diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-03.xml new file mode 100644 index 0000000000..eb410aeb50 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-03.xml @@ -0,0 +1,91 @@ + + + + LibreOffice, OpenOffice: Multiple vulnerabilities + Multiple vulnerabilities have been found in both LibreOffice and + OpenOffice, the worst of which allows for the remote execution of arbitrary + code. + + + November 04, 2016 + November 04, 2016: 1 + 565026 + 587566 + remote + + + 5.1.4.2 + 5.1.4.2 + + + 5.1.4.2 + 5.1.4.2 + + + 4.1.2 + 4.1.2 + + + +

LibreOffice is a powerful office suite; its clean interface and powerful + tools let you unleash your creativity and grow your productivity. +

+ +

Apache OpenOffice is the leading open-source office software suite for + word processing, spreadsheets, presentations, graphics, databases and + more. +

+
+ +

Multiple vulnerabilities have been found in both LibreOffice and + OpenOffice. Please review the referenced CVE’s for specific + information regarding each. +

+
+ +

Remote attackers could obtain sensitive information, cause a Denial of + Service condition, or execute arbitrary code. +

+
+ +

There is no known work around at this time.

+
+ +

All LibreOffice users should upgrade their respective packages to the + latest version: +

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-office/libreoffice-5.1.4.2" + # emerge --ask --oneshot --verbose + ">=app-office/libreoffice-bin-debug-5.1.4.2" + + +

All OpenOffice users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-4.1.2" + +
+ + + CVE-2015-4551 + + + CVE-2015-5212 + + + CVE-2015-5213 + + + CVE-2015-5214 + + CVE-2016-4324 + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-04.xml new file mode 100644 index 0000000000..4cc41969a2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-04.xml @@ -0,0 +1,73 @@ + + + + Oracle JRE/JDK: Multiple vulnerabilities + Multiple vulnerabilities have been found in Oracle's JRE and JDK + software suites allowing remote attackers to remotely execute arbitrary + code, obtain information, and cause Denial of Service. + + + November 04, 2016 + November 04, 2016: 1 + 597516 + remote + + + 1.8.0.111 + 1.8.0.111 + + + 1.8.0.111 + 1.8.0.111 + + + +

Java Platform, Standard Edition (Java SE) lets you develop and deploy + Java applications on desktops and servers, as well as in today’s + demanding embedded environments. Java offers the rich user interface, + performance, versatility, portability, and security that today’s + applications require. +

+
+ +

Multiple vulnerabilities exist in both Oracle’s JRE and JDK. Please + review the referenced CVE’s for additional information. +

+
+ +

Remote attackers could gain access to information, remotely execute + arbitrary code, or cause Denial of Service. +

+
+ +

There is no known workaround at this time.

+
+ +

All Oracle JRE Users users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-java/oracle-jre-bin-1.8.0.111" + + +

All Oracle JDK Users users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-java/oracle-jdk-bin-1.8.0.111" + +
+ + CVE-2016-5542 + CVE-2016-5554 + CVE-2016-5556 + CVE-2016-5568 + CVE-2016-5573 + CVE-2016-5582 + CVE-2016-5597 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-05.xml new file mode 100644 index 0000000000..c8facf0bc8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-05.xml @@ -0,0 +1,50 @@ + + + + tnftp: Arbitrary code execution + tnftp is vulnerable to remote code execution if output file is not + specified. + + tnftp + November 15, 2016 + November 15, 2016: 1 + 527302 + remote + + + 20141104 + 20141104 + + + +

tnftp is a NetBSD FTP client with several advanced features.

+
+ +

The fetch_url function in usr.bin/ftp/fetch.c allows remote + attackers to execute arbitrary commands via a +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All tnftp users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --verbose --oneshot ">=net-ftp/tnftp-20141104" + +
+ + CVE-2014-8517 + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-06.xml new file mode 100644 index 0000000000..e1f5beb052 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-06.xml @@ -0,0 +1,46 @@ + + + + xinetd: Privilege escalation + A vulnerability in xinetd could lead to privilege escalation. + xinetd + November 15, 2016 + November 15, 2016: 1 + 488158 + remote + + + 2.3.15-r2 + 2.3.15-r2 + + + +

xinetd is a secure replacement for inetd.

+
+ +

Xinetd does not enforce the user and group configuration directives for + TCPMUX services, which causes these services to be run as root. +

+
+ +

Attackers could escalate privileges outside of the running process.

+
+ +

There is no known workaround at this time.

+
+ +

All xinetd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --verbose --oneshot ">=sys-apps/xinetd-2.3.15-r2" + +
+ + CVE-2013-4342 + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-07.xml new file mode 100644 index 0000000000..c469fb986c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-07.xml @@ -0,0 +1,49 @@ + + + + polkit: Heap-corruption on duplicate IDs + polkit is vulnerable to local privilege escalation. + polkit + November 15, 2016 + November 15, 2016: 1 + 555666 + local + + + 0.113 + 0.113 + + + +

polkit is a toolkit for managing policies relating to unprivileged + processes communicating with privileged processes. +

+
+ +

A vulnerability was discovered in polkit’s + polkit_backend_action_pool_init function due to duplicate action IDs in + action descriptions. +

+
+ +

Local attackers are able to gain unauthorized privileges on the system.

+
+ +

There is no known workaround at this time.

+
+ +

All polkit users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-auth/polkit-0.113" + +
+ + CVE-2015-3255 + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-08.xml new file mode 100644 index 0000000000..8718960983 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-08.xml @@ -0,0 +1,75 @@ + + + + libpng: Multiple vulnerabilities + Multiple vulnerabilities have been found in libpng, the worst of + which may allow remote attackers to cause Denial of Service. + + libpng + November 15, 2016 + November 15, 2016: 1 + 564244 + 565678 + 568216 + remote + + + 1.2.56 + 1.5.26 + 1.6.21 + 1.6.21 + + + +

libpng is a standard library used to process PNG (Portable Network + Graphics) images. It is used by several other programs, including web + browsers and potentially server processes. +

+
+ +

Multiple vulnerabilities were found in libpng. Please review the + referenced CVE’s for additional information. +

+
+ +

Remote attackers could cause a Denial of Service condition or have other + unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All libpng 1.2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.56" + + +

All libpng 1.5 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.5.26" + + +

All libpng 1.6 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.6.21" + +
+ + CVE-2015-7981 + CVE-2015-8126 + + CVE-2015-8540 + + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-09.xml new file mode 100644 index 0000000000..5d88bac90d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-09.xml @@ -0,0 +1,70 @@ + + + + Xen: Multiple vulnerabilities + Multiple vulnerabilities have been found in Xen, the worst of which + allows gaining of privileges on the host system. + + xen + November 15, 2016 + November 15, 2016: 1 + 588780 + 593198 + 594850 + remote + + + 4.6.3-r3 + 4.6.3-r3 + + + 4.6.3-r2 + 4.6.3-r2 + + + +

Xen is a bare-metal hypervisor.

+
+ +

Multiple vulnerabilities have been discovered in Xen. Please review the + CVE identifiers referenced below for details. +

+
+ +

A malicious guest administrator could escalate their privileges on the + host system or cause a Denial of Service. Additionally, a malicious + unprivileged guest user may be able to obtain or corrupt sensitive + information (including cryptographic material) in other programs in the + same guest. +

+
+ +

There is no known workaround at this time.

+
+ +

All Xen users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.6.3-r3" + + +

All Xen tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-tools-4.6.3-r2 + +
+ + CVE-2016-6258 + CVE-2016-7092 + CVE-2016-7093 + CVE-2016-7094 + CVE-2016-7777 + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-10.xml new file mode 100644 index 0000000000..86d1fc1c58 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-10.xml @@ -0,0 +1,50 @@ + + + + libuv: Privilege escalation + A vulnerability in libuv could lead to privilege escalation. + + November 17, 2016 + November 17, 2016: 1 + 540826 + local, remote + + + 1.4.2 + 1.4.2 + + + +

libuv is a multi-platform support library with a focus on asynchronous + I/O. +

+
+ +

It was discovered that libuv does not call setgroups before calling + setuid/setgid. If this is not called, then even though the uid has been + dropped, there may still be groups associated that permit superuser + privileges. +

+
+ +

Context-dependent attackers could escalate privileges via unspecified + vectors. +

+
+ +

There is no known workaround at this time.

+
+ +

All libuv users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --verbose --oneshot ">=dev-libs/libuv-1.4.2" + +
+ + CVE-2015-0278 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-11.xml new file mode 100644 index 0000000000..f3038223d8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-11.xml @@ -0,0 +1,77 @@ + + + + QEMU: Multiple vulnerabilities + Multiple vulnerabilities have been found in QEMU, the worst of + which could cause a Denial of Service condition. + + + November 18, 2016 + November 18, 2016: 1 + 594368 + 594520 + 595192 + 596048 + 596738 + 596752 + 596774 + 596776 + 597108 + 597110 + 598044 + 598046 + 598328 + local + + + 2.7.0-r6 + 2.7.0-r6 + + + +

QEMU is a generic and open source machine emulator and virtualizer.

+
+ +

Multiple vulnerabilities have been discovered in QEMU. Please review the + CVE identifiers referenced below for details. +

+
+ +

A privileged user /process within a guest QEMU environment can cause a + Denial of Service condition against the QEMU guest process or the host. +

+
+ +

There is no known workaround at this time.

+
+ +

All QEMU users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.7.0-r6" + +
+ + CVE-2016-7161 + CVE-2016-7423 + CVE-2016-7466 + CVE-2016-7907 + CVE-2016-7908 + CVE-2016-7909 + CVE-2016-7994 + CVE-2016-8576 + CVE-2016-8577 + CVE-2016-8578 + CVE-2016-8668 + CVE-2016-8669 + CVE-2016-8909 + CVE-2016-8910 + CVE-2016-9102 + CVE-2016-9103 + CVE-2016-9104 + CVE-2016-9105 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-12.xml new file mode 100644 index 0000000000..4967a676c5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-12.xml @@ -0,0 +1,58 @@ + + + + imlib2: Multiple vulnerabilities + Multiple vulnerabilities have been found in imlib2, the worst of + which allows for the remote execution of arbitrary code. + + imlib2 + November 20, 2016 + November 20, 2016: 1 + 572884 + 578810 + 580038 + remote + + + 1.4.9 + 1.4.9 + + + +

imlib2 is an advanced replacement for image manipulation libraries such + as libXpm. It is utilized by numerous programs, including gkrellm and + several window managers, to display images. +

+
+ +

Multiple vulnerabilities have been discovered in imlib2. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted image + file using an application linked against imlib2, possibly resulting in + execution of arbitrary code with the privileges of the process or a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All imlib2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/imlib2-1.4.9" + +
+ + CVE-2014-9762 + CVE-2014-9763 + CVE-2014-9764 + CVE-2016-4024 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-13.xml new file mode 100644 index 0000000000..b714e29859 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-13.xml @@ -0,0 +1,50 @@ + + + + MongoDB: Denial of Service + A vulnerability in MongoDB can lead to a Denial of Service + condition. + + mongodb + November 20, 2016 + November 20, 2016: 1 + 542880 + remote + + + 2.4.13 + 2.4.13 + + + +

MongoDB (from “humongous”) is a scalable, high-performance, open + source, schema-free, document-oriented database. +

+
+ +

MongoDB’s ‘mongod’ server fails to validate some cases of + malformed BSON. +

+
+ +

A remote attacker could send a specially crafted BSON request possibly + resulting in a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All MongoDB users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/mongodb-2.4.13" + +
+ + CVE-2015-1609 + + K_F + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-14.xml new file mode 100644 index 0000000000..cb039edc60 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-14.xml @@ -0,0 +1,52 @@ + + + + MIT Kerberos 5: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in MIT Kerberos 5, + the worst of which may allow remote attackers to cause Denial of Service. + + mit-krb5 + November 20, 2016 + November 20, 2016: 1 + 564304 + remote + + + 1.13.2-r2 + 1.13.2-r2 + + + +

MIT Kerberos 5 is a suite of applications that implement the Kerberos + network protocol. +

+
+ +

Multiple vulnerabilities have been discovered in MIT Kerberos 5. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly cause a Denial of Service condition.

+
+ +

There is no known workaround at this time.

+
+ +

All MIT Kerberos 5 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-crypt/mit-krb5-1.13.2-r2" + +
+ + CVE-2015-2695 + CVE-2015-2696 + CVE-2015-2697 + + + BlueKnight + + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index d96a5874a5..4d29fa2db3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Tue, 01 Nov 2016 19:13:17 +0000 +Mon, 21 Nov 2016 18:13:23 +0000