diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 670e7c304f..53261d6d0d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 435197 BLAKE2B 5ef1f755677fba588afa252a22622c045d099b3f39fb6b356786170399bb20e8c58212856a5ddc6f59dc6076e3f84a95376a4dc3b4d5154c7d540151a154c88a SHA512 fb541e904c3c6b5ec17c08e76f9ce1dcd0d8f0b31dee092dd3542b9a34a04890e9a1b1e6b0d78d3523fb451deb84b3316ae6b588a29aec6f4741dfb52941ecc9 -TIMESTAMP 2018-12-31T15:38:40Z +MANIFEST Manifest.files.gz 436466 BLAKE2B 1592f1e1bb1660fe56598a716be2722c8f9b14d74fcc7bf4086935ca129dff18da9e9a7deb43b3b3ab5e34487a04b37269914fde19e2c86f3d80a1165fc058e0 SHA512 814ba1ee894cf6c7438051199c5078a6339901cdea60b6848add142bf264fc54ba915b91229a96a1404f81bdbc5177e162144d5b97ce8351358c43ca91c86df7 +TIMESTAMP 2019-03-11T01:38:51Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlwqOABfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlyFvCtfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klBxRBAAtUgUnM+koOIrHy98B5Uj8vQ0YUz+hHXxfPZ5I3DjG138tNv+kSSfZtZ1 -VC9QQSG0svtCjDOUG1CZ6b31Kf1ySFALtcelgTgNp8Y8R1CqoC0UIhd6jhxIEzU3 -QThllPuldQOr8pOf/3pxDO0gZ/eeXeBF2rnrDq8nDkkqLNTnPBg998fJZGLFTi+S -yWYh4Dtyq53TbbQ4tjKwFL8MZnIv9tDt5Xol6socrhWdZvScnpoHgg7W5+LemdYb -J/CGgtl9LYn9xvUCCKl5YV/BF3rLH1tJUdZHDrcl1jqSSnmF59uQ17XDOyb47xZH -bPU9gxGNvqdDdizqb8mRKILzQqzzBuSiOshuSO29wX4Xh+GcO76JBamw9U6B8O+O -G+IjxAN9HaDj0nRzzCqQkhkBpN4dNsySt1bYyqzcTXaLUre6EQAerQE943exCQGX -p+UiE4as/EMg6S1EA95K/hshidQHXMbCpqzoK4BCJ9AXgm3WULAJy6JhTEma+4M4 -7cIKiGtl4G61SxVCt/hVjqKKUZVkjUMo/+PMyclJ1Xrhgomxs1Pv+waX6RQ7ldgs -dBALSFUehLiBDCC1HTSUEniPjDmgNNaAclze37jLhjOZUoVaiCDD6wuLHqIFajlC -nLejRPqU6qWCOk6ig6UgA68G48Ttf7WXSZ9i/3d1Tw5B5ASWAMM= -=qJUW +klAPHA/+P/U8xHLyUo0llv8FWLgjEhNDQzpJYEckpNbjTTLXZueHWKItVRvIgY+O +VVLeZp4MgQih16YB1lIzYwDMcsYdt1kk/5oytqjkpNgLeude+G5Z65cLw0C1//Y2 +1+yXTiWs6XpWdVqh3Or7/muHcxpoyxHtVBbbAThx3uv8sgsCEKFxdEC5TTod/i3s ++5syLAHAy/0EAO5H3WUEiuh9PZCEZZ+2j9VKLySNQQa6IoYAweXxBQ7+B+ongJAZ +s5r/34AiXM3bE7OREc/RnbbtRbjY080BHzrUetFPKdFEH1cNYd/L9OwRqz+j9HpN +S9MKO0BMn1Lt/osnAIiPiiRW4/QM9rVSe1yx6gqn4+Z8bubVYEn964Ryo+TRGYOJ +eMpf49JbNFjRfqyhr4F/NZpAyxl6m2d1rnI754hgRvAtq/QFZ6777IBGMKePRoqj +Z8te+9hP8PG8AJsgx5ZSJXRC0qxhLYPSVx6fVsY+eRe/ykLZdpUz7jZP63xSsz7r +sTrA0e10kMp9u9vBzzni8OI8hUratTZLxlTgucNeytXCjCpZh+8XBBTNZD3JwYaG +j/pr8JOXrIJ626TQ3lqfTLXc+fwC38/r6hLm1QWuR2fP57V4aXRmJmn99RROb5cX +tZNVNGO+xhaQzhBq+3P8ycPDtC1I1x4XQEFLtyFJUIFeCkak3Fk= +=J9ze -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index b87f67ec61..3834742efd 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-01.xml new file mode 100644 index 0000000000..beacb00e0b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-01.xml @@ -0,0 +1,55 @@ + + + + Keepalived: Multiple vulnerabilities + Multiple vulnerabilities have been found in Keepalived, the worst + of which could allow an attacker to cause Denial of Service condition. + + keepalived + 2019-03-10 + 2019-03-10 + 670856 + local, remote + + + 2.0.10 + 2.0.10 + + + +

Keepalived is a strong & robust keepalive facility to the Linux + Virtual Server project. +

+
+ +

Multiple vulnerabilities have been discovered in keepalived. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could send a specially crafted request possibly + resulting in a Denial of Service condition. A local attacker could + perform symlink attacks to overwrite arbitrary files with the privileges + of the user running the application. +

+
+ +

There is no known workaround at this time.

+
+ +

All Keepalived users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-cluster/keepalived-2.0.10" + +
+ + CVE-2018-19044 + CVE-2018-19045 + CVE-2018-19046 + CVE-2018-19115 + + whissi + pinkbyte +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-02.xml new file mode 100644 index 0000000000..11ae0246fe --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-02.xml @@ -0,0 +1,62 @@ + + + + Zsh: User-assisted execution of arbitrary code + Input validation errors in Zsh could result in arbitrary code + execution. + + zsh + 2019-03-10 + 2019-03-10 + 665278 + local, remote + + + 5.6 + 5.6 + + + +

A shell designed for interactive use, although it is also a powerful + scripting language. +

+
+ +

Two input validation errors have been discovered in how Zsh parses + scripts: +

+ + +
+ +

An attacker could entice a user to execute a specially crafted script + using Zsh, possibly resulting in execution of arbitrary code with the + privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All Zsh users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-shells/zsh-5.6" + + +
+ + CVE-2018-0502 + CVE-2018-13259 + + Zlogene + ackle +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-03.xml new file mode 100644 index 0000000000..eb2941f015 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-03.xml @@ -0,0 +1,53 @@ + + + + cURL: Multiple vulnerabilities + Multiple vulnerabilities have been found in cURL, the worst of + which could result in a Denial of Service condition. + + curl + 2019-03-10 + 2019-03-10 + 665292 + 670026 + 677346 + remote + + + 7.64.0 + 7.64.0 + + + +

A command line tool and library for transferring data with URLs.

+
+ +

Multiple vulnerabilities have been discovered in cURL. Please review the + CVE identifiers referenced below for details. +

+
+ +

Remote attackers could cause a Denial of Service condition.

+
+ +

There is no known workaround at this time.

+
+ +

All cURL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.64.0" + +
+ + CVE-2018-14618 + CVE-2018-16839 + CVE-2018-16840 + CVE-2018-16842 + CVE-2019-3822 + CVE-2019-3823 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-04.xml new file mode 100644 index 0000000000..14dee74c7b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-04.xml @@ -0,0 +1,73 @@ + + + + Mozilla Firefox: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the + worst of which may allow execution of arbitrary code. + + firefox + 2019-03-10 + 2019-03-10 + 672956 + 676892 + 677856 + remote + + + 60.5.1 + 60.5.1 + + + 60.5.1 + 60.5.1 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla + Project. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to view a specially crafted web + page possibly resulting in the execution of arbitrary code with the + privileges of the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla FireFox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-60.5.1" + + +

All Mozilla FireFox bin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-60.5.1" + +
+ + CVE-2018-12405 + CVE-2018-18356 + CVE-2018-18492 + CVE-2018-18493 + CVE-2018-18494 + CVE-2018-18498 + CVE-2018-18500 + CVE-2018-18501 + CVE-2018-18505 + CVE-2019-5785 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-05.xml new file mode 100644 index 0000000000..106046f3f7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-05.xml @@ -0,0 +1,50 @@ + + + + Tar: Denial of Service + A vulnerability in Tar could led to a Denial of Service condition. + tar + 2019-03-10 + 2019-03-10 + 674210 + local + + + 1.30-r1 + 1.30-r1 + + + +

The Tar program provides the ability to create and manipulate tar + archives. +

+
+ +

The sparse_dump_region function in sparse.c file in Tar allows an + infinite loop using the --sparse option. +

+
+ +

A local attacker could cause a Denial of Service condition by modifying + a file that is supposed to be archived by a different user’s process + (e.g., a system backup running as root). +

+
+ +

There is no known workaround at this time.

+
+ +

All Tar users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/tar-1.30-r1" + + +
+ + CVE-2018-20482 + + Zlogene + Zlogene +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-06.xml new file mode 100644 index 0000000000..456d057120 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-06.xml @@ -0,0 +1,66 @@ + + + + rdesktop: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in rdesktop, the + worst of which could result in the remote execution of arbitrary code. + + rdesktop + 2019-03-10 + 2019-03-10 + 674558 + remote + + + 1.8.4 + 1.8.4 + + + +

rdesktop is a Remote Desktop Protocol (RDP) Client.

+
+ +

Multiple vulnerabilities have been discovered in rdesktop. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could cause a Denial of Service condition, obtain + sensitive information, or execute arbitrary code. +

+
+ +

There is no known workaround at this time.

+
+ +

All rdesktop users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/rdesktop-1.8.4" + +
+ + CVE-2018-20174 + CVE-2018-20175 + CVE-2018-20176 + CVE-2018-20177 + CVE-2018-20178 + CVE-2018-20179 + CVE-2018-20180 + CVE-2018-20181 + CVE-2018-20182 + CVE-2018-8791 + CVE-2018-8792 + CVE-2018-8793 + CVE-2018-8794 + CVE-2018-8795 + CVE-2018-8796 + CVE-2018-8797 + CVE-2018-8798 + CVE-2018-8799 + CVE-2018-8800 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-07.xml new file mode 100644 index 0000000000..5ef41e69dd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-07.xml @@ -0,0 +1,52 @@ + + + + systemd: Multiple vulnerabilities + Multiple vulnerabilities have been found in systemd, the worst of + which may allow execution of arbitrary code. + + systemd + 2019-03-10 + 2019-03-10 + 674144 + 677944 + remote + + + 239-r4 + 239-r4 + + + +

A system and service manager.

+
+ +

Multiple vulnerabilities have been discovered in systemd. Please review + the CVE identifiers referenced below for details. +

+
+ +

An attacker could cause a Denial of Service condition or possibly + execute arbitrary code. +

+
+ +

There is no known workaround at this time.

+
+ +

All systemd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/systemd-239-r4" + +
+ + CVE-2018-16864 + CVE-2018-16865 + CVE-2018-16866 + CVE-2019-6454 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-08.xml new file mode 100644 index 0000000000..3793a2326d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-08.xml @@ -0,0 +1,48 @@ + + + + GNU Wget: Password and metadata leak + A vulnerability in GNU Wget which could allow an attacker to obtain + sensitive information. + + wget + 2019-03-10 + 2019-03-10 + 674170 + local + + + 1.20.1 + 1.20.1 + + + +

GNU Wget is a free software package for retrieving files using HTTP, + HTTPS and FTP, the most widely-used Internet protocols. +

+
+ +

A vulnerability was discovered in GNU Wget’s file_metadata in xattr.c.

+
+ +

A local attacker could obtain sensitive information to include + credentials. +

+
+ +

There is no known workaround at this time.

+
+ +

All GNU Wget users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/wget-1.20.1" + +
+ + CVE-2018-20483 + + BlueKnight + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 222264473b..457a6ae6b1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 31 Dec 2018 15:38:36 +0000 +Mon, 11 Mar 2019 01:38:48 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 991ee16872..6dea1110d2 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -baa5a86124960e22df1f11ab63da9f282dd4cdd3 1546204642 2018-12-30T21:17:22+00:00 +579d79ed98752445ffce6122ab66094d1cb0110e 1552251022 2019-03-10T20:50:22+00:00