diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index f1e0751125..b477c9f4f9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 441860 BLAKE2B 42660ae46077e4a9e7437540059276e5d8c03bba0cbf41ae4d1528525d01c1f1aa20986d326ca29f6b004f9ed6d1432a8d0d2105937171bf162dea272120291b SHA512 1f444ca7421a7efb1ae619b481942be43c32f3ca1b877de6feb5d595fd24bd2f5594ee8a4f3f194f5a5b6f9006b608396118df784309aa0cc2de9b3e6a17424a -TIMESTAMP 2019-04-17T20:08:50Z +MANIFEST Manifest.files.gz 442494 BLAKE2B ea6e4d13fed10b9dc7cd8a15d0158e6d9956295e733d9c58e7ad42757e48c466dcbf29b90a95203fa76be9b2ce5c403a61d560e58c77f3a9def96a74982c8d4f SHA512 822a6f67d551562039f8079880b76f65668f36de8582dd99f5fd15f76cc5aad88c83d341fb2a0b1d48467ad0bc300afe2adef18e2b56f85af07a5740e2e3c648 +TIMESTAMP 2019-04-23T01:38:53Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAly3h9JfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAly+bK1fFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klCosw/+Jsxx5eQYhfqE+nllUNMvYqnA4JGQvF4sx9iE4taLkgObjgtPJtplUmFY -we74NGpt6LzSHq2RBCw8A6Dmely8aHrIR8qI0WX+LzsPfTKBTiMRUFEkP1kbG5SA -MgRROa7kwt8BIMgHbBVjg09ZTZ3TDme7HDitK/a+jtpCaqOtHsGJTVrrzcRyyGj4 -zR//jMy6QFU5z6pQAqcUF8qVy0fAQhGx3Q5vO5/FOFt/vo1VC1fsTRnFPi09wv4s -/hr22RIL/l//CVDCTargPtnXGQGkIualx6ANdvkU5OUsxyppLgMHnt10cJQ21hCS -CWwQOpql6rXJ1t5ziQwzNaQUzjoVGf3yEu09hUjPkuJCMVszI/6xwDec35iRi/19 -9nfVvwlFC3RRCxWTN4928WOSTgCMF9gKQzs1kVuvsENDXq7u9LvXhXdfgg5LK53R -m7LAEPez2Fs++LMp9S7q/ldjM6bksdoN+dMiT9jVYf3mNxR4SRoLaghJ9JTr61Ne -d5XnILqhUz6vIRSqFjZnoF3FVlNK3uubRoh8QUWwHoKCFqMzNeGlpP/6c2YbyQB7 -mfSlVfQN4EuKzDHBv+PAja1oqfTRd8kKfRWpPdFZN4HHeQvRdE3uLyVQMm/BOw2x -uyn2vCYItXQv+Tq3kZ8o9IlsvbczE9Xna0BlRqMEa/6RCUYIrH8= -=6T8P +klBFXBAAmTHnJ+9Kf9ZeiyVnrMWPlcyUFeY0IbrilUWWYRnygvwIYcsHqTOFHVk3 +Qdz3PW71QVXcK1pObQMIoEoT+3XgYa6gcFmNkyfNni3xHNs1gw+yTr+h8hGcsNl7 +AWyODlCZrzLZns9T3ev8UdUPgLpjfPxRMJ76AcAXirxDZIZUo45fd3Lpc8fQ9ZTU +FgPjRuiwONjS6MMNFxoXaoH3fzSKjvLvAgXnnV9ScOy2pVrdXExvCc1LvKxvjb1r +cSoMFJ3RrqVZMCmL5dAQ5Yj5FsYINFrjgWf4d8z/LLx4s8wZ3wc0RsI2Rz2JFVKG +yGstXmE+n0dVkKYfai9ZT4uGQZCjS8/WNXiGShgCzEMR72Dy3GZuwxRijLMclAqs +FqBoz3SQ1Li+WHli2L5AS2FDq+xixlx1dREb/Dn7V5V+Rv5mVgFzcUtVSSjtUklw +lggR/RS6ayr4OuHNqslNjOuy6dkncyXK8+17fwskxAKurp9ZHtp263DJ4rA3pkXi +pCCDaqJQs1pOJlfoGp0UKYjrsCMG/QAe/FGhAZoZrgkmttqIm5EHeBRXWnBiOpuG +YqPjhQ1k1F6g8KR2nVtVt1CmEsxv0uHDSpsdR+iIEfMZ6q7qehsSJf944RneqRVw +UBxbtACDiOScMl1LH4bUY78obFeZt6nkSLFQDkJ+BnUj12Vqlc8= +=tjB4 -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 8a1a92e731..765fa663bc 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-20.xml new file mode 100644 index 0000000000..3600d8fe77 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-20.xml @@ -0,0 +1,48 @@ + + + + Apache: Privilege escalation + A vulnerability in Apache might allow an attacker to escalate + privileges. + + apache + 2019-04-22 + 2019-04-22 + 682306 + remote + + + 2.4.39 + 2.4.39 + + + +

The Apache HTTP server is one of the most popular web servers on the + Internet. +

+
+ +

A vulnerability was discovered in Apache with MPM event, worker, or + prefork. +

+
+ +

An attacker could escalate privileges.

+
+ +

There is no known workaround at this time.

+
+ +

All Apache users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.39" + +
+ + CVE-2019-0211 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-21.xml new file mode 100644 index 0000000000..c15ae6a5c4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-21.xml @@ -0,0 +1,46 @@ + + + + SQLite: Remote code execution + A vulnerability in SQLite may allow for the remote execution of + code. + + sqlite + 2019-04-22 + 2019-04-22 + 672942 + remote + + + 3.25.3 + 3.25.3 + + + +

SQLite is a C library that implements an SQL database engine.

+
+ +

An integer overflow was discovered in SQLite’s FTS3 extension.

+
+ +

A remote attacker could, by executing arbitrary SQL statements against a + vulnerable host, execute arbitrary code. +

+
+ +

There is no known workaround at this time.

+
+ +

All SQLite users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/sqlite-3.25.3" + +
+ + CVE-2018-20346 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-22.xml new file mode 100644 index 0000000000..0859caae3d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-22.xml @@ -0,0 +1,50 @@ + + + + OpenDKIM: Root privilege escalation + A vulnerability was discovered in Gentoo's ebuild for OpenDKIM + which could lead to root privilege escalation. + + opendkim + 2019-04-22 + 2019-04-22 + 629914 + remote + + + 2.10.3-r8 + 2.10.3-r8 + + + +

A community effort to develop and maintain a C library for producing + DKIM-aware applications and an open source milter for providing DKIM + service. +

+
+ +

It was discovered that Gentoo’s OpenDKIM ebuild does not properly set + permissions or place the pid file in a safe directory. +

+
+ +

A local attacker could escalate privileges.

+
+ +

Users should ensure the proper permissions are set as discussed in the + referenced bugs. +

+
+ +

All OpenDKIM users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-filter/opendkim-2.10.3-r8" + +
+ + + BlueKnight + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-23.xml new file mode 100644 index 0000000000..9dbde00658 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201904-23.xml @@ -0,0 +1,47 @@ + + + + GLib: Multiple vulnerabilities + Multiple vulnerabilities have been found in GLib, the worst of + which could result in a Denial of Service condition. + + glib + 2019-04-22 + 2019-04-22 + 668474 + remote + + + 2.56.4 + 2.56.4 + + + +

GLib is a library providing a number of GNOME’s core objects and + functions. +

+
+ +

Multiple vulnerabilities have been discovered in GLib. Please review the + referenced bug for details. +

+
+ +

Please review the referenced bugs for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GLib users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/glib-2.56.4" + +
+ + + BlueKnight + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index d7258a36de..a24dea1229 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Wed, 17 Apr 2019 20:08:47 +0000 +Tue, 23 Apr 2019 01:38:49 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 0773d72858..3124361d55 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -6c18ba31f4c4516ed01d1b3ca04795cfadc11f86 1555526007 2019-04-17T18:33:27+00:00 +76232d72230fb0f05eaefd8d7f5efcf5b14047c1 1555976179 2019-04-22T23:36:19+00:00