diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index ba505977f1..be0375e73b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 446941 BLAKE2B 27348febfa1e8b0c37a6262b9e1c30afa2668e0702870fc19e3e8e049c8aa3fce3a0a847ecfdfa1843e08f25b1c541365b360bee2789c88b7c7abd1d0af7a0a4 SHA512 b604df11b0bda8c02e03d8c0f183f427ec63dd525e2cbd5b7473a5dbfd7112d964e04f46efec437421b06496482ba2148b26225bcbd4b736cd57023d4aeb1ea7 -TIMESTAMP 2019-08-24T03:38:57Z +MANIFEST Manifest.files.gz 448845 BLAKE2B 24feded351e2c02762000f35c6c58ac935b2383bf6acdd7450f974e16e15fe0935d3f657233d5cd4ab87639ad5f410b8ea36fd5c019b93bfbfc47983ef01dbdc SHA512 569d13495f7e4953afefd29435d7953d3afa1815ae86459c1f4f84726efaaedc5598835f415738d792d2d1060be50cf8ad9140b7fcf124dd7f9ea681a55957ab +TIMESTAMP 2019-09-11T01:08:54Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl1gsVJfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl14SSZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klDIUQ/8DqVraS5XpijcFx0dQ2wh744XUAv0P/6BYLho0bUpb59ZPZ5HocB9qAny -Po3WeVcUUUyZWtoLSFbRXnk8w+1i4p/ghmcQ3+dH/CIznIC/MzPrQFyVasV+xlIm -OgiVN/OkNKIIyjPghfhrAEqIQa0Bq99jOxo2eO+7yirmuNA4xmytjVuPr+oIbQ1a -R5WvaXYmq58vA9zPVuMdnY4288QqfmBDqfnHDodEsim99/FGCEtI9yiNiIYEOnc+ -RWEAlc0msiHF3swIV1xsgpI9gqYiNm4da8dFoCQAaMJ4izzC7nMXfIDLgAyX8aSr -ebincWbRbGoQndud5UUH7n79Q3H5LV5IKn3pbk0RpEgZbmWSFoZbOZ+xu9L7pyNf -icYYO6zoir36SUUuLpPx3r59nTAoHDuT2Dq+OwDZMWMzbaVusFWu7/weNplSnn4z -n8qhI0yVALYtsHFUBe+U7ISwqDxhffMRz/Os3NfQS+FzQJWB9AmRuglYr6g9NvPl -DCK1Wl898YEXRpr8xapnAAHF0jHqykC3aKfrGl8L/l1aIPJ/eVyB67xj9cwXzx89 -nSR7lCsaBTBZPOqXwtomKtMrAKDFcp2ooZ8JgjYgrnnX48YBgWunDh/fk7jLho3Q -WvXT229nvy12g81L5Lb8Dk2V38fS28jFFyjneSa45guw9QWocIg= -=b+l5 +klDZSBAAqoFwooNC4OtE9pVq2cfjdzGkK9W5/lJi+aVvllk3srr5BHd8jakr9IJq +DaXZNkdcNs+ZSU2pW8wF3KG7r6b5Ib0KTTYHuMCSXJHSYNLBW60x1YHOUoQYdPGb +K26I7l61X742gFzmeGjXUaqUbN4Z99iYBTLD7VnYQCSMDPLirNF+0Mi35lrXA8OO +9nX63kLgvrmRpArBhjeR41JlfjqC5yqES3KWYYuzMO+V7L7smP9zmgf2NI9lZfCm +HIh4exi0xmHr0ZgW4wZgvLFuAxHE4BoMO+z5mW1Qb7CkTdEeizWsMxdQiGRgOT12 +WTUV3qW5QfHYTNuDHxhfrfRPQ6/+EhosLRrxWO0EHoYh/GNUJ/TdQATADJa+whLy +sXm9tuX/LriOlB1bPx6SakW2BNbTmve4XwocNKUh2Th02C9WsTiK4hNARnct+644 +FUuKCiCXK8/r1isozPY0YcnwDuQvBAS3diYo9b641BpCCSlhPqJuZDvl/9CFnqLF +z4LydlDnarNKWY1HXcrQnlzwwyPxpDHjfp2Mugrc4P0Nyr99/Vboale/rjIlZXFi +idIDlJZqTsznd1bM7vdZ4rzEsAbwS2DtWgfDk5xzHP9uYjt7srjrwT8PPHXf3fDn +MT6ZGrkgpOHqC/LswBWMNvzRJqTp1Zod08wjwJbr6XLWTK+z+vE= +=OjnX -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 8dde4ddcf5..e80a943da5 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-03.xml index 2b768c68c8..4a5520a3d1 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-03.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-03.xml @@ -7,7 +7,7 @@ jasper 2019-08-09 - 2019-08-09 + 2019-08-28 614028 614032 624988 @@ -63,7 +63,6 @@ CVE-2017-13753 CVE-2017-14132 CVE-2017-14229 - CVE-2017-14232 CVE-2017-5503 CVE-2017-5504 CVE-2017-5505 @@ -76,5 +75,5 @@ CVE-2018-9154 b-man - b-man + b-man diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-26.xml new file mode 100644 index 0000000000..9a757dd834 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-26.xml @@ -0,0 +1,54 @@ + + + + libofx: Multiple vulnerabilities + Multiple vulnerabilities have been found in libofx, the worst of + which could result in the arbitrary execution of code. + + libofx + 2019-08-31 + 2019-08-31 + 631304 + 636062 + 662910 + remote + + + 0.9.14 + 0.9.14 + + + +

A library to support the Open Financial eXchange XML format

+
+ +

Multiple vulnerabilities have been discovered in libofx. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to process a specially crafted + file using an application linked against libofx, possibly resulting in + execution of arbitrary code with the privileges of the process or a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libofx users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libofx-0.9.14" + +
+ + CVE-2017-14731 + CVE-2017-2816 + CVE-2017-2920 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-27.xml new file mode 100644 index 0000000000..6f7af7bbed --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-27.xml @@ -0,0 +1,46 @@ + + + + Nautilus: Security bypass + A vulnerability in Nautilus may allow attackers to escape the + sandbox. + + nautilus + 2019-08-31 + 2019-08-31 + 692784 + local + + + 3.30.5-r1 + 3.30.5-r1 + + + +

Default file manager for the GNOME desktop

+
+ +

A vulnerability was discovered in Nautilus which allows an attacker to + escape the sandbox. +

+
+ +

A local attacker could possibly bypass sandbox protection.

+
+ +

There is no known workaround at this time.

+
+ +

All Nautilus users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=gnome-base/nautilus-3.30.5-r1" + +
+ + CVE-2019-11461 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-28.xml new file mode 100644 index 0000000000..19818590fb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-28.xml @@ -0,0 +1,47 @@ + + + + GNOME desktop library: Security bypass + A vulnerability in the GNOME desktop library may allow attackers to + escape the sandbox. + + gnome-desktop + 2019-08-31 + 2019-08-31 + 692782 + local + + + 3.30.2.3 + 3.30.2.3 + + + +

Library with common API for various GNOME modules.

+
+ +

A vulnerability was discovered in the GNOME desktop library which allows + an attacker to escape the sandbox. +

+
+ +

A local attacker could possibly bypass sandbox protection.

+
+ +

There is no known workaround at this time.

+
+ +

All GNOME desktop library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=gnome-base/gnome-desktop-3.30.2.3" + +
+ + CVE-2019-11460 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-29.xml new file mode 100644 index 0000000000..4b86c592f6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201908-29.xml @@ -0,0 +1,52 @@ + + + + Dovecot: Multiple vulnerabilities + Multiple vulnerabilities have been found in Dovecot, the worst of + which could result in the arbitrary execution of code. + + dovecot + 2019-08-31 + 2019-08-31 + 683732 + 692572 + local, remote + + + 2.3.7.2 + 2.3.7.2 + + + +

Dovecot is an open source IMAP and POP3 email server.

+
+ +

Multiple vulnerabilities have been discovered in Dovecot. Please review + the CVE identifiers referenced below for details. +

+
+ +

An unauthenticated remote attacker could send a specially crafted mail + or use crafted IMAP commands possibly resulting in the execution of + arbitrary code with the privileges of the process or a Denial of Service + condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Dovecot users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-mail/dovecot-2.3.7.2" + +
+ + CVE-2019-10691 + CVE-2019-11500 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-01.xml new file mode 100644 index 0000000000..d94daf002b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-01.xml @@ -0,0 +1,53 @@ + + + + Perl: Multiple vulnerabilities + Multiple vulnerabilities have been found in Perl, the worst of + which could result in the arbitrary execution of code. + + perl + 2019-09-06 + 2019-09-06 + 653432 + 670190 + remote + + + 5.28.2 + 5.28.2 + + + +

Perl is a highly capable, feature-rich programming language.

+
+ +

Multiple vulnerabilities have been discovered in Perl. Please review the + CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Perl users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/perl-5.28.2" + +
+ + CVE-2018-18311 + CVE-2018-18312 + CVE-2018-18313 + CVE-2018-18314 + CVE-2018-6797 + CVE-2018-6798 + CVE-2018-6913 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-02.xml new file mode 100644 index 0000000000..14e36289ad --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-02.xml @@ -0,0 +1,57 @@ + + + + VLC: Multiple vulnerabilities + Multiple vulnerabilities have been found in VLC, the worst of which + could result in the arbitrary execution of code. + + vlc + 2019-09-06 + 2019-09-06 + 689974 + remote + + + 3.0.8 + 3.0.8 + + + +

VLC is a cross-platform media player and streaming server.

+
+ +

Multiple vulnerabilities have been discovered in VLC. Please review the + CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All VLC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/vlc-3.0.8" + +
+ + CVE-2019-13602 + CVE-2019-13962 + CVE-2019-14437 + CVE-2019-14438 + CVE-2019-14498 + CVE-2019-14533 + CVE-2019-14534 + CVE-2019-14535 + CVE-2019-14776 + CVE-2019-14777 + CVE-2019-14778 + CVE-2019-14970 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-03.xml new file mode 100644 index 0000000000..70b47802e0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-03.xml @@ -0,0 +1,52 @@ + + + + Pango: Buffer overflow + A buffer overflow in Pango might allow an attacker to execute + arbitrary code. + + pango + 2019-09-06 + 2019-09-06 + 692110 + remote + + + 1.42.4-r2 + 1.42.4-r2 + + + +

Pango is a library for layout and rendering of internationalized text.

+
+ +

A buffer overflow has been discovered in Pango’s + pango_log2vis_get_embedding_levels function. +

+
+ +

A remote attacker could entice a user to process a specially crafted + string with functions like pango_itemize, possibly resulting in execution + of arbitrary code with the privileges of the process or a Denial of + Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Pango users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/pango-1.42.4-r2" + +
+ + + CVE-2019-1010238 + + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-04.xml new file mode 100644 index 0000000000..0d229fc592 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-04.xml @@ -0,0 +1,53 @@ + + + + Apache: Multiple vulnerabilities + Multiple vulnerabilities have been found in Apache, the worst of + which could result in a Denial of Service condition. + + apache + 2019-09-06 + 2019-09-06 + 692172 + remote + + + 2.4.41 + 2.4.41 + + + +

The Apache HTTP server is one of the most popular web servers on the + Internet. +

+
+ +

Multiple vulnerabilities have been discovered in Apache. Please review + the CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Apache users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.41" + +
+ + CVE-2019-10081 + CVE-2019-10082 + CVE-2019-10092 + CVE-2019-10097 + CVE-2019-10098 + CVE-2019-9517 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-05.xml new file mode 100644 index 0000000000..dfe043bf6a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-05.xml @@ -0,0 +1,118 @@ + + + + WebkitGTK+: Multiple vulnerabilities + Multiple vulnerabilities have been found in WebkitGTK+, the worst + of which could result in the arbitrary execution of code. + + webkitgtk+ + 2019-09-06 + 2019-09-06 + 683234 + 686216 + 693122 + remote + + + 2.24.4 + 2.24.4 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, + suitable for projects requiring any kind of web integration, from hybrid + HTML/CSS applications to full-fledged web browsers. +

+
+ +

Multiple vulnerabilities have been discovered in WebkitGTK+. Please + review the CVE identifiers referenced below for details. +

+
+ +

An attacker, by enticing a user to visit maliciously crafted web + content, may be able to execute arbitrary code or cause memory + corruption. +

+
+ +

There is no known workaround at this time.

+
+ +

All WebkitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.24.4" + +
+ + CVE-2019-11070 + CVE-2019-6201 + CVE-2019-6251 + CVE-2019-7285 + CVE-2019-7292 + CVE-2019-8503 + CVE-2019-8506 + CVE-2019-8515 + CVE-2019-8518 + CVE-2019-8523 + CVE-2019-8524 + CVE-2019-8535 + CVE-2019-8536 + CVE-2019-8544 + CVE-2019-8551 + CVE-2019-8558 + CVE-2019-8559 + CVE-2019-8563 + CVE-2019-8595 + CVE-2019-8607 + CVE-2019-8615 + CVE-2019-8644 + CVE-2019-8644 + CVE-2019-8649 + CVE-2019-8649 + CVE-2019-8658 + CVE-2019-8658 + CVE-2019-8666 + CVE-2019-8666 + CVE-2019-8669 + CVE-2019-8669 + CVE-2019-8671 + CVE-2019-8671 + CVE-2019-8672 + CVE-2019-8672 + CVE-2019-8673 + CVE-2019-8673 + CVE-2019-8676 + CVE-2019-8676 + CVE-2019-8677 + CVE-2019-8677 + CVE-2019-8678 + CVE-2019-8678 + CVE-2019-8679 + CVE-2019-8679 + CVE-2019-8680 + CVE-2019-8680 + CVE-2019-8681 + CVE-2019-8681 + CVE-2019-8683 + CVE-2019-8683 + CVE-2019-8684 + CVE-2019-8684 + CVE-2019-8686 + CVE-2019-8686 + CVE-2019-8687 + CVE-2019-8687 + CVE-2019-8688 + CVE-2019-8688 + CVE-2019-8689 + CVE-2019-8689 + CVE-2019-8690 + CVE-2019-8690 + WSA-2019-0002 + WSA-2019-0004 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-06.xml new file mode 100644 index 0000000000..b8780c5902 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-06.xml @@ -0,0 +1,54 @@ + + + + Exim: Multiple vulnerabilities + Multiple vulnerabilities have been found in Exim, the worst of + which allows remote attackers to execute arbitrary code. + + exim + 2019-09-07 + 2019-09-07 + 692394 + 693494 + remote + + + 4.92.2 + 4.92.2 + + + +

Exim is a message transfer agent (MTA) designed to be a a highly + configurable, drop-in replacement for sendmail. +

+
+ +

Multiple vulnerabilities have been discovered in Exim. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by connecting to the SMTP listener daemon, could + possibly execute arbitrary code with the privileges of the process or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Exim users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-mta/exim-4.92.2" + + +
+ + CVE-2019-13917 + CVE-2019-15846 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-07.xml new file mode 100644 index 0000000000..a911119695 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-07.xml @@ -0,0 +1,64 @@ + + + + Simple DirectMedia Layer: Multiple vulnerabilities + Multiple vulnerabilities have been found in Simple DirectMedia + Layer, the worst of which could result in the arbitrary execution of code. + + libsdl2 + 2019-09-08 + 2019-09-08 + 690064 + 692392 + remote + + + 2.0.10 + 2.0.10 + + + +

Simple DirectMedia Layer is a cross-platform development library + designed to provide low level access to audio, keyboard, mouse, joystick, + and graphics hardware via OpenGL and Direct3D. +

+
+ +

Multiple vulnerabilities have been discovered in Simple DirectMedia + Layer. Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to process a specially crafted + audio or video, possibly resulting in execution of arbitrary code with + the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Simple DirectMedia Layer users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libsdl2-2.0.10" + + +
+ + CVE-2019-13626 + CVE-2019-7572 + CVE-2019-7573 + CVE-2019-7574 + CVE-2019-7575 + CVE-2019-7576 + CVE-2019-7577 + CVE-2019-7578 + CVE-2019-7635 + CVE-2019-7636 + CVE-2019-7638 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-08.xml new file mode 100644 index 0000000000..7f2b359063 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201909-08.xml @@ -0,0 +1,49 @@ + + + + D-Bus: Authentication bypass + An authentication bypass was discovered in D-Bus. + dbus + 2019-09-08 + 2019-09-08 + 687900 + local + + + 1.12.16 + 1.12.16 + + + +

D-Bus is a message bus system which processes can use to talk to each + other. +

+
+ +

It was discovered that a local attacker could manipulate symbolic links + in their own home directory to bypass authentication and connect to a + DBusServer with elevated privileges. +

+
+ +

A local attacker can bypass authentication mechanisms and elevate + privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All D-Bus users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/dbus-1.12.16" + +
+ + CVE-2019-12749 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 3dd5bc60c7..ce53b3ac10 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Sat, 24 Aug 2019 03:38:54 +0000 +Wed, 11 Sep 2019 01:08:51 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index a0dca6b119..933a7041a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -55b0fff2f98b275d6a6bcaf8e12164157936324c 1566095478 2019-08-18T02:31:18+00:00 +0d8b041795d355b2f8da9b84725a62150a91dc13 1567964538 2019-09-08T17:42:18+00:00