diff options
Diffstat (limited to 'metadata/glsa')
-rw-r--r-- | metadata/glsa/Manifest | 30 | ||||
-rw-r--r-- | metadata/glsa/Manifest.files.gz | bin | 515403 -> 517009 bytes | |||
-rw-r--r-- | metadata/glsa/glsa-202107-41.xml | 47 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-42.xml | 50 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-43.xml | 52 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-44.xml | 51 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-45.xml | 61 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-46.xml | 48 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-47.xml | 49 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-48.xml | 49 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-49.xml | 72 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-50.xml | 51 | ||||
-rw-r--r-- | metadata/glsa/timestamp.chk | 2 | ||||
-rw-r--r-- | metadata/glsa/timestamp.commit | 2 |
14 files changed, 547 insertions, 17 deletions
diff --git a/metadata/glsa/Manifest b/metadata/glsa/Manifest index dae4120315e4..233040c09ae1 100644 --- a/metadata/glsa/Manifest +++ b/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 515403 BLAKE2B 2c3efe7a5a7d2ab8e90e9b1bd7118eceae943d57d96054bc9b9f1f28ce3625d956a0ef4b37dc99a8f53983d4cb1c230b5d63cdaf2310372c379209c8703ec67f SHA512 3314ee13046d68813f7a4f6d648d5b31496fb976d5d8456229403081e0e0f9369fa83c271c4d6eb3dbe296b3a72758271782ca5d805b74a5deaa07e14742bafb -TIMESTAMP 2021-07-17T17:39:10Z +MANIFEST Manifest.files.gz 517009 BLAKE2B 7dfe2c6f0d3c02fd13a4ff92c8b43527ed90bc991cb77cf23a6b6f4d95a096baf241470cf7a0758af0ac5a10a8c455ea6117a88ca56d9619752cbe7f94a48887 SHA512 a547d3f7e4ce6646a0fd7f1bbc0c170ce1ad5c251ff3df4af3717aeb9fe49d0376f58f7a94715f226b5ed2e9b7f27692afb69b78d807ec8b830b728935a0bcbd +TIMESTAMP 2021-07-24T00:39:02Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmDzFb5fFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmD7YSZfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klDTaRAAiEapxlJpnLp5i442vw3FGhXvzblQCEiX/58EfEx0FZ/OsnvkGWhC55p5 -7SUCZNE0doIskdzXItmenbaWy+BBmzWtqMTSkt3mMDddxt9ElaU1LWlr9XefH/BM -sjlwAJfeJndyw60i7JMTETTjX3scBM+Z9wP8n0uyuiLFQQ0kNM8DrwxyKOlEV5Fy -xQv9DieSnnPaMiQZ+yLuZQM4lpiwTEToGjs9MgC2d032AL9G1TiZFFjFYRcaJWKS -mhZeGUHUI81VYa93a7yeHCYC6fE19S0bsg+KPccyMYcxa4e3UwebT+zNPWQHA50c -89YLMVAGTIgR7qweUzfgDOM2M5Si1Rj1gtq442Hg78p+uoE9gdKicAxyW9qiMBBs -LkgD5HMM6+x/x2VwdNHszYPfbKKJX5Av52KSLqy2hX8fHZAvSIIogxQftr2SJqsU -/OIZKqzgksB/masJn6BdDGrE/EyeyoQxSeXTgfHrytOzWaZkTnnSZmoF2aLEQf5y -H6gB7PyCQgCw5rtPc/eyl0Zhu1FXwq9soK4a6BJW0WCQHL0AWdM/xR7P7ZTJKc2e -haCmlIBwxbWtk1656Zm/JcEgOvsgkYrH+g8RBtD3UtMgOWpXS+TSM1HEslM6rgkL -1hFP5bztPPwgcs0vHkwVy9bm0y9t4vgCDibxJ/1M94WlFvUHG14= -=jtEe +klC5Mw/9GsZ9wpwdz+PbVdusr4HHAV59IT+qhg3/55VhmeVfPaFMIsfVpxbhZPtj +EjaHeBD/iOblkKhN7ctyFMe3Vf/r63bMmhT6ERpV3mKu8h43LsHN5qcjQ4TlvCvD +kT+IJiMI3LfxdRlYQMGr572aclA/xd194LiPJyUj4j0p2slbrbtzp3OEKTO+BI/a +6ZVULgMrMowWbAZTeqqusOK1RC5z4URqhAHun+7piyBmtc3tph3KcpQKRpBon2Kv ++6ONA1LzmHrbvEJnjsuTSx1irS1b5prQgU8CPJ6h9Y6QObDDxjmut4JHfC0MBXeI +RUaIQHxgqfcetTh+WwjY9mGVxVS2NlgCeOUQU5pgKZJ40mWQDbFId2BYs4ih8WzU +YFl5zbzie3mxyFoo5ssc8/Q/HOoOU+sG6Ld8M8Wu9BwP1us7GE8dRaVrW+xSKkDc +7Fj09YZbKpD7HiQZOyjf3xK3D6W80ZPs5VujslWE+YPuV/V4sy516hJ2QmYJlFvI +mrjk3mwocKx/Zyhm45z+g5AkRCA8g2leHNX5SwF38+ZkOXTtIiQdbrO2IT6MoO/Q +/ticUcLzITIDwfsN5fXUSO1hOAXl3FzDLsUvKw+yPmbIhXIK5bwgHPk5QE/ACdpo +j0PRo+XX2V1BYzJg1n3aU4M8nVuYaKEah7vp3GhvPiLKxMB9msg= +=EP+w -----END PGP SIGNATURE----- diff --git a/metadata/glsa/Manifest.files.gz b/metadata/glsa/Manifest.files.gz Binary files differindex 0db27d5d926b..7f2ba8300b23 100644 --- a/metadata/glsa/Manifest.files.gz +++ b/metadata/glsa/Manifest.files.gz diff --git a/metadata/glsa/glsa-202107-41.xml b/metadata/glsa/glsa-202107-41.xml new file mode 100644 index 000000000000..2e01572b2113 --- /dev/null +++ b/metadata/glsa/glsa-202107-41.xml @@ -0,0 +1,47 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-41"> + <title>Dovecot: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Dovecot, the worst of + which could result in a Denial of Service condition. + </synopsis> + <product type="ebuild">dovecot</product> + <announced>2021-07-18</announced> + <revised count="2">2021-07-18</revised> + <bug>797349</bug> + <access>remote</access> + <affected> + <package name="net-mail/dovecot" auto="yes" arch="*"> + <unaffected range="ge">2.3.14.1</unaffected> + <vulnerable range="lt">2.3.14.1</vulnerable> + </package> + </affected> + <background> + <p>Dovecot is an open source IMAP and POP3 email server.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Dovecot. Please review + the CVE identifiers referenced below for details. + </p> + </description> + <impact type="low"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Dovecot users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-mail/dovecot-2.3.14.1" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-29157">CVE-2021-29157</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-33515">CVE-2021-33515</uri> + </references> + <metadata tag="requester" timestamp="2021-07-17T16:37:03Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-18T03:45:21Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-42.xml b/metadata/glsa/glsa-202107-42.xml new file mode 100644 index 000000000000..8b6fc8a9b409 --- /dev/null +++ b/metadata/glsa/glsa-202107-42.xml @@ -0,0 +1,50 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-42"> + <title>PJSIP: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in PJSIP, the worst of + which could result in a Denial of Service condition. + </synopsis> + <product type="ebuild">pjproject</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>775359</bug> + <access>remote</access> + <affected> + <package name="net-libs/pjproject" auto="yes" arch="*"> + <unaffected range="ge">2.10-r1</unaffected> + <vulnerable range="lt">2.10-r1</vulnerable> + </package> + </affected> + <background> + <p>PJSIP is a free and open source multimedia communication library written + in C language implementing standard based protocols such as SIP, SDP, + RTP, STUN, TURN, and ICE. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in PJSIP. Please review + the CVE identifiers referenced below for details. + </p> + </description> + <impact type="low"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All PJSIP users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/pjproject-2.10-r1" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15260">CVE-2020-15260</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-21375">CVE-2021-21375</uri> + </references> + <metadata tag="requester" timestamp="2021-07-16T02:16:25Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T03:48:47Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-43.xml b/metadata/glsa/glsa-202107-43.xml new file mode 100644 index 000000000000..aa7e48b71929 --- /dev/null +++ b/metadata/glsa/glsa-202107-43.xml @@ -0,0 +1,52 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-43"> + <title>RPM: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in RPM, the worst of which + could result in remote code execution. + </synopsis> + <product type="ebuild">rpm</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>778533</bug> + <bug>787944</bug> + <access>remote</access> + <affected> + <package name="app-arch/rpm" auto="yes" arch="*"> + <unaffected range="ge">4.16.1.3</unaffected> + <vulnerable range="lt">4.16.1.3</vulnerable> + </package> + </affected> + <background> + <p>The Red Hat Package Manager (RPM) is a command line driven package + management system capable of installing, uninstalling, verifying, + querying, and updating computer software packages. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in RPM. Please review the + CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All RPM users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/rpm-4.16.1.3" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-20266">CVE-2021-20266</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3421">CVE-2021-3421</uri> + </references> + <metadata tag="requester" timestamp="2021-07-16T01:57:38Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T04:06:54Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-44.xml b/metadata/glsa/glsa-202107-44.xml new file mode 100644 index 000000000000..30a974dc968c --- /dev/null +++ b/metadata/glsa/glsa-202107-44.xml @@ -0,0 +1,51 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-44"> + <title>libslirp: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in libslirp, the worst of + which could result in a Denial of Service condition. + </synopsis> + <product type="ebuild">libslirp</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>796347</bug> + <access>local</access> + <affected> + <package name="net-libs/libslirp" auto="yes" arch="*"> + <unaffected range="ge">4.6.0</unaffected> + <vulnerable range="lt">4.6.0</vulnerable> + </package> + </affected> + <background> + <p>libslirp is a TCP/IP emulator used to provide virtual networking + services. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in libslirp. Please review + the CVE identifiers referenced below for details. + </p> + </description> + <impact type="low"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All libslirp users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libslirp-4.6.0" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595</uri> + </references> + <metadata tag="requester" timestamp="2021-07-10T00:29:05Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T04:11:18Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-45.xml b/metadata/glsa/glsa-202107-45.xml new file mode 100644 index 000000000000..253cc37b6db7 --- /dev/null +++ b/metadata/glsa/glsa-202107-45.xml @@ -0,0 +1,61 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-45"> + <title>PyCharm Community, Professional: Remote code execution</title> + <synopsis>A vulnerability has been found in PyCharm Community and + Professional, potentially resulting in arbitrary code execution. + </synopsis> + <product type="ebuild">pycharm</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>797892</bug> + <access>remote</access> + <affected> + <package name="dev-util/pycharm-community" auto="yes" arch="*"> + <unaffected range="ge">2021.1.2</unaffected> + <vulnerable range="lt">2021.1.2</vulnerable> + </package> + <package name="dev-util/pycharm-professional" auto="yes" arch="*"> + <unaffected range="ge">2021.1.2</unaffected> + <vulnerable range="lt">2021.1.2</vulnerable> + </package> + </affected> + <background> + <p>PyCharm is the Python IDE for professional developers.</p> + </background> + <description> + <p>Insufficient validation exists within PyCharm’s checks for fetching + projects from VCS. + </p> + </description> + <impact type="normal"> + <p>If a victim can be enticed into fetching a VCS project via PyCharm, a + remote attacker could achieve remote code execution. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All PyCharm Community users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-util/pycharm-community-2021.1.2" + </code> + + <p>All PyCharm Professional users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-util/pycharm-professional-2021.1.2" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30005">CVE-2021-30005</uri> + </references> + <metadata tag="requester" timestamp="2021-07-16T02:00:34Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T04:13:01Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-46.xml b/metadata/glsa/glsa-202107-46.xml new file mode 100644 index 000000000000..2c4b4415bdd9 --- /dev/null +++ b/metadata/glsa/glsa-202107-46.xml @@ -0,0 +1,48 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-46"> + <title>mpv: Format string vulnerability</title> + <synopsis>A format string vulnerability was found in mpv, potentially + resulting in arbitrary code execution. + </synopsis> + <product type="ebuild">mpv</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>780474</bug> + <access>remote</access> + <affected> + <package name="media-video/mpv" auto="yes" arch="*"> + <unaffected range="ge">0.33.1</unaffected> + <vulnerable range="lt">0.33.1</vulnerable> + </package> + </affected> + <background> + <p>Video player based on MPlayer/mplayer2.</p> + </background> + <description> + <p>mpv uses untrusted input within format strings.</p> + </description> + <impact type="normal"> + <p>A remote attacker could entice a user to open a specially crafted m3u + playlist file using mpv, possibly resulting in execution of arbitrary + code with the privileges of the process or a Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All mpv users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/mpv-0.33.1" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30145">CVE-2021-30145</uri> + </references> + <metadata tag="requester" timestamp="2021-07-16T02:03:07Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T04:16:47Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-47.xml b/metadata/glsa/glsa-202107-47.xml new file mode 100644 index 000000000000..39653c3ca06c --- /dev/null +++ b/metadata/glsa/glsa-202107-47.xml @@ -0,0 +1,49 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-47"> + <title>libpano13: Format string vulnerability</title> + <synopsis>A format string vulnerability has been found in libpano13, + potentially resulting in arbitrary code execution. + </synopsis> + <product type="ebuild">libpano13</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>780486</bug> + <access>remote</access> + <affected> + <package name="media-libs/libpano13" auto="yes" arch="*"> + <unaffected range="ge">2.9.20</unaffected> + <vulnerable range="lt">2.9.20</vulnerable> + </package> + </affected> + <background> + <p>libpano13 is Helmut Dersch’s panorama toolbox library.</p> + </background> + <description> + <p>A format string issue exists within panoFileOutputNamesCreate() where + unvalidated input is passed directly into the formatter. + </p> + </description> + <impact type="normal"> + <p>A remote attacker could entice a user to open a specially crafted file + using libpano13, possibly resulting in execution of arbitrary code with + the privileges of the process or a Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All libpano13 users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libpano13-2.9.20" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-20307">CVE-2021-20307</uri> + </references> + <metadata tag="requester" timestamp="2021-07-16T01:54:06Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T04:19:22Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-48.xml b/metadata/glsa/glsa-202107-48.xml new file mode 100644 index 000000000000..93798cdc8b89 --- /dev/null +++ b/metadata/glsa/glsa-202107-48.xml @@ -0,0 +1,49 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-48"> + <title>systemd: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in systemd, the worst of + which could result in a Denial of Service condition. + </synopsis> + <product type="ebuild">systemd</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>789399</bug> + <bug>803041</bug> + <access>local, remote</access> + <affected> + <package name="sys-apps/systemd" auto="yes" arch="*"> + <unaffected range="ge">248.5</unaffected> + <vulnerable range="lt">248.5</vulnerable> + </package> + </affected> + <background> + <p>A system and service manager.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in systemd. Please review + the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All systemd users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/systemd-248.5" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-13529">CVE-2020-13529</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-33910">CVE-2021-33910</uri> + </references> + <metadata tag="requester" timestamp="2021-07-20T18:35:40Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T19:14:28Z">ajak</metadata> +</glsa> + diff --git a/metadata/glsa/glsa-202107-49.xml b/metadata/glsa/glsa-202107-49.xml new file mode 100644 index 000000000000..66db2e9ee5f0 --- /dev/null +++ b/metadata/glsa/glsa-202107-49.xml @@ -0,0 +1,72 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-49"> + <title>Chromium, Google Chrome: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Chromium and Google + Chrome, the worst of which could result in the arbitrary execution of code. + </synopsis> + <product type="ebuild">chromium, google-chrome</product> + <announced>2021-07-22</announced> + <revised count="2">2021-07-22</revised> + <bug>802540</bug> + <access>remote</access> + <affected> + <package name="www-client/chromium" auto="yes" arch="*"> + <unaffected range="ge">91.0.4472.164</unaffected> + <vulnerable range="lt">91.0.4472.164</vulnerable> + </package> + <package name="www-client/google-chrome" auto="yes" arch="*"> + <unaffected range="ge">91.0.4472.164</unaffected> + <vulnerable range="lt">91.0.4472.164</vulnerable> + </package> + </affected> + <background> + <p>Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. + </p> + + <p>Google Chrome is one fast, simple, and secure browser for all your + devices. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in chromium, and + google-chrome. Please review the CVE identifiers referenced below for + details. + </p> + </description> + <impact type="high"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Chromium users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-91.0.4472.164" + </code> + + <p>All Google Chrome users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/google-chrome-91.0.4472.164" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30541">CVE-2021-30541</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30559">CVE-2021-30559</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30560">CVE-2021-30560</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30561">CVE-2021-30561</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30562">CVE-2021-30562</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30563">CVE-2021-30563</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30564">CVE-2021-30564</uri> + </references> + <metadata tag="requester" timestamp="2021-07-19T02:47:55Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-22T04:51:59Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-50.xml b/metadata/glsa/glsa-202107-50.xml new file mode 100644 index 000000000000..147944a9d215 --- /dev/null +++ b/metadata/glsa/glsa-202107-50.xml @@ -0,0 +1,51 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-50"> + <title>Singularity: Remote code execution</title> + <synopsis>A vulnerability in Singularity could result in remote code + execution. + </synopsis> + <product type="ebuild">singularity</product> + <announced>2021-07-22</announced> + <revised count="1">2021-07-22</revised> + <bug>792465</bug> + <access>remote</access> + <affected> + <package name="sys-cluster/singularity" auto="yes" arch="*"> + <unaffected range="ge">3.7.4</unaffected> + <vulnerable range="lt">3.7.4</vulnerable> + </package> + </affected> + <background> + <p>Singularity is the container platform for performance sensitive + workloads. + </p> + </background> + <description> + <p>Singularity always uses the default remote endpoint, + ‘cloud.syslabs.io’, for action commands using the ‘library://’ + URI rather than the configured remote endpoint. + </p> + </description> + <impact type="high"> + <p>An attacker that that can push a malicious container to the default + remote endpoint could execute code on hosts that fetch the container. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Singularity users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-cluster/singularity-3.7.4" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-32635">CVE-2021-32635</uri> + </references> + <metadata tag="requester" timestamp="2021-07-19T02:57:15Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-22T04:54:09Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/timestamp.chk b/metadata/glsa/timestamp.chk index 598a38ee3e84..33f7bb267cb6 100644 --- a/metadata/glsa/timestamp.chk +++ b/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Sat, 17 Jul 2021 17:39:07 +0000 +Sat, 24 Jul 2021 00:38:58 +0000 diff --git a/metadata/glsa/timestamp.commit b/metadata/glsa/timestamp.commit index 4a0f4bdf44a0..5a39cf9d5775 100644 --- a/metadata/glsa/timestamp.commit +++ b/metadata/glsa/timestamp.commit @@ -1 +1 @@ -8869d4a8d53cf7ba0e777627877b7a395ba645d6 1626498718 2021-07-17T05:11:58+00:00 +b771364599953f210f7a780b5aacba265c26034b 1626929656 2021-07-22T04:54:16+00:00 |