diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index be0375e73b..61dd37b893 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 448845 BLAKE2B 24feded351e2c02762000f35c6c58ac935b2383bf6acdd7450f974e16e15fe0935d3f657233d5cd4ab87639ad5f410b8ea36fd5c019b93bfbfc47983ef01dbdc SHA512 569d13495f7e4953afefd29435d7953d3afa1815ae86459c1f4f84726efaaedc5598835f415738d792d2d1060be50cf8ad9140b7fcf124dd7f9ea681a55957ab -TIMESTAMP 2019-09-11T01:08:54Z +MANIFEST Manifest.files.gz 449647 BLAKE2B 8803d7d7f47c464cfd8f60beebc66a2a666a58eced0da3542b3aa3258b2801c9603a06ee88dc1b3d88b18763967fd4df415a2267ef2059485f617f508c374276 SHA512 19ad2e1287d270dc62f5d69c91b20e5b243af42fac29e8d0aef1d81bebaee04f64f471f8dadc1f923158b7380eb0face42df28d6a6f48575d0150c58354966e3 +TIMESTAMP 2019-11-22T17:38:48Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl14SSZfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl3YHShfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klDZSBAAqoFwooNC4OtE9pVq2cfjdzGkK9W5/lJi+aVvllk3srr5BHd8jakr9IJq -DaXZNkdcNs+ZSU2pW8wF3KG7r6b5Ib0KTTYHuMCSXJHSYNLBW60x1YHOUoQYdPGb -K26I7l61X742gFzmeGjXUaqUbN4Z99iYBTLD7VnYQCSMDPLirNF+0Mi35lrXA8OO -9nX63kLgvrmRpArBhjeR41JlfjqC5yqES3KWYYuzMO+V7L7smP9zmgf2NI9lZfCm -HIh4exi0xmHr0ZgW4wZgvLFuAxHE4BoMO+z5mW1Qb7CkTdEeizWsMxdQiGRgOT12 -WTUV3qW5QfHYTNuDHxhfrfRPQ6/+EhosLRrxWO0EHoYh/GNUJ/TdQATADJa+whLy -sXm9tuX/LriOlB1bPx6SakW2BNbTmve4XwocNKUh2Th02C9WsTiK4hNARnct+644 -FUuKCiCXK8/r1isozPY0YcnwDuQvBAS3diYo9b641BpCCSlhPqJuZDvl/9CFnqLF -z4LydlDnarNKWY1HXcrQnlzwwyPxpDHjfp2Mugrc4P0Nyr99/Vboale/rjIlZXFi -idIDlJZqTsznd1bM7vdZ4rzEsAbwS2DtWgfDk5xzHP9uYjt7srjrwT8PPHXf3fDn -MT6ZGrkgpOHqC/LswBWMNvzRJqTp1Zod08wjwJbr6XLWTK+z+vE= -=OjnX +klB87w//UoGHDGr8v7UijB9Op29ia5ExY66P8cQLQah48TTTzUFJuhW+1cxaxuM8 +8TtUbHf7n6HwmFs35WrsjI3zDMYxz67gKQtu4sCEDBvq0k/7wOmVomxa6Idt+ADC +BfmkdbYLiRDpnBc3l/uLgMCrocUTmrCoH/BjDAlh0tW8ViuQ1ah72dtmhwOPtkkK +mH4PPzOFPujoIGwn7lgQE2MPinExpgQ1x31mMNUvqld2OXMmm1VrjcF7LD6WxjuL +gAFcPnVf8ru/H/gMD14/VZ1Lkf7a7jV3aDOZk7dj+0+G9rDRWMcnLga+N3nnlizk +8I2E3mGM6U858gc7TZkPxycsV35PGCCOWg9HoHRDkjfe5gCR97tVHrREBPnUa8hT +fbSRic6HO0fLb4tX3w7y4GdiUDeQ9IarZngkbWpy8ZDRFhIonYDj8N1drWfSQu15 +lwGu3s7R2HAhGfO3HxhXuHpbmxf3TQlayBASyXofp3zx+hCCUdKXD/O+NwfqNveE +57SQ3lW0kEWL2jQgvocn4LiMzrDuMImAiwubcY5nfXaQZWwjSIV1T+MVcC/kb9Yt +JzKWlTFOl8eaNnjiXA8wMU4cLNFW4v9OQfrqrKUT8kO3nWkB20aiqPJxp0XRRA+B +jR1SxQVNdu2P2JmJOpuS0m5ybAubZ0oIG0Y0VtqRYIboolBXjFQ= +=uGfw -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index e80a943da5..87a4ce20a9 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201910-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201910-01.xml new file mode 100644 index 0000000000..4064b16ac5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201910-01.xml @@ -0,0 +1,81 @@ + + + + PHP: Arbitrary code execution + A vulnerability in PHP might allow an attacker to execute arbitrary + code. + + php + 2019-10-25 + 2019-11-19 + 698452 + remote + + + 7.1.33 + 7.2.24 + 7.3.11 + 5.6.40-r7 + 7.1.33 + 7.2.24 + 7.3.11 + 5.6.40-r7 + + + +

PHP is an open source general-purpose scripting language that is + especially suited for web development. +

+
+ +

A underflow in env_path_info in PHP-FPM under certain configurations can + be exploited to gain remote code execution. +

+
+ +

A remote attacker, by sending special crafted HTTP requests, could + possibly execute arbitrary code with the privileges of the process, or + cause a Denial of Service condition. +

+
+ +

If patching is not feasible, the suggested workaround is to include + checks to verify whether or not a file exists before passing to PHP. +

+
+ +

All PHP 5.6 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-5.6.40-r7" + + +

All PHP 7.1 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.1.33" + + +

All PHP 7.2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.2.24" + + +

All PHP 7.3 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/php-7.3.11" + + +
+ + CVE-2019-11043 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-01.xml new file mode 100644 index 0000000000..e87f7485d7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-01.xml @@ -0,0 +1,55 @@ + + + + OpenSSH: Integer overflow + An integer overflow in OpenSSH might allow an attacker to execute + arbitrary code. + + openssh + 2019-11-07 + 2019-11-07 + 697046 + remote + + + 8.0_p1-r4 + 8.0_p1-r2 + + + +

OpenSSH is a complete SSH protocol implementation that includes SFTP + client and server support. +

+
+ +

OpenSSH, when built with “xmss” USE flag enabled, has a + pre-authentication integer overflow if a client or server is configured + to use a crafted XMSS key. +

+ +

NOTE: This USE flag is disabled by default!

+
+ +

A remote attacker could connect to a vulnerable OpenSSH server using a + special crafted XMSS key possibly resulting in execution of arbitrary + code with the privileges of the process or a Denial of Service condition. +

+
+ +

Disable XMSS key type.

+
+ +

All OpenSSH users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=net-misc/openssh/openssh-8.0_p1-r4" + +
+ + CVE-2019-16905 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-02.xml new file mode 100644 index 0000000000..8d4d4b4254 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-02.xml @@ -0,0 +1,49 @@ + + + + pump: User-assisted execution of arbitrary code + A buffer overflow in pump might allow remote attacker to execute + arbitrary code. + + pump + 2019-11-07 + 2019-11-07 + 694314 + remote + + + 0.8.24-r4 + + + +

BOOTP and DHCP client for automatic IP configuration.

+
+ +

It was discovered that there was an arbitrary code execution + vulnerability in the pump DHCP/BOOTP client. +

+
+ +

A remote attacker, by enticing a user to connect to a malicious server, + could cause the execution of arbitrary code with the privileges of the + user running pump DHCP/BOOTP client. +

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for pump. We recommend that users + unmerge pump: +

+ + + # emerge --unmerge "net-misc/pump" + +
+ + Debian Bug Report 933674 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-03.xml new file mode 100644 index 0000000000..0d7dff81e1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-03.xml @@ -0,0 +1,51 @@ + + + + Oniguruma: Multiple vulnerabilities + Multiple vulnerabilities have been found in Oniguruma, the worst of + which could result in the arbitrary execution of code. + + oniguruma + 2019-11-07 + 2019-11-07 + 691832 + local, remote + + + 6.9.3 + 6.9.3 + + + +

Oniguruma is a regular expression library.

+
+ +

Multiple vulnerabilities have been discovered in Oniguruma. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by enticing a user to process a specially crafted + string using an application linked against Oniguruma, could possibly + execute arbitrary code with the privileges of the process or cause a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Oniguruma users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/oniguruma-6.9.3" + +
+ + CVE-2019-13224 + CVE-2019-13225 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-04.xml new file mode 100644 index 0000000000..8793df1008 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201911-04.xml @@ -0,0 +1,50 @@ + + + + OpenSSL: Multiple vulnerabilities + Multiple information disclosure vulnerabilities in OpenSSL allow + attackers to obtain sensitive information. + + openssl + 2019-11-07 + 2019-11-07 + 694162 + local, remote + + + 1.0.2t + 1.0.2t + + + +

OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer + (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general + purpose cryptography library. +

+
+ +

Multiple vulnerabilities have been discovered in OpenSSL. Please review + the CVE identifiers referenced below for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSSL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2t" + +
+ + CVE-2019-1547 + CVE-2019-1563 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index ce53b3ac10..caca29ca0b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Wed, 11 Sep 2019 01:08:51 +0000 +Fri, 22 Nov 2019 17:38:45 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 933a7041a4..3d9c875b21 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -0d8b041795d355b2f8da9b84725a62150a91dc13 1567964538 2019-09-08T17:42:18+00:00 +435541275775881e78e6acc96aca7536a5955224 1574160598 2019-11-19T10:49:58+00:00