diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 53261d6d0d..80ca09e0ad 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 436466 BLAKE2B 1592f1e1bb1660fe56598a716be2722c8f9b14d74fcc7bf4086935ca129dff18da9e9a7deb43b3b3ab5e34487a04b37269914fde19e2c86f3d80a1165fc058e0 SHA512 814ba1ee894cf6c7438051199c5078a6339901cdea60b6848add142bf264fc54ba915b91229a96a1404f81bdbc5177e162144d5b97ce8351358c43ca91c86df7 -TIMESTAMP 2019-03-11T01:38:51Z +MANIFEST Manifest.files.gz 437429 BLAKE2B d71793c37518c554e77bcce22a3ca061890ae72b465c007c31dd2c429c8174741829feddc258347929fc21c74551873bd6be78db810aced844a0e1c497853ff8 SHA512 00d0bfb813b46cc0d061cd7f833014ba841445d5bb2ae0b2ba659c73836487cf7bae990c575667b3cc73306bb0dc54613f22d4fd84afe2cd7cee60f090008f3e +TIMESTAMP 2019-03-14T14:08:54Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlyFvCtfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlyKYHZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klAPHA/+P/U8xHLyUo0llv8FWLgjEhNDQzpJYEckpNbjTTLXZueHWKItVRvIgY+O -VVLeZp4MgQih16YB1lIzYwDMcsYdt1kk/5oytqjkpNgLeude+G5Z65cLw0C1//Y2 -1+yXTiWs6XpWdVqh3Or7/muHcxpoyxHtVBbbAThx3uv8sgsCEKFxdEC5TTod/i3s -+5syLAHAy/0EAO5H3WUEiuh9PZCEZZ+2j9VKLySNQQa6IoYAweXxBQ7+B+ongJAZ -s5r/34AiXM3bE7OREc/RnbbtRbjY080BHzrUetFPKdFEH1cNYd/L9OwRqz+j9HpN -S9MKO0BMn1Lt/osnAIiPiiRW4/QM9rVSe1yx6gqn4+Z8bubVYEn964Ryo+TRGYOJ -eMpf49JbNFjRfqyhr4F/NZpAyxl6m2d1rnI754hgRvAtq/QFZ6777IBGMKePRoqj -Z8te+9hP8PG8AJsgx5ZSJXRC0qxhLYPSVx6fVsY+eRe/ykLZdpUz7jZP63xSsz7r -sTrA0e10kMp9u9vBzzni8OI8hUratTZLxlTgucNeytXCjCpZh+8XBBTNZD3JwYaG -j/pr8JOXrIJ626TQ3lqfTLXc+fwC38/r6hLm1QWuR2fP57V4aXRmJmn99RROb5cX -tZNVNGO+xhaQzhBq+3P8ycPDtC1I1x4XQEFLtyFJUIFeCkak3Fk= -=J9ze +klBZJQ//ZmGGCLyldR1zfBkQiVyYfY4xs3/AVZH+ZToWmEDYQ2Vx+FADUBloGgz7 +7zHL21o5+/KhkHinIaAETPvnUo8iiLpX0uC4HPjwwtmBldzE6no5evgpCHgh1j9+ +Kw/tFPRJ9wAavy824jAF8eFoOK6zsZWCL4QPIUTDUZER+fxCCGD35MDti4z9FBsE +jmcrRZWMZGCElNfTwBhI7aaQ01MM9CCw5yeaOZlmHjRbkO003e2Rr8EMWlUZIoHL +9UL+1hdrKNxwLqRtBTX23SBeCfVyG8hHOSGQm6Iy7DJesHSpuGWYQAc7P3Pog5Yz +7x4xanJ33mCDlxyZHRL6Ct35dgIS9+NdgWoQyPepKbxwM/EGliOVoy/5g045SueO +6e3yOSZzSXCQxEEHycKBqOMWMl+VTycN/fi54ArMlo39to5g7JbEF4T+Q2zB2a2J +0Dev4IkKyyJ4fK0JWQPrkhNNB3u//Wlry/g/TYWV1abFftoBrRLU8N4axwq5jJtH +twQAFmVtDAF1lrqVW/VoaKcOL0IM2HVDYHfLPCtRBjVkya/6xotL4+CiQ0AQcK88 +zZUPQpNP8PrkAZ8gDElNm+hbIBsY0G2Z0/oJWnOHbchcs6oq0Uf1tT4qOI/NPZgK +nqAytoy5ciJjvqXC1jKuYVpu2XnZlzNeHcyYZE5SilRAvle7i+M= +=nBaS -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 3834742efd..131fc099a6 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-09.xml new file mode 100644 index 0000000000..036d610ff7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-09.xml @@ -0,0 +1,50 @@ + + + + GNU C Library: Arbitrary descriptor allocation + A vulnerability in the GNU C Library could result in a Denial of + Service condition. + + glibc + 2019-03-14 + 2019-03-14 + 617938 + remote + + + 2.26.0 + 2.26.0 + + + +

The GNU C library is the standard C library used by Gentoo Linux + systems. +

+
+ +

A vulnerability was discovered in the GNU C Library functions xdr_bytes + and xdr_string. +

+
+ +

A remote attacker, by sending a crafted UDP packet, could cause a Denial + of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All GNU C Library users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.26.0" + +
+ + CVE-2018-19591 + + Zlogene + Zlogene +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-10.xml new file mode 100644 index 0000000000..afb36ae60d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-10.xml @@ -0,0 +1,59 @@ + + + + OpenSSL: Multiple vulnerabilities + Multiple Information Disclosure vulnerabilities in OpenSSL allow + attackers to obtain sensitive information. + + openssl + 2019-03-14 + 2019-03-14 + 673056 + 678564 + local, remote + + + 1.0.2r + 1.0.2r + + + +

OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer + (SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general + purpose cryptography library. +

+
+ +

Multiple vulnerabilities have been discovered in OpenSSL. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker to obtain sensitive information, caused by the failure + to immediately close the TCP connection after the hosts encounter a + zero-length record with valid padding. +

+ +

A local attacker could run a malicious process next to legitimate + processes using the architecture’s parallel thread running capabilities + to leak encrypted data from the CPU’s internal processes. +

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSSL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.0.2r" + +
+ + CVE-2018-5407 + CVE-2019-1559 + + whissi + Zlogene +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-11.xml new file mode 100644 index 0000000000..7eea14bf14 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-11.xml @@ -0,0 +1,49 @@ + + + + XRootD: Remote code execution + A vulnerability was discovered in XRootD which could lead to the + remote execution of code. + + xrootd + 2019-03-14 + 2019-03-14 + 638420 + remote + + + 4.8.3 + 4.8.3 + + + +

A project that aims at giving high performance, scalable, and fault + tolerant access to data repositories of many kinds. +

+
+ +

A shell command injection was discovered in XRootD.

+ +
+ +

A remote attacker could execute arbitrary code.

+
+ +

There is no known workaround at this time.

+
+ +

All XRootD users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/xrootd-4.8.3" + +
+ + + CVE-2017-1000215 + + + BlueKnight + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-12.xml new file mode 100644 index 0000000000..ddbe0d19b0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-12.xml @@ -0,0 +1,61 @@ + + + + WebkitGTK+: Multiple vulnerabilities + Multiple vulnerabilities have been found in WebkitGTK+, the worst + of which could result in the arbitrary execution of code. + + webkit-gtk + 2019-03-14 + 2019-03-14 + 672108 + 674702 + 678334 + remote + + + 2.22.6 + 2.22.6 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, + suitable for projects requiring any kind of web integration, from hybrid + HTML/CSS applications to full-fledged web browsers. +

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please + review the referenced CVE identifiers for details. +

+
+ +

An attacker could execute arbitrary code or conduct cross-site + scripting. +

+
+ +

There is no known workaround at this time.

+
+ +

All WebkitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.22.6" + +
+ + CVE-2019-6212 + CVE-2019-6215 + CVE-2019-6216 + CVE-2019-6217 + CVE-2019-6226 + CVE-2019-6227 + CVE-2019-6229 + CVE-2019-6233 + CVE-2019-6234 + + BlueKnight + b-man +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-13.xml new file mode 100644 index 0000000000..11e3fcfdcd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-13.xml @@ -0,0 +1,52 @@ + + + + BIND: Multiple vulnerabilities + Multiple vulnerabilities have been found in BIND, the worst of + which could result in a Denial of Service condition. + + bind + 2019-03-14 + 2019-03-14 + 657654 + 666946 + remote + + + 9.12.1_p2-r1 + 9.12.1_p2-r1 + + + +

BIND (Berkeley Internet Name Domain) is a Name Server.

+
+ +

Multiple vulnerabilities have been discovered in BIND. Please review the + CVE identifiers referenced below for details. +

+
+ +

BIND can improperly permit recursive query service to unauthorized + clients possibly resulting in a Denial of Service condition or to be used + in DNS reflection attacks. +

+
+ +

There is no known workaround at this time.

+
+ +

All bind users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/bind-9.12.1_p2-r1" + +
+ + CVE-2018-5738 + CVE-2018-5740 + CVE-2018-5741 + + BlueKnight + BlueKnight +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-14.xml new file mode 100644 index 0000000000..88f56cdca5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201903-14.xml @@ -0,0 +1,82 @@ + + + + Oracle JDK/JRE: Multiple vulnerabilities + Multiple vulnerabilities have been found in Oracle’s JDK and JRE + software suites. + + oracle-jdk-bin,oracle-jre-bin + 2019-03-14 + 2019-03-14 + 653560 + 661456 + 676134 + remote + + + 1.8.0.202 + 1.8.0.202 + + + 1.8.0.202 + 1.8.0.202 + + + +

Java Platform, Standard Edition (Java SE) lets you develop and deploy + Java applications on desktops and servers, as well as in today’s + demanding embedded environments. Java offers the rich user interface, + performance, versatility, portability, and security that today’s + applications require. +

+
+ +

Multiple vulnerabilities have been discovered in Oracle’s JDK and JRE + software suites. Please review the CVE identifiers referenced below for + details. +

+
+ +

A remote attacker could possibly execute arbitrary code with the + privileges of the process, gain access to information, or cause a Denial + of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All Oracle JDK bin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-java/oracle-jdk-bin-1.8.0.202" + + +

All Oracle JRE bin users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-java/oracle-jre-bin-1.8.0.202" + +
+ + CVE-2018-2790 + CVE-2018-2794 + CVE-2018-2795 + CVE-2018-2796 + CVE-2018-2797 + CVE-2018-2798 + CVE-2018-2799 + CVE-2018-2800 + CVE-2018-2811 + CVE-2018-2814 + CVE-2018-2815 + CVE-2019-2422 + CVE-2019-2426 + + BlueKnight + BlueKnight +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 457a6ae6b1..df2152bdbe 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Mon, 11 Mar 2019 01:38:48 +0000 +Thu, 14 Mar 2019 14:08:50 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 6dea1110d2..43c20f3996 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -579d79ed98752445ffce6122ab66094d1cb0110e 1552251022 2019-03-10T20:50:22+00:00 +17152e28d973dd918d88b38fdcc6e83f34c921f2 1552527902 2019-03-14T01:45:02+00:00