summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRepository QA checks <repo-qa-checks@gentoo.org>2018-05-22 22:47:04 +0000
committerRepository QA checks <repo-qa-checks@gentoo.org>2018-05-22 22:47:04 +0000
commit6cc2d6116bf06c8ace04f85612f9caa93eb9d461 (patch)
tree9d61c94c25e367bc55630460f13cbb7f3e3d002b /metadata/glsa
parentMerge updates from master (diff)
parent[ GLSA 201805-09 ] Shadow: security bypass (diff)
downloadgentoo-6cc2d6116bf06c8ace04f85612f9caa93eb9d461.tar.gz
gentoo-6cc2d6116bf06c8ace04f85612f9caa93eb9d461.tar.bz2
gentoo-6cc2d6116bf06c8ace04f85612f9caa93eb9d461.zip
Merge commit '000a4ecebe264f405efd60fbeab45f98ae1183f7'
Diffstat (limited to 'metadata/glsa')
-rw-r--r--metadata/glsa/glsa-201805-07.xml57
-rw-r--r--metadata/glsa/glsa-201805-08.xml70
-rw-r--r--metadata/glsa/glsa-201805-09.xml48
3 files changed, 175 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-201805-07.xml b/metadata/glsa/glsa-201805-07.xml
new file mode 100644
index 000000000000..f57a6fb9d6d1
--- /dev/null
+++ b/metadata/glsa/glsa-201805-07.xml
@@ -0,0 +1,57 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201805-07">
+ <title>Samba: Multiple vulnerabilities </title>
+ <synopsis>Multiple vulnerabilities have been found in Samba, the worst of
+ which may allow remote execution of arbitrary code.
+ </synopsis>
+ <product type="ebuild">samba</product>
+ <announced>2018-05-22</announced>
+ <revised count="1">2018-05-22</revised>
+ <bug>588262</bug>
+ <bug>619516</bug>
+ <bug>639024</bug>
+ <bug>650382</bug>
+ <access>remote</access>
+ <affected>
+ <package name="net-fs/samba" auto="yes" arch="*">
+ <unaffected range="ge">4.5.16</unaffected>
+ <vulnerable range="lt">4.5.16</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Samba is a suite of SMB and CIFS client/server programs.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Samba. Please review
+ the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could possibly execute arbitrary code, cause a Denial
+ of Service condition, conduct a man-in-the-middle attack, or obtain
+ sensitive information.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Samba users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-fs/samba-4.5.16"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2016-2119">CVE-2016-2119</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-14746">CVE-2017-14746</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-15275">CVE-2017-15275</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-7494">CVE-2017-7494</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-1050">CVE-2018-1050</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-1057">CVE-2018-1057</uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-05-15T00:36:47Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2018-05-22T22:29:53Z">b-man</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201805-08.xml b/metadata/glsa/glsa-201805-08.xml
new file mode 100644
index 000000000000..5b8b52935500
--- /dev/null
+++ b/metadata/glsa/glsa-201805-08.xml
@@ -0,0 +1,70 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201805-08">
+ <title>VirtualBox: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in VirtualBox, the worst
+ of which could allow an attacker to take control of VirtualBox.
+ </synopsis>
+ <product type="ebuild">virtualbox</product>
+ <announced>2018-05-22</announced>
+ <revised count="1">2018-05-22</revised>
+ <bug>655186</bug>
+ <access>remote</access>
+ <affected>
+ <package name="app-emulation/virtualbox" auto="yes" arch="*">
+ <unaffected range="ge">5.1.36</unaffected>
+ <vulnerable range="lt">5.1.36</vulnerable>
+ </package>
+ <package name="app-emulation/virtualbox-bin" auto="yes" arch="*">
+ <unaffected range="ge">5.1.36.122089</unaffected>
+ <vulnerable range="lt">5.1.36.122089</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>VirtualBox is a powerful virtualization product from Oracle.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in VirtualBox. Please
+ review the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>An attacker could take control of VirtualBox resulting in the execution
+ of arbitrary code with the privileges of the process, a Denial of Service
+ condition, or other unspecified impacts.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All VirtualBox users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/virtualbox-5.1.36"
+ </code>
+
+ <p>All VirtualBox binary users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=app-emulation/virtualbox-bin-5.1.36.122089"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-2830">CVE-2018-2830</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-2831">CVE-2018-2831</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-2835">CVE-2018-2835</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-2836">CVE-2018-2836</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-2837">CVE-2018-2837</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-2842">CVE-2018-2842</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-2843">CVE-2018-2843</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-2844">CVE-2018-2844</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-2845">CVE-2018-2845</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-2860">CVE-2018-2860</uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-05-14T23:15:39Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2018-05-22T22:32:13Z">b-man</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201805-09.xml b/metadata/glsa/glsa-201805-09.xml
new file mode 100644
index 000000000000..f4af27e4d2fc
--- /dev/null
+++ b/metadata/glsa/glsa-201805-09.xml
@@ -0,0 +1,48 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201805-09">
+ <title>Shadow: security bypass</title>
+ <synopsis>A vulnerability found in Shadow may allow local attackers to bypass
+ security restrictions.
+ </synopsis>
+ <product type="ebuild">shadow</product>
+ <announced>2018-05-22</announced>
+ <revised count="1">2018-05-22</revised>
+ <bug>647790</bug>
+ <access>remote</access>
+ <affected>
+ <package name="sys-apps/shadow" auto="yes" arch="*">
+ <unaffected range="ge">4.6</unaffected>
+ <vulnerable range="lt">4.6</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Shadow is a set of tools to deal with user accounts.</p>
+ </background>
+ <description>
+ <p>A local attacker could possibly bypass security restrictions if an
+ administrator used “group blacklisting” to restrict access to file
+ system paths.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A local attacker could possibly bypass security restrictions.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All shadow users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/shadow-4.6"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-7169">CVE-2018-7169</uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-05-22T22:21:35Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2018-05-22T22:36:37Z">Zlogene</metadata>
+</glsa>