diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml index 2e4401ccb1..7cd1b2287c 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201606-18.xml @@ -19,6 +19,7 @@ 7.2.6.6-r1 3.0.1 3.1.0 + 3.2.0 7.2.6.6-r1 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-10.xml index 989947f5b7..693f22fc5b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-10.xml +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201610-10.xml @@ -17,6 +17,7 @@ 23.0.0.205 11.2.202.635 11.2.202.643 + 11.2.202.644 23.0.0.205 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-21.xml new file mode 100644 index 0000000000..5dc51fe796 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-21.xml @@ -0,0 +1,65 @@ + + + + ImageMagick: Multiple vulnerabilities + Multiple vulnerabilities have been found in ImageMagick, the worst + of which allows remote attackers to execute arbitrary code. + + imagemagick + November 30, 2016 + November 30, 2016: 1 + 581990 + 593526 + 593530 + 593532 + 595200 + 596002 + 596004 + remote + + + 6.9.6.2 + 6.9.6.2 + + + +

ImageMagick is a collection of tools and libraries for many image + formats. +

+
+ +

Multiple vulnerabilities have been discovered in ImageMagick. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All ImageMagick users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/imagemagick-6.9.6.2" + +
+ + CVE-2016-3714 + CVE-2016-3715 + CVE-2016-3716 + CVE-2016-3717 + CVE-2016-3718 + CVE-2016-5010 + CVE-2016-5842 + CVE-2016-6491 + CVE-2016-7799 + CVE-2016-7906 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-22.xml new file mode 100644 index 0000000000..c3199e4dca --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201611-22.xml @@ -0,0 +1,97 @@ + + + + PHP: Multiple vulnerabilities + Multiple vulnerabilities have been found in PHP, the worst of which + could lead to arbitrary code execution or cause a Denial of Service + condition. + + php + November 30, 2016 + November 30, 2016: 1 + 578734 + 581834 + 584204 + 587246 + 591710 + 594498 + 597586 + 599326 + remote + + + 5.6.28 + 5.6.28 + + + +

PHP is a widely-used general-purpose scripting language that is + especially suited for Web development and can be embedded into HTML. +

+
+ +

Multiple vulnerabilities have been discovered in PHP. Please review the + CVE identifiers referenced below for details. +

+
+ +

An attacker can possibly execute arbitrary code or create a Denial of + Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All PHP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev=lang/php-5.6.28" + +
+ + CVE-2015-8865 + CVE-2016-3074 + CVE-2016-4071 + CVE-2016-4072 + CVE-2016-4073 + CVE-2016-4537 + CVE-2016-4538 + CVE-2016-4539 + CVE-2016-4540 + CVE-2016-4541 + CVE-2016-4542 + CVE-2016-4543 + CVE-2016-4544 + CVE-2016-5385 + CVE-2016-6289 + CVE-2016-6290 + CVE-2016-6291 + CVE-2016-6292 + CVE-2016-6294 + CVE-2016-6295 + CVE-2016-6296 + CVE-2016-6297 + CVE-2016-7124 + CVE-2016-7125 + CVE-2016-7126 + CVE-2016-7127 + CVE-2016-7128 + CVE-2016-7129 + CVE-2016-7130 + CVE-2016-7131 + CVE-2016-7132 + CVE-2016-7133 + CVE-2016-7134 + CVE-2016-7411 + CVE-2016-7412 + CVE-2016-7413 + CVE-2016-7414 + CVE-2016-7416 + CVE-2016-7417 + CVE-2016-7418 + + b-man + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-01.xml new file mode 100644 index 0000000000..eb26bb565e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-01.xml @@ -0,0 +1,70 @@ + + + + GnuPG: RNG output is predictable + Due to a design flaw, the output of GnuPG's Random Number Generator + (RNG) is predictable. + + gnupg + December 02, 2016 + December 02, 2016: 1 + 591536 + local + + + 1.4.21 + 1.4.21 + + + +

The GNU Privacy Guard, GnuPG, is a free replacement for the PGP suite of + cryptographic software. +

+
+ +

A long standing bug (since 1998) in Libgcrypt (see “GLSA 201610-04” + below) and GnuPG allows an attacker to predict the output from the + standard RNG. Please review the “Entropy Loss and Output Predictability + in the Libgcrypt PRNG” paper below for a deep technical analysis. +

+
+ +

An attacker who obtains 580 bytes of the random number from the standard + RNG can trivially predict the next 20 bytes of output. +

+ +

This flaw does not affect the default generation of keys, because + running gpg for key creation creates at most 2 keys from the pool. For a + single 4096 bit RSA key, 512 bytes of random are required and thus for + the second key (encryption subkey), 20 bytes could be predicted from the + the first key. +

+ +

However, the security of an OpenPGP key depends on the primary key + (which was generated first) and thus the 20 predictable bytes should not + be a problem. For the default key length of 2048 bit nothing will be + predictable. +

+
+ +

There is no known workaround at this time.

+
+ +

All GnuPG 1 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-crypt/gnupg-1.4.21" + + +
+ + CVE-2016-6313 + + Entropy Loss and Output Predictability in the Libgcrypt PRNG + + GLSA 201610-04 + + whissi + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-02.xml new file mode 100644 index 0000000000..22806cf13b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-02.xml @@ -0,0 +1,64 @@ + + + + DavFS2: Local privilege escalation + A vulnerability in DavFS2 allows local users to gain root + privileges. + + davfs2 + December 02, 2016 + December 02, 2016: 1 + 485232 + local + + + 1.5.2 + 1.5.2 + + + +

DavFS2 is a file system driver that allows you to mount a WebDAV server + as a local disk drive. +

+
+ +

DavFS2 installs “/usr/sbin/mount.davfs” as setuid root. This utility + uses “system()” to call “/sbin/modprobe”. +

+ +

While the call to “modprobe” itself cannot be manipulated, a local + authenticated user can set the “MODPROBE_OPTIONS” environment + variable to pass a user controlled path, allowing the loading of an + arbitrary kernel module. +

+
+ +

A local user could gain root privileges.

+
+ +

The system administrator should ensure that all modules the + “mount.davfs” utility tries to load are loaded upon system boot + before any local user can call the utility. +

+ +

An additional defense measure can be implemented by enabling the Linux + kernel module signing feature. This assists in the prevention of + arbitrary modules being loaded. +

+
+ +

All DavFS2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-fs/davfs2-1.5.2" + +
+ + CVE-2013-4362 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-03.xml new file mode 100644 index 0000000000..79c38fcb38 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-03.xml @@ -0,0 +1,55 @@ + + + + libsndfile: Multiple vulnerabilities + Multiple vulnerabilities have been found in libsndfile, the worst + of which might allow remote attackers to execute arbitrary code. + + libsndfile + December 03, 2016 + December 03, 2016: 1 + 533750 + 566682 + local, remote + + + 1.0.26 + 1.0.26 + + + +

libsndfile is a C library for reading and writing files containing + sampled sound. +

+
+ +

Multiple vulnerabilities have been discovered in libsndfile. Please + review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could entice a user to open a specially crafted file, + possibly resulting in the execution of arbitrary code with the privileges + of the process, or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libsndfile users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libsndfile-1.0.26" + +
+ + CVE-2014-9496 + CVE-2015-7805 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-04.xml new file mode 100644 index 0000000000..f13661b1c9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-04.xml @@ -0,0 +1,59 @@ + + + + BusyBox: Multiple vulnerabilities + Multiple vulnerabilities have been found in BusyBox, the worst of + which allows remote attackers to execute arbitrary code. + + busybox + December 04, 2016 + December 04, 2016: 1 + 564246 + 577610 + local, remote + + + 1.24.2 + 1.24.2 + + + +

BusyBox is a set of tools for embedded systems and is a replacement for + GNU Coreutils. +

+
+ +

Multiple vulnerabilities have been discovered in BusyBox. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time. However, on Gentoo, the + remote code execution vulnerability can be avoided if you don’t use + BusyBox’s udhcpc or build the package without the “ipv6” USE flag + enabled. +

+
+ +

All BusyBox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/busybox-1.24.2" + + +
+ + CVE-2016-2147 + CVE-2016-2148 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-05.xml new file mode 100644 index 0000000000..be917ecd12 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-05.xml @@ -0,0 +1,55 @@ + + + + Pygments: Arbitrary code execution + Pygments is vulnerable to remote code execution if an attacker is + allowed to specify the font name. + + pygments + December 04, 2016 + December 04, 2016: 1 + 564478 + remote + + + 2.0.2-r1 + 2.0.2-r1 + + + +

Pygments is a generic syntax highlighter suitable for use in code + hosting, forums, wikis or other applications that need to prettify source + code. +

+
+ +

A vulnerability in FontManager’s _get_nix_font_path function allows + shell metacharacters to be passed in a font name. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process. +

+
+ +

There is no known workaround at this time.

+
+ +

All Pygments users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/pygments-2.0.2-r1" + +
+ + + CVE-2015-8557 + + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-06.xml new file mode 100644 index 0000000000..c3cb0a54f9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-06.xml @@ -0,0 +1,50 @@ + + + + nghttp2: Heap-use-after-free + Nghttp2 is vulnerable to a heap-use-after-free flaw in idle stream + handling code. + + nghttp2 + December 04, 2016 + December 04, 2016: 1 + 569518 + remote + + + 1.6.0 + 1.6.0 + + + +

Nghttp2 is an implementation of HTTP/2 and its header compression + algorithm HPACK in C. +

+
+ +

A heap-use-after-free vulnerability has been discovered in nghttp2. + Please review the CVE identifier referenced below for details. +

+
+ +

The impact of the vulnerability is still unknown.

+
+ +

There is no known workaround at this time.

+
+ +

All nghttp2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/nghttp2-1.6.0" + +
+ + CVE-2015-8659 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-07.xml new file mode 100644 index 0000000000..53a9f09ba6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-07.xml @@ -0,0 +1,52 @@ + + + + dpkg: Arbitrary code execution + A vulnerability was discovered in dpkg which could potentially lead + to arbitrary code execution. + + dpkg + December 04, 2016 + December 04, 2016: 1 + 567258 + local, remote + + + 1.17.26 + 1.17.26 + + + +

Debian package management system.

+
+ +

Gentoo Linux developer, Hanno Böck, discovered an off-by-one error in + the dpkg-deb component of dpkg, the Debian package management system, + which triggers a stack-based buffer overflow. +

+
+ +

An attacker could potentially execute arbitrary code if an user or an + automated system were tricked into processing a specially crafted Debian + binary package (.deb). +

+
+ +

There is no known workaround at this time.

+
+ +

All dpkg users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/dpkg-1.17.26" + +
+ + CVE-2015-0860 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-08.xml new file mode 100644 index 0000000000..bff22bab0f --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-08.xml @@ -0,0 +1,55 @@ + + + + LinuxCIFS utils: Buffer overflow + A vulnerability in LinuxCIFS utils' "cifscreds" PAM module might + allow remote attackers to have an unspecified impact via unknown vectors. + + cifs-utils + December 04, 2016 + December 04, 2016: 1 + 552634 + remote + + + 6.4 + 6.4 + + + +

The LinuxCIFS utils are a collection of tools for managing Linux CIFS + Client Filesystems. +

+
+ +

A stack-based buffer overflow was discovered in cifskey.c or cifscreds.c + in LinuxCIFS, as used in “pam_cifscreds.” +

+
+ +

A remote attacker could exploit this vulnerability to cause an + unspecified impact. +

+
+ +

Don’t use LinuxCIFS utils’ “cifscreds” PAM module. In Gentoo, + LinuxCIFS utils’ PAM support is disabled by default unless the + “pam” USE flag is enabled. +

+
+ +

All LinuxCIFS utils users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-fs/cifs-utils-6.4" + +
+ + CVE-2014-2830 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-09.xml new file mode 100644 index 0000000000..bdd4036149 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-09.xml @@ -0,0 +1,55 @@ + + + + GD: Multiple vulnerabilities + Multiple vulnerabilities have been found in GD, the worst of which + allows remote attackers to execute arbitrary code. + + gd + December 04, 2016 + December 04, 2016: 1 + 587662 + 587968 + 592720 + 592722 + local, remote + + + 2.2.3 + 2.2.3 + + + +

GD is a graphic library for fast image creation.

+
+ +

Multiple vulnerabilities have been discovered in GD. Please review the + CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, or cause a Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All gd users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gd-2.2.3" + +
+ + CVE-2016-5766 + CVE-2016-6128 + CVE-2016-6132 + CVE-2016-6207 + CVE-2016-7568 + + b-man + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-10.xml new file mode 100644 index 0000000000..8717429ac7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-10.xml @@ -0,0 +1,62 @@ + + + + libvirt: Directory traversal + Libvirt is vulnerable to directory traversal when using Access + Control Lists (ACL). + + libvirt + December 04, 2016 + December 04, 2016: 1 + 568870 + local + + + 1.2.21-r1 + 1.2.21-r1 + + + +

libvirt is a C toolkit for manipulating virtual machines.

+
+ +

Normally, only privileged users can coerce libvirt into creating or + opening existing files using the virStorageVol APIs; and such users + already have full privilege to create any domain XML. +

+ +

But in the case of fine-grained ACLs, it is feasible that a user can be + granted storage_vol:create but not domain:write, and it violates + assumptions if such a user can abuse libvirt to access files outside of + the storage pool. +

+
+ +

When fine-grained Access Control Lists (ACL) are in effect, an + authenticated local user with storage_vol:create permission but without + domain:write permission maybe able to create or access arbitrary files + outside of the storage pool. +

+
+ +

Don’t make use of fine-grained Access Control Lists (ACL) in libvirt; + In Gentoo, libvirt’s ACL support is disable by default unless you + enable the “policykit” USE flag. +

+
+ +

All libvirt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/libvirt-1.2.21-r1" + +
+ + CVE-2015-5313 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-11.xml new file mode 100644 index 0000000000..e2146ef371 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201612-11.xml @@ -0,0 +1,80 @@ + + + + Chromium: Multiple vulnerabilities + Multiple vulnerabilities have been found in the Chromium web + browser, the worst of which allows remote attackers to execute arbitrary + code. + + chromium + December 05, 2016 + December 05, 2016: 1 + 601486 + remote + + + 55.0.2883.75 + 55.0.2883.75 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+
+ +

Multiple vulnerabilities have been discovered in the Chromium web + browser. Please review the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, obtain + sensitive information, or bypass security restrictions. +

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-55.0.2883.75" + +
+ + CVE-2016-5203 + CVE-2016-5204 + CVE-2016-5205 + CVE-2016-5206 + CVE-2016-5207 + CVE-2016-5208 + CVE-2016-5209 + CVE-2016-5210 + CVE-2016-5211 + CVE-2016-5212 + CVE-2016-5213 + CVE-2016-5214 + CVE-2016-5215 + CVE-2016-5217 + CVE-2016-5218 + CVE-2016-5219 + CVE-2016-5220 + CVE-2016-5221 + CVE-2016-5222 + CVE-2016-5223 + CVE-2016-5224 + CVE-2016-5225 + CVE-2016-5226 + CVE-2016-9650 + CVE-2016-9651 + CVE-2016-9652 + + + BlueKnight + + whissi +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 02d979d411..d3d81ca196 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Tue, 22 Nov 2016 19:13:27 +0000 +Mon, 05 Dec 2016 01:13:17 +0000