mirror of
https://github.com/flatcar/scripts.git
synced 2026-02-09 09:41:56 +01:00
Merge pull request #3683 from flatcar/buildbot/monthly-glsa-metadata-updates-2026-02-01
Monthly GLSA metadata 2026-02-01
This commit is contained in:
commit
f8b1f793ce
@ -1,24 +1,24 @@
|
||||
-----BEGIN PGP SIGNED MESSAGE-----
|
||||
Hash: SHA512
|
||||
|
||||
MANIFEST Manifest.files.gz 606026 BLAKE2B f642a7d3238c8998aee627a1b7086431eb88df4678fdf42f7ddf8d8bb6de107a02fae7c557568660cc9f04cb9ed135534cc32f129482ba4da102bb96be7e68a9 SHA512 aa4b68d334da5329457cfc76655ce927a51c26cff8774aed431df0f4711bf41c231eea1647511c9cabfd8eabec4b84637a0f0f2ccc3d138d509d72522dbd32d7
|
||||
TIMESTAMP 2026-01-01T06:40:27Z
|
||||
MANIFEST Manifest.files.gz 606828 BLAKE2B a1b451cbd8b97fba48dcbcc329e204f935247276d40c90ac4cbfb608d79ab2e992895b94ff858963121d1134b508c59270174e7bcdaf0344859da3443b02f1b8 SHA512 7cf2f0457c87986d719605bc843f16fb1b58e94af8217c0a3cfc1d3b7a854459cdf2ac652b4f9271da08b81922bfb4c73aa18e4836c21288bc5adf2c59450d36
|
||||
TIMESTAMP 2026-02-01T07:02:09Z
|
||||
-----BEGIN PGP SIGNATURE-----
|
||||
|
||||
iQKuBAEBCgCZFiEE4dartjv8+0ugL98c7FkO6skYklAFAmlWFtsbFIAAAAAABAAO
|
||||
iQKvBAEBCgCZFiEE4dartjv8+0ugL98c7FkO6skYklAFAml++nIbFIAAAAAABAAO
|
||||
bWFudTIsMi41KzEuMTEsMiwyXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25z
|
||||
Lm9wZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRFMUQ2QUJCNjNCRkNGQjRCQTAyRkRG
|
||||
MUNFQzU5MEVFQUM5MTg5MjUwAAoJEOxZDurJGJJQGU0P+Mj6Fa4IzlNvGfztJ3vt
|
||||
Mgacid6hW8pHl6WnEcBrVUsMw+QXVZmJNeC1erVZ7duOu/VUDD/y787YPM5CAwYN
|
||||
fKI5DIrbUvb4vl8r71O6cC0a+7d8t5FERwYkqBwQEHlCJZzy6BIfOswaPdUqyl0m
|
||||
FS12GwelAZ6vHM1BqFzwA2vcUcREsaSpos9+QUCKRPeQRG7PGb5pWqiLIa+fgnoz
|
||||
pabOe3fSzVY+SqSVZ2ZzC7QVNPLdmjk5JTK7yp+KQRwNY5Tx0DEGkDFtPv5Lxo+R
|
||||
zRTCdzL+KmXlpfAYeV21hNbYqCYNJl+/IWts7rr0ykONvHwQpY4qUAtlvsBsTqLg
|
||||
dJvfIOkV8ILr5vlW+MoPyyuV5ATWdLQow3SkWNUpXuBBH/h6vpM8CGH5gg+eMpwB
|
||||
v8vVKfc87XdPa+OhBwy+DJCyyWG4weFK5sOZbT1mM0K72ZoHCNuolVwFIfKJvJ3Z
|
||||
8DWkAq+w6U4ft1nx25TRs0o9/uXkTsLIkJgbeThccuEo5EYLykEmRJ0V8BH4Y5Hc
|
||||
VhFtafFPtg87bQx8h2M/f0LsFcr6X2R58FIWyt/WRHdfG7G3q6OxF/nFO/djQF2t
|
||||
0R7XXtN3UTQ+XvSzNG25s6QUP8LL2wGKbLsmaU5fBXTW/44Zn9wDdKMdSVNQaAmi
|
||||
G6SqbKPoKyQY4uI2gWyvxl0=
|
||||
=tC7e
|
||||
MUNFQzU5MEVFQUM5MTg5MjUwAAoJEOxZDurJGJJQtm4QAKn7InAoh6OetjFpQHnP
|
||||
8bYo6j4twV1tyzIN//aRqQNwTDfyMELCeHie/lh7yGSYVmpqBGArvit2kK/JAi5C
|
||||
78H11gvBjrlP4fdJ40Lo24PtngJV+LcgBiNHDI76S7WOe58RbcIBFPzQSDLXa6fV
|
||||
ldhfi5iQQVJrKLn4naX9gzGSa0ERXBdv96d7AIF63lnbAvO1LL9lGo8yc85f7Im4
|
||||
ldvkSpRJBWNe1o7RLVU9bCnu7kSbexKplVHdPlVJwURarnD0IZPCUWbcI5Dl7tWa
|
||||
PCoAbvJKAU1Ylz08jHLyyCbWC60XmYPUweGB3K4wrrLT85afYssON7DnCKJyJ88/
|
||||
Iq/B7m1tFqKmGh4RqeZcVQ62mpSlxrAL6EsaHAuHcGbOGe7wsYF1KDctGCA31IYk
|
||||
/gF+pZNTE0wVw8XUYppPv8t3m3rCTL8NMEPX/1QEeux7rFsy7HEf+blyOMKhc6zY
|
||||
y+8M+kwMP9pl9fXr7STNcr0uLNxmgU47bn8JHqdNPz7VdBDnOstWq8ncUXSMox5G
|
||||
WpuJ4vgnwBwtLSNEVdu0QNpgBoF82ELibyA51Z4sB/dy1PhwhcusD0vy99tBJyHM
|
||||
WbBObFneNwZZq9lHuoY/4mWCs4J8f/N2B8axphrFPfgQIiepkwYSlh2sCyONF5jS
|
||||
HB8CfD+GkDbYCkmdWiCgVtj3
|
||||
=7ZS8
|
||||
-----END PGP SIGNATURE-----
|
||||
|
||||
Binary file not shown.
46
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202601-01.xml
vendored
Normal file
46
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202601-01.xml
vendored
Normal file
@ -0,0 +1,46 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="202601-01">
|
||||
<title>inetutils: Remote Code Execution</title>
|
||||
<synopsis>A vulnerability has been discovered in the telnetd module of inetutils, which allows remote code execution as root.</synopsis>
|
||||
<product type="ebuild">inetutils</product>
|
||||
<announced>2026-01-26</announced>
|
||||
<revised count="1">2026-01-26</revised>
|
||||
<bug>969065</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="net-misc/inetutils" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.7</unaffected>
|
||||
<vulnerable range="lt">2.7</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Inetutils is a collection of common network programs including a telnet client and server.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>The telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as the last parameter.
|
||||
|
||||
If the client supply a carefully crafted USER environment value being the string "-f root", and passes the telnet(1) -a or --login parameter to send this USER environment to the server, the client will be automatically logged in as root bypassing normal authentication processes.
|
||||
|
||||
This happens because the telnetd server do not sanitize the USER environment variable before passing it on to login(1), and login(1) uses the -f parameter to by-pass normal authentication.</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>An attacker can login as root via the telnetd daemon.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>Reinstall inetutils with the telnetd USE flag disabled. This is the default in Gentoo.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All inetutils users with the telnetd USE flag enabled should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-misc/inetutils-2.7"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2026-24061">CVE-2026-24061</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2026-01-26T10:22:35.842111Z">graaff</metadata>
|
||||
<metadata tag="submitter" timestamp="2026-01-26T10:22:35.844585Z">graaff</metadata>
|
||||
</glsa>
|
||||
65
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202601-02.xml
vendored
Normal file
65
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202601-02.xml
vendored
Normal file
@ -0,0 +1,65 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="202601-02">
|
||||
<title>Vim, gVim: Multiple Vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been discovered in Vim and gVim, the worst of which could lead to execution of arbitrary code.</synopsis>
|
||||
<product type="ebuild">gvim,vim,vim-core</product>
|
||||
<announced>2026-01-26</announced>
|
||||
<revised count="1">2026-01-26</revised>
|
||||
<bug>961498</bug>
|
||||
<access>local</access>
|
||||
<affected>
|
||||
<package name="app-editors/gvim" auto="yes" arch="*">
|
||||
<unaffected range="ge">9.1.1652</unaffected>
|
||||
<vulnerable range="lt">9.1.1652</vulnerable>
|
||||
</package>
|
||||
<package name="app-editors/vim" auto="yes" arch="*">
|
||||
<unaffected range="ge">9.1.1652</unaffected>
|
||||
<vulnerable range="lt">9.1.1652</vulnerable>
|
||||
</package>
|
||||
<package name="app-editors/vim-core" auto="yes" arch="*">
|
||||
<unaffected range="ge">9.1.1652</unaffected>
|
||||
<vulnerable range="lt">9.1.1652</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Vim is an efficient, highly configurable improved version of the classic ‘vi’ text editor. gVim is the GUI version of Vim.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Vim, gVim. Please review the CVE identifiers referenced below for details.</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>Please review the referenced CVE identifiers for details.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Vim, gVim users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=app-editors/vim-9.1.1652"
|
||||
</code>
|
||||
|
||||
<p>All Vim, gVim users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.1.1652"
|
||||
</code>
|
||||
|
||||
<p>All Vim, gVim users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=app-editors/gvim-9.1.1652"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-53905">CVE-2025-53905</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2026-01-26T10:26:17.924691Z">graaff</metadata>
|
||||
<metadata tag="submitter" timestamp="2026-01-26T10:26:17.927149Z">graaff</metadata>
|
||||
</glsa>
|
||||
54
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202601-03.xml
vendored
Normal file
54
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202601-03.xml
vendored
Normal file
@ -0,0 +1,54 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="202601-03">
|
||||
<title>GIMP: Arbitrary Code Execution</title>
|
||||
<synopsis>A vulnerability has been discovered in GIMP, which can lead to execution of arbitrary code.</synopsis>
|
||||
<product type="ebuild">gimp</product>
|
||||
<announced>2026-01-26</announced>
|
||||
<revised count="1">2026-01-26</revised>
|
||||
<bug>965334</bug>
|
||||
<access>local</access>
|
||||
<affected>
|
||||
<package name="media-gfx/gimp" auto="yes" arch="*">
|
||||
<unaffected range="ge">2.10.38-r3</unaffected>
|
||||
<unaffected range="ge">3.0.6</unaffected>
|
||||
<vulnerable range="lt">2.10.38-r3</vulnerable>
|
||||
<vulnerable range="lt">3.0.6</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>GIMP is the GNU Image Manipulation Program. XCF is the native image file format used by GIMP.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>A vulnerability has been discovered in GIMP. Please review the CVE identifier referenced below for details.</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
|
||||
|
||||
The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All GIMP users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-gfx/gimp-3.0.6"
|
||||
</code>
|
||||
|
||||
<p>All GIMP 2.x users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=media-gfx/gimp-2.10.38-r3 =media-gfx/gimp-2*"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-10934">CVE-2025-10934</uri>
|
||||
<uri>GHSA-wv7v-cchq-8fjh</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2026-01-26T10:28:36.688155Z">graaff</metadata>
|
||||
<metadata tag="submitter" timestamp="2026-01-26T10:28:36.690919Z">graaff</metadata>
|
||||
</glsa>
|
||||
45
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202601-04.xml
vendored
Normal file
45
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202601-04.xml
vendored
Normal file
@ -0,0 +1,45 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="202601-04">
|
||||
<title>Asterisk: Multiple Vulnerabilities</title>
|
||||
<synopsis>Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to arbitrary code execution.</synopsis>
|
||||
<product type="ebuild">asterisk</product>
|
||||
<announced>2026-01-26</announced>
|
||||
<revised count="1">2026-01-26</revised>
|
||||
<bug>960930</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="net-misc/asterisk" auto="yes" arch="*">
|
||||
<unaffected range="ge">18.26.3</unaffected>
|
||||
<vulnerable range="lt">18.26.3</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Asterisk is an open source telephony engine and toolkit.</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Asterisk. Please review the CVE identifiers referenced below for details.</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>Please review the referenced CVE identifiers for details.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=net-misc/asterisk-18.26.3"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-1131">CVE-2025-1131</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-49832">CVE-2025-49832</uri>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-57767">CVE-2025-57767</uri>
|
||||
<uri>GHSA-64qc-9x89-rx5j</uri>
|
||||
<uri>GHSA-mrq5-74j5-f5cr</uri>
|
||||
<uri>GHSA-v9q8-9j8m-5xwp</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2026-01-26T10:31:04.790497Z">graaff</metadata>
|
||||
<metadata tag="submitter" timestamp="2026-01-26T10:31:04.792835Z">graaff</metadata>
|
||||
</glsa>
|
||||
42
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202601-05.xml
vendored
Normal file
42
sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202601-05.xml
vendored
Normal file
@ -0,0 +1,42 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
|
||||
<glsa id="202601-05">
|
||||
<title>Commons-BeanUtils: Arbitary Code Execution</title>
|
||||
<synopsis>A vulnerability has been discovered in Commons-BeanUtils, which can lead to execution of arbitrary code.</synopsis>
|
||||
<product type="ebuild">commons-beanutils</product>
|
||||
<announced>2026-01-26</announced>
|
||||
<revised count="1">2026-01-26</revised>
|
||||
<bug>960929</bug>
|
||||
<access>remote</access>
|
||||
<affected>
|
||||
<package name="dev-java/commons-beanutils" auto="yes" arch="*">
|
||||
<unaffected range="ge">1.11.0</unaffected>
|
||||
<vulnerable range="lt">1.11.0</vulnerable>
|
||||
</package>
|
||||
</affected>
|
||||
<background>
|
||||
<p>Commons-beanutils provides easy-to-use wrappers around Reflection and Introspection APIs</p>
|
||||
</background>
|
||||
<description>
|
||||
<p>Multiple vulnerabilities have been discovered in Commons-BeanUtils. Please review the CVE identifiers referenced below for details.</p>
|
||||
</description>
|
||||
<impact type="high">
|
||||
<p>A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default.</p>
|
||||
</impact>
|
||||
<workaround>
|
||||
<p>There is no known workaround at this time.</p>
|
||||
</workaround>
|
||||
<resolution>
|
||||
<p>All Commons-BeanUtils users should upgrade to the latest version:</p>
|
||||
|
||||
<code>
|
||||
# emerge --sync
|
||||
# emerge --ask --oneshot --verbose ">=dev-java/commons-beanutils-1.11.0"
|
||||
</code>
|
||||
</resolution>
|
||||
<references>
|
||||
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734</uri>
|
||||
</references>
|
||||
<metadata tag="requester" timestamp="2026-01-26T10:32:54.504065Z">graaff</metadata>
|
||||
<metadata tag="submitter" timestamp="2026-01-26T10:32:54.507391Z">graaff</metadata>
|
||||
</glsa>
|
||||
@ -1 +1 @@
|
||||
Thu, 01 Jan 2026 06:40:24 +0000
|
||||
Sun, 01 Feb 2026 07:02:03 +0000
|
||||
|
||||
@ -1 +1 @@
|
||||
9e297cd21fe68d36a7180cf1ead3745d99567474 1766871224 2025-12-27T21:33:44Z
|
||||
371ee63aaee87b60a1f5a63de7d230d6598a20c8 1769423604 2026-01-26T10:33:24Z
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user