summaryrefslogtreecommitdiff
path: root/metadata/glsa
diff options
context:
space:
mode:
Diffstat (limited to 'metadata/glsa')
-rw-r--r--metadata/glsa/Manifest30
-rw-r--r--metadata/glsa/Manifest.files.gzbin518764 -> 519553 bytes
-rw-r--r--metadata/glsa/glsa-202208-01.xml42
-rw-r--r--metadata/glsa/glsa-202208-02.xml101
-rw-r--r--metadata/glsa/glsa-202208-03.xml42
-rw-r--r--metadata/glsa/glsa-202208-04.xml42
-rw-r--r--metadata/glsa/glsa-202208-05.xml46
-rw-r--r--metadata/glsa/timestamp.chk2
-rw-r--r--metadata/glsa/timestamp.commit2
9 files changed, 290 insertions, 17 deletions
diff --git a/metadata/glsa/Manifest b/metadata/glsa/Manifest
index fafc6b894c8f..3b8852c82805 100644
--- a/metadata/glsa/Manifest
+++ b/metadata/glsa/Manifest
@@ -1,23 +1,23 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
-MANIFEST Manifest.files.gz 518764 BLAKE2B 800d8c605261a8d2ca31eca4bde7d3bb3f684de4f3181019daf03f289f18680c6d96f494d58f96fe4ad07cdd9e1d88375337c122e7b8e08a991332389d887299 SHA512 aedc41e29d7be49299b1cb0ff40f391a2deff64b9b55c25130ff0d38269f249b737b1d372d346ecfc163d0044fae33a0e164e57a26c205b60f17269607a8117b
-TIMESTAMP 2022-08-04T12:09:55Z
+MANIFEST Manifest.files.gz 519553 BLAKE2B 95b916bb9f20b609241e18817604d9aedbd9b94266162c0ae72c4075b346239f9bd4fbc73135a0dac0faa2a62330ae77a5fadd98fff5b4147580808a7c200ffe SHA512 4eb7457d78ec74e73c36af46d3c675bcb9bc9cf33d2f1fde05df8e517560b480fc8f920df111c03877fd301aeb0d0d260bbfc22b80cd0d7497e107fd5ded7e3c
+TIMESTAMP 2022-08-04T18:09:48Z
-----BEGIN PGP SIGNATURE-----
-iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmLrtxNfFIAAAAAALgAo
+iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmLsC2xfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx
RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY
-klCaEw/+KIdI9/zP7WSa4yasw8sfLEybpWWo2hiS0SoASnhIWZ2TBG5XkBkWV8JE
-ab+rtBcJPXXq28NUBso6Vy7nSwtPuvJxl7zRfb9XXboDj4pCpAlo82yVXd+oL0lI
-kHPmdHMLJPipcOkvS8iBOKDckrOBC+/FyJ4IhK5Qm+YCZEs5/Aiu4JL0CDpna6AG
-amQm/f3XlQBDUS6+JCBtbHLG5f23XNW6VmON08vTjj9apxedqG2vy3tnVyBqLguv
-7KRKTS9gSaU+kzpp0Gg5n+uVdQR9J/BnHE6W2JBC7bp8LT0LOKWsBvwp6HjzvolB
-ST98s9XVe92MbU3QpiDaQEwQ2CmeeO+L1YtxUrRhCQiG9ySXNbNLI5eIMhxDGFTn
-2izhdIAwxhEKW3NWyzajRwDlKQJ6a/b8GlRRu0CEdzpzrqG6dr2qIH/WHFSprYVI
-9RPvI5CUeBkuSfbZzOqgfG1wEqeCuQylL/RJvRYFr/aCUgBE8zywinX7fpTc3e6Q
-o4Ick/nqaK9MEZ5gPlRnU7rnFuSOoEME5Dkl+dIm2ZB/N3ujaJA04mevjPovkD9/
-vADAv2hylVTdy3pkNIJVj46HYfeCSeYiK9RpPvLim+/eYP9QJzaNQ+x4106klOgI
-JtJH/2DmLlSWBph+Su1h3MFAMR5eCMTEoAWuySCoUhiHpi6TlS8=
-=ZxjK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+=TLF9
-----END PGP SIGNATURE-----
diff --git a/metadata/glsa/Manifest.files.gz b/metadata/glsa/Manifest.files.gz
index 1f73abc83f0a..5b6ba51e4671 100644
--- a/metadata/glsa/Manifest.files.gz
+++ b/metadata/glsa/Manifest.files.gz
Binary files differ
diff --git a/metadata/glsa/glsa-202208-01.xml b/metadata/glsa/glsa-202208-01.xml
new file mode 100644
index 000000000000..ed2d5810df34
--- /dev/null
+++ b/metadata/glsa/glsa-202208-01.xml
@@ -0,0 +1,42 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202208-01">
+ <title>3MF Consortium lib3mf: Remote code execution</title>
+ <synopsis>A vulnerability in lib3mf could lead to remote code execution.</synopsis>
+ <product type="ebuild">lib3mf</product>
+ <announced>2022-08-04</announced>
+ <revised count="1">2022-08-04</revised>
+ <bug>775362</bug>
+ <access>remote</access>
+ <affected>
+ <package name="media-libs/lib3mf" auto="yes" arch="*">
+ <unaffected range="ge">2.1.1</unaffected>
+ <vulnerable range="lt">2.1.1</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>lib3mf is an implementation of the 3D Manufacturing Format file standard.</p>
+ </background>
+ <description>
+ <p>Incorrect memory handling within lib3mf could result in a use-after-free.</p>
+ </description>
+ <impact type="normal">
+ <p>An attacker that can provide malicious input to an application using 3MF Consortium&#39;s lib3mf could achieve remote code execution.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All 3MF Consortium lib3mf users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=media-libs/lib3mf-2.1.1"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-21772">CVE-2021-21772</uri>
+ </references>
+ <metadata tag="requester" timestamp="2022-08-04T13:52:26.273448Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2022-08-04T13:52:26.289354Z">ajak</metadata>
+</glsa> \ No newline at end of file
diff --git a/metadata/glsa/glsa-202208-02.xml b/metadata/glsa/glsa-202208-02.xml
new file mode 100644
index 000000000000..f8dd813ed94a
--- /dev/null
+++ b/metadata/glsa/glsa-202208-02.xml
@@ -0,0 +1,101 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202208-02">
+ <title>Go: Multiple Vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in Go, the worst of which could result in remote code execution.</synopsis>
+ <product type="ebuild">go</product>
+ <announced>2022-08-04</announced>
+ <revised count="1">2022-08-04</revised>
+ <bug>754210</bug>
+ <bug>766216</bug>
+ <bug>775326</bug>
+ <bug>788640</bug>
+ <bug>794784</bug>
+ <bug>802054</bug>
+ <bug>806659</bug>
+ <bug>807049</bug>
+ <bug>816912</bug>
+ <bug>821859</bug>
+ <bug>828655</bug>
+ <bug>833156</bug>
+ <bug>834635</bug>
+ <bug>838130</bug>
+ <bug>843644</bug>
+ <bug>849290</bug>
+ <bug>857822</bug>
+ <bug>862822</bug>
+ <access>remote</access>
+ <affected>
+ <package name="dev-lang/go" auto="yes" arch="*">
+ <unaffected range="ge">1.18.5</unaffected>
+ <vulnerable range="lt">1.18.5</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Go is an open source programming language that makes it easy to build simple, reliable, and efficient software.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Go. Please review the CVE identifiers referenced below for details.</p>
+ </description>
+ <impact type="high">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Go users shoud upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-lang/go-1.18.5"
+ </code>
+
+ <p>In addition, users using Portage 3.0.9 or later should ensure that packages with Go binaries have no vulnerable code statically linked into their binaries by rebuilding the @golang-rebuild set:</p>
+
+ <code>
+ # emerge --ask --oneshot --verbose @golang-rebuild
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-28366">CVE-2020-28366</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-28367">CVE-2020-28367</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-27918">CVE-2021-27918</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-27919">CVE-2021-27919</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-29923">CVE-2021-29923</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3114">CVE-2021-3114</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3115">CVE-2021-3115</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-31525">CVE-2021-31525</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-33195">CVE-2021-33195</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-33196">CVE-2021-33196</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-33197">CVE-2021-33197</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-33198">CVE-2021-33198</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-34558">CVE-2021-34558</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-36221">CVE-2021-36221</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-38297">CVE-2021-38297</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-41771">CVE-2021-41771</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-41772">CVE-2021-41772</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-44716">CVE-2021-44716</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-44717">CVE-2021-44717</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-1705">CVE-2022-1705</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-23772">CVE-2022-23772</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-23773">CVE-2022-23773</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-23806">CVE-2022-23806</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-24675">CVE-2022-24675</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-24921">CVE-2022-24921</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-27536">CVE-2022-27536</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-28131">CVE-2022-28131</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-28327">CVE-2022-28327</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-29526">CVE-2022-29526</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30629">CVE-2022-30629</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30630">CVE-2022-30630</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30631">CVE-2022-30631</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30632">CVE-2022-30632</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30633">CVE-2022-30633</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-30635">CVE-2022-30635</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-32148">CVE-2022-32148</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-32189">CVE-2022-32189</uri>
+ </references>
+ <metadata tag="requester" timestamp="2022-08-04T13:53:02.198118Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2022-08-04T13:53:02.201567Z">ajak</metadata>
+</glsa> \ No newline at end of file
diff --git a/metadata/glsa/glsa-202208-03.xml b/metadata/glsa/glsa-202208-03.xml
new file mode 100644
index 000000000000..942101cddcc7
--- /dev/null
+++ b/metadata/glsa/glsa-202208-03.xml
@@ -0,0 +1,42 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202208-03">
+ <title>Babel: Remote code execution</title>
+ <synopsis>A vulnerability in Babel could result in remote code execution.</synopsis>
+ <product type="ebuild">Babel</product>
+ <announced>2022-08-04</announced>
+ <revised count="1">2022-08-04</revised>
+ <bug>786954</bug>
+ <access>remote</access>
+ <affected>
+ <package name="dev-python/Babel" auto="yes" arch="*">
+ <unaffected range="ge">2.9.1</unaffected>
+ <vulnerable range="lt">2.9.1</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Babel is a collection of tools for internationalizing Python applications.</p>
+ </background>
+ <description>
+ <p>Babel does not properly restrict which sources a locale can be loaded from. If Babel loads an attacker-controlled .dat file, arbitrary code execution can be achieved via unsafe Pickle deserialization.</p>
+ </description>
+ <impact type="normal">
+ <p>An attacker with filesystem access and control over the locales Babel loads can achieve code execution.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Babel users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-python/Babel-2.9.1"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-20095">CVE-2021-20095</uri>
+ </references>
+ <metadata tag="requester" timestamp="2022-08-04T13:53:26.311668Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2022-08-04T13:53:26.316368Z">ajak</metadata>
+</glsa> \ No newline at end of file
diff --git a/metadata/glsa/glsa-202208-04.xml b/metadata/glsa/glsa-202208-04.xml
new file mode 100644
index 000000000000..59a03c63d718
--- /dev/null
+++ b/metadata/glsa/glsa-202208-04.xml
@@ -0,0 +1,42 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202208-04">
+ <title>libmcpp: Denial of service</title>
+ <synopsis>Multiple vulnerabilities in libmcpp could result in a denial of service condition.</synopsis>
+ <product type="ebuild">libmcpp</product>
+ <announced>2022-08-04</announced>
+ <revised count="1">2022-08-04</revised>
+ <bug>718808</bug>
+ <access>remote</access>
+ <affected>
+ <package name="dev-cpp/libmcpp" auto="yes" arch="*">
+ <unaffected range="ge">2.7.2_p5</unaffected>
+ <vulnerable range="lt">2.7.2_p5</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>libmcpp is a portable C/C++ preprocessor.</p>
+ </background>
+ <description>
+ <p>A buffer overflow and an out-of-bounds read vulnerability have been discovered in libmcpp, which could be exploited for denial of service.</p>
+ </description>
+ <impact type="low">
+ <p>An attacker that can provide crafted input to libmcpp could achieve denial of service.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All libmcpp users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-cpp/libmcpp-2.7.2_p5"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-14274">CVE-2019-14274</uri>
+ </references>
+ <metadata tag="requester" timestamp="2022-08-04T13:53:45.282478Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2022-08-04T13:53:45.286989Z">ajak</metadata>
+</glsa> \ No newline at end of file
diff --git a/metadata/glsa/glsa-202208-05.xml b/metadata/glsa/glsa-202208-05.xml
new file mode 100644
index 000000000000..088ef70191b0
--- /dev/null
+++ b/metadata/glsa/glsa-202208-05.xml
@@ -0,0 +1,46 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202208-05">
+ <title>Icinga Web 2: Multiple Vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in Icinga Web 2, the worst of which could result in remote code execution.</synopsis>
+ <product type="ebuild">icingaweb2</product>
+ <announced>2022-08-04</announced>
+ <revised count="1">2022-08-04</revised>
+ <bug>738024</bug>
+ <bug>834802</bug>
+ <access>remote</access>
+ <affected>
+ <package name="www-apps/icingaweb2" auto="yes" arch="*">
+ <unaffected range="ge">2.9.6</unaffected>
+ <vulnerable range="lt">2.9.6</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Icinga Web 2 is a frontend for icinga2.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Icinga Web 2. Please review the CVE identifiers referenced below for details.</p>
+ </description>
+ <impact type="high">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Icinga Web 2 users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=www-apps/icingaweb2-2.9.6"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-24368">CVE-2020-24368</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-24714">CVE-2022-24714</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-24715">CVE-2022-24715</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-24716">CVE-2022-24716</uri>
+ </references>
+ <metadata tag="requester" timestamp="2022-08-04T13:54:03.704673Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2022-08-04T13:54:03.709641Z">ajak</metadata>
+</glsa> \ No newline at end of file
diff --git a/metadata/glsa/timestamp.chk b/metadata/glsa/timestamp.chk
index 8faa17d133fc..73af047d975d 100644
--- a/metadata/glsa/timestamp.chk
+++ b/metadata/glsa/timestamp.chk
@@ -1 +1 @@
-Thu, 04 Aug 2022 12:09:52 +0000
+Thu, 04 Aug 2022 18:09:45 +0000
diff --git a/metadata/glsa/timestamp.commit b/metadata/glsa/timestamp.commit
index 349124ae11e5..3c24c45fc243 100644
--- a/metadata/glsa/timestamp.commit
+++ b/metadata/glsa/timestamp.commit
@@ -1 +1 @@
-254c716d0dd35a6846f281fd4a3eaf970dc0bede 1659377108 2022-08-01T18:05:08+00:00
+911ba97fd465c36414fa2eb8a1fea31d4152990a 1659621622 2022-08-04T14:00:22+00:00