diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-32.xml new file mode 100644 index 0000000000..1d75ea1e19 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-32.xml @@ -0,0 +1,51 @@ + + + + elfutils: Heap-based buffer overflow + A heap-based buffer overflow vulnerability in elfutils might allow + remote attackers to execute arbitrary code. + + elfutils + December 13, 2016 + December 13, 2016: 2 + 507246 + remote + + + 0.159 + 0.159 + + + +

Elfutils provides a library and utilities to access, modify and analyse + ELF objects. +

+
+ +

An integer overflow, in the check_section function of dwarf_begin_elf.c, + in the libdw library can lead to a heap-based buffer overflow. +

+
+ +

A remote attacker could entice a user to open a specially crafted file, + possibly resulting in the execution of arbitrary code with the privileges + of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All elfutils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/elfutils-0.159" + +
+ + CVE-2014-0172 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-33.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-33.xml new file mode 100644 index 0000000000..f6bece071b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-33.xml @@ -0,0 +1,49 @@ + + + + GPL Ghostscript: User-assisted execution of arbitrary code + An integer overflow in GPL Ghostscript may allow remote attackers + to execute arbitrary code. + + ghostscript-gpl + December 13, 2016 + December 13, 2016: 2 + 556316 + remote + + + 9.09 + 9.09 + + + +

Ghostscript is an interpreter for the PostScript language and for PDF.

+
+ +

An integer overflow flaw was discovered that leads to an out-of-bounds + read and write in gs_ttf.ps. +

+
+ +

A remote attacker could entice a user to open a specially crafted file, + possibly resulting in the execution of arbitrary code with the privileges + of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All GPL Ghostscript users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gpl-9.09" + +
+ + CVE-2015-3228 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-34.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-34.xml new file mode 100644 index 0000000000..20b5a3cecb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-34.xml @@ -0,0 +1,51 @@ + + + + systemd: Multiple vulnerabilities + Multiple vulnerabilities have been found in systemd, the worst of + which may allow execution of arbitrary code. + + systemd + December 13, 2016 + December 13, 2016: 2 + 486904 + local, remote + + + 208 + 208 + + + +

A system and service manager.

+
+ +

Multiple vulnerabilities have been discovered in systemd. Please review + the CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly execute arbitrary code with the privileges of + the process, cause a Denial of Service condition, or gain escalated + privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All systemd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/systemd-208" + +
+ + CVE-2013-4391 + CVE-2013-4393 + CVE-2013-4394 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-35.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-35.xml new file mode 100644 index 0000000000..adb930ee57 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-35.xml @@ -0,0 +1,49 @@ + + + + XStream: Remote execution of arbitrary code + A vulnerability in XStream may allow remote attackers to execute + arbitrary code. + + xstream + December 13, 2016 + December 13, 2016: 2 + 497652 + remote + + + 1.4.8-r1 + 1.4.8-r1 + + + +

XStream is a simple library to serialize objects to XML and back again.

+
+ +

It was found that XStream would deserialize arbitrary user-supplied XML + content, thus representing objects of any type. +

+
+ +

A remote attacker could pass a specially crafted XML document to + XStream, possibly resulting in the execution of arbitrary code with the + privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All XStream users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/xstream-1.4.8-r1" + +
+ + CVE-2013-7285 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-36.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-36.xml new file mode 100644 index 0000000000..d6f4b40b34 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-36.xml @@ -0,0 +1,52 @@ + + + + TigerVNC: Integer overflow + An integer overflow in TigerVNC might allow remote attackers to + execute + arbitrary code. + + tigervnc + December 13, 2016 + December 13, 2016: 2 + 534714 + remote + + + 1.4.2 + 1.4.2 + + + +

TigerVNC is a high-performance VNC server/client.

+
+ +

TigerVNC is impacted by the same vulnerability as found in + CVE-2014-6051. An integer overflow, leading to a heap-based buffer + overflow, was found in the way screen sizes were handled. +

+
+ +

A remote attacker, utilizing a malicious VNC server, could execute + arbitrary code with the privileges of the user running the client, or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All TigerVNC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/tigervnc-1.4.2" + +
+ + CVE-2014-6051 + CVE-2014-8240 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-37.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-37.xml new file mode 100644 index 0000000000..bb1b9944d5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-37.xml @@ -0,0 +1,52 @@ + + + + Pixman: Buffer overflow + A buffer overflow in Pixman might allow remote attackers to execute + arbitrary code. + + pixman + December 13, 2016 + December 13, 2016: 2 + 561526 + remote + + + 0.32.8 + 0.32.8 + + + +

Pixman is a pixel manipulation library.

+
+ +

In pixman-general, careless computations done with the ‘dest_buffer’ + pointer may overflow, failing the buffer upper limit check. +

+
+ +

A remote attacker could possibly cause a Denial of Service condition, or + execute arbitrary code with the privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All Pixman users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/pixman-0.32.8" + +
+ + + Pixman 0.32.8 Release Notes + + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-38.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-38.xml new file mode 100644 index 0000000000..e03177a6fd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-38.xml @@ -0,0 +1,49 @@ + + + + Botan: Multiple vulnerabilities + Multiple vulnerabilities have been found in Botan, the worst of + which allows remote attackers to execute arbitrary code. + + botan + December 13, 2016 + December 13, 2016: 2 + 574034 + remote + + + 1.10.12 + 1.10.12 + + + +

Botan (Japanese for peony) is a cryptography library written in C++11.

+
+ +

Multiple vulnerabilities have been discovered in Botan. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Botan users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/botan-1.10.12" + +
+ + CVE-2016-2194 + CVE-2016-2195 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-39.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-39.xml new file mode 100644 index 0000000000..73380626dc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-39.xml @@ -0,0 +1,53 @@ + + + + Bash: Arbitrary code execution + A vulnerability in Bash could potentially lead to arbitrary code + execution. + + bash + December 13, 2016 + December 13, 2016: 2 + 594496 + remote + + + 4.3_p46-r1 + 4.3_p46-r1 + + + +

Bash is the standard GNU Bourne Again SHell.

+
+ +

A vulnerability was found in the way Bash expands $HOSTNAME. Injecting + malicious code into $HOSTNAME could cause it to run each time Bash + expands \h in the prompt string. +

+
+ +

A remote attacker controlling the system’s hostname (i.e. via DHCP) + could possibly execute arbitrary code with the privileges of the process, + or cause a Denial of + Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Bash users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-shells/bash-4.3_p46-r1" + +
+ + CVE-2016-0634 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-40.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-40.xml new file mode 100644 index 0000000000..25f2052b4e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-40.xml @@ -0,0 +1,56 @@ + + + + SQUASHFS: Multiple vulnerabilities + Multiple vulnerabilities have been found in SQUASHFS, the worst of + which may allow execution of arbitrary code. + + squashfs-tools + December 13, 2016 + December 13, 2016: 2 + 427356 + remote + + + 4.3 + 4.3 + + + +

Squashfs is a compressed read-only filesystem for Linux. Squashfs is + intended for general read-only filesystem use, for archival use (i.e. in + cases where a .tar.gz file may be used), and in constrained block + device/memory systems (e.g. embedded systems) where low overhead is + needed. +

+
+ +

Multiple vulnerabilities have been discovered in SQUASHFS. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted .sqsh + file using unsquashfs; possibly resulting in the execution of arbitrary + code with the privileges of the process, or a Denial of Service + condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All squashfs-tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=squashfs-tools-4.3" + +
+ + CVE-2012-4024 + CVE-2012-4025 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-41.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-41.xml new file mode 100644 index 0000000000..30e31e81bc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-41.xml @@ -0,0 +1,59 @@ + + + + WebKitGTK+: Multiple vulnerabilities + Multiple vulnerabilities have been found in WebKitGTK+, the worst + of which may allow execution of arbitrary code. + + webkit-gtk + December 13, 2016 + December 13, 2016: 3 + 570034 + remote + + + 2.4.10-r200 + 2.4.10-r200 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, + suitable for projects requiring any kind of web integration, from hybrid + HTML/CSS applications to full-fledged web browsers. It offers WebKit’s + full functionality and is useful in a wide range of systems from desktop + computers to embedded systems like phones, tablets, and televisions. + WebKitGTK+ is made by a lively community of developers and designers, who + hope to bring the web platform to everyone. It’s the official web + engine of the GNOME platform and is used in browsers such as Epiphany and + Midori. +

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker can use multiple vectors to execute arbitrary code or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.4.10-r200" + +
+ + CVE-2014-4412 + CVE-2014-4413 + CVE-2014-4414 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-42.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-42.xml new file mode 100644 index 0000000000..88d846c838 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-42.xml @@ -0,0 +1,52 @@ + + + + Zabbix: Multiple vulnerabilities + Multiple vulnerabilities have been found in Zabbix, the worst of + which may allow execution of arbitrary code. + + zabbix + December 13, 2016 + December 13, 2016: 1 + 582536 + 598762 + remote + + + 2.2.16 + 2.2.16 + + + +

Zabbix is software for monitoring applications, networks, and servers.

+
+ +

Multiple vulnerabilities have been discovered in Zabbix. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Zabbix users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/zabbix-2.2.16" + +
+ + CVE-2016-4338 + CVE-2016-9140 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-43.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-43.xml new file mode 100644 index 0000000000..a1668a6f16 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-43.xml @@ -0,0 +1,65 @@ + + + + Node.js: Multiple vulnerabilities + Multiple vulnerabilities have been found in Node.js, the worst of + which can allow remote attackers to cause Denial of Service conditions. + + nodejs + December 13, 2016 + December 13, 2016: 1 + 568900 + 586084 + 595256 + remote + + + 0.12.17 + 4.6.1 + 4.6.1 + + + +

Node.js is a JavaScript runtime built on Chrome’s V8 JavaScript + engine. +

+
+ +

Multiple vulnerabilities have been discovered in Node.js. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly cause a Denial of Service condition, or + conduct man-in-the-middle attacks. +

+
+ +

There is no known workaround at this time.

+
+ +

All Node.js 0.12.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/nodejs-0.12.17" + + +

All Node.js 4.6.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/nodejs-4.6.1" + +
+ + CVE-2015-8027 + CVE-2016-2086 + CVE-2016-2216 + CVE-2016-5325 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 09cda85a2c..d11a9fb91b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 12 Dec 2016 00:43:15 +0000 +Tue, 13 Dec 2016 20:13:14 +0000