From 6957f5c65b02bba533954eabc0b62f5de36be206 Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Tue, 10 Apr 2018 17:26:49 +0100 Subject: gentoo resync : 10.04.2018 --- metadata/glsa/Manifest | 30 +++++++++---------- metadata/glsa/Manifest.files.gz | Bin 419802 -> 421068 bytes metadata/glsa/glsa-201804-03.xml | 55 ++++++++++++++++++++++++++++++++++ metadata/glsa/glsa-201804-04.xml | 63 +++++++++++++++++++++++++++++++++++++++ metadata/glsa/glsa-201804-05.xml | 59 ++++++++++++++++++++++++++++++++++++ metadata/glsa/glsa-201804-06.xml | 50 +++++++++++++++++++++++++++++++ metadata/glsa/glsa-201804-07.xml | 50 +++++++++++++++++++++++++++++++ metadata/glsa/glsa-201804-08.xml | 61 +++++++++++++++++++++++++++++++++++++ metadata/glsa/glsa-201804-09.xml | 50 +++++++++++++++++++++++++++++++ metadata/glsa/glsa-201804-10.xml | 55 ++++++++++++++++++++++++++++++++++ metadata/glsa/timestamp.chk | 2 +- metadata/glsa/timestamp.commit | 2 +- 12 files changed, 460 insertions(+), 17 deletions(-) create mode 100644 metadata/glsa/glsa-201804-03.xml create mode 100644 metadata/glsa/glsa-201804-04.xml create mode 100644 metadata/glsa/glsa-201804-05.xml create mode 100644 metadata/glsa/glsa-201804-06.xml create mode 100644 metadata/glsa/glsa-201804-07.xml create mode 100644 metadata/glsa/glsa-201804-08.xml create mode 100644 metadata/glsa/glsa-201804-09.xml create mode 100644 metadata/glsa/glsa-201804-10.xml (limited to 'metadata/glsa') diff --git a/metadata/glsa/Manifest b/metadata/glsa/Manifest index 0d9778ce12fd..d06381fc60ff 100644 --- a/metadata/glsa/Manifest +++ b/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 419802 BLAKE2B 77b61430b97be606d07e770dcefecad6df694cb9d174d02e411d0c9124496cc8f3c082d220e88b305fb15b10d7c63b688c68e4484d9efe6cf97b41aabe095755 SHA512 3f233f14b1531babe34f57d6f927c008a3406b144de3e74532b3bf23c806220ffc43906d40c476f43e773cfbdabd98ea035b95415e8a23d7ad3ed93384c13bf7 -TIMESTAMP 2018-04-07T11:38:26Z +MANIFEST Manifest.files.gz 421068 BLAKE2B 7dadce7e4b041a3441a6b63ed7a860af4bdcb72f0c20dfbfdd9e4fb6e577a48f6a4fcb0599fba15eed3a96fa7c8c225773cd2e3d3942a286fd74ab527c15651e SHA512 acf6ff1943f0998753e92be7360ecf6e135b838a2681d49f8c91bef5155aaca01686c562e9e52ce269826b172b3f86851233b7716507c7b52394116ff6101c02 +TIMESTAMP 2018-04-10T15:38:31Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlrIrbJfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAlrM2ndfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klDxaw/8Drfbfj0hfEitCnKxUG4s7ZsusS76lSRthsQkw6WlGKhiuO0O60MAS0pa -ne5YXBBKp8CY9WMtTIPwUK9uFoVzvGvBGP8HZmEYQkKRvSnvfyBudQjrbWp0k3Cs -2TLcIrTS1slz6CGWDG8e/qwW3+7TfsTCegwixEQ90C8MOqWQkdC2zhkP2uN321gt -VRs89bMJuxgJTtbVB23Ttkj2mvmbeqPsStvzXF0Yqb0617pBkIgQhZxzsRnJXYhs -yBFH46JqLacgah3caCyZqPYtu7qefBdIsCo5PbGUlHZWzMrhrF/CVvRcazOUNYBy -lOD2lpzR9QuX7gMvffiDg16rHxtsHXb0e8cfl1oDJ1JIRpgwi39oVPlIFSIOqTjC -hDuuHUrqRIwbiuJtLYL034SzXvK7VnqpqPQpH5PoB7iqG/i+FHhyw7WiJg94doAi -qF48/+QIOuQzesuL89zNwb6FEkP4rPkNyhd0+gZAKETb/mhUoHkNC0OdeUWQTT70 -dtaiH4HlOvlyOxm7Y5Mae2P5mHXWSuKNWrznahnGnQDjeSwpoHLlZLAOUfdy7Wy9 -Gn4yHzSRMUX31T8c8UlBDqzIwaPP2npukLAhW/fD8+BsHWofDMqA18sGLnw5XKSD -+5nROyVpqxqKf44RNM/KNKdQCamasvsX7SMfuhrdkBHYoJ79bmo= -=4WEz +klBM2hAAhxjdROZlLwG2CxokiwKkVTLMepPK80nnhs85wEgE/DD4+zDo7qeKsRvi +24x/hzxUrr+B82GoEGK6nhCq90CCj54FMZNu+3csa8T8JaFJrzJ+HAU6iNtfdKjE +vMsE6Vdvehx6pgTEmVXrcc0iGQHKu8FNItd4z6MXvQg6s7UUJqdhw+mIV1t7jOB3 +rbGrzpYFgn1fZggmRrhIk82Lf3cTlSe5AU5/3625wrYpNUkYzS0cgkIA+vTjWo0N +2bOpNXSJQobx1mILAivJHyjcz2TU38Po63soohfjyj1qpDF1FNKcYaidbR7ytFXS +V3NmV0eoXmstXDMBsH1r01YtVxs6zpHSWkoZDEZTixGGxhJdPqyO0eQo1fCzCg0k +AlIDdmNkfZAJiguSz8ZOjhIbhBrED7jyxl7q6bkfzC99rJwLSHeXk4h9bsGNdcFG +WKByqf2HACL8J+XRpiwUX/lF8YxQ6PkXr3fWi4/i6zrGMa/Mu2U+RKDzFEHTTbXc +nPuk4fY8aQt1FCXIjqBWUmhy4S/8VFCYKzru+s7NWNxFQsTzVXA8A5E4/KxOO4Ui +jkUACXpPNWH/wAN55j5kZ4GwfvNDhQZ2Q/kiQAAWkcKUoYrQVrfB/gPy+eTTfa6N +naEOmfnrFKuN0C0rYr6iLloS79cwvVSqZw2IjNsrcvAB7anhlUM= +=iVON -----END PGP SIGNATURE----- diff --git a/metadata/glsa/Manifest.files.gz b/metadata/glsa/Manifest.files.gz index b5be97045f05..0c5cc77ecc00 100644 Binary files a/metadata/glsa/Manifest.files.gz and b/metadata/glsa/Manifest.files.gz differ diff --git a/metadata/glsa/glsa-201804-03.xml b/metadata/glsa/glsa-201804-03.xml new file mode 100644 index 000000000000..c59928cc59f0 --- /dev/null +++ b/metadata/glsa/glsa-201804-03.xml @@ -0,0 +1,55 @@ + + + + Poppler: Multiple vulnerabilities + Multiple vulnerabilities have been found in Poppler, the worst of + which could allow a Denial of Service. + + poppler + 2018-04-08 + 2018-04-08 + 644388 + 645868 + remote + + + 0.61.1 + 0.61.1 + + + +

Poppler is a PDF rendering library based on the xpdf-3.0 code base.

+
+ +

Multiple vulnerabilities have been discovered in Poppler. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker, by enticing a user to open a specially crafted PDF, + could cause a Denial of Service condition or have other unspecified + impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All Poppler users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/poppler-0.61.1" + +
+ + + CVE-2017-1000456 + + CVE-2017-14975 + CVE-2017-14976 + CVE-2017-14977 + + b-man + b-man +
diff --git a/metadata/glsa/glsa-201804-04.xml b/metadata/glsa/glsa-201804-04.xml new file mode 100644 index 000000000000..d12760a99d68 --- /dev/null +++ b/metadata/glsa/glsa-201804-04.xml @@ -0,0 +1,63 @@ + + + + cURL: Multiple vulnerabilities + Multiple vulnerabilities have been found in cURL, the worst of + which could result in a Denial of Service condition. + + curl + 2018-04-08 + 2018-04-08 + 645698 + 650056 + remote + + + 7.59.0 + 7.59.0 + + + +

A command line tool and library for transferring data with URLs.

+
+ +

Multiple vulnerabilities have been discovered in cURL. Please review the + CVE identifiers referenced below for details. +

+
+ +

Remote attackers could cause a Denial of Service condition, obtain + sensitive information, or have other unspecified impacts. +

+
+ +

There is no known workaround at this time.

+
+ +

All cURL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/curl-7.59.0" + +
+ + + CVE-2018-1000005 + + + CVE-2018-1000007 + + + CVE-2018-1000120 + + + CVE-2018-1000121 + + + CVE-2018-1000122 + + + b-man + b-man +
diff --git a/metadata/glsa/glsa-201804-05.xml b/metadata/glsa/glsa-201804-05.xml new file mode 100644 index 000000000000..fac50a830abb --- /dev/null +++ b/metadata/glsa/glsa-201804-05.xml @@ -0,0 +1,59 @@ + + + + ISC DHCP: Multiple vulnerabilities + Multiple vulnerabilities have been found in ISC DHCP, the worst of + which could allow for the remote execution of arbitrary code. + + dhcp + 2018-04-08 + 2018-04-08 + 644708 + 649010 + remote + + + 4.3.6_p1 + 4.3.6_p1 + + + +

ISC DHCP is a Dynamic Host Configuration Protocol (DHCP) client/server.

+
+ +

Multiple vulnerabilities have been discovered in ISC DHCP. Please review + the CVE identifiers referenced below for details. +

+
+ +

Remote attackers could execute arbitrary code, cause a Denial of Service + condition, or have other unspecified impacts. +

+
+ +

There are no known workarounds at this time for CVE-2018-5732 or + CVE-2018-5733. +

+ +

In accordance with upstream documentation, the recommended workaround + for CVE-2017-3144 is, “to disallow access to the OMAPI control port + from unauthorized clients (in accordance with best practices for server + operation).” +

+
+ +

All DHCP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/dhcp-4.3.6_p1" + +
+ + CVE-2017-3144 + CVE-2018-5732 + CVE-2018-5733 + + chrisadr + b-man +
diff --git a/metadata/glsa/glsa-201804-06.xml b/metadata/glsa/glsa-201804-06.xml new file mode 100644 index 000000000000..a038c242317f --- /dev/null +++ b/metadata/glsa/glsa-201804-06.xml @@ -0,0 +1,50 @@ + + + + mailx: Multiple vulnerabilities + Multiple vulnerabilities were discovered in mailx, the worst of + which may allow a remote attacker to execute arbitrary commands. + + mailx + 2018-04-08 + 2018-04-08 + 533208 + remote + + + 8.1.2.20160123 + 8.1.2.20160123 + + + +

A utility program for sending and receiving mail, also known as a Mail + User Agent program. +

+
+ +

Multiple vulnerabilities have been discovered in mailx. Please review + the CVE identifiers referenced below for details. +

+
+ +

A remote attacker could execute arbitrary commands.

+
+ +

There is no known workaround at this time.

+
+ +

All mailx users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=mail-client/mailx-8.1.2.20160123" + +
+ + CVE-2004-2771 + CVE-2014-7844 + + chrisadr + b-man +
diff --git a/metadata/glsa/glsa-201804-07.xml b/metadata/glsa/glsa-201804-07.xml new file mode 100644 index 000000000000..e47a94f67e7d --- /dev/null +++ b/metadata/glsa/glsa-201804-07.xml @@ -0,0 +1,50 @@ + + + + libvirt: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in libvirt, the worst + of which may result in the execution of arbitrary commands. + + libvirt + 2018-04-08 + 2018-04-08 + 647338 + 650018 + local + + + 4.1.0 + 4.1.0 + + + +

libvirt is a C toolkit for manipulating virtual machines.

+
+ +

Multiple vulnerabilities have been discovered in libvirt. Please review + the CVE identifiers referenced below for details. +

+
+ +

A local privileged attacker could execute arbitrary commands or cause a + Denial of Service condition. +

+
+ +

There is no known workaround at this time.

+
+ +

All libvirt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/libvirt-4.1.0" + +
+ + CVE-2018-5748 + CVE-2018-6764 + + chrisadr + b-man +
diff --git a/metadata/glsa/glsa-201804-08.xml b/metadata/glsa/glsa-201804-08.xml new file mode 100644 index 000000000000..16b031554877 --- /dev/null +++ b/metadata/glsa/glsa-201804-08.xml @@ -0,0 +1,61 @@ + + + + QEMU: Multiple vulnerabilities + Multiple vulnerabilities have been found in QEMU, the worst of + which may allow an attacker to execute arbitrary code. + + qemu + 2018-04-08 + 2018-04-08 + 629348 + 638506 + 643432 + 646814 + 649616 + local, remote + + + 2.11.1-r1 + 2.11.1-r1 + + + +

QEMU is a generic and open source machine emulator and virtualizer.

+
+ +

Multiple vulnerabilities have been discovered in QEMU. Please review the + CVE identifiers referenced below for details. +

+
+ +

An attacker could execute arbitrary code, cause a Denial of Service + condition, or obtain sensitive information. +

+
+ +

There is no known workaround at this time.

+
+ +

All QEMU users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.11.1-r1" + +
+ + CVE-2017-13672 + CVE-2017-15124 + CVE-2017-16845 + CVE-2017-17381 + CVE-2017-18030 + CVE-2017-18043 + CVE-2017-5715 + CVE-2018-5683 + CVE-2018-5748 + CVE-2018-7550 + + chrisadr + b-man +
diff --git a/metadata/glsa/glsa-201804-09.xml b/metadata/glsa/glsa-201804-09.xml new file mode 100644 index 000000000000..ab4be111389b --- /dev/null +++ b/metadata/glsa/glsa-201804-09.xml @@ -0,0 +1,50 @@ + + + + SPICE VDAgent: Arbitrary command injection + A vulnerability in SPICE VDAgent could allow local attackers to + execute arbitrary commands. + + spice,vdagent + 2018-04-08 + 2018-04-08 + 650020 + local + + + 0.17.0_p20180319 + 0.17.0_p20180319 + + + +

Provides a complete open source solution for remote access to virtual + machines in a seamless way so you can play videos, record audio, share + USB devices and share folders without complications. +

+
+ +

SPICE VDAgent does not properly escape save directory before passing to + shell. +

+
+ +

A local attacker could execute arbitrary commands.

+
+ +

There is no known workaround at this time.

+
+ +

All SPICE VDAgent users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-emulation/spice-vdagent-0.17.0_p20180319" + +
+ + CVE-2017-15108 + + b-man + b-man +
diff --git a/metadata/glsa/glsa-201804-10.xml b/metadata/glsa/glsa-201804-10.xml new file mode 100644 index 000000000000..82a5c8731e29 --- /dev/null +++ b/metadata/glsa/glsa-201804-10.xml @@ -0,0 +1,55 @@ + + + + Zend Framework: Multiple vulnerabilities + Multiple vulnerabilities have been found in Zend Framework, the + worst of which could allow attackers to remotely execute arbitrary + commands. + + zendframework + 2018-04-09 + 2018-04-09 + 604182 + remote + + + 1.12.9 + + + +

Zend Framework is a high quality and open source framework for + developing Web Applications. +

+ +
+ +

Multiple vulnerabilities have been discovered in Zend Framework that + have remain unaddressed. Please review the referenced CVE identifiers for + details. +

+
+ +

Remote attackers could execute arbitrary commands or conduct SQL + injection attacks. +

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Zend Framework and recommends that + users unmerge the package: +

+ + + # emerge --unmerge "dev-php/ZendFramework" + +
+ + CVE-2016-10034 + CVE-2016-4861 + CVE-2016-6233 + + b-man + b-man +
diff --git a/metadata/glsa/timestamp.chk b/metadata/glsa/timestamp.chk index a01a4cb82d0c..688d03838185 100644 --- a/metadata/glsa/timestamp.chk +++ b/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Sat, 07 Apr 2018 11:38:22 +0000 +Tue, 10 Apr 2018 15:38:27 +0000 diff --git a/metadata/glsa/timestamp.commit b/metadata/glsa/timestamp.commit index febf2abf42b1..f481b3dc7443 100644 --- a/metadata/glsa/timestamp.commit +++ b/metadata/glsa/timestamp.commit @@ -1 +1 @@ -e07af6df7a81524d31084c5565441abb9e572281 1522807580 2018-04-04T02:06:20+00:00 +6d341a6c00fd52a41ddaf7e932d941b6c7f9bf88 1523293654 2018-04-09T17:07:34+00:00 -- cgit v1.2.3