diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-14.xml index 273b8f1992..2778a8b214 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-14.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201603-14.xml @@ -23,7 +23,7 @@ 7.2.6.4 - 7.2.6.4 + 7.2.6.4 6.1.13.9 6 7.2.6.4 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml index 7cd1b2287c..343d7bb036 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml @@ -16,10 +16,8 @@ remote - 7.2.6.6-r1 - 3.0.1 - 3.1.0 - 3.2.0 + 7.2.6.6-r1 + 3.0.1 7.2.6.6-r1 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-18.xml index 13225b5fae..1885e30aa0 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-18.xml @@ -6,16 +6,16 @@ which could lead to arbitrary code execution. python - January 10, 2017 - January 10, 2017: 1 + 2017-01-10 + 2017-02-24: 2 531002 585910 585946 remote - 2.7.12 - 3.4.5 + 2.7.12 + 3.4.5 3.4.5 @@ -67,6 +67,6 @@ CVE-2016-0772 CVE-2016-5636 - b-man - whissi + b-man + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-62.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-62.xml index f16a28c59b..e3c9c3e841 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-62.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-62.xml @@ -7,7 +7,7 @@ firejail 2017-01-24 - 2017-01-24: 1 + 2017-01-31: 2 604758 local, remote @@ -60,5 +60,5 @@ CVE-2017-5207 b-man - whissi + whissi diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-64.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-64.xml new file mode 100644 index 0000000000..d70eea6633 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-64.xml @@ -0,0 +1,58 @@ + + + + X.Org X Server: Multiple vulnerabilities + Multiple vulnerabilities have been found in X.Org X Server, the + worst of which may allow authenticated attackers to read from or send + information to arbitrary X11 clients. + + xorg-server + 2017-01-25 + 2017-01-25: 1 + 493294 + 548002 + 551680 + remote + + + 1.18.4 + 1.18.4 + + + +

The X Window System is a graphical windowing system based on a + client/server model. +

+
+ +

Multiple vulnerabilities have been discovered in X.Org X Server. Please + review the CVE identifiers referenced below for details. +

+
+ +

An authenticated attacker could possibly cause a Denial of Service + condition or read from or send information to arbitrary X11 clients. +

+
+ +

There is no known workaround at this time.

+
+ +

All X.Org X Server users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-base/xorg-server-1.18.4" + +
+ + CVE-2013-6424 + CVE-2015-3164 + CVE-2015-3418 + + X.Org/Wayland Security Advisory: Missing authentication in XWayland + + + BlueKnight + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-65.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-65.xml new file mode 100644 index 0000000000..fca9268f0e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-65.xml @@ -0,0 +1,87 @@ + + + + Oracle JRE/JDK: Multiple vulnerabilities + Multiple vulnerabilities have been found in Oracle's JRE and JDK + software suites, the worst of which may allow execution of arbitrary code + + jre,jdk,oracle + 2017-01-25 + 2017-01-25: 1 + 606118 + remote + + + 1.8.0.121 + 1.8.0.121 + + + 1.8.0.121 + 1.8.0.121 + + + +

Java Platform, Standard Edition (Java SE) lets you develop and deploy + Java applications on desktops and servers, as well as in today’s + demanding embedded environments. Java offers the rich user interface, + performance, versatility, portability, and security that today’s + applications require. +

+
+ +

Multiple vulnerabilities have been discovered in in Oracle’s JRE and + JDK. Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, gain access to information, or cause a Denial + of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Oracle JRE users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-java/oracle-jre-bin-1.8.0.121" + + +

All Oracle JDK users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-java/oracle-jdk-bin-1.8.0.121" + + +
+ + CVE-2016-2183 + CVE-2016-5546 + CVE-2016-5547 + CVE-2016-5548 + CVE-2016-5549 + CVE-2016-5552 + CVE-2016-8328 + CVE-2017-3231 + CVE-2017-3241 + CVE-2017-3252 + CVE-2017-3253 + CVE-2017-3259 + CVE-2017-3260 + CVE-2017-3261 + CVE-2017-3262 + CVE-2017-3272 + CVE-2017-3289 + + Oracle Critical Patch Update Advisory - January 2017 + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-66.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-66.xml new file mode 100644 index 0000000000..7edf7d6013 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-66.xml @@ -0,0 +1,74 @@ + + + + Chromium: Multiple vulnerabilities + Multiple vulnerabilities have been found in the Chromium web + browser, the worst of which allows remote attackers to execute arbitrary + code. + + chromium + 2017-01-29 + 2017-01-29: 1 + 607276 + remote + + + 56.0.2924.76 + 56.0.2924.76 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+
+ +

Multiple vulnerabilities have been discovered in the Chromium web + browser. Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, obtain + sensitive information, bypass security restrictions, or perform + cross-site scripting (XSS). +

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-56.0.2924.76" + +
+ + CVE-2017-5006 + CVE-2017-5007 + CVE-2017-5008 + CVE-2017-5009 + CVE-2017-5010 + CVE-2017-5011 + CVE-2017-5012 + CVE-2017-5013 + CVE-2017-5014 + CVE-2017-5015 + CVE-2017-5016 + CVE-2017-5017 + CVE-2017-5018 + CVE-2017-5019 + CVE-2017-5020 + CVE-2017-5021 + CVE-2017-5022 + CVE-2017-5023 + CVE-2017-5024 + CVE-2017-5025 + CVE-2017-5026 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-67.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-67.xml new file mode 100644 index 0000000000..c88f32dd54 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-67.xml @@ -0,0 +1,47 @@ + + + + a2ps: Arbitrary code execution + A vulnerability in a2ps' fixps script might allow remote attackers + to execute arbitrary code. + + a2ps + 2017-01-29 + 2017-01-29: 1 + 506352 + remote + + + 4.14-r5 + 4.14-r5 + + + +

a2ps is an Any to PostScript filter.

+
+ +

a2ps’ fixps script does not invoke gs with the -dSAFER option.

+
+ +

Remote attackers, by enticing a user to process a specially crafted + PostScript file, could delete arbitrary files or execute arbitrary code + with the privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All a2ps users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/a2ps-4.14-r5" + +
+ + CVE-2014-0466 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-68.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-68.xml new file mode 100644 index 0000000000..08fa57fe40 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-68.xml @@ -0,0 +1,54 @@ + + + + FreeImage: Multiple vulnerabilities + Multiple vulnerabilities have been found in FreeImage, the worst of + which may allow execution of arbitrary code + + freeimage + 2017-01-29 + 2017-01-29: 1 + 559006 + 596350 + remote + + + 3.15.4-r1 + 3.15.4-r1 + + + +

FreeImage is an Open Source library project for developers who would + like to support popular graphics image formats like PNG, BMP, JPEG, TIFF + and others as needed by today’s multimedia applications. +

+
+ +

Multiple vulnerabilities have been discovered in in FreeImage. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by enticing a user to process a specially crafted + image file, could possibly execute arbitrary code with the privileges of + the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All FreeImage users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/freeimage-3.15.4-r1" + +
+ + CVE-2015-0852 + CVE-2016-5684 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-69.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-69.xml new file mode 100644 index 0000000000..0d034abbd4 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-69.xml @@ -0,0 +1,54 @@ + + + + Ark: Unintended execution of scripts and executable files + A vulnerability in Ark might allow remote attackers to execute + arbitrary code. + + ark + 2017-01-29 + 2017-01-29: 1 + 604846 + remote + + + 16.08.3-r1 + 16.08.3-r1 + + + +

Ark is a graphical file compression/decompression utility with support + for multiple formats. +

+
+ +

A vulnerability was discovered in how Ark handles executable files while + browsing a compressed archive. A user could unintentionally execute a + malicious script which has the executable bit set inside of the archive. + This is due to Ark not displaying what files are executable and running + the associated applications for the file type upon execution. +

+
+ +

A remote attacker, by coercing a user to browse a malicious archive file + within Ark and execute certain files, could execute arbitrary code with + the privileges of the user. +

+
+ +

There is no known workaround at this time.

+
+ +

All Ark users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=kde-apps/ark-16.08.3-r1" + +
+ + CVE-2017-5330 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-70.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-70.xml new file mode 100644 index 0000000000..aba6fd5368 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-70.xml @@ -0,0 +1,54 @@ + + + + Firewalld: Improper authentication methods + A vulnerability in Firewalld allows firewall configurations to be + modified by unauthenticated users. + + firewalld + 2017-01-29 + 2017-01-29: 1 + 591458 + local + + + 0.4.3.3 + 0.4.3.3 + + + +

Firewalld provides a dynamically managed firewall with support for + network/firewall zones to define the trust level of network connections + or interfaces. +

+
+ +

A flaw in Firewalld allows any locally logged in user to tamper with or + change firewall settings. This is due to how Firewalld handles + authentication via polkit which is not properly applied to 5 particular + functions to include: addPassthrough, removePassthrough, addEntry, + removeEntry, and setEntries. +

+
+ +

A local attacker could tamper or change firewall settings leading to the + additional exposure of systems to include unauthorized remote access. +

+
+ +

There is no known workaround at this time.

+
+ +

All Firewalld users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-firewall/firewalld-0.4.3.3" + +
+ + CVE-2016-5410 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-71.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-71.xml new file mode 100644 index 0000000000..1d55b382c5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-71.xml @@ -0,0 +1,56 @@ + + + + FFmpeg: Multiple vulnerabilities + Multiple vulnerabilities have been found in FFmpeg, the worst of + which may allow remote attackers to cause a Denial of Service condition. + + ffmpeg + 2017-01-29 + 2017-01-29: 1 + 596760 + remote + + + 2.8.10 + 2.8.10 + + + +

FFmpeg is a complete, cross-platform solution to record, convert and + stream audio and video. +

+
+ +

Multiple vulnerabilities have been discovered in FFmpeg. Please review + the CVE identifiers referenced below for details. +

+
+ +

Remote attackers could cause a Denial of Service condition via various + crafted media file types or have other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All FFmpeg users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/ffmpeg-2.8.10" + +
+ + CVE-2016-7122 + CVE-2016-7450 + CVE-2016-7502 + CVE-2016-7555 + CVE-2016-7562 + CVE-2016-7785 + CVE-2016-7905 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-72.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-72.xml new file mode 100644 index 0000000000..d0c052d546 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-72.xml @@ -0,0 +1,55 @@ + + + + libXpm: Remote execution of arbitrary code + An integer overflow in libXpm might allow remote attackers to + execute arbitrary code or cause a Denial of Service Condition. + + libxpm + 2017-01-29 + 2017-01-29: 1 + 602782 + remote + + + 3.5.12 + 3.5.12 + + + +

The X PixMap image format is an extension of the monochrome X BitMap + format specified in the X protocol, and is commonly used in traditional X + applications. +

+
+ +

An integer overflow was discovered in libXpm’s src/CrDatFrI.c file. + On 64 bit systems, this allows an overflow to occur on 32 bit integers + while parsing XPM extensions in a file. +

+
+ +

A remote attacker, by enticing a user to process a specially crafted XPM + file, could execute arbitrary code with the privileges of the process or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libXpm users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/libXpm-3.5.12" + +
+ + + CVE-2016-10164 + + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-73.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-73.xml new file mode 100644 index 0000000000..e8cbde4b71 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-73.xml @@ -0,0 +1,55 @@ + + + + SQUASHFS: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in SQUASHFS, the + worst of which may allow execution of arbitrary code + + squashfs + 2017-01-29 + 2017-01-29: 1 + 552484 + remote + + + 4.3-r1 + 4.3-r1 + + + +

Squashfs is a compressed read-only filesystem for Linux. Squashfs is + intended for general read-only filesystem use, for archival use (i.e. in + cases where a .tar.gz file may be used), and in constrained block + device/memory systems (e.g. embedded systems) where low overhead is + needed. +

+
+ +

Multiple vulnerabilities have been discovered in SQUASHFS. Please review + the CVE identifiers referenced below for details. +

+
+ +

Remote attackers, by enticing a user to process a specially crafted + SQUASHFS image, could execute arbitrary code with the privileges of the + process. +

+
+ +

There is no known workaround at this time.

+
+ +

All SQUASHFS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-fs/squashfs-tools-4.3-r1" + +
+ + CVE-2015-4645 + CVE-2015-4646 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-74.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-74.xml new file mode 100644 index 0000000000..69fd1fdb3d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-74.xml @@ -0,0 +1,72 @@ + + + + libpng: Remote execution of arbitrary code + A null pointer dereference in libpng might allow remote attackers + to execute arbitrary code. + + libpng + 2017-01-29 + 2017-01-29: 1 + 604082 + remote + + + 1.6.27 + 1.5.28 + 1.2.57 + 1.6.27 + + + +

libpng is a standard library used to process PNG (Portable Network + Graphics) images. It is used by several programs, including web browsers + and potentially server processes. +

+
+ +

A null pointer dereference was discovered in libpng in the + png_push_save_buffer function. In order to be vulnerable, an application + has to load a text chunk into the PNG structure, then delete all text, + then add another text chunk to the same PNG structure, which seems to be + an unlikely sequence, but it is possible. +

+
+ +

A remote attacker, by enticing a user to process a specially crafted PNG + file, could execute arbitrary code with the privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All libpng 1.6.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.6.27" + + +

All libpng 1.5.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.5.28:1.5" + + +

All libpng 1.2.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.2.57:1.2" + +
+ + + CVE-2016-10087 + + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-75.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-75.xml new file mode 100644 index 0000000000..988e1d9dba --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-75.xml @@ -0,0 +1,57 @@ + + + + Perl: Multiple vulnerabilities + Multiple vulnerabilities have been found in Perl, the worst of + which could allow remote attackers to execute arbitrary code. + + perl + 2017-01-29 + 2017-01-29: 1 + 580612 + 588592 + 589680 + 606750 + 606752 + local, remote + + + 5.22.3_rc4 + 5.22.3_rc4 + + + +

Perl is a highly capable, feature-rich programming language.

+
+ +

Multiple vulnerabilities have been discovered in Perl. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, or + escalate privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All Perl users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/perl-5.22.3_rc4" + +
+ + CVE-2015-8607 + CVE-2015-8853 + CVE-2016-1238 + CVE-2016-2381 + CVE-2016-6185 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-76.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-76.xml new file mode 100644 index 0000000000..c5e51f9b81 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-76.xml @@ -0,0 +1,49 @@ + + + + HarfBuzz: Multiple vulnerabilities + Multiple vulnerabilities have been found in HarfBuzz, the worst of + which could allow remote attackers to cause a Denial of Service condition. + + harfbuzz + 2017-01-31 + 2017-01-31: 1 + 572856 + remote + + + 1.0.6 + 1.0.6 + + + +

HarfBuzz is an OpenType text shaping engine.

+
+ +

Multiple vulnerabilities have been discovered in HarfBuzz. Please review + the CVE identifiers referenced below for details. +

+
+ +

Remote attackers, through the use of crafted data, could cause a Denial + of Service condition or have other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All HarfBuzz users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/harfbuzz-1.0.6" + +
+ + CVE-2015-8947 + CVE-2016-2052 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-77.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-77.xml new file mode 100644 index 0000000000..7f445efe19 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-77.xml @@ -0,0 +1,59 @@ + + + + Ansible: Remote execution of arbitrary code + A vulnerability in Ansible may allow rogue clients to execute + commands on the Ansible controller. + + ansible + 2017-01-31 + 2017-01-31: 1 + 605342 + remote + + + 2.1.4.0_rc3 + 2.2.1.0_rc5 + 2.1.4.0_rc3 + 2.2.1.0_rc5 + + + +

Ansible is a radically simple IT automation platform.

+
+ +

An input validation vulnerability was found in Ansible’s handling of + data sent from client systems. +

+
+ +

An attacker with control over a client system being managed by Ansible + and the ability to send facts back to the Ansible server could execute + arbitrary code on the Ansible server using the Ansible-server privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All Ansible 2.1.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/ansible-2.1.4.0_rc3" + + +

All Ansible 2.2.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/ansible-2.2.1.0_rc5" + + +
+ + CVE-2016-9587 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-01.xml new file mode 100644 index 0000000000..f4ac29e435 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-01.xml @@ -0,0 +1,59 @@ + + + + PCSC-Lite: Multiple vulnerabilities + Multiple vulnerabilities have been found in PCSC-Lite, the worst of + which could lead to privilege escalation. + + PCSC-Lite + 2017-02-01 + 2017-02-01: 1 + 604574 + local + + + 1.8.20 + 1.8.20 + + + +

PCSC-Lite is a middleware to access a smart card using the SCard API + (PC/SC). +

+
+ +

The SCardReleaseContext function normally releases resources associated + with the given handle (including “cardsList”) and clients should + cease using this handle. However, a malicious client can make the daemon + invoke SCardReleaseContext and continue issuing other commands that use + “cardsList”, resulting in a use-after-free. When SCardReleaseContext + is invoked multiple times it additionally results in a double-free of + “cardsList”. +

+
+ +

A local attacker could use a malicious client to connect to pcscd’s + Unix socket, possibly resulting in a Denial of Service condition or + privilege escalation since the daemon is running as root. +

+
+ +

There is no known workaround at this time.

+
+ +

All PCSC-Lite users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/pcsc-lite-1.8.20" + + +
+ + + CVE-2016-10109 + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-02.xml new file mode 100644 index 0000000000..6914b0caae --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-02.xml @@ -0,0 +1,66 @@ + + + + RTMPDump: Multiple vulnerabilities + Multiple vulnerabilities have been found in RTMPDump, the worst of + which could lead to arbitrary code execution. + + rtmpdump + 2017-02-06 + 2017-02-06: 1 + 570242 + remote + + + 2.4_p20161210 + 2.4_p20161210 + + + +

RTMPDump is an RTMP client intended to stream audio or video flash + content +

+
+ +

Multiple vulnerabilities have been discovered in RTMPDump.

+ +

The following is a list of vulnerabilities fixed:

+ +
    +
  • Additional decode input size checks
  • +
  • Ignore zero-length packets
  • +
  • Potential integer overflow in RTMPPacket_Alloc().
  • +
  • Obsolete RTMPPacket_Free() call left over from original C++ to C + rewrite +
  • +
  • AMFProp_GetObject must make sure the prop is actually an object
  • +
+ +
+ +

A remote attacker could entice a user to open a specially crafted media + flash file using RTMPDump. This could possibly result in the execution of + arbitrary code with the privileges of the process or a Denial of Service + condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All RTMPDump users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=media-video/rtmpdump-2.4_p20161210" + +
+ + OSS ML + CVE Request + + + BlueKnight + BlueKnight +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-03.xml new file mode 100644 index 0000000000..5a9e9a39d3 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-03.xml @@ -0,0 +1,67 @@ + + + + Firejail: Privilege escalation + Firejail is vulnerable to the escalation of privileges due to an + incomplete fix for CVE-2017-5180. + + firejail + 2017-02-09 + 2017-02-09: 1 + 607382 + local + + + 0.9.44.8 + 0.9.44.8 + + + 0.9.38.10 + 0.9.38.10 + + + +

A SUID program that reduces the risk of security breaches by restricting + the running environment of untrusted applications using Linux namespaces + and seccomp-bpf. +

+
+ +

The unaffected packages listed in GLSA 201612-48 had an incomplete fix + as reported by Sebastian Krahmer of SuSE. This has been properly patched + in the latest releases. +

+
+ +

An attacker could possibly bypass sandbox protection, cause a Denial of + Service condition, or escalate privileges. +

+
+ +

There is no known workaround at this time.

+
+ +

All Firejail users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/firejail-0.9.44.8" + + +

All Firejail-lts users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/firejail-lts-0.9.38.10" + +
+ + CVE-2017-5940 + + Firejail Release Notes + + GLSA 201612-48 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-04.xml new file mode 100644 index 0000000000..e4dfe1c235 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-04.xml @@ -0,0 +1,54 @@ + + + + GnuTLS: Multiple vulnerabilities + Multiple vulnerabilities have been found in GnuTLS, the worst of + which may allow execution of arbitrary code. + + gnutls + 2017-02-10 + 2017-02-10: 1 + 605238 + remote + + + 3.3.26 + 3.3.26 + + + +

GnuTLS is an Open Source implementation of the TLS and SSL protocols.

+
+ +

Multiple heap and stack overflows and double free vulnerabilities have + been discovered in GnuTLS by the OSS-Fuzz project. Please review the CVE + identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user or automated system to process a + specially crafted certificate using an application linked against GnuTLS. + This could possibly result in the execution of arbitrary code with the + privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All GnuTLS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/gnutls-3.3.26" + +
+ + CVE-2017-5334 + CVE-2017-5335 + CVE-2017-5336 + CVE-2017-5337 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-05.xml new file mode 100644 index 0000000000..4fa1682e62 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-05.xml @@ -0,0 +1,47 @@ + + + + Lsyncd: Remote execution of arbitrary code + A vulnerability in Lsyncd allows execution of arbitrary code. + lsyncd + 2017-02-10 + 2017-02-10: 1 + 529678 + local, remote + + + 2.1.6 + 2.1.6 + + + +

A daemon to synchronize local directories using rsync.

+
+ +

default-rsyncssh.lua in Lsyncd performed insufficient sanitising of + filenames. +

+
+ +

An attacker, able to control files processed by Lsyncd, could possibly + execute arbitrary code with the privileges of the process or cause a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Lsyncd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/lsyncd-2.1.6" + +
+ + CVE-2014-8990 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-06.xml new file mode 100644 index 0000000000..ba184707d6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-06.xml @@ -0,0 +1,51 @@ + + + + Graphviz: Multiple vulnerabilities + Multiple vulnerabilities have been found in Graphviz and the extent + of these vulnerabilities are unspecified. + + graphviz + 2017-02-10 + 2017-02-10: 1 + 497274 + remote + + + 2.36.0 + 2.36.0 + + + +

Graphviz is an open source graph visualization software.

+
+ +

Multiple vulnerabilities in Graphviz were discovered. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker, able to control input matched against a regular + expression or by enticing a user to process a specially crafted file, + could cause unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All Graphviz users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/graphviz-2.36.0" + +
+ + CVE-2014-0978 + CVE-2014-1235 + CVE-2014-1236 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-07.xml new file mode 100644 index 0000000000..aef31154b9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-07.xml @@ -0,0 +1,55 @@ + + + + OpenSSL: Multiple vulnerabilities + Multiple vulnerabilities have been found in OpenSSL, the worst of + which might allow attackers to access sensitive information. + + openssl + 2017-02-14 + 2017-02-14: 1 + 607318 + remote + + + 1.0.2k + 1.0.2k + + + +

OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer + (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general + purpose cryptography library. +

+
+ +

Multiple vulnerabilities have been discovered in OpenSSL. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker is able to crash applications linked against OpenSSL + or could obtain sensitive private-key information via an attack against + the Diffie-Hellman (DH) ciphersuite. +

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSSL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2k" + +
+ + CVE-2016-7055 + CVE-2017-3730 + CVE-2017-3731 + CVE-2017-3732 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-08.xml new file mode 100644 index 0000000000..6e25cc50df --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-08.xml @@ -0,0 +1,52 @@ + + + + VirtualBox: Multiple vulnerabilities + Multiple vulnerabilities have been found in VirtualBox, the worst + of which might allow unauthorized changes to some critical or all + accessible data. + + virtualbox + 2017-02-14 + 2017-02-14: 1 + 607674 + local, remote + + + 5.0.32 + 5.0.32 + + + +

VirtualBox is a powerful virtualization product from Oracle.

+
+ +

Multiple vulnerabilities have been discovered in VirtualBox. Please + review the CVE identifiers referenced below for details. +

+
+ +

An attacker could cause a Denial of Service condition. Additionally, an + attacker could create, delete or modify critical or all accessible data. +

+
+ +

There is no known workaround at this time.

+
+ +

All VirtualBox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-5.0.32" + +
+ + CVE-2016-5545 + CVE-2017-3290 + CVE-2017-3316 + CVE-2017-3332 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-09.xml new file mode 100644 index 0000000000..307978df58 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-09.xml @@ -0,0 +1,67 @@ + + + + ImageMagick: Multiple vulnerabilities + Multiple vulnerabilities have been found in ImageMagick, the worst + of which allows remote attackers to execute arbitrary code. + + imagemagick + 2017-02-17 + 2017-02-17: 2 + 599744 + 606654 + remote + + + 6.9.7.4 + 6.9.7.4 + + + +

ImageMagick is a collection of tools and libraries for many image + formats. +

+
+ +

Multiple vulnerabilities have been discovered in ImageMagick. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by enticing a user to process a specially crafted + image file, could execute arbitrary code with the privileges of the + process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All ImageMagick users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.9.7.4" + +
+ + + CVE-2016-10144 + + + CVE-2016-10145 + + + CVE-2016-10146 + + CVE-2016-9298 + CVE-2017-5506 + CVE-2017-5507 + CVE-2017-5508 + CVE-2017-5509 + CVE-2017-5510 + CVE-2017-5511 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-10.xml new file mode 100644 index 0000000000..fb897b8ac2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-10.xml @@ -0,0 +1,58 @@ + + + + NTFS-3G: Privilege escalation + A vulnerability in NTFS-3G allows local users to gain root + privileges. + + ntfs-3g + 2017-02-19 + 2017-02-19: 1 + 607912 + local + + + 2016.2.22-r2 + 2016.2.22-r2 + + + +

NTFS-3G is a stable, full-featured, read-write NTFS driver for various + operating systems. +

+
+ +

The NTFS-3G driver does not properly clear environment variables before + invoking mount or umount. +

+ +

This flaw is similar to the vulnerability described in + “GLSA-201701-19” and “GLSA-201603-04” referenced below but is now + implemented in the NTFS-3G driver itself. +

+
+ +

A local user could gain root privileges.

+
+ +

There is no known workaround at this time. However, on Gentoo when the + “suid” USE flag is not set (which is the default) an attacker cannot + exploit the flaw. +

+
+ +

All NTFS-3G users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-fs/ntfs3g-2016.2.22-r2" + +
+ + CVE-2017-0358 + GLSA-201603-04 + GLSA-201701-19 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-11.xml new file mode 100644 index 0000000000..985ae38e33 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-11.xml @@ -0,0 +1,63 @@ + + + + GNU C Library: Multiple vulnerabilities + Multiple vulnerabilities have been found in the GNU C Library, the + worst of which allows context-dependent attackers to execute arbitrary + code. + + glibc + 2017-02-19 + 2017-02-19: 1 + 560420 + 560526 + 572416 + 576726 + 578602 + local, remote + + + 2.23-r3 + 2.23-r3 + + + +

The GNU C library is the standard C library used by Gentoo Linux + systems. +

+
+ +

Multiple vulnerabilities have been discovered in the GNU C Library. + Please review the CVE identifiers referenced below for details. +

+
+ +

A context-dependent attacker could possibly execute arbitrary code with + the privileges of the process, disclose sensitive information, or cause a + Denial of Service condition via multiple vectors. +

+
+ +

There is no known workaround at this time.

+
+ +

All GNU C Library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.23-r3" + +
+ + CVE-2014-9761 + CVE-2015-5277 + CVE-2015-8776 + CVE-2015-8777 + CVE-2015-8778 + CVE-2015-8779 + CVE-2016-1234 + CVE-2016-3075 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-12.xml new file mode 100644 index 0000000000..4825141ffa --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-12.xml @@ -0,0 +1,55 @@ + + + + MuPDF: Multiple vulnerabilities + Multiple vulnerabilities have been found in MuPDF, the worst of + which allows remote attackers to execute arbitrary code. + + mupdf + 2017-02-19 + 2017-02-19: 1 + 589826 + 590480 + 608702 + 608712 + remote + + + 1.10a-r1 + 1.10a-r1 + + + +

A lightweight PDF, XPS, and E-book viewer.

+
+ +

Multiple vulnerabilities have been discovered in MuPDF. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted PDF + document using MuPDF possibly resulting in the execution of arbitrary + code, with the privileges of the process, or a Denial of Service + condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All MuPDF users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/mupdf-1.10a-r1" + +
+ + CVE-2016-6265 + CVE-2016-6525 + CVE-2017-5896 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-13.xml new file mode 100644 index 0000000000..a4eb178f19 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-13.xml @@ -0,0 +1,75 @@ + + + + Mozilla Thunderbird: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Thunderbird, + the worst of which could lead to the execution of arbitrary code. + + thunderbird + 2017-02-20 + 2017-02-20: 1 + 607310 + remote + + + 45.7.0 + 45.7.0 + + + 45.7.0 + 45.7.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the + Mozilla project. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. + Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by enticing a user to open a specially crafted email + or web page, could possibly execute arbitrary code with the privileges of + the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-45.7.0" + + +

All Mozilla Thunderbird binary users should upgrade to the latest + version: +

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=mail-client/thunderbird-bin-45.7.0" + +
+ + CVE-2017-5373 + CVE-2017-5375 + CVE-2017-5376 + CVE-2017-5378 + CVE-2017-5380 + CVE-2017-5383 + CVE-2017-5390 + CVE-2017-5396 + + Mozilla Foundation Security Advisory 2017-03 + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-14.xml new file mode 100644 index 0000000000..a4a873eae7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-14.xml @@ -0,0 +1,52 @@ + + + + PyCrypto: Remote execution of arbitrary code + A heap-based buffer overflow in PyCrypto might allow remote + attackers to execute arbitrary code. + + pycrypto + 2017-02-20 + 2017-02-20: 1 + 576494 + remote + + + 2.6.1-r2 + 2.6.1-r2 + + + +

The Python Cryptography Toolkit (PyCrypto) is a collection of both + secure hash functions (such as SHA256 and RIPEMD160), and various + encryption algorithms (AES, DES, RSA, ElGamal, etc.). +

+
+ +

A heap-based buffer overflow vulnerability has been discovered in + PyCrypto. Please review the CVE identifier referenced below for details. +

+
+ +

A remote attacker, able to control the mode of operation in PyCrypto’s + AES module, could possibly execute arbitrary code with the privileges of + the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All PyCrypto users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/pycrypto-2.6.1-r2" + +
+ + CVE-2013-7459 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-15.xml new file mode 100644 index 0000000000..4fd879865b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-15.xml @@ -0,0 +1,66 @@ + + + + OCaml: Buffer overflow and information disclosure + A buffer overflow in OCaml might allow remote attackers to obtain + sensitive information or crash an OCaml-based application. + + ocaml + 2017-02-20 + 2017-02-20: 1 + 581946 + remote + + + 4.04.0 + 4.04.0 + + + +

OCaml is a high-level, strongly-typed, functional, and object-oriented + programming language from the ML family of languages. +

+
+ +

It was discovered that OCaml was vulnerable to a runtime bug that, on + 64-bit platforms, causes size arguments to internal memmove calls to be + sign-extended from 32- to 64-bits before being passed to the memmove + function. This leads to arguments between 2GiB and 4GiB being interpreted + as larger than they are (specifically, a bit below 2^64), causing a + buffer overflow. Further, arguments between 4GiB and 6GiB are interpreted + as 4GiB smaller than they should be causing a possible information leak. +

+
+ +

A remote attacker, able to interact with an OCaml-based application, + could possibly obtain sensitive information or cause a Denial of Service + condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All OCaml users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/ocam-4.04.0" + + +

Packages which depend on OCaml may need to be recompiled. Tools such as + qdepends (included in app-portage/portage-utils) may assist in + identifying these packages: +

+ + + # emerge --oneshot --ask --verbose $(qdepends -CQ dev-lang/ocaml | sed + 's/^/=/') + +
+ + CVE-2015-8869 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-16.xml new file mode 100644 index 0000000000..ff922abe2d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-16.xml @@ -0,0 +1,63 @@ + + + + Redis: Multiple vulnerabilities + Multiple vulnerabilities have been found in Redis, the worst of + which may allow execution of arbitrary code. + + redis + 2017-02-20 + 2017-02-20: 1 + 551274 + 565188 + 595730 + remote + + + 3.2.5 + 3.0.7 + 3.2.5 + + + +

Redis is an open source (BSD licensed), in-memory data structure store, + used as a database, cache and message broker. +

+
+ +

Multiple vulnerabilities have been discovered in Redis. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, able to connect to a Redis instance, could issue + malicious commands possibly resulting in the execution of arbitrary code + with the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Redis 3.0.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/redis-3.0.7" + + +

All Redis 3.2.x users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/redis-3.2.5" + +
+ + CVE-2015-4335 + CVE-2015-8080 + CVE-2016-8339 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-17.xml new file mode 100644 index 0000000000..4e34e47d9a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-17.xml @@ -0,0 +1,71 @@ + + + + MySQL: Multiple vulnerabilities + Multiple vulnerabilities have been found in MySQL, the worst of + which could lead to privilege escalation. + + mysql + 2017-02-20 + 2017-02-20: 1 + 606254 + local, remote + + + 5.6.35 + 5.6.35 + + + +

MySQL is a popular multi-threaded, multi-user SQL server. MariaDB is an + enhanced, drop-in replacement for MySQL. +

+
+ +

Multiple vulnerabilities have been discovered in MySQL. Please review + the CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly escalate privileges, gain access to critical + data or complete access to all MySQL server accessible data, or cause a + Denial of Service condition via unspecified vectors. +

+
+ +

There is no known workaround at this time.

+
+ +

All MySQL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/mysql-5.6.35" + +
+ + CVE-2016-8318 + CVE-2016-8327 + CVE-2017-3238 + CVE-2017-3243 + CVE-2017-3244 + CVE-2017-3251 + CVE-2017-3256 + CVE-2017-3257 + CVE-2017-3258 + CVE-2017-3265 + CVE-2017-3273 + CVE-2017-3291 + CVE-2017-3312 + CVE-2017-3313 + CVE-2017-3317 + CVE-2017-3318 + CVE-2017-3319 + CVE-2017-3320 + + Oracle Critical Patch Update Advisory - January 2017 + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-18.xml new file mode 100644 index 0000000000..3378018f62 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-18.xml @@ -0,0 +1,59 @@ + + + + MariaDB: Multiple vulnerabilities + Multiple vulnerabilities have been found in MariaDB, the worst of + which could lead to privilege escalation. + + mariadb + 2017-02-20 + 2017-02-20: 1 + 606258 + local, remote + + + 10.0.29 + 10.0.29 + + + +

MariaDB is an enhanced, drop-in replacement for MySQL.

+
+ +

Multiple vulnerabilities have been discovered in MariaDB. Please review + the CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly escalate privileges, gain access to critical + data or complete access to all MariaDB Server accessible data, or cause a + Denial of Service condition via unspecified vectors. +

+
+ +

There is no known workaround at this time.

+
+ +

All MariaDB users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/mariadb-10.0.29" + +
+ + CVE-2016-6664 + CVE-2017-3238 + CVE-2017-3243 + CVE-2017-3244 + CVE-2017-3257 + CVE-2017-3258 + CVE-2017-3265 + CVE-2017-3291 + CVE-2017-3312 + CVE-2017-3317 + CVE-2017-3318 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-19.xml new file mode 100644 index 0000000000..e797b5a375 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-19.xml @@ -0,0 +1,49 @@ + + + + TigerVNC: Buffer overflow + A buffer overflow in TigerVNC might allow remote attackers to + execute arbitrary code. + + tigervnc + 2017-02-20 + 2017-02-20: 1 + 606998 + remote + + + 1.7.1 + 1.7.1 + + + +

TigerVNC is a high-performance VNC server/client.

+
+ +

A buffer overflow vulnerability in ModifiablePixelBuffer::fillRect in + vncviewer was found. +

+
+ +

A remote attacker, utilizing a malicious VNC server, could execute + arbitrary code with the privileges of the user running the client or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All TigerVNC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/tigervnc-1.7.1" + +
+ + CVE-2017-5581 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-20.xml new file mode 100644 index 0000000000..c1e13ce421 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-20.xml @@ -0,0 +1,77 @@ + + + + Adobe Flash Player: Multiple vulnerabilities + Multiple vulnerabilities have been found in Adobe Flash Player, the + worst of which allows remote attackers to execute arbitrary code. + + flash + 2017-02-20 + 2017-02-20: 1 + 605314 + 609330 + remote + + + 24.0.0.221 + 24.0.0.221 + + + +

The Adobe Flash Player is a renderer for the SWF file format, which is + commonly used to provide interactive websites. +

+
+ +

Multiple vulnerabilities have been discovered in Adobe Flash Player. + Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or bypass security restrictions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Adobe Flash users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-24.0.0.221" + +
+ + CVE-2017-2925 + CVE-2017-2926 + CVE-2017-2927 + CVE-2017-2928 + CVE-2017-2930 + CVE-2017-2931 + CVE-2017-2932 + CVE-2017-2933 + CVE-2017-2934 + CVE-2017-2935 + CVE-2017-2936 + CVE-2017-2937 + CVE-2017-2938 + CVE-2017-2982 + CVE-2017-2984 + CVE-2017-2985 + CVE-2017-2986 + CVE-2017-2987 + CVE-2017-2988 + CVE-2017-2990 + CVE-2017-2991 + CVE-2017-2992 + CVE-2017-2993 + CVE-2017-2994 + CVE-2017-2995 + CVE-2017-2996 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-21.xml new file mode 100644 index 0000000000..68f1a9b4c5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-21.xml @@ -0,0 +1,71 @@ + + + + Opus: User-assisted execution of arbitrary code + A vulnerability in Opus could cause memory corruption. + opus + 2017-02-20 + 2017-02-20: 1 + 605894 + remote + + + 1.1.3-r1 + 1.1.3-r1 + + + +

Opus is a totally open, royalty-free, highly versatile audio codec.

+
+ +

A large NLSF values could cause the stabilization code in + silk/NLSF_stabilize.c to wrap-around and have the last value in + NLSF_Q15[] to be negative, close to -32768. +

+ +

Under normal circumstances, the code will simply read from the wrong + table resulting in an unstable LPC filter. The filter would then go + through the LPC stabilization code at the end of silk_NLSF2A(). +

+ +

Ultimately, the output audio would be garbage, but no worse than with + any other harmless bad packet. +

+ +

Please see the referenced upstream patch and Debian bug report below for + a detailed analysis. +

+ +

However, the original report was about a successful exploitation of + Android’s Mediaserver in conjunction with this vulnerability. +

+
+ +

A remote attacker could entice a user to open a specially crafted media + stream, possibly resulting in execution of arbitrary code with the + privileges of the process, or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Opus users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/opus-1.1.3-r1" + +
+ + CVE-2017-0381 + + Debian Bug 851612 + + + Upstream patch + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-22.xml new file mode 100644 index 0000000000..b18c72c2aa --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-22.xml @@ -0,0 +1,74 @@ + + + + Mozilla Firefox: Multiple vulnerabilities + Multiple vulnerabilities have been found in Mozilla Firefox, the + worst of which may allow execution of arbitrary code. + + firefox + 2017-02-20 + 2017-02-20: 1 + 607138 + remote + + + 45.7.0 + 45.7.0 + + + 45.7.0 + 45.7.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla + Project. +

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, bypass + access restriction, access otherwise protected information, or spoof + content via multiple vectors. +

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-45.7.0" + + +

All Mozilla Firefox binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-45.7.0" + +
+ + CVE-2017-5373 + CVE-2017-5375 + CVE-2017-5376 + CVE-2017-5378 + CVE-2017-5380 + CVE-2017-5383 + CVE-2017-5386 + CVE-2017-5390 + CVE-2017-5396 + + Mozilla Foundation Security Advisory 2017-02 + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-23.xml new file mode 100644 index 0000000000..4eae1027c5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-23.xml @@ -0,0 +1,61 @@ + + + + Dropbear: Multiple vulnerabilities + Multiple vulnerabilities have been found in Dropbear, the worst of + which allows remote attackers to execute arbitrary code. + + dropbear + 2017-02-20 + 2017-02-20: 1 + 605560 + remote + + + 2016.74 + 2016.74 + + + +

Dropbear is an SSH server and client designed with a small memory + footprint. +

+
+ +

Multiple vulnerabilities have been discovered in Dropbear. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with root + privileges if usernames containing special characters can be created on a + system. Also, a dbclient user who can control username or host arguments + could potentially run arbitrary code with the privileges of the process. +

+ +

In addition, a remote attacker could entice a user to process a + specially crafted SSH key using dropbearconvert, possibly resulting in + execution of arbitrary code with the privileges of the process or a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Dropbear users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/dropbear-2016.74" + +
+ + CVE-2016-7406 + CVE-2016-7407 + CVE-2016-7408 + CVE-2016-7409 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-24.xml new file mode 100644 index 0000000000..1e92964d19 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-24.xml @@ -0,0 +1,57 @@ + + + + LibVNCServer/LibVNCClient: Multiple vulnerabilities + Multiple vulnerabilities have been found in + LibVNCServer/LibVNCClient, the worst of which allows remote attackers to + execute arbitrary code when connecting to a malicious server. + + libvncserver + 2017-02-20 + 2017-02-20: 1 + 605326 + remote + + + 0.9.11 + 0.9.11 + + + +

LibVNCServer/LibVNCClient are cross-platform C libraries that allow you + to easily implement VNC server or client functionality in your program. +

+
+ +

Multiple vulnerabilities have been discovered in LibVNCServer and + LibVNCClient. Please review the CVE identifiers referenced below for + details. +

+
+ +

A remote attacker could entice a user to connect to a malicious VNC + server or leverage Man-in-the-Middle attacks to cause the execution of + arbitrary code with the privileges of the user running a VNC client + linked against LibVNCClient. +

+
+ +

There is no known workaround at this time.

+
+ +

All LibVNCServer/LibVNCClient users should upgrade to the latest + version: +

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libvncserver-0.9.11" + +
+ + CVE-2016-9941 + CVE-2016-9942 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-25.xml new file mode 100644 index 0000000000..0cedc9ab6a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-25.xml @@ -0,0 +1,53 @@ + + + + libass: Multiple vulnerabilities + Multiple vulnerabilities have been found in libass, the worst of + which have unknown impacts. + + libass + 2017-02-20 + 2017-02-20: 1 + 596422 + remote + + + 0.13.4 + 0.13.4 + + + +

libass is a portable subtitle renderer for the ASS/SSA (Advanced + Substation Alpha/Substation Alpha) subtitle format. +

+
+ +

Multiple vulnerabilities have been discovered in libass. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could cause a Denial of Service condition or other + unknown impacts via unknown attack vectors. +

+
+ +

There is no known workaround at this time.

+
+ +

All libass users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libass-0.13.4" + +
+ + CVE-2016-7969 + CVE-2016-7970 + CVE-2016-7971 + CVE-2016-7972 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-26.xml new file mode 100644 index 0000000000..fc86cf20f8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-26.xml @@ -0,0 +1,59 @@ + + + + Nagios: Multiple vulnerabilities + Multiple vulnerabilities have been found in Nagios, the worst of + which could lead to privilege escalation. + + nagios + 2017-02-21 + 2017-02-21: 1 + 595194 + 598104 + 600864 + 602216 + local, remote + + + 4.2.4 + 4.2.4 + + + +

Nagios is an open source host, service and network monitoring program.

+
+ +

Multiple vulnerabilities have been discovered in Nagios. Please review + the CVE identifiers referenced below for details. +

+
+ +

A local attacker, who either is already Nagios’s system user or + belongs to Nagios’s group, could potentially escalate privileges. +

+ +

In addition, a remote attacker could read or write to arbitrary files by + spoofing a crafted response from the Nagios RSS feed server. +

+
+ +

There is no known workaround at this time.

+
+ +

All Nagios users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/nagios-core-4.2.4" + +
+ + CVE-2008-4796 + CVE-2008-7313 + CVE-2016-8641 + CVE-2016-9565 + CVE-2016-9566 + + whissi + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-27.xml new file mode 100644 index 0000000000..e65aec7e17 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-27.xml @@ -0,0 +1,65 @@ + + + + Xen: Multiple vulnerabilities + Multiple vulnerabilities have been found in Xen, the worst of which + could lead to the execution of arbitrary code on the host system. + + xen + 2017-02-21 + 2017-02-21: 1 + 607840 + 609160 + local + + + 4.7.1-r5 + 4.7.1-r5 + + + 4.7.1-r6 + 4.7.1-r6 + + + +

Xen is a bare-metal hypervisor.

+
+ +

Multiple vulnerabilities have been discovered in Xen. Please review the + CVE identifiers and Xen Security Advisory referenced below for details. +

+
+ +

A local attacker could potentially execute arbitrary code with + privileges of Xen (QEMU) process on the host, gain privileges on the host + system, cause a Denial of Service condition, or obtain sensitive + information. +

+
+ +

There is no known workaround at this time.

+
+ +

All Xen users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.7.1-r5" + + +

All Xen Tools users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-emulation/xen-tools-4.7.1-r6" + +
+ + CVE-2017-2615 + XSA-207 + XSA-208 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-28.xml new file mode 100644 index 0000000000..dc8de74927 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-28.xml @@ -0,0 +1,72 @@ + + + + QEMU: Multiple vulnerabilities + Multiple vulnerabilities have been found in QEMU, the worst of + which could lead to the execution of arbitrary code on the host system. + + qemu + 2017-02-21 + 2017-02-21: 1 + 606264 + 606720 + 606722 + 607000 + 607100 + 607766 + 608034 + 608036 + 608038 + 608520 + 608728 + local + + + 2.8.0-r1 + 2.8.0-r1 + + + +

QEMU is a generic and open source machine emulator and virtualizer.

+
+ +

Multiple vulnerabilities have been discovered in QEMU. Please review the + CVE identifiers referenced below for details. +

+
+ +

A local attacker could potentially execute arbitrary code with + privileges of QEMU process on the host, gain privileges on the host + system, cause a Denial of Service condition, or obtain sensitive + information. +

+
+ +

There is no known workaround at this time.

+
+ +

All QEMU users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.8.0-r1" + +
+ + + CVE-2016-10155 + + CVE-2017-2615 + CVE-2017-5525 + CVE-2017-5552 + CVE-2017-5578 + CVE-2017-5579 + CVE-2017-5667 + CVE-2017-5856 + CVE-2017-5857 + CVE-2017-5898 + CVE-2017-5931 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-29.xml new file mode 100644 index 0000000000..d6e26f8aa7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-29.xml @@ -0,0 +1,64 @@ + + + + PHP: Multiple vulnerabilities + Multiple vulnerabilities have been found in PHP, the worst of which + could lead to arbitrary code execution or cause a Denial of Service + condition. + + php + 2017-02-21 + 2017-02-21: 1 + 604776 + 606626 + remote + + + 5.6.30 + 5.6.30 + + + +

PHP is a widely-used general-purpose scripting language that is + especially suited for Web development and can be embedded into HTML. +

+
+ +

Multiple vulnerabilities have been discovered in PHP. Please review the + CVE identifiers referenced below for details. +

+
+ +

An attacker could possibly execute arbitrary code or create a Denial of + Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All PHP 5.6 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.6.30:5.6" + +
+ + + CVE-2016-10158 + + + CVE-2016-10159 + + + CVE-2016-10160 + + + CVE-2016-10161 + + CVE-2016-9935 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-30.xml new file mode 100644 index 0000000000..6c9705d56c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-30.xml @@ -0,0 +1,89 @@ + + + + tcpdump: Multiple vulnerabilities + Multiple vulnerabilities have been found in tcpdump, the worst of + which may allow execution of arbitrary code. + + tcpdump + 2017-02-21 + 2017-02-21: 1 + 606516 + remote + + + 4.9.0 + 4.9.0 + + + +

tcpdump is a tool for network monitoring and data acquisition.

+
+ +

Multiple vulnerabilities have been discovered in tcpdump. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by sending a specially crafted network package, could + possibly execute arbitrary code with the privileges of the process or + cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All tcpdump users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/tcpdump-4.9.0" + +
+ + CVE-2016-7922 + CVE-2016-7923 + CVE-2016-7924 + CVE-2016-7925 + CVE-2016-7926 + CVE-2016-7927 + CVE-2016-7928 + CVE-2016-7929 + CVE-2016-7930 + CVE-2016-7931 + CVE-2016-7932 + CVE-2016-7933 + CVE-2016-7934 + CVE-2016-7935 + CVE-2016-7936 + CVE-2016-7937 + CVE-2016-7938 + CVE-2016-7939 + CVE-2016-7940 + CVE-2016-7973 + CVE-2016-7974 + CVE-2016-7975 + CVE-2016-7983 + CVE-2016-7984 + CVE-2016-7985 + CVE-2016-7986 + CVE-2016-7992 + CVE-2016-7993 + CVE-2016-8574 + CVE-2016-8575 + CVE-2017-5202 + CVE-2017-5203 + CVE-2017-5204 + CVE-2017-5205 + CVE-2017-5341 + CVE-2017-5342 + CVE-2017-5482 + CVE-2017-5483 + CVE-2017-5484 + CVE-2017-5485 + CVE-2017-5486 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-31.xml new file mode 100644 index 0000000000..f0a1547804 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-31.xml @@ -0,0 +1,62 @@ + + + + GPL Ghostscript: Multiple vulnerabilities + Multiple vulnerabilities have been found in GPL Ghostscript, the + worst of which may allow execution of arbitrary code. + + ghostscript + 2017-02-22 + 2017-02-22: 1 + 596576 + 607190 + remote + + + 9.20-r1 + 9.20-r1 + + + +

Ghostscript is an interpreter for the PostScript language and for PDF.

+
+ +

Multiple vulnerabilities have been discovered in GPL Ghostscript and the + bundled OpenJPEG. Please review the CVE identifiers and GLSA-201612-26 + (OpenJPEG) referenced below for additional information. +

+ +

Note: GPL Ghostscript in Gentoo since app-text/ghostscript-gpl-9.20-r1 + no longer bundles OpenJPEG. +

+
+ +

A context-dependent attacker could entice a user to open a specially + crafted PostScript file or PDF using GPL Ghostscript possibly resulting + in the execution of arbitrary code with the privileges of the process or + a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All GPL Ghostscript users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-text/ghostscript-gpl-9.20-r1" + +
+ + CVE-2016-7976 + CVE-2016-7977 + CVE-2016-7978 + CVE-2016-7979 + CVE-2016-8602 + GLSA-201612-26 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-32.xml new file mode 100644 index 0000000000..6baab55ce2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201702-32.xml @@ -0,0 +1,57 @@ + + + + Ruby Archive::Tar::Minitar: Directory traversal + Ruby Archive::Tar::Minitar is vulnerable to a directory traversal + attack. + + archive-tar-minitar + 2017-02-22 + 2017-02-22: 1 + 607110 + remote + + + 0.6.1 + 0.6.1 + + + +

Archive::Tar::Minitar is a pure-Ruby library and command-line utility + that provides the ability to deal with POSIX tar(1) archive files. +

+
+ +

Michal Marek discovered that Ruby Archive::Tar::Minitar is vulnerable to + a directory traversal vulnerability. +

+
+ +

A remote attacker could entice a user or an automated system to process + a specially crafted archive using Ruby Archive::Tar::Minitar possibly + allowing the writing of arbitrary files with the privileges of the + process. +

+
+ +

There is no known workaround at this time.

+
+ +

All Ruby Archive::Tar::Minitar users should upgrade to the latest + version: +

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-ruby/archive-tar-minitar-0.6.1" + +
+ + + CVE-2016-10173 + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-01.xml new file mode 100644 index 0000000000..49601e9952 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-01.xml @@ -0,0 +1,56 @@ + + + + OpenOffice: User-assisted execution of arbitrary code + A vulnerability in OpenOffice Impress could cause memory + corruption. + + openoffice + 2017-03-19 + 2017-03-19: 1 + 597080 + remote + + + 4.1.3 + 4.1.3 + + + +

Apache OpenOffice is an open-source office software suite for word + processing, spreadsheets, presentations, graphics, databases and more. +

+
+ +

An exploitable out-of-bounds vulnerability exists in OpenOffice Impress + when handling MetaActions. +

+
+ +

A remote attacker could entice a user to open a specially crafted + OpenDocument Presentation .ODP or Presentation Template .OTP file using + OpenOffice Impress, possibly resulting in execution of arbitrary code + with the privileges of the process or a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All OpenOffice users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-office/openoffice-bin-4.1.3" + + +
+ + CVE-2016-1513 + + TALOS-2016-0051 + + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-02.xml new file mode 100644 index 0000000000..06cb24e4b6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-02.xml @@ -0,0 +1,61 @@ + + + + Adobe Flash Player: Multiple vulnerabilities + Multiple vulnerabilities have been found in Adobe Flash Player, the + worst of which allows remote attackers to execute arbitrary code. + + adobe-flash + 2017-03-19 + 2017-03-19: 1 + 612588 + remote + + + 25.0.0.127 + 25.0.0.127 + + + +

The Adobe Flash Player is a renderer for the SWF file format, which is + commonly used to provide interactive websites. +

+
+ +

Multiple vulnerabilities have been discovered in Adobe Flash Player. + Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or bypass security restrictions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Adobe Flash users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-25.0.0.127" + + +
+ + + APSB17-07 + + CVE-2017-2997 + CVE-2017-2998 + CVE-2017-2999 + CVE-2017-3000 + CVE-2017-3001 + CVE-2017-3002 + CVE-2017-3003 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-03.xml new file mode 100644 index 0000000000..8d4c2a9252 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201703-03.xml @@ -0,0 +1,52 @@ + + + + PuTTY: Buffer overflow + A buffer overflow in PuTTY might allow remote attackers to execute + arbitrary code or cause a denial of service. + + PuTTY + 2017-03-19 + 2017-03-19: 1 + 610552 + remote + + + 0.68 + 0.68 + + + +

PuTTY is a free implementation of Telnet and SSH for Windows and Unix + platforms, along with an xterm terminal emulator. +

+
+ +

A heap-corrupting buffer overflow bug in the ssh_agent_channel_data + function of PuTTY was found. +

+
+ +

A remote attacker, utilizing the SSH agent forwarding of an SSH server, + could execute arbitrary code with the privileges of the user running the + client or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All PuTTY users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/putty-0.68" + + +
+ + CVE-2017-6542 + + BlueKnight + BlueKnight +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index cc05544a46..98f5de2268 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Tue, 24 Jan 2017 22:13:22 +0000 +Tue, 21 Mar 2017 21:38:55 +0000