diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 89b0b932e1..c4cb2559cd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 576950 BLAKE2B 88011af22fa4be4dd32deb6beef67152498dbf9a935f1735cb732a1cff2286ecaac7ff10b0cd4cc26890af67573dfd9f41b1b3d976e69dc012ee35c219644c8d SHA512 c652e80fb194ffb2de3f33c3046f525f887396de843ab0761ad5fa21d9949f6b62a1a16747b833821d7307bc10a7d9679651980cd85f6673c854e9dc8e09f5af -TIMESTAMP 2024-07-01T06:40:32Z +MANIFEST Manifest.files.gz 580125 BLAKE2B 982b6b57cb4d4733e1bbfeb28e0a6a9ff1b1b559ff5cd5932caade1ea3218e0035c9f42e574b5131fdf3387eabb87c7cd6aed2cba373d576048c0a5e79ccec35 SHA512 8cb2188002bd17e3e7ba091831fe199c9ad02d776881b9e2e7325790c2a717534701fddb8aaca82004fd810de6f8b5b2c8146c80435e1d75e4d5c49960506eaf +TIMESTAMP 2024-08-01T06:40:34Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmaCT2BfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmarLeJfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klCqxxAAlJUoGJYKzxQA/H3JQnjWSmIGVKL5XLmsWRPghQ9J5hsLgQURe8wGtoIU -9oCNhRJesjAkA5l72Aa+HyEonUAiOqZD8R17ek9ipDLA9VFM9T9yNhk+nwnDu8Yi -nWRjh3GB3OlcZbJDZ0ORE3ze65a8AMHlnWyCCq1QSZYXAqYDhbBz+i0y2hOtsBLP -KiJKyh1uFON30dzDNbvY8taSw5ktaV5x4uuvmh7fmw2PpfoqK838me3YuQq8hVt4 -/haj/FoAfT8imrL8f52v01gUxz9EP5gRuzfML4v728TcQjDlmyuk/EuSm0PjFKxn -zto2xmY/6/4AL/VKGOmzw3zpjapWjyiydVsh+l0hec1aZTxdgheh/dN7TfMJgmTV -MUIyeLOX+qMvFph1ZITVNi3iQW5VO9Ho4exzvMgHVthli0Kqjqdx7rC966zHN3Ao -3QuNtof4D+0ChqOyJpfdIrrRQct7M/Jp+2ZSx0T3luZ2mxSvVH+aIBBo/w37i5hM -3612fcZWMDtzUvT0sbhuf9j1o7S7T24V66cs0BxpMC8t2Gh3pF4TL8CDDFH1rrv6 -8b9TU/3t/qk1haW42KmYXeUq6wEUWw1Z49wb80JEI6ZlTtm74CEdTYm27eisb+Wq -H7DiQc0WDdZm5i7wVEN/nyVEf04Qv5IhfYS3MDaPDnck2pVaPtc= -=IEvJ +klA/+w//b9GufyRShrKBPRMRF3zwZabqhzFcsN9C70FsaXlrAgQ5l1HqY9CSBkdk +2F1YS3Y0EYR1EI3zAbGpfrVwvp8CE/Mxq5NbIeehhoByIehYyPTu0x1DgpNbnFFo +EokuM5mG+qfF1Tv8qeGBBMkUvzrBRGQLG79z2khcvoYpaYJTON19MqeeFQffo60p +9eebwqSdEaaadCWaO9ncsDVzD/xb/JE9chbqApNAI6Qu+3gAqjxXsc8wLwbx5+GD +IxoiNzkX8d2AaXR0IMcen2bFOyRhSEAa0BrWLYP8aEZdQJkMSGPCL09FxGSFZRmo +hcUGgN8awJ7YMemPhug14V10fMQ/krgYsqknY2GojMJR/lmzYgRwHjAPAZq1uUue +A3v91z/tE6DCQgJBYuay3pytDIsmg1GZMXOUsTYlkvkHSFD6iD8L/agYAlOU+Q+u +6uSYpjINJqe0B49fDvuHF5nvSGUv7yFK4dMvLKOftqKWLegBg+WQIUqjnu8Bi/jJ +aXU7+tffKbgY5AIlpv5STWdbBwJ3/b72JTzeT1FQpurzgHnZZ2mr0dyektsiW9KI +sXNfB/MuGwtz7Rf8a5pxB0yf4EtTO94NATW2Nka5bWSmj01ZPDB+WlDGU3RakEqz +V5FeH7TW7oOg1WN0ewrTUCh+75N5P+nHFpa1PW1iGBek7RGPcak= +=y/aO -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index f940d60f99..035709be80 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-09.xml new file mode 100644 index 0000000000..874e12f86e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-09.xml @@ -0,0 +1,67 @@ + + + + OpenSSH: Remote Code Execution + A vulnerability has been discovered in OpenSSH, which can lead to remote code execution with root privileges. + openssh + 2024-07-01 + 2024-07-01 + 935271 + remote + + + 9.7_p1-r6 + 9.7_p1-r6 + + + +

OpenSSH is a free application suite consisting of server and clients that replace tools like telnet, rlogin, rcp and ftp with more secure versions offering additional functionality.

+
+ +

A vulnerability has been discovered in OpenSSH. Please review the CVE identifier referenced below for details.

+
+ +

A critical vulnerability in sshd(8) was present in Portable OpenSSH +versions that may allow arbitrary code execution with root privileges. + +Successful exploitation has been demonstrated on 32-bit Linux/glibc +systems with ASLR. Under lab conditions, the attack requires on +average 6-8 hours of continuous connections up to the maximum the +server will accept. Exploitation on 64-bit systems is believed to be +possible but has not been demonstrated at this time. It's likely that +these attacks will be improved upon.

+
+ +

There is no known workaround at this time. + +Note that Gentoo has backported the fix to the following versions: + +net-misc/openssh-9.6_p1-r5 +net-misc/openssh-9.7_p1-r6

+
+ +

All OpenSSH users should upgrade to the latest version and restart the sshd server (to ensure access for new sessions and no vulnerable code keeps running).

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/openssh-9.7_p1-r6" + + +

With OpenRC:

+ + + # rc-service sshd restart + + +

With systemd:

+ + + # systemctl try-restart sshd.service + +
+ + CVE-2024-6387 + + graaff + graaff +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-10.xml new file mode 100644 index 0000000000..980308027f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-10.xml @@ -0,0 +1,41 @@ + + + + Sofia-SIP: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Sofia-SIP, the worst of which can lead to remote code execution. + sofia-sip + 2024-07-05 + 2024-07-05 + 891791 + remote + + + 1.13.16 + + + +

Sofia-SIP is an RFC3261 compliant SIP User-Agent library.

+
+ +

Multiple vulnerabilities have been discovered in Sofia-SIP. Please review the CVE identifiers referenced below for details.

+
+ +

Multiple vulnerabilities have been discovered in Sofia-SIP. Please review the CVE identifiers referenced below for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for the Sofia-SIP package. We recommend that users unmerge it:

+ + + # emerge --ask --depclean "net-libs/sofia-sip" + +
+ + CVE-2023-22741 + CVE-2023-32307 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-11.xml new file mode 100644 index 0000000000..247f229724 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-11.xml @@ -0,0 +1,46 @@ + + + + PuTTY: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in PuTTY, the worst of which could lead to compromised keys. + putty + 2024-07-05 + 2024-07-05 + 920304 + 930082 + remote + + + 0.81 + 0.81 + + + +

PuTTY is a free implementation of Telnet and SSH for Windows and Unix platforms, along with an xterm terminal emulator.

+
+ +

Multiple vulnerabilities have been discovered in PuTTY. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All PuTTY users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/putty-0.81" + + +

In addition, any keys generated with PuTTY versions 0.68 to 0.80 should be considered breached and should be regenerated.

+
+ + CVE-2023-48795 + CVE-2024-31497 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-12.xml new file mode 100644 index 0000000000..4834b8028c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-12.xml @@ -0,0 +1,56 @@ + + + + podman: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Podman, the worst of which could lead to privilege escalation. + podman + 2024-07-05 + 2024-07-05 + 829896 + 870931 + 896372 + 921290 + 923751 + 927500 + 927501 + local + + + 4.9.4 + 4.9.4 + + + +

Podman is a tool for managing OCI containers and pods with a Docker-compatible CLI.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Podman users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/podman-4.9.4" + +
+ + CVE-2021-4024 + CVE-2022-2989 + CVE-2023-0778 + CVE-2023-48795 + CVE-2024-1753 + CVE-2024-23651 + CVE-2024-23652 + CVE-2024-23653 + CVE-2024-24786 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-13.xml new file mode 100644 index 0000000000..d988629f65 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-13.xml @@ -0,0 +1,64 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which could lead to arbitrary code execution + webkit-gtk + 2024-07-05 + 2024-07-05 + 923851 + 930116 + local and remote + + + 2.44.0 + 2.44.0 + 2.44.0 + 2.44.0 + 2.44.0 + 2.44.0 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version (depending on the installed slots):

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.44.0:4" + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.44.0:4.1" + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.44.0:6" + +
+ + CVE-2014-1745 + CVE-2023-40414 + CVE-2023-42833 + CVE-2023-42843 + CVE-2023-42950 + CVE-2023-42956 + CVE-2024-23206 + CVE-2024-23213 + CVE-2024-23222 + CVE-2024-23252 + CVE-2024-23254 + CVE-2024-23263 + CVE-2024-23280 + CVE-2024-23284 + WSA-2024-0001 + WSA-2024-0002 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-14.xml new file mode 100644 index 0000000000..4037c006b5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-14.xml @@ -0,0 +1,46 @@ + + + + TigerVNC: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in TigerVNC, the worst of which could lead to remote code execution. + tigervnc + 2024-07-05 + 2024-07-05 + 700464 + remote + + + 1.12.0-r2 + 1.12.0-r2 + + + +

TigerVNC is a high-performance VNC server/client.

+
+ +

Multiple vulnerabilities have been discovered in TigerVNC. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All TigerVNC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/tigervnc-1.12.0-r2" + +
+ + CVE-2019-15691 + CVE-2019-15692 + CVE-2019-15694 + CVE-2019-15695 + CVE-2020-26117 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-15.xml new file mode 100644 index 0000000000..fc4f96ecc7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-15.xml @@ -0,0 +1,42 @@ + + + + GraphicsMagick: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in GraphicsMagick, the worst of which could lead to arbitrary code execution. + graphicsmagick + 2024-07-05 + 2024-07-05 + 888545 + 890851 + local + + + 1.3.40 + 1.3.40 + + + +

GraphicsMagick is a collection of tools and libraries which support reading, writing, and manipulating images in many major formats.

+
+ +

Multiple vulnerabilities have been discovered in GraphicsMagick. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GraphicsMagick users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/graphicsmagick-1.3.40" + +
+ + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-16.xml new file mode 100644 index 0000000000..e586167715 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-16.xml @@ -0,0 +1,42 @@ + + + + GNU Coreutils: Buffer Overflow Vulnerability + A vulnerability has been discovered in Coreutils, which can lead to a heap buffer overflow and possibly aribitrary code execution. + coreutils + 2024-07-05 + 2024-07-05 + 922474 + local + + + 9.4-r1 + 9.4-r1 + + + +

The GNU Core Utilities are the basic file, shell and text manipulation utilities of the GNU operating system.

+
+ +

A vulnerability has been discovered in the Coreutils "split" program that can lead to a heap buffer overflow and possibly arbitrary code execution.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Coreutils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/coreutils-9.4-r1" + +
+ + CVE-2024-0684 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-17.xml new file mode 100644 index 0000000000..ce7d5704e6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-17.xml @@ -0,0 +1,55 @@ + + + + BusyBox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in BusyBox, the worst of which could lead to arbitrary code execution. + busybox + 2024-07-05 + 2024-07-05 + 824222 + local + + + 1.34.0 + 1.34.0 + + + +

BusyBox is set of tools for embedded systems and is a replacement for GNU Coreutils.

+
+ +

Multiple vulnerabilities have been discovered in BusyBox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All BusyBox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/busybox-1.34.0" + +
+ + CVE-2021-42373 + CVE-2021-42374 + CVE-2021-42375 + CVE-2021-42376 + CVE-2021-42377 + CVE-2021-42378 + CVE-2021-42379 + CVE-2021-42380 + CVE-2021-42381 + CVE-2021-42382 + CVE-2021-42383 + CVE-2021-42384 + CVE-2021-42385 + CVE-2021-42386 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-18.xml new file mode 100644 index 0000000000..ea2c242f8a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-18.xml @@ -0,0 +1,42 @@ + + + + Stellarium: Arbitrary File Write + A vulnerability has been discovered in Stellarium, which can lead to arbitrary file writes. + stellarium + 2024-07-05 + 2024-07-05 + 905300 + local and remote + + + 23.1 + 23.1 + + + +

Stellarium is a free open source planetarium for your computer. It shows a realistic sky in 3D, just like what you see with the naked eye, binoculars or a telescope.

+
+ +

A vulnerability has been discovered in Stellarium. Please review the CVE identifier referenced below for details.

+
+ +

Attackers can write to files that are typically unintended, such as ones with absolute pathnames or .. directory traversal.

+
+ +

There is no known workaround at this time.

+
+ +

All Stellarium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sci-astronomy/stellarium-23.1" + +
+ + CVE-2023-28371 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-19.xml new file mode 100644 index 0000000000..2c2a729489 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-19.xml @@ -0,0 +1,59 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. + thunderbird,thunderbird-bin + 2024-07-06 + 2024-07-06 + 932375 + remote + + + 115.11.0 + 115.11.0 + + + 115.11.0 + 115.11.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-115.11.0" + + +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-115.11.0" + +
+ + CVE-2024-2609 + CVE-2024-3302 + CVE-2024-3854 + CVE-2024-3857 + CVE-2024-3859 + CVE-2024-3861 + CVE-2024-3864 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-20.xml new file mode 100644 index 0000000000..84856ba834 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-20.xml @@ -0,0 +1,48 @@ + + + + KDE Plasma Workspaces: Privilege Escalation + A vulnerability has been discovered in KDE Plasma Workspaces, which can lead to privilege escalation. + plasma-workspace + 2024-07-06 + 2024-07-06 + 933342 + remote + + + 5.27.11.1 + 5.27.11.1 + + + +

KDE Plasma workspace is a widget based desktop environment designed to be fast and efficient.

+
+ +

Multiple vulnerabilities have been discovered in KDE Plasma Workspaces. Please review the CVE identifiers referenced below for details.

+
+ +

KSmserver, KDE's XSMP manager, incorrectly allows connections via ICE +based purely on the host, allowing all local connections. This allows +another user on the same machine to gain access to the session +manager. + +A well crafted client could use the session restore feature to execute +arbitrary code as the user on the next boot.

+
+ +

There is no known workaround at this time.

+
+ +

All KDE Plasma Workspaces users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=kde-plasma/plasma-workspace-5.27.11.1" + +
+ + CVE-2024-36041 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-21.xml new file mode 100644 index 0000000000..12c0a2e5a2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-21.xml @@ -0,0 +1,49 @@ + + + + X.Org X11 library: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in the X.Org X11 library, the worst of which could lead to a denial of service. + libX11 + 2024-07-06 + 2024-07-06 + 877461 + 908549 + 915129 + remote + + + 1.8.7 + 1.8.7 + + + +

X.Org is an implementation of the X Window System. The X.Org X11 library provides the X11 protocol library files.

+
+ +

Multiple vulnerabilities have been discovered in X.Org X11 library. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All X.Org X11 library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/libX11-1.8.7" + +
+ + CVE-2022-3554 + CVE-2022-3555 + CVE-2023-3138 + CVE-2023-43785 + CVE-2023-43786 + CVE-2023-43787 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-22.xml new file mode 100644 index 0000000000..10eb68b467 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-22.xml @@ -0,0 +1,72 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which could arbitrary code execution. + firefox,firefox-bin + 2024-07-06 + 2024-07-06 + 927559 + remote + + + 124.0.1 + 115.9.1 + 124.0.1 + 115.9.1 + + + 124.0.1 + 115.9.1 + 124.0.1 + 115.9.1 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-124.0.1" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-124.0.1:rapid" + + +

All Mozilla Firefox ESR users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-115.9.1:esr" + + +

All Mozilla Firefox ESR binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-115.9.1:esr" + +
+ + CVE-2024-29943 + CVE-2024-29944 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-23.xml new file mode 100644 index 0000000000..3015033820 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-23.xml @@ -0,0 +1,48 @@ + + + + LIVE555 Media Server: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in LIVE555 Media Server, the worst of which could lead to a denial of service. + live + 2024-07-09 + 2024-07-09 + 732598 + 807622 + local and remote + + + 2021.08.24 + 2021.08.24 + + + +

LIVE555 Media Server is a set of libraries for multimedia streaming.

+
+ +

Multiple vulnerabilities have been discovered in LIVE555 Media Server. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All LIVE555 Media Server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-plugins/live-2021.08.24" + +
+ + CVE-2020-24027 + CVE-2021-38380 + CVE-2021-38381 + CVE-2021-38382 + CVE-2021-39282 + CVE-2021-39283 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-24.xml new file mode 100644 index 0000000000..118703bb07 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-24.xml @@ -0,0 +1,48 @@ + + + + HarfBuzz: Denial of Service + A vulnerability has been discovered in HarfBuzz, which can lead to a denial of service. + harfbuzz + 2024-07-10 + 2024-07-10 + 905310 + local + + + 7.1.0 + 7.1.0 + + + +

HarfBuzz is an OpenType text shaping engine.

+
+ +

Multiple vulnerabilities have been discovered in HarfBuzz. Please review the CVE identifiers referenced below for details.

+
+ +

hb-ot-layout-gsubgpos.hh in HarfBuzz allows attackers to trigger O(n^2) growth via consecutive marks during the process of looking back for base glyphs when attaching marks.

+
+ +

There is no known workaround at this time.

+
+ +

All HarfBuzz users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/harfbuzz-7.1.0" + +
+ + CVE-2023-22006 + CVE-2023-22036 + CVE-2023-22041 + CVE-2023-22044 + CVE-2023-22045 + CVE-2023-22049 + CVE-2023-25193 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-25.xml new file mode 100644 index 0000000000..4b13514271 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-25.xml @@ -0,0 +1,48 @@ + + + + Buildah: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Buildah, the worst of which could lead to privilege escalation. + buildah + 2024-07-10 + 2024-07-10 + 923650 + 927499 + 927502 + local + + + 1.35.3 + 1.35.3 + + + +

Buildah is a tool that facilitates building Open Container Initiative (OCI) container images

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Buildah users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/buildah-1.35.3" + +
+ + CVE-2024-1753 + CVE-2024-23651 + CVE-2024-23652 + CVE-2024-23653 + CVE-2024-24786 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-26.xml new file mode 100644 index 0000000000..8c4b0b7ae7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-26.xml @@ -0,0 +1,42 @@ + + + + Dmidecode: Privilege Escalation + A vulnerability has been discovered in Dmidecode, which can lead to privilege escalation. + dmidecode + 2024-07-24 + 2024-07-24 + 905093 + local + + + 3.5 + 3.5 + + + +

Dmidecode reports information about your system's hardware as described in your system BIOS according to the SMBIOS/DMI standard (see a sample output). This information typically includes system manufacturer, model name, serial number, BIOS version, asset tag as well as a lot of other details of varying level of interest and reliability depending on the manufacturer. This will often include usage status for the CPU sockets, expansion slots (e.g. AGP, PCI, ISA) and memory module slots, and the list of I/O ports (e.g. serial, parallel, USB).

+
+ +

Dmidecode -dump-bin can overwrite a local file. This has security relevance because, for example, execution of Dmidecode via sudo is plausible.

+
+ +

Please review the referenced CVE identifier for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Dmidecode users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/dmidecode-3.5" + +
+ + CVE-2023-30630 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-27.xml new file mode 100644 index 0000000000..8848a48c54 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-27.xml @@ -0,0 +1,46 @@ + + + + ExifTool: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in ExifTool, the worst of which could lead to arbitrary code execution. + exiftool + 2024-07-24 + 2024-07-24 + 785667 + 791397 + 803317 + 832033 + local + + + 12.42 + 12.42 + + + +

ExifTool is a platform-independent Perl library plus a command-line application for reading, writing and editing meta information in a wide variety of files.

+
+ +

Multiple vulnerabilities have been discovered in ExifTool. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All ExifTool users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/exiftool-12.42" + +
+ + CVE-2021-22204 + CVE-2022-23935 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-28.xml new file mode 100644 index 0000000000..67adc3da09 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202407-28.xml @@ -0,0 +1,45 @@ + + + + Freenet: Deanonymization Vulnerability + A vulnerability has been discovered in Freenet, which can lead to deanonymization due to path folding. + freenet + 2024-07-24 + 2024-07-24 + 904441 + remote + + + 0.7.5_p1497 + 0.7.5_p1497 + + + +

Freenet is an encrypted network without censorship.

+
+ +

This release fixes a severe vulnerability in path folding that allowed +to distinguish between downloaders and forwarders with an adapted +node that is directly connected via opennet.

+
+ +

This release fixes a severe vulnerability in path folding that allowed +to distinguish between downloaders and forwarders with an adapted +node that is directly connected via opennet.

+
+ +

There is no known workaround at this time.

+
+ +

All Freenet users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-p2p/freenet-0.7.5_p1497" + +
+ + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 2c44b89231..5b4c0e1b03 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 01 Jul 2024 06:40:29 +0000 +Thu, 01 Aug 2024 06:40:30 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 21aaf410fe..0cb2bdefb8 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -7c19ce25facd6aa54d2b0f9a8fecd6020509009e 1719814176 2024-07-01T06:09:36Z +13a66c5def0d04b908b4e9faf4975aebf3c111a0 1721801457 2024-07-24T06:10:57Z