diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 616795a491..3ddcc7b8e0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 548981 BLAKE2B 81700173ea02c0d006e3065367bd4b6801ae8e0cad7f0b23c4d86a41c1b860a4cbdeb3051fb86eb2d3f114b8ba0353d6e09e279718eed8ed2607a21c4e7ec67d SHA512 a987e0e64b2dbf1006cecbff251dc3524b4d244d2e54417a697139ac9ee5a97d21aefdfb0fb940e1890076d7fa18c793f4f7a60db6960004ade2253826320f19 -TIMESTAMP 2023-10-01T06:40:07Z +MANIFEST Manifest.files.gz 552633 BLAKE2B f04d03cfce30402b87d7525767633e29394130432fcdd26de705b95ca93788a70abca8abbeee435b946253f2ad9b75f01bf24da1998a529bb89a6bbf1fcfc16e SHA512 6b0fd8a9a899a613a7dbab3dc51f5953cd3a0d18a12e17a4fceca64f11be5c7f83763d742dfada845bf1aec1c1467db31c6df823b9bc683d59fbec9a516d285a +TIMESTAMP 2023-11-01T06:40:04Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmUZFEdfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmVB8sRfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klAXgg/9GGU9Zsh5GEuYoepVc11NhqztXU2fyrn8g4OkbIUFdOq45C/NDOzzmYkS -vve4BAhQZkGn6ixII2dbDqQHmvE4x4NFyobSXLRIYFFAbbQBSRUmib3HbDkxoMhb -nTbnNXX5kOq1m6nb3ydnjOKxfgew50dQYT0Yp+Uh9rRtU7sP74KYkseV9p5z+fp1 -+PKY7Nn0G9qANHMgf1YrxC1cgt4WWXXnXJI7YvjcQ/XZJTrAX2oEEGYee8GsLnAn -uGchKTPCbgBG1Dm9vM3jTctUpXKQ1s3B+T0ynciPHzb8IC0M0BvLdCVA1ZM99rCY -CcCJFkITrSBuUrJl3NJUzlYe1XQUH29c0kQe+mR0F4gDjav7gZBE1mKb9lqw/r2A -vLnm4/kF7IYdxVSFgO2B8GvpPvFQW0hiEAkz+GDRnqYeinVmPTRkBR4VqQfQql1T -rBuhQV9wQ/y/NIZq41X/rljjTdTpvtzB5ZSAxg9fOMmgo3WH6wb/k/6fgEK/WSGf -aTH44QoasTboF9kMrgfR+dB/aaTGAuFWC8Ulkjkxh4wE+HsLats2stAYsAnJfXL9 -jiW3dO8vdIvXYeI0Smmuxv6hHIz1ZJn8jvQv+iv+yonIbZEDQsgIBxxFPW5NrhiJ -a1oJARWuMGvHTeYaqAkfPbS7/ew6b5jLWN3174qxqX6HCsnIyF8= -=otvP +klDycxAArpKet3g/jSJskcceOF38byx5QitCsuFUiXggVy/3UtTs2F9QY0awzRyN +daT6+MHgL/oMPDQKOF+Gdnxeks9iWhEENMsUGyi/C4gKb9BHe9KzMCKpz/5YuKLj +mOZUsJjChrTMf97N9zuYFLPt+YhHlidKG2Nfa7oqEzUZed3nJK96QCWfHOKDBS8q +Pa/JAQ1Gca5Lt4vrlVGYreMCWzb0/9QEFex3WpN8K1TVQi4ttwysOI0zNWaUPilr +o4x1yu2z+Iel3khyazx6FpRFlHrqNBOklmz3vkFleok5r+21qfxy05pwUw5a9rJN +FxwyFtflborCepZCEN4k9YrYILk3yxhfrTvCl9GPD2mhqLA8KW3Lek4RZPXur1HK +laMy/d8Ziw/Z9/ksGim+LfVOJ7F0fgUFJxIJJ+eBLGZzz0RzLl64IKEugVxBnoCU +h2S0XiUUQpGGHlMTkQ5LgcWfbtorgZyQbUX4m/iCo0DGg66+7MADow8yRKRXGNQl +SN24MstUnhU7O/6plg35TRel9fhozl2vau5dWIpm/A3znHmyC3IT53Ffjo3dSwYW +tHURmCy7Sz5K1gxB20PsQnt63L+WCya1vhTpF2kCzLivrYjypUXlIbuQXA7AGE7k +ycBJqVGSz36DuCiEX0ckQbiIHreYqUQLjteVE85Y4XQyX4CSjZs= +=bBmm -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 0926db5908..a95cee3f4f 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-01.xml new file mode 100644 index 0000000000..fd23ee422c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-01.xml @@ -0,0 +1,52 @@ + + + + ClamAV: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in ClamAV, the worst of which could result in remote code execution. + clamav + 2023-10-01 + 2023-10-01 + 831083 + 842813 + 894672 + remote + + + 0.103.7 + 0.103.7 + + + +

ClamAV is a GPL virus scanner.

+
+ +

Multiple vulnerabilities have been discovered in ClamAV. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All ClamAV users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-antivirus/clamav-0.103.7" + +
+ + CVE-2022-20698 + CVE-2022-20770 + CVE-2022-20771 + CVE-2022-20785 + CVE-2022-20792 + CVE-2022-20796 + CVE-2022-20803 + CVE-2023-20032 + CVE-2023-20052 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-02.xml new file mode 100644 index 0000000000..07755474ad --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-02.xml @@ -0,0 +1,131 @@ + + + + NVIDIA Drivers: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in NVIDIA Drivers, the worst of which could result in root privilege escalation. + nvidia-drivers + 2023-10-03 + 2023-10-03 + 764512 + 784596 + 803389 + 832867 + 845063 + 866527 + 881341 + 884045 + 903614 + remote + + + 470.182.03 + 515.105.01 + 525.105.17 + 530.41.03 + 470.182.03 + 515.105.01 + 525.105.17 + 530.41.03 + + + +

NVIDIA Drivers are NVIDIA's accelerated graphics driver.

+
+ +

Multiple vulnerabilities have been discovered in NVIDIA Drivers. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All NVIDIA Drivers 470 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-470.182.03:0/470" + + +

All NVIDIA Drivers 515 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-515.105.01:0/515" + + +

All NVIDIA Drivers 525 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-525.105.17:0/525" + + +

All NVIDIA Drivers 530 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-530.41.03:0/530" + +
+ + CVE-2021-1052 + CVE-2021-1053 + CVE-2021-1056 + CVE‑2021‑1076 + CVE‑2021‑1077 + CVE-2021-1090 + CVE-2021-1093 + CVE-2021-1094 + CVE-2021-1095 + CVE‑2022‑21813 + CVE‑2022‑21814 + CVE-2022-28181 + CVE-2022-28183 + CVE-2022-28184 + CVE-2022-28185 + CVE-2022-31607 + CVE-2022-31608 + CVE-2022-31615 + CVE‑2022‑34665 + CVE-2022-34666 + CVE-2022-34670 + CVE-2022-34673 + CVE-2022-34674 + CVE-2022-34676 + CVE-2022-34677 + CVE-2022-34678 + CVE-2022-34679 + CVE-2022-34680 + CVE-2022-34682 + CVE-2022-34684 + CVE-2022-42254 + CVE-2022-42255 + CVE-2022-42256 + CVE-2022-42257 + CVE-2022-42258 + CVE-2022-42259 + CVE-2022-42260 + CVE-2022-42261 + CVE-2022-42263 + CVE-2022-42264 + CVE-2022-42265 + CVE-2023-0180 + CVE-2023-0181 + CVE-2023-0183 + CVE-2023-0184 + CVE-2023-0185 + CVE-2023-0187 + CVE-2023-0188 + CVE-2023-0189 + CVE-2023-0190 + CVE-2023-0191 + CVE-2023-0194 + CVE-2023-0195 + CVE-2023-0198 + CVE-2023-0199 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-03.xml new file mode 100644 index 0000000000..cb112fcafe --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-03.xml @@ -0,0 +1,47 @@ + + + + glibc: Multiple vulnerabilities + Multiple vulnerabilities in glibc could result in Local Privilege Escalation. + glibc + 2023-10-04 + 2023-10-04 + 867952 + 914281 + 915127 + local and remote + + + 2.37-r7 + 2.37-r7 + + + +

glibc is a package that contains the GNU C library.

+
+ +

Multiple vulnerabilities have been discovered in glibc. Please review the CVE identifiers referenced below for details.

+
+ +

An attacker could elevate privileges from a local user to root.

+
+ +

There is no known workaround at this time.

+
+ +

All glibc users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.37-r7" + +
+ + CVE-2022-39046 + CVE-2023-4527 + CVE-2023-4806 + CVE-2023-4911 + + sam + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-04.xml new file mode 100644 index 0000000000..e7025c0e61 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-04.xml @@ -0,0 +1,44 @@ + + + + libvpx: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libvpx, the worst of which could result in arbitrary code execution. + libvpx + 2023-10-04 + 2023-10-04 + 914875 + 914987 + remote + + + 1.13.1 + 1.13.1 + + + +

libvpx is the VP8 codec SDK used to encode and decode video streams, typically within a WebM format media file.

+
+ +

Multiple vulnerabilities have been discovered in libvpx. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libvpx users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libvpx-1.13.1" + +
+ + CVE-2023-5217 + CVE-2023-44488 + + sam + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-05.xml new file mode 100644 index 0000000000..ece4c31499 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-05.xml @@ -0,0 +1,42 @@ + + + + dav1d: Denial of Service + A vulnerability has been found in dav1d which could result in denial of service. + dav1d + 2023-10-08 + 2023-10-08 + 906107 + remote + + + 1.2.0 + 1.2.0 + + + +

dav1d is an AV1 decoder.

+
+ +

In some circumstances, dav1d might treat an invalid frame as valid, resulting in a crash.

+
+ +

Malformed frame data can result in a denial of service.

+
+ +

Users should avoid parsing untrusted video with dav1d.

+
+ +

All dav1d users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/dav1d-1.2.0" + +
+ + CVE-2023-32570 + + ajak + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-06.xml new file mode 100644 index 0000000000..233f58d051 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-06.xml @@ -0,0 +1,53 @@ + + + + Heimdal: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a KDC. + heimdal + 2023-10-08 + 2023-10-08 + 881429 + 893722 + remote + + + 7.8.0-r1 + 7.8.0-r1 + + + +

Heimdal is a free implementation of Kerberos 5.

+
+ +

Multiple vulnerabilities have been discovered in Heimdal, the worst of which could lead to remote code execution on a Kerberos Domain Controller. + +Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Cross-realm trust vulnerability in Heimdal users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-crypt/heimdal-7.8.0-r1" + +
+ + CVE-2019-14870 + CVE-2021-44758 + CVE-2022-3437 + CVE-2022-3671 + CVE-2022-41916 + CVE-2022-42898 + CVE-2022-44640 + CVE-2022-44758 + CVE-2022-45142 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-07.xml new file mode 100644 index 0000000000..8e2c7029ab --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-07.xml @@ -0,0 +1,58 @@ + + + + Oracle VirtualBox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in VirtualBox, leading to compomise of VirtualBox. + virtualbox + 2023-10-08 + 2023-10-08 + 891327 + remote + + + 7.0.6 + 6.1.46 + 7.0.6 + 6.1.46 + + + +

VirtualBox is a powerful virtualization product from Oracle.

+
+ +

Multiple vulnerabilities have been discovered in Oracle VirtualBox, the worst of which may lead to VirtualBox compromise by an attacker with network access. + +Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Oracle VirtualBox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-7.0.6" + + +

If you still need to use VirtualBox 6:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-6.1.46" "=app-emulation/virtualbox-6*" + +
+ + CVE-2023-21884 + CVE-2023-21885 + CVE-2023-21886 + CVE-2023-21889 + CVE-2023-21898 + CVE-2023-21899 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-08.xml new file mode 100644 index 0000000000..3b79a87909 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-08.xml @@ -0,0 +1,42 @@ + + + + man-db: privilege escalation + A root privilege escalation through setuid executable and cron job has been discovered in man-db. + man-db + 2023-10-08 + 2023-10-08 + 662438 + remote + + + 2.8.5 + 2.8.5 + + + +

man-db is a man replacement that utilizes BerkeleyDB instead of flat files.

+
+ +

A root privilege escalation through setuid executable and cron job has been discovered in man-db. Please review the CVE identifier referenced below for details.

+
+ +

A local user with access to the man user or group can elevate privileges to root.

+
+ +

There is no known workaround at this time.

+
+ +

All man-db users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/man-db-2.8.5" + +
+ + CVE-2018-25078 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-09.xml new file mode 100644 index 0000000000..a04fa2e6dd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-09.xml @@ -0,0 +1,45 @@ + + + + c-ares: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in c-ares the worst of which could result in Denial of Service. + c-ares + 2023-10-08 + 2023-10-08 + 906964 + remote + + + 1.19.1 + 1.19.1 + + + +

c-ares is a C library for asynchronous DNS requests (including name resolves).

+
+ +

Multiple vulnerabilities have been discovered in c-ares. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All c-ares users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/c-ares-1.19.1" + +
+ + CVE-2023-31124 + CVE-2023-31130 + CVE-2023-31147 + CVE-2023-32067 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-10.xml new file mode 100644 index 0000000000..5846410c46 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-10.xml @@ -0,0 +1,44 @@ + + + + libcue: Arbitrary Code Execution + A vulnerability has been discovered in libcue which could allow for arbitrary code execution. + libcue + 2023-10-10 + 2023-10-10 + 915500 + remote + + + 2.2.1-r1 + 2.2.1-r1 + + + +

libcue is a CUE Sheet Parser Library.

+
+ +

libcue does not check bounds in a loop and suffers from an integer overflow flaw which can be exploited to take over the program.

+
+ +

Untrusted CUE sheet files can lead to arbitrary code execution. + +app-misc/tracker-miners[cue] uses libcue to index CUE Sheet files in directories. It is possible that downloading a malicious CUE Sheet file into a directory indexed by tracker-miners could lead to remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All libcue users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libcue-2.2.1-r1" + +
+ + CVE-2023-43641 + + sam + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-11.xml new file mode 100644 index 0000000000..2a27923059 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-11.xml @@ -0,0 +1,42 @@ + + + + less: Denial of service + A filtering bypass in less may allow denial of service. + less + 2023-10-10 + 2023-10-10 + 893530 + remote + + + 608-r2 + 608-r2 + + + +

less is a pager and text file viewer.

+
+ +

less suffered from a flaw in its terminal escape sequence handling which made its filtering incomplete.

+
+ +

Malicious input could clear the terminal output or otherwise manipulate it with faked interactions.

+
+ +

There is no known workaround at this time.

+
+ +

All less users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/less-608-r2" + +
+ + CVE-2022-46663 + + sam + sam +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-12.xml new file mode 100644 index 0000000000..82588b6b73 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-12.xml @@ -0,0 +1,68 @@ + + + + curl: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in curl, the worst of which could result in arbitrary code execution. + curl + 2023-10-11 + 2023-10-11 + 887745 + 894676 + 902801 + 906590 + 910564 + 914091 + 915195 + remote + + + 8.3.0-r2 + 8.3.0-r2 + + + +

A command line tool and library for transferring data with URLs.

+
+ +

Multiple vulnerabilities have been discovered in curl. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details. + +Note that the risk of remote code execution is limited to SOCKS usage.

+
+ +

There is no known workaround at this time.

+
+ +

All curl users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/curl-8.3.0-r2" + +
+ + CVE-2022-43551 + CVE-2022-43552 + CVE-2023-23914 + CVE-2023-23915 + CVE-2023-23916 + CVE-2023-27533 + CVE-2023-27534 + CVE-2023-27535 + CVE-2023-27536 + CVE-2023-27537 + CVE-2023-27538 + CVE-2023-28319 + CVE-2023-28320 + CVE-2023-28321 + CVE-2023-28322 + CVE-2023-32001 + CVE-2023-38039 + CVE-2023-38545 + CVE-2023-38546 + + sam + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-13.xml new file mode 100644 index 0000000000..0bf6978894 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-13.xml @@ -0,0 +1,42 @@ + + + + GNU Mailutils: unexpected processsing of escape sequences + A vulnerability has been discovered in Mailutils where escape sequences are processed in a context where this may lead to RCE. + mailutils + 2023-10-19 + 2023-10-19 + 802867 + remote + + + 3.12-r3 + 3.12-r3 + + + +

GNU Mailutils is a collection of mail-related utilities, including an IMAP4 server (imap4d) and a Mail User Agent (mail).

+
+ +

A vulnerability has been discovered in GNU Mailutils. Please review the CVE identifier referenced below for details.

+
+ +

mail(1) from mailutils would process escape sequences (like ~! shellcommand) in message bodies piped/redirected in. This creates an RCE if some part of the message body is under an attacker's control.

+
+ +

There is no known workaround at this time.

+
+ +

All Mailutils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-mail/mailutils-3.12-r3" + +
+ + CVE-2021-32749 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-14.xml new file mode 100644 index 0000000000..c4dc6dd8ee --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-14.xml @@ -0,0 +1,44 @@ + + + + libinput: format string vulnerability when using xf86-input-libinput + A vulnerability has been discovered in libinput where an attacker may run malicous code by exploiting a format string vulnerability. + libinput + 2023-10-26 + 2023-10-26 + 839729 + remote + + + 1.20.1 + 1.20.1 + + + +

A library to handle input devices in Wayland and, via xf86-input-libinput, in X.org.

+
+ +

An attacker may be able to run malicious code by exploiting a format string vulnerability. Please review the CVE identifier referenced below for details.

+
+ +

When a device is detected by libinput, libinput logs several messages through log handlers set up by the callers. These log handlers usually eventually result in a printf call. Logging happens with the privileges of the caller, in the case of Xorg this may be root. + +The device name ends up as part of the format string and a kernel device with printf-style format string placeholders in the device name can enable an attacker to run malicious code. An exploit is possible through any device where the attacker controls the device name, e.g. /dev/uinput or Bluetooth devices.

+
+ +

There is no known workaround at this time.

+
+ +

All libinput users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libinput-1.20.1" + +
+ + CVE-2022-1215 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-15.xml new file mode 100644 index 0000000000..2800fd629a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-15.xml @@ -0,0 +1,42 @@ + + + + USBView: root privilege escalation via insecure polkit settings + A vulnerability has been discovered in usbview where certain users can trigger a privilege escalation. + usbview + 2023-10-26 + 2023-10-26 + 831756 + local + + + 2.2 + 2.2 + + + +

USBView is a tool to display the topology of devices on the USB bus.

+
+ +

A vulnerability has been discovered in usbview. Please review the CVE identifier referenced below for details.

+
+ +

USBView allows some local users (e.g., ones logged in via SSH) to execute arbitrary code as root because certain Polkit settings (e.g., allow_any=yes) for pkexec disable the authentication requirement. Code execution can, for example, use the --gtk-module option.

+
+ +

There is no known workaround at this time.

+
+ +

All USBView users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/usbview-2.2" + +
+ + CVE-2022-23220 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-16.xml new file mode 100644 index 0000000000..f799cbfc86 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-16.xml @@ -0,0 +1,43 @@ + + + + Ubiquiti UniFi: remote code execution via bundled log4j + A vulnerability has been discovered in unifi where bundled log4j can facilitate a remote code execution + unifi + 2023-10-26 + 2023-10-26 + 828853 + remote + + + 6.5.55 + 6.5.55 + + + +

Ubiquiti UniFi is a Management Controller for Ubiquiti Networks UniFi APs.

+
+ +

A bundled version of log4j could facilitate remote code execution. Please review the CVE identifier referenced below for details.

+
+ +

An attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code.

+
+ +

There is no known workaround at this time.

+
+ +

All Ubiquity UniFi users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-wireless/unifi-6.5.55" + +
+ + CVE-2021-4104 + CVE-2021-45046 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-17.xml new file mode 100644 index 0000000000..2bc9e20328 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-17.xml @@ -0,0 +1,43 @@ + + + + UnZip: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in UnZip, the worst of which could lead to code execution. + unzip + 2023-10-30 + 2023-10-30 + 831190 + local + + + 6.0_p27 + 6.0_p27 + + + +

Info-ZIP’s UnZip is a tool to list and extract files inside PKZIP compressed files.

+
+ +

Multiple vulnerabilities have been discovered in UnZip. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All UnZip users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/unzip-6.0_p27" + +
+ + CVE-2022-0529 + CVE-2022-0530 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-18.xml new file mode 100644 index 0000000000..b66189f1dc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-18.xml @@ -0,0 +1,45 @@ + + + + Rack: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Rack, the worst of which can lead to sequence injection in logging compontents. + rack + 2023-10-30 + 2023-10-30 + 884795 + remote + + + 2.2.3.1 + 2.2.3.1 + + + +

Rack is a modular Ruby web server interface.

+
+ +

Multiple vulnerabilities have been discovered in Rack. Please review the CVE identifiers referenced below for details.

+
+ +

A possible denial of service vulnerability was found in the multipart parsing component of Rack. + +A sequence injection vulnerability was found which could allow a possible shell escape in the Lint and CommonLogger components of Rack.

+
+ +

There is no known workaround at this time.

+
+ +

All Rack users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-ruby/rack-2.2.3.1" + +
+ + CVE-2022-30122 + CVE-2022-30123 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-19.xml new file mode 100644 index 0000000000..c054d9841f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-19.xml @@ -0,0 +1,44 @@ + + + + Dovecot: Privilege Escalation + A vulnerability has been discovered in Dovecot that can lead to a privilege escalation when master and non-master passdbs are used. + dovecot + 2023-10-30 + 2023-10-30 + 856733 + local and remote + + + 2.3.19.1-r1 + 2.3.19.1-r1 + + + +

Dovecot is an open source IMAP and POP3 email server.

+
+ +

A vulnerability has been discovered in Dovecot. Please review the CVE identifier referenced below for details.

+
+ +

When two passdb configuration entries exist in Dovecot configuration, which have the same driver and args settings, the incorrect username_filter and mechanism settings can be applied to passdb definitions. These incorrectly applied settings can lead to an unintended security configuration and can permit privilege escalation with certain configurations involving master user authentication. + +Dovecot documentation does not advise against the use of passdb definitions which have the same driver and args settings. One such configuration would be where an administrator wishes to use the same pam configuration or passwd file for both normal and master users but use the username_filter setting to restrict which of the users is able to be a master user.

+
+ +

There is no known workaround at this time.

+
+ +

All Dovecot users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-mail/dovecot-2.3.19.1-r1" + +
+ + CVE-2022-30550 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-20.xml new file mode 100644 index 0000000000..09fddfed57 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-20.xml @@ -0,0 +1,45 @@ + + + + rxvt-unicode: Arbitrary Code Execution + A vulnerability has been discovered in rxvt-unicode where data written to the terminal can lead to code execution. + rxvt-unicode + 2023-10-30 + 2023-10-30 + 884787 + local and remote + + + 9.30 + 9.30 + + + +

rxvt-unicode is a clone of the well known terminal emulator rxvt.

+
+ +

A vulnerability has been discovered in rxvt-unicode. Please review the CVE identifiers referenced below for details.

+
+ +

in the Perl background extension, when an attacker can +control the data written to the user's terminal and certain options are set. + +The "background" extension is automatically loaded if certain X resources are set such as 'transparent' (see the full list at the top of src/perl/background[1]). So it is possible to be using this extension without realising it.

+
+ +

There is no known workaround at this time.

+
+ +

All rxvt-unicode users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-terms/rxvt-unicode-9.30" + +
+ + CVE-2022-4170 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-21.xml new file mode 100644 index 0000000000..d701fa3107 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-21.xml @@ -0,0 +1,47 @@ + + + + ConnMan: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in ConnMan, the worst of which can lead to remote code execution. + connman + 2023-10-31 + 2023-10-31 + 832028 + 863425 + remote + + + 1.42_pre20220801 + 1.42_pre20220801 + + + +

ConnMan provides a daemon for managing Internet connections.

+
+ +

Multiple vulnerabilities have been discovered in ConnMan. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All ConnMan users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/connman-1.42_pre20220801" + +
+ + CVE-2022-23096 + CVE-2022-23097 + CVE-2022-23098 + CVE-2022-32292 + CVE-2022-32293 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-22.xml new file mode 100644 index 0000000000..5944404c52 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-22.xml @@ -0,0 +1,61 @@ + + + + Salt: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Salt, the worst of which could result in local privilege escalation. + salt + 2023-10-31 + 2023-10-31 + 767919 + 812440 + 836365 + 855962 + local and remote + + + 3004.2 + 3004.2 + + + +

Salt is a fast, intelligent and scalable automation engine.

+
+ +

Multiple vulnerabilities have been discovered in Salt. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Salt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/salt-3004.2" + +
+ + CVE-2020-28243 + CVE-2020-28972 + CVE-2020-35662 + CVE-2021-3144 + CVE-2021-3148 + CVE-2021-3197 + CVE-2021-21996 + CVE-2021-25281 + CVE-2021-25282 + CVE-2021-25283 + CVE-2021-25284 + CVE-2021-31607 + CVE-2022-22934 + CVE-2022-22935 + CVE-2022-22936 + CVE-2022-22941 + CVE-2022-22967 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-23.xml new file mode 100644 index 0000000000..9bd12a4cdf --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202310-23.xml @@ -0,0 +1,43 @@ + + + + libxslt: Multiple Vulnerabilities + Several use-after-free vulnerabilities have been found in libxslt. + libxslt + 2023-10-31 + 2023-10-31 + 820722 + 833508 + remote + + + 1.1.35 + 1.1.35 + + + +

libxslt is the XSLT C library developed for the GNOME project. XSLT itself is an XML language to define transformations for XML.

+
+ +

Multiple vulnerabilities have been discovered in libxslt. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libxslt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libxslt-1.1.35" + +
+ + CVE-2021-30560 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index bcd865f7f1..d6d72a0f9d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Sun, 01 Oct 2023 06:40:03 +0000 +Wed, 01 Nov 2023 06:40:00 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index cfb8823901..fdc81e7787 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -de793de405f9e13d0d29d94de3f236ce0b5b3338 1696064247 2023-09-30T08:57:27+00:00 +49515c936bcad95017ac696eb33dd49f6f28e9b5 1698756865 2023-10-31T12:54:25+00:00