bump(metadata/glsa): sync with upstream

This commit is contained in:
David Michael 2018-06-26 03:30:32 +00:00
parent c5cedfa370
commit efeec47380
6 changed files with 115 additions and 17 deletions

View File

@ -1,23 +1,23 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
MANIFEST Manifest.files.gz 426460 BLAKE2B 47694bd3ef3c615341d613415950b0242b5038a27c4ebe5cfbcbd26dbd4cdf9a80251ec31f482f1575b622e4c7b6577fa42adb2ec5074a46b45ff15ddfdfe1b1 SHA512 685738a5c048270cbefc11e9bf44bb952395b8423bf32612d4c7c6519b5b09941e4920caa34fcbd798a247315ab3dfb6d919b8a36b224acdcaaa2909bff6f2d0
TIMESTAMP 2018-06-20T17:38:33Z
MANIFEST Manifest.files.gz 426775 BLAKE2B 0a924e893bc7d02fb872d05ff4b63ad4d237b75711b0c6a09d632bbc7eeb1a14506448cef5b376ba25b504b6e4c16d40d6662762ee100207b8ee92abf972340d SHA512 811f8949726f5f714f93c3522b7ae6b1eb5aad37a0229ee9d5f5ee0ddb8c5273a4f3b0d4055d44a1dbeed5fc458aeb2e5620e47889961d9b7a4e961c24e5877b
TIMESTAMP 2018-06-26T03:08:38Z
-----BEGIN PGP SIGNATURE-----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=fl5T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=Ut/r
-----END PGP SIGNATURE-----

View File

@ -0,0 +1,50 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201806-08">
<title>file: Denial of service</title>
<synopsis>A vulnerability in file could lead to a Denial of Service
condition.
</synopsis>
<product type="ebuild">file</product>
<announced>2018-06-23</announced>
<revised count="1">2018-06-23</revised>
<bug>657930</bug>
<access>remote</access>
<affected>
<package name="sys-apps/file" auto="yes" arch="*">
<unaffected range="ge">5.33-r2</unaffected>
<vulnerable range="lt">5.33-r2</vulnerable>
</package>
</affected>
<background>
<p>file is a utility that guesses a file format by scanning binary data for
patterns.
</p>
</background>
<description>
<p>File does not properly utilize the do_core_note function in readelf.c in
libmagic.a.
</p>
</description>
<impact type="normal">
<p>A remote attacker could send a specially crafted ELF file possibly
resulting in a Denial of Service condition.
</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All file users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=sys-apps/file-5.33-r2"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-10360">CVE-2018-10360</uri>
</references>
<metadata tag="requester" timestamp="2018-06-23T00:28:49Z">b-man</metadata>
<metadata tag="submitter" timestamp="2018-06-23T21:38:00Z">Zlogene</metadata>
</glsa>

View File

@ -0,0 +1,48 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="201806-09">
<title>PNP4Nagios: Root privilege escalation</title>
<synopsis>A vulnerability in PNP4Nagios which may allow local attackers to
gain root privileges.
</synopsis>
<product type="ebuild">pnp4nagios</product>
<announced>2018-06-24</announced>
<revised count="1">2018-06-24</revised>
<bug>637640</bug>
<access>local</access>
<affected>
<package name="net-analyzer/pnp4nagios" auto="yes" arch="*">
<unaffected range="ge">0.6.26-r9</unaffected>
<vulnerable range="lt">0.6.26-r9</vulnerable>
</package>
</affected>
<background>
<p>PNP4Nagios is an addon for the Nagios Network Monitoring System.</p>
</background>
<description>
<p>It was found that PHP4Nagios creates files owned by an unprivileged user
that are used by root.
</p>
</description>
<impact type="normal">
<p>A local attacker could escalate privileges to root.</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All PNP4Nagios users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose
"&gt;=net-analyzer/pnp4nagios-0.6.26-r9"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-16834">CVE-2017-16834</uri>
</references>
<metadata tag="requester" timestamp="2018-06-19T23:53:20Z">b-man</metadata>
<metadata tag="submitter" timestamp="2018-06-24T03:10:22Z">irishluck83</metadata>
</glsa>

View File

@ -1 +1 @@
Wed, 20 Jun 2018 17:38:29 +0000
Tue, 26 Jun 2018 03:08:35 +0000

View File

@ -1 +1 @@
5b6712dd5c527643b1249a76e15d0921eda06151 1529454280 2018-06-20T00:24:40+00:00
676a0a13a2c9c89e7a04d5a85550b5b48c25f9b4 1529809898 2018-06-24T03:11:38+00:00