mirror of
https://github.com/flatcar/scripts.git
synced 2025-10-01 10:31:37 +02:00
bump(metadata/glsa): sync with upstream
This commit is contained in:
parent
f1c0fc9283
commit
ad734b5315
@ -1,23 +1,23 @@
|
||||
-----BEGIN PGP SIGNED MESSAGE-----
|
||||
Hash: SHA512
|
||||
|
||||
MANIFEST Manifest.files.gz 449647 BLAKE2B 8803d7d7f47c464cfd8f60beebc66a2a666a58eced0da3542b3aa3258b2801c9603a06ee88dc1b3d88b18763967fd4df415a2267ef2059485f617f508c374276 SHA512 19ad2e1287d270dc62f5d69c91b20e5b243af42fac29e8d0aef1d81bebaee04f64f471f8dadc1f923158b7380eb0face42df28d6a6f48575d0150c58354966e3
|
||||
TIMESTAMP 2019-11-22T17:38:48Z
|
||||
MANIFEST Manifest.files.gz 450288 BLAKE2B 3798da941a15fcee18382da626450662d799e35257d8ad4a0b1552a6ddaae69d623b969c7ea2a3ff528f29e7ea6067f37208f6499dc6674753bd8f0bc73ac9b6 SHA512 c989a03018fd5d5d0ec3658457962a1285eb9736eaf370cd03c34b1c2e6807a141280958db2771efc54eda1120570c478512f7e244686722c0c6fc53bcfde64c
|
||||
TIMESTAMP 2019-11-25T18:08:47Z
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
|
||||
iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl3YHShfFIAAAAAALgAo
|
||||
iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl3cGK9fFIAAAAAALgAo
|
||||
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx
|
||||
RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY
|
||||
klB87w//UoGHDGr8v7UijB9Op29ia5ExY66P8cQLQah48TTTzUFJuhW+1cxaxuM8
|
||||
8TtUbHf7n6HwmFs35WrsjI3zDMYxz67gKQtu4sCEDBvq0k/7wOmVomxa6Idt+ADC
|
||||
BfmkdbYLiRDpnBc3l/uLgMCrocUTmrCoH/BjDAlh0tW8ViuQ1ah72dtmhwOPtkkK
|
||||
mH4PPzOFPujoIGwn7lgQE2MPinExpgQ1x31mMNUvqld2OXMmm1VrjcF7LD6WxjuL
|
||||
gAFcPnVf8ru/H/gMD14/VZ1Lkf7a7jV3aDOZk7dj+0+G9rDRWMcnLga+N3nnlizk
|
||||
8I2E3mGM6U858gc7TZkPxycsV35PGCCOWg9HoHRDkjfe5gCR97tVHrREBPnUa8hT
|
||||
fbSRic6HO0fLb4tX3w7y4GdiUDeQ9IarZngkbWpy8ZDRFhIonYDj8N1drWfSQu15
|
||||
lwGu3s7R2HAhGfO3HxhXuHpbmxf3TQlayBASyXofp3zx+hCCUdKXD/O+NwfqNveE
|
||||
57SQ3lW0kEWL2jQgvocn4LiMzrDuMImAiwubcY5nfXaQZWwjSIV1T+MVcC/kb9Yt
|
||||
JzKWlTFOl8eaNnjiXA8wMU4cLNFW4v9OQfrqrKUT8kO3nWkB20aiqPJxp0XRRA+B
|
||||
jR1SxQVNdu2P2JmJOpuS0m5ybAubZ0oIG0Y0VtqRYIboolBXjFQ=
|
||||
=uGfw
|
||||
klD6eBAApy6F7OqvbNHOVDfc0l99xjuiTuxAyp5DZ87Z0b635086T9+HLyFh2TuW
|
||||
FlVMqkPe05RVyOH6Tq+fEmixQfzWucRdFCV9IpAdzIgLCue/4Ey1v/mZhoYqj3ve
|
||||
2JUrfCmYKNU1N5qqdkSqdHG88wH/XjABodvPJLC3pgAMVQZ0Ln/t0HGwDr+q/zo8
|
||||
N6sUV34fvm8aF5qQfJCyaoOTmJQNDAuZ7t0Dcfz8XlHCgOFSsW03gyIxeUJfdaRW
|
||||
ADn0WJGAgyXhtMdQJMTRZ5H3n79B9VaNOJAuSR1SHv6MZf0ARgYpAT9QeQE1LH4y
|
||||
CMQfmqHu/pHGJxAxOqV4Q7/bV6Ppv5iIXjCysEA66ySGLn/ZSX/aMssooe9l/ymi
|
||||
rMkbovWSnq4B4o6JwqtRFONliQ/N/axJWTn9hcndsJRqv/kF5AVSXyogBMQQb8rR
|
||||
hz76WpLx9ccwnFnrfRLLOBY1MVBSrBH7cj5jEv/uK26E48CwACJjDvJ6FREAJzx7
|
||||
AWyGIGFS0fEwOiBEYWzLb46CsWNPMqm9js2002ygUe/FgnOQ0GwxX5y2UMvPn58h
|
||||
1tHsy+RYTGE7VkKCMvw7RdNZZ3zDu1Zi/iFIArK4gtgrD7Ojf/XPNcpNVQz3MSh9
|
||||
GJe1zeh4iKwlMJnsMydIP3UZTSc7V85Y/+t5JEYCj72swdPbr8U=
|
||||
=AYYs
|
||||
-----END PGP SIGNATURE-----
|
||||
|
Binary file not shown.
50
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-05.xml
vendored
Normal file
50
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-05.xml
vendored
Normal file
@ -0,0 +1,50 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201911-05">
|
||||
<title>Adobe Flash Player: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the
|
||||
worst of which could result in the arbitrary execution of code.
|
||||
</synopsis>
|
||||
<product type="ebuild">adobe,flash</product>
|
||||
<announced>2019-11-25</announced>
|
||||
<revised count="1">2019-11-25</revised>
|
||||
<bug>694352</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="www-plugins/adobe-flash" auto="yes" arch="*">
|
||||
<unaffected range="ge">32.0.0.255</unaffected>
|
||||
<vulnerable range="lt">32.0.0.255</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>The Adobe Flash Player is a renderer for the SWF file format, which is
|
||||
commonly used to provide interactive websites.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Adobe Flash Player.
|
||||
Please review the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>Please review the referenced CVE identifiers for details.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Adobe Flash Player users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose
|
||||
">=www-plugins/adobe-flash-32.0.0.255"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-8069">CVE-2019-8069</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-8070">CVE-2019-8070</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2019-10-26T20:58:44Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2019-11-25T00:10:47Z">b-man</metadata>
|
||||
</glsa>
|
135
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-06.xml
vendored
Normal file
135
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-06.xml
vendored
Normal file
@ -0,0 +1,135 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201911-06">
|
||||
<title>Chromium, Google Chrome: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in Chromium and Google
|
||||
Chrome, the worst of which could result in the arbitrary execution of code.
|
||||
</synopsis>
|
||||
<product type="ebuild">chromium,chrome,google</product>
|
||||
<announced>2019-11-25</announced>
|
||||
<revised count="1">2019-11-25</revised>
|
||||
<bug>692916</bug>
|
||||
<bug>694002</bug>
|
||||
<bug>694954</bug>
|
||||
<bug>697506</bug>
|
||||
<bug>698398</bug>
|
||||
<bug>699068</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="www-client/chromium" auto="yes" arch="*">
|
||||
<unaffected range="ge">78.0.3904.87</unaffected>
|
||||
<vulnerable range="lt">78.0.3904.87</vulnerable>
|
||||
</package>
|
||||
<package name="www-client/google-chrome" auto="yes" arch="*">
|
||||
<unaffected range="ge">78.0.3904.87</unaffected>
|
||||
<vulnerable range="lt">78.0.3904.87</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Chromium is an open-source browser project that aims to build a safer,
|
||||
faster, and more stable way for all users to experience the web.
|
||||
</p>
|
||||
|
||||
<p>Google Chrome is one fast, simple, and secure browser for all your
|
||||
devices.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Chromium and Google
|
||||
Chrome. Please review the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>Please review the referenced CVE identifiers for details.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Chromium users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose
|
||||
">=www-client/chromium-78.0.3904.87"
|
||||
</code>
|
||||
|
||||
<p>All Google Chrome users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose
|
||||
">=www-client/google-chrome-78.0.3904.87"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13659">CVE-2019-13659</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13660">CVE-2019-13660</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13661">CVE-2019-13661</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13662">CVE-2019-13662</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13663">CVE-2019-13663</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13664">CVE-2019-13664</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13665">CVE-2019-13665</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13666">CVE-2019-13666</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13667">CVE-2019-13667</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13668">CVE-2019-13668</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13669">CVE-2019-13669</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13670">CVE-2019-13670</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13671">CVE-2019-13671</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13673">CVE-2019-13673</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13674">CVE-2019-13674</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13675">CVE-2019-13675</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13676">CVE-2019-13676</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13677">CVE-2019-13677</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13678">CVE-2019-13678</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13679">CVE-2019-13679</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13680">CVE-2019-13680</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13681">CVE-2019-13681</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13682">CVE-2019-13682</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13683">CVE-2019-13683</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13685">CVE-2019-13685</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13686">CVE-2019-13686</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13687">CVE-2019-13687</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13688">CVE-2019-13688</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13693">CVE-2019-13693</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13694">CVE-2019-13694</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13695">CVE-2019-13695</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13696">CVE-2019-13696</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13697">CVE-2019-13697</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13699">CVE-2019-13699</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13700">CVE-2019-13700</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13701">CVE-2019-13701</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13703">CVE-2019-13703</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13704">CVE-2019-13704</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13705">CVE-2019-13705</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13706">CVE-2019-13706</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13707">CVE-2019-13707</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13708">CVE-2019-13708</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13709">CVE-2019-13709</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13710">CVE-2019-13710</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13711">CVE-2019-13711</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13713">CVE-2019-13713</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13714">CVE-2019-13714</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13715">CVE-2019-13715</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13716">CVE-2019-13716</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13717">CVE-2019-13717</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13718">CVE-2019-13718</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13719">CVE-2019-13719</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13721">CVE-2019-13721</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5869">CVE-2019-5869</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5870">CVE-2019-5870</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5871">CVE-2019-5871</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5872">CVE-2019-5872</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5873">CVE-2019-5873</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5874">CVE-2019-5874</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5875">CVE-2019-5875</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5876">CVE-2019-5876</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5877">CVE-2019-5877</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5878">CVE-2019-5878</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5879">CVE-2019-5879</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5880">CVE-2019-5880</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5881">CVE-2019-5881</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2019-10-26T19:59:08Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2019-11-25T00:13:45Z">b-man</metadata>
|
||||
</glsa>
|
66
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-07.xml
vendored
Normal file
66
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-07.xml
vendored
Normal file
@ -0,0 +1,66 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201911-07">
|
||||
<title>Mozilla Firefox: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in Mozilla Firefox, the
|
||||
worst of which could result in the arbitrary execution of code.
|
||||
</synopsis>
|
||||
<product type="ebuild">firefox</product>
|
||||
<announced>2019-11-25</announced>
|
||||
<revised count="1">2019-11-25</revised>
|
||||
<bug>693442</bug>
|
||||
<bug>698512</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="www-client/firefox" auto="yes" arch="*">
|
||||
<unaffected range="ge">68.2.0</unaffected>
|
||||
<vulnerable range="lt">68.2.0</vulnerable>
|
||||
</package>
|
||||
<package name="www-client/firefox-bin" auto="yes" arch="*">
|
||||
<unaffected range="ge">68.2.0</unaffected>
|
||||
<vulnerable range="lt">68.2.0</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Mozilla Firefox is a popular open-source web browser from the Mozilla
|
||||
Project.
|
||||
</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Mozilla Firefox. Please
|
||||
review the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>Please review the referenced CVE identifiers for details.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Firefox users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=www-client/firefox-68.2.0"
|
||||
</code>
|
||||
|
||||
<p>All Firefox binary users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=www-client/firefox-bin-68.2.0"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2019-09-22T23:21:18Z">b-man</metadata>
|
||||
<metadata tag="submitter" timestamp="2019-11-25T00:16:53Z">b-man</metadata>
|
||||
</glsa>
|
48
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-08.xml
vendored
Normal file
48
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-08.xml
vendored
Normal file
@ -0,0 +1,48 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="201911-08">
|
||||
<title>Expat: Multiple vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been found in Expat, the worst of
|
||||
which could result in a Denial of Service condition.
|
||||
</synopsis>
|
||||
<product type="ebuild">expat</product>
|
||||
<announced>2019-11-25</announced>
|
||||
<revised count="1">2019-11-25</revised>
|
||||
<bug>688734</bug>
|
||||
<bug>694362</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="dev-libs/expat" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.2.8</unaffected>
|
||||
<vulnerable range="lt">2.2.8</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Expat is a set of XML parsing libraries.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Expat. Please review
|
||||
the CVE identifiers referenced below for details.
|
||||
</p>
|
||||
</description>
|
||||
<impact type="normal">
|
||||
<p>Please review the referenced CVE identifiers for details.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Expat users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-libs/expat-2.2.8"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2019-09-24T11:38:45Z">whissi</metadata>
|
||||
<metadata tag="submitter" timestamp="2019-11-25T00:18:23Z">b-man</metadata>
|
||||
</glsa>
|
@ -1 +1 @@
|
||||
Fri, 22 Nov 2019 17:38:45 +0000
|
||||
Mon, 25 Nov 2019 18:08:44 +0000
|
||||
|
@ -1 +1 @@
|
||||
435541275775881e78e6acc96aca7536a5955224 1574160598 2019-11-19T10:49:58+00:00
|
||||
751af6f91da06f53265195cff434eb66a145af73 1574641117 2019-11-25T00:18:37+00:00
|
||||
|
Loading…
x
Reference in New Issue
Block a user