Merge pull request #3683 from flatcar/buildbot/monthly-glsa-metadata-updates-2026-02-01

Monthly GLSA metadata 2026-02-01
This commit is contained in:
Dongsu Park 2026-02-06 10:16:28 +01:00 committed by GitHub
commit f8b1f793ce
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
9 changed files with 270 additions and 18 deletions

View File

@ -1,24 +1,24 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
MANIFEST Manifest.files.gz 606026 BLAKE2B f642a7d3238c8998aee627a1b7086431eb88df4678fdf42f7ddf8d8bb6de107a02fae7c557568660cc9f04cb9ed135534cc32f129482ba4da102bb96be7e68a9 SHA512 aa4b68d334da5329457cfc76655ce927a51c26cff8774aed431df0f4711bf41c231eea1647511c9cabfd8eabec4b84637a0f0f2ccc3d138d509d72522dbd32d7
TIMESTAMP 2026-01-01T06:40:27Z
MANIFEST Manifest.files.gz 606828 BLAKE2B a1b451cbd8b97fba48dcbcc329e204f935247276d40c90ac4cbfb608d79ab2e992895b94ff858963121d1134b508c59270174e7bcdaf0344859da3443b02f1b8 SHA512 7cf2f0457c87986d719605bc843f16fb1b58e94af8217c0a3cfc1d3b7a854459cdf2ac652b4f9271da08b81922bfb4c73aa18e4836c21288bc5adf2c59450d36
TIMESTAMP 2026-02-01T07:02:09Z
-----BEGIN PGP SIGNATURE-----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=tC7e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=7ZS8
-----END PGP SIGNATURE-----

View File

@ -0,0 +1,46 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="202601-01">
<title>inetutils: Remote Code Execution</title>
<synopsis>A vulnerability has been discovered in the telnetd module of inetutils, which allows remote code execution as root.</synopsis>
<product type="ebuild">inetutils</product>
<announced>2026-01-26</announced>
<revised count="1">2026-01-26</revised>
<bug>969065</bug>
<access>remote</access>
<affected>
<package name="net-misc/inetutils" auto="yes" arch="*">
<unaffected range="ge">2.7</unaffected>
<vulnerable range="lt">2.7</vulnerable>
</package>
</affected>
<background>
<p>Inetutils is a collection of common network programs including a telnet client and server.</p>
</background>
<description>
<p>The telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as the last parameter.
If the client supply a carefully crafted USER environment value being the string &#34;-f root&#34;, and passes the telnet(1) -a or --login parameter to send this USER environment to the server, the client will be automatically logged in as root bypassing normal authentication processes.
This happens because the telnetd server do not sanitize the USER environment variable before passing it on to login(1), and login(1) uses the -f parameter to by-pass normal authentication.</p>
</description>
<impact type="high">
<p>An attacker can login as root via the telnetd daemon.</p>
</impact>
<workaround>
<p>Reinstall inetutils with the telnetd USE flag disabled. This is the default in Gentoo.</p>
</workaround>
<resolution>
<p>All inetutils users with the telnetd USE flag enabled should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/inetutils-2.7"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2026-24061">CVE-2026-24061</uri>
</references>
<metadata tag="requester" timestamp="2026-01-26T10:22:35.842111Z">graaff</metadata>
<metadata tag="submitter" timestamp="2026-01-26T10:22:35.844585Z">graaff</metadata>
</glsa>

View File

@ -0,0 +1,65 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="202601-02">
<title>Vim, gVim: Multiple Vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been discovered in Vim and gVim, the worst of which could lead to execution of arbitrary code.</synopsis>
<product type="ebuild">gvim,vim,vim-core</product>
<announced>2026-01-26</announced>
<revised count="1">2026-01-26</revised>
<bug>961498</bug>
<access>local</access>
<affected>
<package name="app-editors/gvim" auto="yes" arch="*">
<unaffected range="ge">9.1.1652</unaffected>
<vulnerable range="lt">9.1.1652</vulnerable>
</package>
<package name="app-editors/vim" auto="yes" arch="*">
<unaffected range="ge">9.1.1652</unaffected>
<vulnerable range="lt">9.1.1652</vulnerable>
</package>
<package name="app-editors/vim-core" auto="yes" arch="*">
<unaffected range="ge">9.1.1652</unaffected>
<vulnerable range="lt">9.1.1652</vulnerable>
</package>
</affected>
<background>
<p>Vim is an efficient, highly configurable improved version of the classic vi text editor. gVim is the GUI version of Vim.</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in Vim, gVim. Please review the CVE identifiers referenced below for details.</p>
</description>
<impact type="high">
<p>Please review the referenced CVE identifiers for details.</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Vim, gVim users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-editors/vim-9.1.1652"
</code>
<p>All Vim, gVim users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.1.1652"
</code>
<p>All Vim, gVim users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=app-editors/gvim-9.1.1652"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-53905">CVE-2025-53905</uri>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906</uri>
</references>
<metadata tag="requester" timestamp="2026-01-26T10:26:17.924691Z">graaff</metadata>
<metadata tag="submitter" timestamp="2026-01-26T10:26:17.927149Z">graaff</metadata>
</glsa>

View File

@ -0,0 +1,54 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="202601-03">
<title>GIMP: Arbitrary Code Execution</title>
<synopsis>A vulnerability has been discovered in GIMP, which can lead to execution of arbitrary code.</synopsis>
<product type="ebuild">gimp</product>
<announced>2026-01-26</announced>
<revised count="1">2026-01-26</revised>
<bug>965334</bug>
<access>local</access>
<affected>
<package name="media-gfx/gimp" auto="yes" arch="*">
<unaffected range="ge">2.10.38-r3</unaffected>
<unaffected range="ge">3.0.6</unaffected>
<vulnerable range="lt">2.10.38-r3</vulnerable>
<vulnerable range="lt">3.0.6</vulnerable>
</package>
</affected>
<background>
<p>GIMP is the GNU Image Manipulation Program. XCF is the native image file format used by GIMP.</p>
</background>
<description>
<p>A vulnerability has been discovered in GIMP. Please review the CVE identifier referenced below for details.</p>
</description>
<impact type="high">
<p>This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All GIMP users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/gimp-3.0.6"
</code>
<p>All GIMP 2.x users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=media-gfx/gimp-2.10.38-r3 =media-gfx/gimp-2*"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-10934">CVE-2025-10934</uri>
<uri>GHSA-wv7v-cchq-8fjh</uri>
</references>
<metadata tag="requester" timestamp="2026-01-26T10:28:36.688155Z">graaff</metadata>
<metadata tag="submitter" timestamp="2026-01-26T10:28:36.690919Z">graaff</metadata>
</glsa>

View File

@ -0,0 +1,45 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="202601-04">
<title>Asterisk: Multiple Vulnerabilities</title>
<synopsis>Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to arbitrary code execution.</synopsis>
<product type="ebuild">asterisk</product>
<announced>2026-01-26</announced>
<revised count="1">2026-01-26</revised>
<bug>960930</bug>
<access>remote</access>
<affected>
<package name="net-misc/asterisk" auto="yes" arch="*">
<unaffected range="ge">18.26.3</unaffected>
<vulnerable range="lt">18.26.3</vulnerable>
</package>
</affected>
<background>
<p>Asterisk is an open source telephony engine and toolkit.</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in Asterisk. Please review the CVE identifiers referenced below for details.</p>
</description>
<impact type="high">
<p>Please review the referenced CVE identifiers for details.</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/asterisk-18.26.3"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-1131">CVE-2025-1131</uri>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-49832">CVE-2025-49832</uri>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-57767">CVE-2025-57767</uri>
<uri>GHSA-64qc-9x89-rx5j</uri>
<uri>GHSA-mrq5-74j5-f5cr</uri>
<uri>GHSA-v9q8-9j8m-5xwp</uri>
</references>
<metadata tag="requester" timestamp="2026-01-26T10:31:04.790497Z">graaff</metadata>
<metadata tag="submitter" timestamp="2026-01-26T10:31:04.792835Z">graaff</metadata>
</glsa>

View File

@ -0,0 +1,42 @@
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
<glsa id="202601-05">
<title>Commons-BeanUtils: Arbitary Code Execution</title>
<synopsis>A vulnerability has been discovered in Commons-BeanUtils, which can lead to execution of arbitrary code.</synopsis>
<product type="ebuild">commons-beanutils</product>
<announced>2026-01-26</announced>
<revised count="1">2026-01-26</revised>
<bug>960929</bug>
<access>remote</access>
<affected>
<package name="dev-java/commons-beanutils" auto="yes" arch="*">
<unaffected range="ge">1.11.0</unaffected>
<vulnerable range="lt">1.11.0</vulnerable>
</package>
</affected>
<background>
<p>Commons-beanutils provides easy-to-use wrappers around Reflection and Introspection APIs</p>
</background>
<description>
<p>Multiple vulnerabilities have been discovered in Commons-BeanUtils. Please review the CVE identifiers referenced below for details.</p>
</description>
<impact type="high">
<p>A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default.</p>
</impact>
<workaround>
<p>There is no known workaround at this time.</p>
</workaround>
<resolution>
<p>All Commons-BeanUtils users should upgrade to the latest version:</p>
<code>
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-java/commons-beanutils-1.11.0"
</code>
</resolution>
<references>
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734</uri>
</references>
<metadata tag="requester" timestamp="2026-01-26T10:32:54.504065Z">graaff</metadata>
<metadata tag="submitter" timestamp="2026-01-26T10:32:54.507391Z">graaff</metadata>
</glsa>

View File

@ -1 +1 @@
Thu, 01 Jan 2026 06:40:24 +0000
Sun, 01 Feb 2026 07:02:03 +0000

View File

@ -1 +1 @@
9e297cd21fe68d36a7180cf1ead3745d99567474 1766871224 2025-12-27T21:33:44Z
371ee63aaee87b60a1f5a63de7d230d6598a20c8 1769423604 2026-01-26T10:33:24Z