 + CVE-2016-9853 + CVE-2016-9854 + CVE-2016-9855 + CVE-2016-9856 + CVE-2016-9857 + CVE-2016-9858 + CVE-2016-9859 + CVE-2016-9860 + CVE-2016-9861 + CVE-2016-9862 + CVE-2016-9863 + CVE-2016-9864 + CVE-2016-9865 + CVE-2016-9866 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 56f02b0417..486da2ff50 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 02 Jan 2017 15:13:23 +0000 +Wed, 11 Jan 2017 22:43:24 +0000