diff options
author | 2018-01-07 23:54:20 +0000 | |
---|---|---|
committer | 2018-01-07 23:54:20 +0000 | |
commit | d5b5f167d3d337a9c4c8b1410f857e222124eb57 (patch) | |
tree | 3cb1eeef75e6e3f7b7308e945fca94875fd43f3b /metadata/glsa | |
parent | Merge updates from master (diff) | |
parent | Add GLSA 201801-08 (diff) | |
download | gentoo-d5b5f167d3d337a9c4c8b1410f857e222124eb57.tar.gz gentoo-d5b5f167d3d337a9c4c8b1410f857e222124eb57.tar.bz2 gentoo-d5b5f167d3d337a9c4c8b1410f857e222124eb57.zip |
Merge commit 'a061d9c7e7aab8a1e784b06ad53eea848ddc4f3c'
Diffstat (limited to 'metadata/glsa')
-rw-r--r-- | metadata/glsa/glsa-201801-03.xml | 134 | ||||
-rw-r--r-- | metadata/glsa/glsa-201801-04.xml | 51 | ||||
-rw-r--r-- | metadata/glsa/glsa-201801-05.xml | 50 | ||||
-rw-r--r-- | metadata/glsa/glsa-201801-06.xml | 51 | ||||
-rw-r--r-- | metadata/glsa/glsa-201801-07.xml | 68 | ||||
-rw-r--r-- | metadata/glsa/glsa-201801-08.xml | 53 |
6 files changed, 407 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-201801-03.xml b/metadata/glsa/glsa-201801-03.xml new file mode 100644 index 000000000000..67a86a6d1886 --- /dev/null +++ b/metadata/glsa/glsa-201801-03.xml @@ -0,0 +1,134 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201801-03"> + <title>Chromium, Google Chrome: Multiple vulnerabilities </title> + <synopsis>Multiple vulnerabilities have been found in Chromium and Google + Chrome, the worst of which could result in the execution of arbitrary code. + </synopsis> + <product type="ebuild">chromium,google-chrome</product> + <announced>2018-01-07</announced> + <revised>2018-01-07: 1</revised> + <bug>640334</bug> + <bug>641376</bug> + <access>local, remote</access> + <affected> + <package name="www-client/chromium" auto="yes" arch="*"> + <unaffected range="ge">63.0.3239.108</unaffected> + <vulnerable range="lt">63.0.3239.108</vulnerable> + </package> + <package name="www-client/google-chrome" auto="yes" arch="*"> + <unaffected range="ge">63.0.3239.108</unaffected> + <vulnerable range="lt">63.0.3239.108</vulnerable> + </package> + </affected> + <background> + <p>Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. + </p> + + <p>Google Chrome is one fast, simple, and secure browser for all your + devices + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Chromium and Google + Chrome. Please review the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>A remote attacker could possibly execute arbitrary code with the + privileges of the process, cause a Denial of Service condition, bypass + content security controls, or conduct URL spoofing. + </p> + </impact> + <workaround> + <p>There are no known workarounds at this time.</p> + </workaround> + <resolution> + <p>All Chromium users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-63.0.3239.108" + </code> + + <p>All Google Chrome users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/google-chrome-63.0.3239.108" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15407"> + CVE-2017-15407 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15408"> + CVE-2017-15408 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15409"> + CVE-2017-15409 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15410"> + CVE-2017-15410 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15411"> + CVE-2017-15411 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15412"> + CVE-2017-15412 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15413"> + CVE-2017-15413 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15415"> + CVE-2017-15415 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15416"> + CVE-2017-15416 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15417"> + CVE-2017-15417 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15418"> + CVE-2017-15418 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15419"> + CVE-2017-15419 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15420"> + CVE-2017-15420 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15422"> + CVE-2017-15422 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15423"> + CVE-2017-15423 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15424"> + CVE-2017-15424 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15425"> + CVE-2017-15425 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15426"> + CVE-2017-15426 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15427"> + CVE-2017-15427 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15429"> + CVE-2017-15429 + </uri> + <uri link="https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html"> + Google Chrome Release 20171206 + </uri> + <uri link="https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop_14.html"> + Google Chrome Release 20171214 + </uri> + </references> + <metadata tag="requester" timestamp="2018-01-05T05:50:33Z">jmbailey</metadata> + <metadata tag="submitter" timestamp="2018-01-07T23:22:12Z">jmbailey</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201801-04.xml b/metadata/glsa/glsa-201801-04.xml new file mode 100644 index 000000000000..e49cf9f43606 --- /dev/null +++ b/metadata/glsa/glsa-201801-04.xml @@ -0,0 +1,51 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201801-04"> + <title>LibXcursor: User-assisted execution of arbitrary code</title> + <synopsis>A vulnerability in LibXcursor might allow remote attackers to + execute arbitrary code. + </synopsis> + <product type="ebuild">LibXcursor</product> + <announced>2018-01-07</announced> + <revised>2018-01-07: 1</revised> + <bug>639062</bug> + <access>local, remote</access> + <affected> + <package name="x11-libs/libXcursor" auto="yes" arch="*"> + <unaffected range="ge">1.1.15</unaffected> + <vulnerable range="lt">1.1.15</vulnerable> + </package> + </affected> + <background> + <p>X.Org X11 libXcursor runtime library.</p> + </background> + <description> + <p>It was discovered that libXcursor is prone to several heap overflows + when parsing malicious files. + </p> + </description> + <impact type="normal"> + <p>A remote attacker, by enticing a user to process a specially crafted + cursor file, could possibly execute arbitrary code with the privileges of + the process or cause a Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All LibXcursor users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/libXcursor-1.1.15" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-16612"> + CVE-2017-16612 + </uri> + </references> + <metadata tag="requester" timestamp="2018-01-05T05:33:40Z">jmbailey</metadata> + <metadata tag="submitter" timestamp="2018-01-07T23:27:33Z">jmbailey</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201801-05.xml b/metadata/glsa/glsa-201801-05.xml new file mode 100644 index 000000000000..0522284c6ea3 --- /dev/null +++ b/metadata/glsa/glsa-201801-05.xml @@ -0,0 +1,50 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201801-05"> + <title>OpenSSH: Permission issue</title> + <synopsis>A flaw has been discovered in OpenSSH which could allow a remote + attacker to create zero-length files. + </synopsis> + <product type="ebuild">OpenSSH</product> + <announced>2018-01-07</announced> + <revised>2018-01-07: 1</revised> + <bug>633428</bug> + <access>remote</access> + <affected> + <package name="net-misc/openssh" auto="yes" arch="*"> + <unaffected range="ge">7.5_p1-r3</unaffected> + <vulnerable range="lt">7.5_p1-r3</vulnerable> + </package> + </affected> + <background> + <p>OpenSSH is a complete SSH protocol implementation that includes SFTP + client and server support. + </p> + </background> + <description> + <p>The process_open function in sftp-server.c in OpenSSH did not properly + prevent write operations in readonly mode. + </p> + </description> + <impact type="normal"> + <p>A remote attacker could cause the creation of zero-length files.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All OpenSSH users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/openssh-7.5_p1-r3" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15906"> + CVE-2017-15906 + </uri> + </references> + <metadata tag="requester" timestamp="2018-01-05T05:55:47Z">jmbailey</metadata> + <metadata tag="submitter" timestamp="2018-01-07T23:36:33Z">jmbailey</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201801-06.xml b/metadata/glsa/glsa-201801-06.xml new file mode 100644 index 000000000000..a0725d7cc0f7 --- /dev/null +++ b/metadata/glsa/glsa-201801-06.xml @@ -0,0 +1,51 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201801-06"> + <title>Back In Time: Command injection</title> + <synopsis>A command injection vulnerability in 'Back in Time' may allow for + the execution of arbitrary shell commands. + </synopsis> + <product type="ebuild">backintime</product> + <announced>2018-01-07</announced> + <revised>2018-01-07: 1</revised> + <bug>636974</bug> + <access>local, remote</access> + <affected> + <package name="app-backup/backintime" auto="yes" arch="*"> + <unaffected range="ge">1.1.24</unaffected> + <vulnerable range="lt">1.1.24</vulnerable> + </package> + </affected> + <background> + <p>A simple backup tool for Linux, inspired by “flyback project”.</p> + </background> + <description> + <p>‘Back in Time’ did improper escaping/quoting of file paths used as + arguments to the ‘notify-send’ command leading to some parts of file + paths being executed as shell commands within an os.system call. + </p> + </description> + <impact type="normal"> + <p>A context-dependent attacker could execute arbitrary shell commands via + a specially crafted file. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All ‘Back In Time’ users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-backup/backintime-1.1.24" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-16667"> + CVE-2017-16667 + </uri> + </references> + <metadata tag="requester" timestamp="2018-01-05T05:36:24Z">jmbailey</metadata> + <metadata tag="submitter" timestamp="2018-01-07T23:41:27Z">jmbailey</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201801-07.xml b/metadata/glsa/glsa-201801-07.xml new file mode 100644 index 000000000000..554e946dd132 --- /dev/null +++ b/metadata/glsa/glsa-201801-07.xml @@ -0,0 +1,68 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201801-07"> + <title>GNU Emacs: Command injection</title> + <synopsis>A vulnerability has been found in Emacs which may allow for + arbitrary command execution. + </synopsis> + <product type="ebuild">Emacs</product> + <announced>2018-01-07</announced> + <revised>2018-01-07: 1</revised> + <bug>630680</bug> + <access>remote</access> + <affected> + <package name="app-editors/emacs" auto="yes" arch="*"> + <unaffected range="ge" slot="23">23.4-r16</unaffected> + <unaffected range="ge" slot="24">24.5-r4</unaffected> + <unaffected range="ge" slot="25">25.2-r1</unaffected> + <vulnerable range="lt" slot="23">23.4-r16</vulnerable> + <vulnerable range="lt" slot="24">24.5-r4</vulnerable> + <vulnerable range="lt" slot="25">25.2-r1</vulnerable> + </package> + </affected> + <background> + <p>GNU Emacs is a highly extensible and customizable text editor.</p> + </background> + <description> + <p>A command injection flaw within the Emacs “enriched mode” handling + has been discovered. + </p> + </description> + <impact type="normal"> + <p>A remote attacker, by enticing a user to open a specially crafted file, + could execute arbitrary commands with the privileges of process. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All GNU Emacs 23.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/emacs-23.4-r16" + </code> + + <p>All GNU Emacs 24.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/emacs-24.5-r4" + </code> + + <p>All GNU Emacs 25.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/emacs-,25.2-r1" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14482"> + CVE-2017-14482 + </uri> + </references> + <metadata tag="requester" timestamp="2018-01-05T05:59:49Z">jmbailey</metadata> + <metadata tag="submitter" timestamp="2018-01-07T23:47:51Z">jmbailey</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201801-08.xml b/metadata/glsa/glsa-201801-08.xml new file mode 100644 index 000000000000..71a3eac590d4 --- /dev/null +++ b/metadata/glsa/glsa-201801-08.xml @@ -0,0 +1,53 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201801-08"> + <title>MiniUPnPc: Arbitrary code execution</title> + <synopsis>A vulnerability in MiniUPnPc might allow remote attackers to + execute arbitrary code. + </synopsis> + <product type="ebuild">MiniUPnP</product> + <announced>2018-01-07</announced> + <revised>2018-01-07: 1</revised> + <bug>562684</bug> + <access>remote</access> + <affected> + <package name="net-libs/miniupnpc" auto="yes" arch="*"> + <unaffected range="ge">2.0.20170509</unaffected> + <vulnerable range="lt">2.0.20170509</vulnerable> + </package> + </affected> + <background> + <p>The client library, enabling applications to access the services + provided by an UPnP “Internet Gateway Device” present on the network. + </p> + </background> + <description> + <p>An exploitable buffer overflow vulnerability exists in the XML parser + functionality of the MiniUPnP library. + </p> + </description> + <impact type="normal"> + <p>A remote attacker, by enticing a user to connect to a malicious server, + could cause the execution of arbitrary code with the privileges of the + user running a MiniUPnPc linked application. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All MiniUPnPc users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/miniupnpc-2.0.20170509" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6031"> + CVE-2015-6031 + </uri> + </references> + <metadata tag="requester" timestamp="2018-01-05T06:06:14Z">jmbailey</metadata> + <metadata tag="submitter" timestamp="2018-01-07T23:51:08Z">jmbailey</metadata> +</glsa> |