diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 6f42c1c615..97017d50f6 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 555493 BLAKE2B 9b9c68f6fcd5aa241244f03965d32d2bee2397eebacb0b4742f3b5eff9058f33cdb8d4c1f96505cd2a1acaed4347077a204862e5674effe944e54b05e7466726 SHA512 bf81aa35acfc8893b8a8ffc0d57915c1a8e6b54e9400f0d03f26dd199de30e2601f7a7c1060d2185e26c3276979665ae687fb8e8a1e2b4d537df4a3270e38d43 -TIMESTAMP 2023-12-01T06:40:02Z +MANIFEST Manifest.files.gz 558197 BLAKE2B dde0fd5bc1749affc0b48b285b7ab9bd0a7216628f650cd3cbf0e6b2a1788ebd2dc667afbfee3491b42c071ba583d8c7e204468384a8f639b22206d6cbf47903 SHA512 6a3cf3862910d3680e54853c513e07b7a7d791fa5a5732653e79584f351498dd0ac5f7c244cf38dd9920afd7da27fd2c1e7a51770500da41d964a2a5ddd6ec92 +TIMESTAMP 2024-01-01T06:39:54Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmVpf8JfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmWSXjpfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klAidhAApvskqQHXNDKb23KYww5txqWvEIG7F3zNXzL2khrVh1PxoPhey6mf/bO5 -75lyy0i5D6MZuEUMJW2MEIrcqALpz7mmfPD8v2D/OT053XqP7UuLPBKeeTlQ2w+m -KpCvgMohqFVQjMVlKbYtCAq1Fx3tvafo03JCTseKlZ2sF8xdxIo0sMJGBs2tSc5J -vaxjkT2Wo4CSn0XT8G1g1d6iLIs4eIhKsDWy759WyCU/43g1TzGXqDGhIQSXEX0C -oeJsKK/V1fLPLcP9CnoqRGQ46/L8LdjTDYfb9caKgQ8lCh/hqZce3Lqfyh4KRd2k -uw51if5KABbRAQ4Qc12l1S8JQH4T0yR/BB70ywb50dIfxmQJQrzpr5ybhv5P66jz -EJkpNShtvrZvuYxF71KpTYsuJWNnNuJLRUIrywtyj4f1rmxgqdBRDec+ycrjNGOl -MzCrk3PgEb6lV6qvMicyVYakq6Yl861hVE9kquoh0djsm9velGXnV1l1+jcTLubH -0pPS4luIVhkGuGzoej7UOwhdpUdeZjqPcPPF63+VeIJVZscAizlGnYP/IE7DNyYQ -PBSphTSR5s50IRItmnuDdnzitwmGQM5ngWDFO7Y8T4icxN34GlxpV/LmODnweutd -KNt68X7UTuhNoKV7+ifeunQ3fu7q/VdI5an9REaGKVg/eFoFvtk= -=S+ig +klB20BAAqVFxMgUnpYZN3TY1cE1pYHAycfbddPzAPAx0I3yPolECfSJpH5UP5EEF +r23EVYdedYTG4cj4cXLRRr0cWdI5/2xHN5YzXqMQdAiNekIjeNc/d/bz+fKXbAZv +a2hGFz71burELuaLhtUOgHhxTPZGA7dZ82k2ZkrHdd3zVyxp6rzS1uQOWj6uKib6 +2dGfgRR+sUdAgIFTexJuCRCt861U5LXEeE7kj8tGXE0kc93JXG5QS3b2NmDvY7GZ +COv3ZeAjYVGkfDQtQtzekL+Sd4UyvICHEZ2M1vPVc5RFFjNUuyC2q7P73DoKXKvD +2RQ4SL7/w9EoBtA+8/glaX59LdnOzIQYtwcmBjfhVn1628RwJesKpAFFVag1hYED +uxh2vlcC/PkvqCf/yYExNh6Krm1agmm4ZJ1l56GckCQWgGgRAwkVt3tjlsNdUoxX +55gRtYMLj153y/2Z2ULpMmB6wOvPNwzSbZ5h9+EMt6UnK6QtDVqO5zc5fVPfpNj5 +0mMNdF1XEfcm64fYeu5IRc2B8MIFGr9c9cFKP4hWXXCMEjB78UtICqwDihgD0s4T +T1zRCMhX5gJv77xwNy6OHe9voXkhV5i3XLyW8fpRTIgWx9WooiFCsDPQLDr/4Qv1 +kqUMaIxkUBmAdOh28ouAd4w2gKe1AqeLLr9quaN7LTItxG77BaI= +=4bYj -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 0ed9dcec42..c1be36f2d9 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-01.xml new file mode 100644 index 0000000000..1508a2eaf0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-01.xml @@ -0,0 +1,49 @@ + + + + Leptonica: Multiple Vulnerabilities + Several vulnerabilities have been found in Leptonice, the worst of which could lead to arbitrary code execution. + leptonica + 2023-12-18 + 2023-12-18 + 649752 + 869416 + remote + + + 1.81.0 + 1.81.0 + + + +

Leptonica is a C library for image processing and analysis.

+
+ +

Multiple vulnerabilities have been discovered in Leptonica. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Leptonica users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/leptonica-1.81.0" + +
+ + CVE-2017-18196 + CVE-2018-7186 + CVE-2018-7247 + CVE-2018-7440 + CVE-2018-7441 + CVE-2018-7442 + CVE-2022-38266 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-02.xml new file mode 100644 index 0000000000..2c69fd4765 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-02.xml @@ -0,0 +1,42 @@ + + + + Minecraft Server: Remote Code Execution + A vulnerability has been found in Minecraft Server which leads to remote code execution. + minecraft-server + 2023-12-20 + 2023-12-20 + 828936 + remote + + + 1.18.1 + 1.18.1 + + + +

Minecraft Server is the official server for the sandbox video game.

+
+ +

A vulnerability has been discovered in Minecraft Server. Please review the CVE identifier referenced below for details.

+
+ +

Vulnerable Minecraft Server versions include a bundled version of log4j which is vulnerable to remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All Minecraft Server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=games-server/minecraft-server-1.18.1" + +
+ + CVE-2021-4104 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-03.xml new file mode 100644 index 0000000000..496cadb339 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-03.xml @@ -0,0 +1,62 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, the worst of which could lead to remote code execution. + thunderbird,thunderbird-bin + 2023-12-20 + 2023-12-20 + 908246 + remote + + + 102.12 + 102.12 + + + 102.12 + 102.12 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-102.12" + + +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-102.12" + +
+ + CVE-2023-32205 + CVE-2023-32206 + CVE-2023-32207 + CVE-2023-32211 + CVE-2023-32212 + CVE-2023-32213 + CVE-2023-32214 + CVE-2023-32215 + CVE-2023-34414 + CVE-2023-34416 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-04.xml new file mode 100644 index 0000000000..6bd77e7aab --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-04.xml @@ -0,0 +1,42 @@ + + + + Arduino: Remote Code Execution + A vulnerability has been found in Arduino which bundled a vulnerable version of log4j. + arduino + 2023-12-22 + 2023-12-22 + 830716 + remote + + + 1.8.19 + 1.8.19 + + + +

Arduino is an open-source AVR electronics prototyping platform.

+
+ +

A vulnerability has been discovered in Arduino. Please review the CVE identifier referenced below for details.

+
+ +

Arduino bundles a vulnerable version of log4j that may lead to remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All Arduino users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-embedded/arduino-1.8.19" + +
+ + CVE-2021-4104 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-05.xml new file mode 100644 index 0000000000..7f286dd03d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-05.xml @@ -0,0 +1,46 @@ + + + + libssh: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libssh, the worst of which could lead to remote code execution. + libssh + 2023-12-22 + 2023-12-22 + 810517 + 905746 + remote + + + 0.10.5 + 0.10.5 + + + +

libssh is a multiplatform C library implementing the SSHv2 protocol on client and server side.

+
+ +

Multiple vulnerabilities have been discovered in libssh. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libssh users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libssh-0.10.5" + +
+ + CVE-2021-3634 + CVE-2023-1667 + CVE-2023-2283 + GHSL-2023-085 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-06.xml new file mode 100644 index 0000000000..9943781b29 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-06.xml @@ -0,0 +1,69 @@ + + + + Exiv2: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Exiv2, the worst of which can lead to remote code execution. + exiv2 + 2023-12-22 + 2023-12-22 + 785646 + 807346 + 917650 + local and remote + + + 0.28.1 + 0.28.1 + + + +

Exiv2 is a C++ library and set of tools for parsing, editing and saving Exif and IPTC metadata from images. Exif, the Exchangeable image file format, specifies the addition of metadata tags to JPEG, TIFF and RIFF files.

+
+ +

Multiple vulnerabilities have been discovered in Exiv2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Exiv2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/exiv2-0.28.1" + +
+ + CVE-2020-18771 + CVE-2020-18773 + CVE-2020-18774 + CVE-2020-18899 + CVE-2021-29457 + CVE-2021-29458 + CVE-2021-29463 + CVE-2021-29464 + CVE-2021-29470 + CVE-2021-29473 + CVE-2021-29623 + CVE-2021-31291 + CVE-2021-31292 + CVE-2021-32617 + CVE-2021-32815 + CVE-2021-34334 + CVE-2021-34335 + CVE-2021-37615 + CVE-2021-37616 + CVE-2021-37618 + CVE-2021-37619 + CVE-2021-37620 + CVE-2021-37621 + CVE-2021-37622 + CVE-2021-37623 + CVE-2023-44398 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-07.xml new file mode 100644 index 0000000000..66081cf21c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-07.xml @@ -0,0 +1,87 @@ + + + + QtWebEngine: Multiple Vulnerabilities + Multiple vulnerabilitiies have been discovered in QtWebEngine, the worst of which could lead to remote code execution. + qtwebengine + 2023-12-22 + 2023-12-22 + 913050 + 915465 + remote + + + 5.15.11_p20231120 + 5.15.11_p20231120 + + + +

QtWebEngine is a library for rendering dynamic web content in Qt5 and Qt6 C++ and QML applications.

+
+ +

Multiple vulnerabilities have been discovered in QtWebEngine. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All QtWebEngine users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtwebengine-5.15.11_p20231120" + +
+ + CVE-2023-4068 + CVE-2023-4069 + CVE-2023-4070 + CVE-2023-4071 + CVE-2023-4072 + CVE-2023-4073 + CVE-2023-4074 + CVE-2023-4075 + CVE-2023-4076 + CVE-2023-4077 + CVE-2023-4078 + CVE-2023-4761 + CVE-2023-4762 + CVE-2023-4763 + CVE-2023-4764 + CVE-2023-5218 + CVE-2023-5473 + CVE-2023-5474 + CVE-2023-5475 + CVE-2023-5476 + CVE-2023-5477 + CVE-2023-5478 + CVE-2023-5479 + CVE-2023-5480 + CVE-2023-5481 + CVE-2023-5482 + CVE-2023-5483 + CVE-2023-5484 + CVE-2023-5485 + CVE-2023-5486 + CVE-2023-5487 + CVE-2023-5849 + CVE-2023-5850 + CVE-2023-5851 + CVE-2023-5852 + CVE-2023-5853 + CVE-2023-5854 + CVE-2023-5855 + CVE-2023-5856 + CVE-2023-5857 + CVE-2023-5858 + CVE-2023-5859 + CVE-2023-5996 + CVE-2023-5997 + CVE-2023-6112 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-08.xml new file mode 100644 index 0000000000..ef351a71a4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-08.xml @@ -0,0 +1,42 @@ + + + + LibRaw: Heap Buffer Overflow + A vulnerability has been found in LibRaw where a heap buffer overflow may lead to an application crash. + libraw + 2023-12-22 + 2023-12-22 + 908041 + remote + + + 0.21.1-r1 + 0.21.1-r1 + + + +

LibRaw is a library for reading RAW files obtained from digital photo cameras.

+
+ +

A vulnerability has been discovered in LibRaw. Please review the CVE identifier referenced below for details.

+
+ +

A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.

+
+ +

There is no known workaround at this time.

+
+ +

All LibRaw users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libraw-0.21.1-r1" + +
+ + CVE-2023-1729 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-09.xml new file mode 100644 index 0000000000..2073312aa8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-09.xml @@ -0,0 +1,45 @@ + + + + NASM: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in NASM, the worst of which could lead to arbitrary code execution. + nasm + 2023-12-22 + 2023-12-22 + 686720 + 903755 + local and remote + + + 2.16.01 + 2.16.01 + + + +

NASM is a 80x86 assembler that has been created for portability and modularity. NASM supports Pentium, P6, SSE MMX, and 3DNow extensions. It also supports a wide range of objects formats (ELF, a.out, COFF, etc), and has its own disassembler.

+
+ +

Multiple vulnerabilities have been discovered in NASM. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All NASM users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/nasm-2.16.01" + +
+ + CVE-2019-8343 + CVE-2020-21528 + CVE-2022-44370 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-10.xml new file mode 100644 index 0000000000..2f3185e353 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-10.xml @@ -0,0 +1,42 @@ + + + + Ceph: Root Privilege Escalation + A vulnerability has been found in Ceph which can lead to root privilege escalation. + ceph + 2023-12-23 + 2023-12-23 + 878277 + local + + + 17.2.6 + 17.2.6 + + + +

Ceph is a distributed network file system designed to provide excellent performance, reliability, and scalability.

+
+ +

A vulnerability has been discovered in Ceph. Please review the CVE identifier referenced below for details.

+
+ +

The ceph-crash.service runs the ceph-crash Python script as root. The script is operating in the directory /var/lib/ceph/crash which is controlled by the unprivileged ceph user (ceph:ceph mode 0750). The script periodically scans for new crash directories and forwards the content via `ceph crash post`.

+
+ +

There is no known workaround at this time.

+
+ +

All Ceph users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-cluster/ceph-17.2.6" + +
+ + CVE-2022-3650 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-11.xml new file mode 100644 index 0000000000..8a76344d53 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-11.xml @@ -0,0 +1,42 @@ + + + + SABnzbd: Remote Code Execution + A vulnerability has been found in SABnzbd which allows for remote code execution. + sabnzbd + 2023-12-23 + 2023-12-23 + 908032 + remote + + + 4.0.2 + 4.0.2 + + + +

Free and easy binary newsreader with web interface.

+
+ +

A vulnerability has been discovered in SABnzbd. Please review the CVE identifier referenced below for details.

+
+ +

A design flaw was discovered in SABnzbd that could allow remote code execution. Manipulating the Parameters setting in the Notification Script functionality allows code execution with the privileges of the SABnzbd process. Exploiting the vulnerabilities requires access to the web interface. Remote exploitation is possible if users exposed their setup to the internet or other untrusted networks without setting a username/password. By default SABnzbd is only accessible from `localhost`, with no authentication required for the web interface.

+
+ +

There is no known workaround at this time.

+
+ +

All SABnzbd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-nntp/sabnzbd-4.0.2" + +
+ + CVE-2023-34237 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-12.xml new file mode 100644 index 0000000000..2cf088a783 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-12.xml @@ -0,0 +1,52 @@ + + + + Flatpak: Multiple Vulnerabilities + Several vulnerabilities have been found in Flatpack, the worst of which lead to privilege escalation and sandbox escape. + flatpak + 2023-12-23 + 2023-12-23 + 775365 + 816951 + 831087 + 901507 + remote + + + 1.14.4 + 1.14.4 + + + +

Flatpak is a Linux application sandboxing and distribution framework.

+
+ +

Multiple vulnerabilities have been discovered in Flatpak. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Flatpak users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/flatpak-1.14.4" + +
+ + CVE-2021-21381 + CVE-2021-41133 + CVE-2021-43860 + CVE-2022-21682 + CVE-2023-28100 + CVE-2023-28101 + GHSA-67h7-w3jq-vh4q + GHSA-xgh4-387p-hqpp + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-13.xml new file mode 100644 index 0000000000..b7e051ae5f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-13.xml @@ -0,0 +1,45 @@ + + + + Gitea: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Gitea, the worst of which could result in information leakage. + gitea + 2023-12-23 + 2023-12-23 + 887825 + 891983 + 905886 + 918674 + remote + + + 1.20.6 + 1.20.6 + + + +

Gitea is a painless self-hosted Git service.

+
+ +

Multiple vulnerabilities have been discovered in Gitea. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Gitea users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-apps/gitea-1.20.6" + +
+ + CVE-2023-3515 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-14.xml new file mode 100644 index 0000000000..d3f9f79b93 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-14.xml @@ -0,0 +1,60 @@ + + + + FFmpeg: Multiple Vulnerabilities + Multiple vulnerabilitiies have been discovered in FFmpeg, the worst of which could lead to code execution + ffmpeg + 2023-12-23 + 2023-12-23 + 795696 + 842267 + 881523 + 903805 + local and remote + + + 6.0 + 4.4.3 + 6.0 + 4.4.3 + + + +

FFmpeg is a complete solution to record, convert and stream audio and video.

+
+ +

Multiple vulnerabilities have been discovered in FFmpeg. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All FFmpeg 4 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-4.4.3" + + +

All FFmpeg 6 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-6.0" + +
+ + CVE-2021-33815 + CVE-2021-38171 + CVE-2021-38291 + CVE-2022-1475 + CVE-2022-3964 + CVE-2022-3965 + CVE-2022-48434 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-15.xml new file mode 100644 index 0000000000..0dea689016 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-15.xml @@ -0,0 +1,57 @@ + + + + Git: Multiple Vulnerabilities + Several vulnerabilities have been found in Git, the worst of which could lead to remote code execution. + git + 2023-12-27 + 2023-12-27 + 838127 + 857831 + 877565 + 891221 + 894472 + 905088 + remote + + + 2.39.3 + 2.39.3 + + + +

Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency.

+
+ +

Multiple vulnerabilities have been discovered in Git. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Git users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.39.3" + +
+ + CVE-2022-23521 + CVE-2022-24765 + CVE-2022-29187 + CVE-2022-39253 + CVE-2022-39260 + CVE-2022-41903 + CVE-2023-22490 + CVE-2023-23946 + CVE-2023-25652 + CVE-2023-25815 + CVE-2023-29007 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-16.xml new file mode 100644 index 0000000000..9b577f4d40 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-16.xml @@ -0,0 +1,44 @@ + + + + libssh: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libssh, the worst of which could lead to code execution. + libssh + 2023-12-28 + 2023-12-28 + 920291 + 920724 + remote + + + 0.10.6 + 0.10.6 + + + +

libssh is a multiplatform C library implementing the SSHv2 protocol on client and server side.

+
+ +

Multiple vulnerabilities have been discovered in libssh. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libssh users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libssh-0.10.6" + +
+ + CVE-2023-6004 + CVE-2023-48795 + + sam + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-17.xml new file mode 100644 index 0000000000..a6dcf89015 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202312-17.xml @@ -0,0 +1,45 @@ + + + + OpenSSH: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenSSH, the worst of which could lead to code execution. + openssh + 2023-12-28 + 2023-12-28 + 920292 + 920722 + remote + + + 9.6_p1 + 9.6_p1 + + + +

OpenSSH is a free application suite consisting of server and clients that replace tools like telnet, rlogin, rcp and ftp with more secure versions offering additional functionality.

+
+ +

Multiple vulnerabilities have been discovered in OpenSSH. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSSH users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/openssh-9.6_p1" + +
+ + CVE-2023-48795 + CVE-2023-51385 + CVE-2023-51385,CVE-2023-48795 + + sam + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index bc8f331575..0634b94f03 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Fri, 01 Dec 2023 06:39:59 +0000 +Mon, 01 Jan 2024 06:39:51 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 313f325014..3525270838 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -e8cae5eafb887bc451b4344e6de2d99b8d6e75de 1701088111 2023-11-27T12:28:31+00:00 +3dfe782899716a3480c9481c69bca8c231c663a7 1703730129 2023-12-28T02:22:09+00:00