diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-05.xml new file mode 100644 index 0000000000..91858eb0f8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-05.xml @@ -0,0 +1,70 @@ + + + + FFmpeg: Multiple vulnerabilities + Multiple vulnerabilities have been found in FFmpeg, the worst of + which allows remote attackers to execute arbitrary code. + + ffmpeg + 2017-05-09 + 2017-05-09: 1 + 608868 + 610810 + remote + + + 3.2.4 + 3.2.4 + + + 1.10.4 + 1.10.4 + + + +

FFmpeg is a complete, cross-platform solution to record, convert and + stream audio and video. +

+
+ +

Multiple vulnerabilities have been discovered in FFmpeg. Please review + the CVE identifiers referenced below for details. +

+ +

gst-plugins-libav is affected because this package is bundling a + vulnerable FFmpeg version. +

+
+ +

A remote attacker could entice a user or automated system using FFmpeg + to process a specially crafted file, resulting in the execution of + arbitrary code or a Denial of Service. +

+
+ +

There is no known workaround at this time.

+
+ +

All FFmpeg users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-3.2.4" + + +

All gst-plugins-libav users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=media-plugins/gst-plugins-libav-1.10.4" + + +
+ + CVE-2017-5024 + CVE-2017-5025 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-06.xml new file mode 100644 index 0000000000..821d1a35cd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-06.xml @@ -0,0 +1,72 @@ + + + + Mozilla Firefox: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the + worst of which may allow execution of arbitrary code. + + firefox + 2017-05-09 + 2017-05-09: 1 + 611976 + remote + + + 45.8.0 + 45.8.0 + + + 45.8.0 + 45.8.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla + Project. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, bypass + access restriction, access otherwise protected information, or spoof + content via multiple vectors. +

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-45.8.0" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-45.8.0" + + +
+ + CVE-2017-5398 + CVE-2017-5400 + CVE-2017-5401 + CVE-2017-5402 + CVE-2017-5404 + CVE-2017-5405 + CVE-2017-5407 + CVE-2017-5408 + CVE-2017-5410 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-07.xml new file mode 100644 index 0000000000..10f7c6fafb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-07.xml @@ -0,0 +1,75 @@ + + + + Mozilla Thunderbird: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, + the worst of which could lead to the execution of arbitrary code. + + thunderbird,mozilla + 2017-05-09 + 2017-05-09: 1 + 611954 + remote + + + 45.8.0 + 45.8.0 + + + 45.8.0 + 45.8.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the + Mozilla project. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. + Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by enticing a user to open a specially crafted email + or web page, could possibly execute arbitrary code with the privileges of + the process, cause a Denial of Service condition, spoof content or obtain + sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-45.8.0" + + +

All Mozilla Thunderbird binary users should upgrade to the latest + version: +

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=mail-client/thunderbird-bin-45.8.0" + + +
+ + CVE-2017-5398 + CVE-2017-5400 + CVE-2017-5401 + CVE-2017-5402 + CVE-2017-5404 + CVE-2017-5405 + CVE-2017-5407 + CVE-2017-5408 + CVE-2017-5410 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-08.xml new file mode 100644 index 0000000000..1f598eebf2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-08.xml @@ -0,0 +1,61 @@ + + + + libav: Multiple vulnerabilities + Multiple vulnerabilities have been found in libav, the worst of + which may allow execution of arbitrary code. + + libav + 2017-05-09 + 2017-05-09: 1 + 552320 + 571870 + 600706 + remote + + + 11.8 + 11.8 + + + +

Libav is a complete solution to record, convert and stream audio and + video. +

+
+ +

Multiple vulnerabilities have been discovered in libav. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted media + file in an application linked against libav, possibly resulting in + execution of arbitrary code with the privileges of the application, a + Denial of Service condition or access the content of arbitrary local + files. +

+
+ +

There is no known workaround at this time.

+
+ +

All libav users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/libav-11.8" + + +
+ + CVE-2015-3395 + CVE-2015-3417 + CVE-2016-1897 + CVE-2016-1898 + CVE-2016-2326 + CVE-2016-3062 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-09.xml new file mode 100644 index 0000000000..5ea908a81c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-09.xml @@ -0,0 +1,83 @@ + + + + Apache Tomcat: Multiple vulnerabilities + Multiple vulnerabilities have been found in Apache Tomcat, the + worst of which could lead to privilege escalation. + + tomcat + 2017-05-18 + 2017-05-18: 1 + 575796 + 586966 + 595978 + 615868 + local, remote + + + 8.0.36 + 7.0.70 + 8.0.36 + + + +

Apache Tomcat is a Servlet-3.0/JSP-2.2 Container.

+
+ +

Multiple vulnerabilities have been discovered in Tomcat. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker may be able to cause a Denial of Service condition, + obtain sensitive information, bypass protection mechanisms and + authentication restrictions. +

+ +

A local attacker, who is a tomcat’s system user or belongs to + tomcat’s group, could potentially escalate privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All Apache Tomcat users have to manually check their Tomcat runscripts + to make sure that they don’t use an old, vulnerable runscript. In + addition: +

+ +

All Apache Tomcat 7 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-7.0.70:7" + + +

All Apache Tomcat 8 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/tomcat-8.0.36:8" + + +
+ + CVE-2015-5174 + CVE-2015-5345 + CVE-2015-5346 + CVE-2015-5351 + CVE-2016-0706 + CVE-2016-0714 + CVE-2016-0763 + CVE-2016-1240 + CVE-2016-3092 + CVE-2016-8745 + CVE-2017-5647 + CVE-2017-5648 + CVE-2017-5650 + CVE-2017-5651 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-10.xml new file mode 100644 index 0000000000..727cf07cf0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-10.xml @@ -0,0 +1,120 @@ + + + + GStreamer plug-ins: User-assisted execution of arbitrary code + Multiple vulnerabilities have been found in various GStreamer + plug-ins, the worst of which could lead to the execution of arbitrary code. + + gstreamer,gst-plugins + 2017-05-18 + 2017-05-18: 1 + 600142 + 601354 + remote + + + 1.10.3 + 1.10.3 + + + 1.10.3 + 1.10.3 + + + 1.10.3 + 1.10.3 + + + 1.10.3 + 1.10.3 + + + +

The GStreamer plug-ins provide decoders to the GStreamer open source + media framework. +

+
+ +

Multiple vulnerabilities have been discovered in various GStreamer + plug-ins. Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user or automated system using a + GStreamer plug-in to process a specially crafted file, resulting in the + execution of arbitrary code or a Denial of Service. +

+
+ +

There is no known workaround at this time.

+
+ +

All gst-plugins-bad users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=media-libs/gst-plugins-bad-1.10.3:1.0" + + +

All gst-plugins-good users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=media-libs/gst-plugins-good-1.10.3:1.0" + + +

All gst-plugins-base users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=media-libs/gst-plugins-base-1.10.3:1.0" + + +

All gst-plugins-ugly users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=media-libs/gst-plugins-ugly-1.10.3:1.0" + + +
+ + + CVE-2016-10198 + + + CVE-2016-10199 + + CVE-2016-9445 + CVE-2016-9446 + CVE-2016-9447 + CVE-2016-9634 + CVE-2016-9635 + CVE-2016-9636 + CVE-2016-9807 + CVE-2016-9808 + CVE-2016-9809 + CVE-2016-9810 + CVE-2016-9811 + CVE-2016-9812 + CVE-2016-9813 + CVE-2017-5837 + CVE-2017-5838 + CVE-2017-5839 + CVE-2017-5840 + CVE-2017-5841 + CVE-2017-5842 + CVE-2017-5843 + CVE-2017-5844 + CVE-2017-5845 + CVE-2017-5846 + CVE-2017-5847 + CVE-2017-5848 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-11.xml new file mode 100644 index 0000000000..1984fe580d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-11.xml @@ -0,0 +1,75 @@ + + + + Xen: Multiple vulnerabilities + Multiple vulnerabilities have been found in Xen, the worst of which + could allow for privilege escalation. + + xen + 2017-05-26 + 2017-05-26: 1 + 615980 + local + + + 4.7.2-r1 + 4.7.2-r1 + + + 4.7.2 + 4.7.2 + + + 4.7.2 + 4.7.2 + + + +

Xen is a bare-metal hypervisor.

+
+ +

Multiple vulnerabilities have been discovered in Xen. Please review the + CVE identifiers and Xen Security Advisory referenced below for details. +

+
+ +

A local attacker could potentially execute arbitrary code with + privileges of Xen (QEMU) process on the host, gain privileges on the host + system, or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Xen users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.7.2-r1:0" + + +

All Xen Tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-tools-4.7.2:0" + + +

All Xen pvgrub users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-emulation/xen-pvgrub-4.7.2:0" + + +
+ + CVE-2017-8903 + CVE-2017-8904 + CVE-2017-8905 + + BlueKnight + BlueKnight +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-12.xml new file mode 100644 index 0000000000..a9b7a5846f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-12.xml @@ -0,0 +1,59 @@ + + + + Adobe Flash Player: Multiple vulnerabilities + Multiple vulnerabilities have been found in Adobe Flash Player, the + worst of which allows remote attackers to execute arbitrary code. + + adobe-flash + 2017-05-26 + 2017-05-26: 1 + 617968 + remote + + + 25.0.0.171 + 25.0.0.171 + + + +

The Adobe Flash Player is a renderer for the SWF file format, which is + commonly used to provide interactive websites. +

+
+ +

Multiple vulnerabilities have been discovered in Adobe Flash Player. + Please review the CVE identifiers referenced below for details. +

+ +
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or bypass security restrictions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Adobe Flash Player users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-25.0.0.171 :22" + + +
+ + CVE-2017-3068 + CVE-2017-3069 + CVE-2017-3070 + CVE-2017-3071 + CVE-2017-3072 + CVE-2017-3073 + CVE-2017-3074 + + BlueKnight + BlueKnight +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-13.xml new file mode 100644 index 0000000000..f807980a36 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-13.xml @@ -0,0 +1,51 @@ + + + + Teeworlds: Remote execution of arbitrary code on client + Teeworlds client vulnerability in snap handling could result in + execution of arbitrary code. + + teeworlds + 2017-05-26 + 2017-05-26: 2 + 600178 + remote + + + 0.6.4 + 0.6.4 + + + +

Teeworlds is an online multi-player platform 2D shooter.

+
+ +

Teeworlds client contains a vulnerability allowing a malicious server to + execute arbitrary code, or write to arbitrary physical memory via the + CClient::ProcessServerPacket method. +

+
+ +

A remote malicious server can write to arbitrary physical memory + locations and possibly execute arbitrary if a vulnerable client joins the + server. +

+
+ +

There is no known workaround at this time.

+
+ +

All Teeworlds users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=games-action/teeworlds-0.6.4:0" + + +
+ + CVE-2016-9400 + + BlueKnight + BlueKnight +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-14.xml new file mode 100644 index 0000000000..d41d227e92 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-14.xml @@ -0,0 +1,49 @@ + + + + Smb4K: Arbitrary command execution as root + A vulnerability in Smb4K could allow local attackers to execute + commands as root. + + smb4k + 2017-05-26 + 2017-05-26: 2 + 618106 + local + + + 1.2.3-r1 + 1.2.3-r1 + + + +

Smb4K is a SMB/CIFS (Windows) share browser for KDE.

+
+ +

Smb4k contains a logic flaw in which mount helper binary does not + properly verify the mount command it is being asked to run. +

+
+ +

A local user can execute commands with the root privilege due to the + mount helper being installed as suid. +

+
+ +

There is no known workaround at this time.

+
+ +

All Smb4K users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/smb4k-1.2.3-r1:4" + + +
+ + CVE-2017-8849 + + BlueKnight + BlueKnight +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml new file mode 100644 index 0000000000..688fe87ccf --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201705-15.xml @@ -0,0 +1,57 @@ + + + + sudo: Privilege escalation + A vulnerability in sudo allows local users to gain root privileges. + sudo,privilege + 2017-05-30 + 2017-05-30: 1 + 620182 + local + + + 1.8.20_p1 + 1.8.20_p1 + + + +

sudo (su “do”) allows a system administrator to delegate authority + to give certain users (or groups of users) the ability to run some (or + all) commands as root or another user while providing an audit trail of + the commands and their arguments. +

+
+ +

Qualys discovered a vulnerability in sudo’s get_process_ttyname() for + Linux, that via sudo_ttyname_scan() can be directed to use a + user-controlled, arbitrary tty device during its traversal of “/dev” + by utilizing the world-writable /dev/shm. +

+
+ +

A local attacker can pretend that his tty is any character device on the + filesystem, and after two race conditions, an attacker can pretend that + the controlled tty is any file on the filesystem allowing for privilege + escalation +

+
+ +

There is no known workaround at this time.

+
+ +

All sudo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/sudo-1.8.20_p1" + + +
+ + + CVE-2017-1000367 + + + K_F + K_F +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index cc7b2c5fee..cc5d47a2b2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 08 May 2017 18:09:03 +0000 +Wed, 31 May 2017 20:08:57 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 5f6cee49ca..ae68b5bd77 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -897a88bc971653dc30260f5432ee7d29adee1c07 1494188470 2017-05-07T20:21:10+00:00 +742dfe25646ca49d62bb5f6452a3600f934c798d 1496157625 2017-05-30T15:20:25+00:00