diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-16.xml new file mode 100644 index 0000000000..f6944b12de --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-16.xml @@ -0,0 +1,52 @@ + + + + GNU Wget: Header injection + A header injection vulnerability in GNU Wget might allow remote + attackers to inject arbitrary HTTP headers. + + wget + 2017-06-20 + 2017-06-20: 1 + 612326 + remote + + + 1.19.1-r1 + 1.19.1-r1 + + + +

GNU Wget is a free software package for retrieving files using HTTP, + HTTPS and FTP, the most widely-used Internet protocols. +

+
+ +

It was discovered that there was a header injection vulnerability in GNU + Wget which allowed remote attackers to inject arbitrary HTTP headers via + CRLF sequences in the host subcomponent of a URL. +

+
+ +

A remote attacker could inject arbitrary HTTP headers in requests by + tricking a user running GNU Wget into processing crafted URLs. +

+
+ +

There is no known workaround at this time.

+
+ +

All GNU Wget users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/wget-1.19.1-r1" + + +
+ + CVE-2017-6508 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-17.xml new file mode 100644 index 0000000000..5b704e20ec --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-17.xml @@ -0,0 +1,59 @@ + + + + Kodi: Multiple vulnerabilities + Multiple vulnerabilities have been found in Kodi, the worst of + which could allow remote attackers to execute arbitrary code. + + kodi + 2017-06-20 + 2017-06-20: 1 + 549342 + 619492 + remote + + + 17.2 + 17.2 + + + +

Kodi (formerly XBMC) is a free and open-source media player software + application. +

+
+ +

Multiple vulnerabilities have been discovered in Kodi. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted image + file using Kodi, possibly resulting in a Denial of Service condition. +

+ +

Furthermore, a remote attacker could entice a user process a specially + crafted ZIP file containing subtitles using Kodi, possibly resulting in + execution of arbitrary code with the privileges of the process or a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Kodi users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-tv/kodi-17.2" + + +
+ + CVE-2015-3885 + CVE-2017-8314 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-18.xml new file mode 100644 index 0000000000..79e77936af --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-18.xml @@ -0,0 +1,56 @@ + + + + mbed TLS: Multiple vulnerabilities + Multiple vulnerabilities have been found in mbed TLS, the worst of + which could lead to the remote execution of arbitrary code. + + mbedtls + 2017-06-20 + 2017-06-20: 1 + 562608 + 571102 + 618824 + remote + + + 2.4.2 + 2.4.2 + + + +

mbed TLS (previously PolarSSL) is an “easy to understand, use, + integrate and expand” implementation of the TLS and SSL protocols and + the respective cryptographic algorithms and support code required. +

+
+ +

Multiple vulnerabilities have been discovered in mbed TLS. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All mbed TLS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/mbedtls-2.4.2" + + +
+ + CVE-2015-5291 + CVE-2015-7575 + CVE-2017-2784 + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-19.xml new file mode 100644 index 0000000000..6869b02f42 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-19.xml @@ -0,0 +1,61 @@ + + + + GNU C Library: Multiple vulnerabilities + Multiple vulnerabilities have been found in the GNU C Library, the + worst of which may allow execution of arbitrary code. + + glibc + 2017-06-20 + 2017-06-20: 2 + 608698 + 608706 + 622220 + local, remote + + + 2.23-r4 + 2.23-r4 + + + +

The GNU C library is the standard C library used by Gentoo Linux + systems. +

+
+ +

Multiple vulnerabilities have been discovered in the GNU C Library. + Please review the CVE identifiers and Qualys’ security advisory + referenced below for details. +

+
+ +

An attacker could possibly execute arbitrary code with the privileges of + the process, escalate privileges or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All GNU C Library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.23-r4" + + +
+ + CVE-2015-5180 + CVE-2016-6323 + + CVE-2017-1000366 + + + Qualys Security Advisory - The Stack Clash + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-20.xml new file mode 100644 index 0000000000..e649e4f7ee --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-20.xml @@ -0,0 +1,76 @@ + + + + Chromium: Multiple vulnerabilities + Multiple vulnerabilities have been found in the Chromium web + browser, the worst of which allows remote attackers to execute arbitrary + code. + + Chromium + 2017-06-20 + 2017-06-20: 1 + 617504 + 620956 + 621886 + remote + + + 59.0.3071.104 + 59.0.3071.104 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+
+ +

Multiple vulnerabilities have been discovered in the Chromium web + browser. Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, obtain + sensitive information, bypass security restrictions or spoof content. +

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-59.0.3071.104" + + +
+ + CVE-2017-5068 + CVE-2017-5070 + CVE-2017-5071 + CVE-2017-5072 + CVE-2017-5073 + CVE-2017-5074 + CVE-2017-5075 + CVE-2017-5076 + CVE-2017-5077 + CVE-2017-5078 + CVE-2017-5079 + CVE-2017-5080 + CVE-2017-5081 + CVE-2017-5082 + CVE-2017-5083 + CVE-2017-5084 + CVE-2017-5085 + CVE-2017-5086 + CVE-2017-5087 + CVE-2017-5088 + CVE-2017-5089 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index b71ca59b35..66f5606df3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Fri, 16 Jun 2017 18:39:35 +0000 +Thu, 22 Jun 2017 02:08:59 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 0fd976b0ad..ccf6b20b22 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -c2f911fc13b81dd715a1b756f739b077f8718170 1496836599 2017-06-07T11:56:39+00:00 +18375d0b60539dde07bb13258d4de5105b9e188e 1497985227 2017-06-20T19:00:27+00:00