diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 54d20fac28..15707c00e3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 417713 BLAKE2B 5f453ee753ccefac1bad76c5778ebd5c3a7b9d23f0d9dda535879657ff3d7c89d4bc4c8048049e852be4cc25e9f91864ed97ae3dd6991c1bc05fc37320c6b805 SHA512 32c698df4a14a8dd6f33822ebc801c8f40da7ae51d5d8d66efb73ac55886769e7465cc82e8e9166c98bba1e2846832e92a392325436d2eca1c487373db893527 -TIMESTAMP 2018-03-07T23:38:29Z +MANIFEST Manifest.files.gz 419802 BLAKE2B 77b61430b97be606d07e770dcefecad6df694cb9d174d02e411d0c9124496cc8f3c082d220e88b305fb15b10d7c63b688c68e4484d9efe6cf97b41aabe095755 SHA512 3f233f14b1531babe34f57d6f927c008a3406b144de3e74532b3bf23c806220ffc43906d40c476f43e773cfbdabd98ea035b95415e8a23d7ad3ed93384c13bf7 +TIMESTAMP 2018-04-04T14:08:23Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlqgd/VfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlrE3FdfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klAiuw//WGdZ3ec9ceJ8bd5e/MHh4zkCJXtUPr/HaidSwX0rqjFquNUBMyXL/S7O -A1aRq9OqndC8WQMxnz89FZMR1pW3D35SBUipfxw7W0n9wqztAVnle0x92D66tbnN -AJ4ZztqlMmGb1oLXKdQXXbLEQqRagcpE7S8Li+wglBoQRwlEZcnaSHi1bwnKe7fn -80HbZ5eqsnVSloxH62tokXcL3gme+nRkpYmZL7BCXzkS9lxxSno1rjp8SuHj79/2 -wiD/Xj0saPW+YJTy55vROpInd3I0fmQ0t5ybO4FYM6/vdYwA0PMVSS+mk3SvvYe6 -5tUjjJLUESqlQz+M+NSGvuEkllQs4drBm6N25dvTrJ1pa5bEdLoKUn58TUz3LtDI -f2H9NR9Sr1VgW5I6OjjlGPBkY0IqlbV19h/oO4HiyW4GrN1nV2Tu9lIn+/7C1GAs -Ks6I/RaJog8A0bKroZ6VF4JvFNmKN8XVa2uilhZAw9Dc2EzgimoGUsGQdakVF7iJ -xrH84WCktuyljDTUfns5Csw7gRXQ1+p4L03OAub6gpfFZRtsPfp7L9Kzzs2fW04t -0pYBD8FJA7E6ZfKa1/Y1UnJsiABdB2Jr/HHcLWg7c6BdGcEsfuJxGx12wazv7gZ8 -IVLUetX2QZO81yOpz7olb/aqI+TyqjR7jldOwmi10R5oBa9WwgY= -=2yKA +klCOqw//dq72XGk93uVY1A2zF8LLTGinHAwKLl7Jvv5ueZk+fi+y/J5rcWM34KAp +Sup8n8N4M/i5xMhBpag2ZnMIDyy7X9qGMmr/f0uxfI/jFplhLUJIwLj9tjUPs7Ml +tv7Y5x01pQZYGM5w55EXk+basWkFNKS0qza8Gl6gYuHizB90fiWf91vIStgT9sQt +qgxlFuhM0cg7/4fCRZgKrLz+/CSfpIz0JKqwuNVx+md0OPkpq1LTbQrwUGeyRsi3 +U5+J1ugt2E6vgusR2sc4M0jlGPFqKN03maeQRBztepbuF0r6F7ROYQ4fFqT9hxQe +roprxcAiYqyRV3989+KwjcKu0Bw3eNXuXDZuaqA2FZdhVnfneMjfb8A9RILZz9z8 +RGCcyrEePJ2kpRoOB5644v0N7iZB1F6Jxm3G8U4GChL97ypxZUcqz/XwJTNYj7YC +bv0pAMfonPLWLWSH96r404aiAHCJzvnx7pfnKveXDV3ZEv83BeJQ82XtHHCIMlUU +lh4xaaB810rPMXN7hkS2TY6Jy7yBANRgnRiOgyMcsPupmpcUzXubFTkKt4il3Iea +GK1c9W2y9LZlvn3n21KRcgKr7MdZd50UWqiACcAoI4LYQl0zoIwJXz7Ev7zCYnHo +zJ1tIECigaXkxo1M6I9pHSBoKImka2nHe3JJXHuvBoCDgrMpYBM= +=KX1n -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 215602afd2..b5be97045f 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-28.xml index 3b12ec9974..fe1515499e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-28.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200507-28.xml @@ -12,7 +12,7 @@ 100686 remote - + 2.1.2 2.1.2 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-16.xml index c9628ab936..d1fd1664d4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-16.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-200512-16.xml @@ -18,7 +18,7 @@ 2.1.30-r13 2.2.3-r8 - + 2.2.1 2.2.1 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-18.xml index 29392d117c..bbd423cef3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201006-18.xml @@ -125,7 +125,7 @@ CVE-2010-0850 CVE-2010-0886 CVE-2010-0887 - Gentoo Linux Java documentation + Gentoo Linux Java documentation Oracle Java SE and Java for Business Critical Patch Update Advisory - March 2010 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-04.xml new file mode 100644 index 0000000000..fbb8dc4ac3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-04.xml @@ -0,0 +1,51 @@ + + + + Newsbeuter: User-assisted execution of arbitrary code + A vulnerability in Newsbeuter may allow remote attackers to execute + arbitrary shell commands. + + newsbeuter + 2018-03-11 + 2018-03-11 + 631150 + remote + + + 2.9-r3 + + + +

Newsbeuter is a RSS/Atom feed reader for the text console.

+ +
+ +

Newsbeuter does not properly escape shell meta-characters in an RSS item + with a media enclosure in the podcast playback function of Podbeuter. +

+
+ +

A remote attacker, by enticing a user to open a feed with a specially + crafted media enclosure, could possibly execute arbitrary shell commands + with the privileges of the user running the application. +

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Newsbeuter and recommends that users + unmerge the package: +

+ + + # emerge --unmerge "net-news/newsbeuter" + + +
+ + CVE-2017-14500 + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-05.xml new file mode 100644 index 0000000000..4feb90ed08 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-05.xml @@ -0,0 +1,101 @@ + + + + Chromium, Google Chrome: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium and Google + Chrome, the worst of which could result in the execution of arbitrary code. + + chromium, google-chrome + 2018-03-13 + 2018-03-13 + 649800 + local, remote + + + 65.0.3325.146 + 65.0.3325.146 + + + 65.0.3325.146 + 65.0.3325.146 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+ +

Google Chrome is one fast, simple, and secure browser for all your + devices. +

+ +
+ +

Multiple vulnerabilities have been discovered in Chromium and Google + Chrome. Please review the referenced CVE identifiers and Google Chrome + Releases for details. +

+ +
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, bypass + content security controls, or conduct URL spoofing. +

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-65.0.3325.146" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/google-chrome-65.0.3325.146" + + +
+ + CVE-2018-6057 + CVE-2018-6058 + CVE-2018-6059 + CVE-2018-6060 + CVE-2018-6061 + CVE-2018-6062 + CVE-2018-6063 + CVE-2018-6064 + CVE-2018-6065 + CVE-2018-6066 + CVE-2018-6067 + CVE-2018-6068 + CVE-2018-6069 + CVE-2018-6070 + CVE-2018-6071 + CVE-2018-6072 + CVE-2018-6073 + CVE-2018-6074 + CVE-2018-6075 + CVE-2018-6076 + CVE-2018-6077 + CVE-2018-6078 + CVE-2018-6079 + CVE-2018-6080 + CVE-2018-6081 + CVE-2018-6082 + CVE-2018-6083 + + Google Chrome Release 20180306 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-06.xml new file mode 100644 index 0000000000..ece35c252c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-06.xml @@ -0,0 +1,85 @@ + + + + Oracle JDK/JRE: Multiple vulnerabilities + Multiple vulnerabilities have been found in Oracle's JDK and JRE + software suites, the worst of which may allow execution of arbitrary code. + + oracle-jdk-bin,oracle-jre-bin + 2018-03-19 + 2018-03-19 + 645268 + remote + + + 1.8.0.162 + 1.8.0.162 + + + 1.8.0.162 + 1.8.0.162 + + + +

Java Platform, Standard Edition (Java SE) lets you develop and deploy + Java applications on desktops and servers, as well as in today’s + demanding embedded environments. Java offers the rich user interface, + performance, versatility, portability, and security that today’s + applications require. +

+ +
+ +

Multiple vulnerabilities have been discovered in Oracle’s Java SE. + Please review the referenced CVE identifiers for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, gain access to information, or cause a Denial + of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Oracle JDK users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-java/oracle-jdk-bin-1.8.0.162:1.8" + + +

All Oracle JRE users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-java/oracle-jre-bin-1.8.0.162:1.8" + + +
+ + CVE-2018-2579 + CVE-2018-2581 + CVE-2018-2582 + CVE-2018-2588 + CVE-2018-2599 + CVE-2018-2602 + CVE-2018-2603 + CVE-2018-2618 + CVE-2018-2627 + CVE-2018-2629 + CVE-2018-2633 + CVE-2018-2634 + CVE-2018-2637 + CVE-2018-2638 + CVE-2018-2639 + CVE-2018-2641 + CVE-2018-2663 + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-07.xml new file mode 100644 index 0000000000..1a657b6795 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-07.xml @@ -0,0 +1,60 @@ + + + + JabberD 2.x: Multiple vulnerabilities + Multiple vulnerabilities have been found in Gentoo's JabberD 2.x + ebuild, the worst of which allows local attackers to escalate privileges. + + jabberd2 + 2018-03-19 + 2018-03-19 + 623806 + 629412 + 631068 + local, remote + + + 2.6.1 + + + +

JabberD 2.x is an open source Jabber server written in C.

+
+ +

Multiple vulnerabilities have been discovered in Gentoo’s JabberD 2.x + ebuild. Please review the referenced CVE identifiers for details. +

+ +
+ +

An attacker could possibly escalate privileges by owning system binaries + in trusted locations, cause a Denial of Service condition by manipulating + the PID file from jabberd2 services, bypass security via SASL ANONYMOUS + connections or have other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for JabberD 2.x and recommends that + users unmerge the package: +

+ + + # emerge --unmerge "net-im/jabberd2" + + +

As an alternative, users may want to upgrade their systems to use + net-im/prosody instead of net-im/jabberd2. +

+ +
+ + CVE-2017-10807 + CVE-2017-18225 + CVE-2017-18226 + + whissi + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-08.xml new file mode 100644 index 0000000000..194e41f8e1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-08.xml @@ -0,0 +1,57 @@ + + + + Adobe Flash Player: Multiple vulnerabilities + Multiple vulnerabilities have been found in Adobe Flash Player, the + worst of which allows remote attackers to execute arbitrary code. + + flash + 2018-03-19 + 2018-03-19 + 646724 + 650424 + remote + + + 29.0.0.113 + 29.0.0.113 + + + +

The Adobe Flash Player is a renderer for the SWF file format, which is + commonly used to provide interactive websites. +

+
+ +

Multiple vulnerabilities have been discovered in Adobe Flash Player. + Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or bypass security restrictions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Adobe Flash Player users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-29.0.0.113" + + +
+ + CVE-2018-4871 + CVE-2018-4877 + CVE-2018-4878 + CVE-2018-4919 + CVE-2018-4920 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-09.xml new file mode 100644 index 0000000000..a2b75c881a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-09.xml @@ -0,0 +1,59 @@ + + + + KDE Plasma Workspaces: Multiple vulnerabilities + Multiple vulnerabilities have been found in KDE Plasma Workspaces, + the worst of which allows local attackers to execute arbitrary commands. + + plasma-workspace + 2018-03-19 + 2018-03-19 + 647106 + local, remote + + + 5.11.5-r1 + 5.11.5-r1 + + + +

KDE Plasma workspace is a widget based desktop environment designed to + be fast and efficient. +

+
+ +

Multiple vulnerabilities have been discovered in KDE Plasma Workspaces. + Please review the referenced CVE identifiers for details. +

+ +
+ +

An attacker could execute arbitrary commands via specially crafted thumb + drive’s volume labels or obtain sensitive information via specially + crafted notifications. +

+
+ +

Users should mount removable devices with Dolphin instead of the device + notifier. +

+ +

Users should disable notifications.

+
+ +

All KDE Plasma Workspace users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=kde-plasma/plasma-workspace-5.11.5-r1" + + +
+ + CVE-2018-6790 + CVE-2018-6791 + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-10.xml new file mode 100644 index 0000000000..b79033cc21 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-10.xml @@ -0,0 +1,63 @@ + + + + collectd: Multiple vulnerabilities + Gentoo's collectd package contains multiple vulnerabilities, the + worst of which may allow local attackers to escalate privileges. + + collectd + 2018-03-22 + 2018-03-22 + 628540 + 637538 + local, remote + + + 5.7.2-r1 + 5.7.2-r1 + + + +

collectd is a daemon which collects system and application performance + metrics periodically and provides mechanisms to store the values in a + variety of ways, for example in RRD files. +

+
+ +

Multiple vulnerabilities have been found in Gentoo’s collectd package. + Please review the referenced CVE identifiers and bug entries for details. +

+
+ +

A local attacker, who either is already collectd’s system user or + belongs to collectd’s group, could potentially gain root privileges and + cause a Denial of Service condition. +

+ +

Remote attackers could cause a Denial of Service condition via specially + crafted SNMP responses. +

+
+ +

There is no known workaround at this time.

+
+ +

All collectd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/collectd-5.7.2-r1" + + +
+ + + CVE-2017-16820 + + + CVE-2017-18240 + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-11.xml new file mode 100644 index 0000000000..4f435c89f1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-11.xml @@ -0,0 +1,59 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Multiple vulnerabilities have been found in WebKitGTK+, the worst + of which may lead to arbitrary code execution. + + WebKitGTK+ + 2018-03-22 + 2018-03-22 + 645686 + remote + + + 2.18.6 + 2.18.6 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, + suitable for projects requiring any kind of web integration, from hybrid + HTML/CSS applications to full-fledged web browsers. +

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please + review the referenced CVE identifiers for details. +

+
+ +

An attacker could execute arbitrary commands via maliciously crafted web + content. +

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.18.6" + +
+ + CVE-2017-13884 + CVE-2017-13885 + CVE-2017-7153 + CVE-2017-7160 + CVE-2017-7161 + CVE-2017-7165 + CVE-2018-4088 + CVE-2018-4089 + CVE-2018-4096 + + jmbailey + jmbailey +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-12.xml new file mode 100644 index 0000000000..f4c5194fed --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-12.xml @@ -0,0 +1,55 @@ + + + + BusyBox: Multiple vulnerabilities + Multiple vulnerabilities have been found in BusyBox, the worst of + which could allow remote attackers to execute arbitrary code. + + busybox + 2018-03-26 + 2018-03-26 + 563756 + 635392 + 638258 + remote + + + 1.28.0 + 1.28.0 + + + +

BusyBox is a set of tools for embedded systems and is a replacement for + GNU Coreutils. +

+
+ +

Multiple vulnerabilities have been discovered in BusyBox. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, or have + other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All BusyBox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/busybox-1.28.0" + +
+ + CVE-2017-15873 + CVE-2017-15874 + CVE-2017-16544 + + chrisadr + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-13.xml new file mode 100644 index 0000000000..746efc7ec5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-13.xml @@ -0,0 +1,52 @@ + + + + PLIB: User-assisted execution of arbitrary code + A vulnerability in PLIB may allow remote attackers to execute + arbitrary code. + + plib + 2018-03-26 + 2018-03-26 + 440762 + remote + + + 1.8.5-r1 + 1.8.5-r1 + + + +

PLIB includes sound effects, music, a complete 3D engine, font + rendering, a simple Windowing library, a game scripting language, a GUI, + networking, 3D math library and a collection of handy utility functions. +

+
+ +

A stack-based buffer overflow within the error function of + ssg/ssgParser.cxx was discovered in PLIB. +

+
+ +

A remote attacker, by enticing a user to open a specially crafted 3d + model file, could possibly execute arbitrary code with the privileges of + the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All PLIB users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/plib-1.8.5-r1" + +
+ + CVE-2012-4552 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-14.xml new file mode 100644 index 0000000000..71ba666fb6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201803-14.xml @@ -0,0 +1,169 @@ + + + + Mozilla Thunderbird: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, + the worst of which could lead to the execution of arbitrary code. + + thunderbird,thunderbird-bin + 2018-03-28 + 2018-03-28 + 627376 + 639048 + 643842 + 645812 + 645820 + remote + + + 52.6.0 + 52.6.0 + + + 52.6.0 + 52.6.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the + Mozilla project. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. + Please review the referenced Mozilla Foundation Security Advisories and + CVE identifiers below for details. +

+ +
+ +

A remote attacker may be able to execute arbitrary code, cause a Denial + of Service condition, obtain sensitive information, conduct URL + hijacking, or conduct cross-site scripting (XSS). +

+
+ +

There is no known workaround at this time.

+
+ +

All Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-52.6.0" + + +

All Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=mail-client/thunderbird-bin-52.6.0" + +
+ + + CVE-2017-7753 + + + CVE-2017-7779 + + + CVE-2017-7784 + + + CVE-2017-7785 + + + CVE-2017-7786 + + + CVE-2017-7787 + + + CVE-2017-7791 + + + CVE-2017-7792 + + + CVE-2017-7793 + + + CVE-2017-7800 + + + CVE-2017-7801 + + + CVE-2017-7802 + + + CVE-2017-7803 + + + CVE-2017-7805 + + + CVE-2017-7807 + + + CVE-2017-7809 + + + CVE-2017-7810 + + + CVE-2017-7814 + + + CVE-2017-7818 + + + CVE-2017-7819 + + + CVE-2017-7823 + + + CVE-2017-7824 + + + CVE-2017-7825 + + CVE-2017-7826 + CVE-2017-7828 + CVE-2017-7829 + CVE-2017-7830 + CVE-2017-7846 + CVE-2017-7847 + CVE-2017-7848 + CVE-2018-5089 + CVE-2018-5095 + CVE-2018-5096 + CVE-2018-5097 + CVE-2018-5098 + CVE-2018-5099 + CVE-2018-5102 + CVE-2018-5103 + CVE-2018-5104 + CVE-2018-5117 + + Mozilla Foundation Security Advisory 2017-20 + + + Mozilla Foundation Security Advisory 2017-23 + + + Mozilla Foundation Security Advisory 2017-26 + + + Mozilla Foundation Security Advisory 2017-30 + + + Mozilla Foundation Security Advisory 2018-04 + + + chrisadr + chrisadr +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201804-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201804-01.xml new file mode 100644 index 0000000000..96654f77e3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201804-01.xml @@ -0,0 +1,52 @@ + + + + libxslt: Multiple vulnerabilities + Multiple vulnerabilities were discovered in libxslt, the worst of + which may allow a remote attacker to execute arbitrary code. + + libxslt + 2018-04-04 + 2018-04-04 + 598204 + 612194 + remote + + + 1.1.30 + 1.1.30 + + + +

libxslt is the XSLT C library developed for the GNOME project. XSLT is + an XML language to define transformations for XML. +

+
+ +

Multiple vulnerabilities have been discovered in libxslt. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, via a crafted HTML page, could possibly execute + arbitrary code, cause a Denial of Service condition or leak information. +

+
+ +

There is no known workaround at this time.

+
+ +

All libxslt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libxslt-1.1.30" + +
+ + CVE-2016-4738 + CVE-2017-5029 + + BlueKnight + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201804-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201804-02.xml new file mode 100644 index 0000000000..efd4696cb7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201804-02.xml @@ -0,0 +1,63 @@ + + + + glibc: Multiple vulnerabilities + Multiple vulnerabilities have been found in glibc, the worst of + which could allow remote attackers to execute arbitrary code. + + glibc + 2018-04-04 + 2018-04-04 + 632556 + 634920 + 635118 + 641644 + 644278 + 646490 + 646492 + local, remote + + + 2.25-r11 + 2.25-r11 + + + +

glibc is a package that contains the GNU C library.

+
+ +

Multiple vulnerabilities have been discovered in glibc. Please review + the CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly execute arbitrary code, escalate privileges, + cause a Denial of Service condition, or have other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All glibc users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.25-r11" + +
+ + CVE-2017-14062 + CVE-2017-15670 + CVE-2017-15671 + CVE-2017-15804 + CVE-2017-16997 + + CVE-2018-1000001 + + CVE-2018-6485 + CVE-2018-6551 + + chrisadr + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 1ec5b0a9e8..f381d5b1a3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Wed, 07 Mar 2018 23:38:25 +0000 +Wed, 04 Apr 2018 14:08:19 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 5f1f6b8c86..febf2abf42 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -de3c19ca944a942c4db36136bf5abc8983cd6a6c 1520449520 2018-03-07T19:05:20+00:00 +e07af6df7a81524d31084c5565441abb9e572281 1522807580 2018-04-04T02:06:20+00:00