summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRepository QA checks <repo-qa-checks@gentoo.org>2018-01-07 23:54:20 +0000
committerRepository QA checks <repo-qa-checks@gentoo.org>2018-01-07 23:54:20 +0000
commitd5b5f167d3d337a9c4c8b1410f857e222124eb57 (patch)
tree3cb1eeef75e6e3f7b7308e945fca94875fd43f3b /metadata/glsa
parentMerge updates from master (diff)
parentAdd GLSA 201801-08 (diff)
downloadgentoo-d5b5f167d3d337a9c4c8b1410f857e222124eb57.tar.gz
gentoo-d5b5f167d3d337a9c4c8b1410f857e222124eb57.tar.bz2
gentoo-d5b5f167d3d337a9c4c8b1410f857e222124eb57.zip
Merge commit 'a061d9c7e7aab8a1e784b06ad53eea848ddc4f3c'
Diffstat (limited to 'metadata/glsa')
-rw-r--r--metadata/glsa/glsa-201801-03.xml134
-rw-r--r--metadata/glsa/glsa-201801-04.xml51
-rw-r--r--metadata/glsa/glsa-201801-05.xml50
-rw-r--r--metadata/glsa/glsa-201801-06.xml51
-rw-r--r--metadata/glsa/glsa-201801-07.xml68
-rw-r--r--metadata/glsa/glsa-201801-08.xml53
6 files changed, 407 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-201801-03.xml b/metadata/glsa/glsa-201801-03.xml
new file mode 100644
index 000000000000..67a86a6d1886
--- /dev/null
+++ b/metadata/glsa/glsa-201801-03.xml
@@ -0,0 +1,134 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201801-03">
+ <title>Chromium, Google Chrome: Multiple vulnerabilities </title>
+ <synopsis>Multiple vulnerabilities have been found in Chromium and Google
+ Chrome, the worst of which could result in the execution of arbitrary code.
+ </synopsis>
+ <product type="ebuild">chromium,google-chrome</product>
+ <announced>2018-01-07</announced>
+ <revised>2018-01-07: 1</revised>
+ <bug>640334</bug>
+ <bug>641376</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="www-client/chromium" auto="yes" arch="*">
+ <unaffected range="ge">63.0.3239.108</unaffected>
+ <vulnerable range="lt">63.0.3239.108</vulnerable>
+ </package>
+ <package name="www-client/google-chrome" auto="yes" arch="*">
+ <unaffected range="ge">63.0.3239.108</unaffected>
+ <vulnerable range="lt">63.0.3239.108</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Chromium is an open-source browser project that aims to build a safer,
+ faster, and more stable way for all users to experience the web.
+ </p>
+
+ <p>Google Chrome is one fast, simple, and secure browser for all your
+ devices
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Chromium and Google
+ Chrome. Please review the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could possibly execute arbitrary code with the
+ privileges of the process, cause a Denial of Service condition, bypass
+ content security controls, or conduct URL spoofing.
+ </p>
+ </impact>
+ <workaround>
+ <p>There are no known workarounds at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Chromium users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=www-client/chromium-63.0.3239.108"
+ </code>
+
+ <p>All Google Chrome users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=www-client/google-chrome-63.0.3239.108"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15407">
+ CVE-2017-15407
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15408">
+ CVE-2017-15408
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15409">
+ CVE-2017-15409
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15410">
+ CVE-2017-15410
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15411">
+ CVE-2017-15411
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15412">
+ CVE-2017-15412
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15413">
+ CVE-2017-15413
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15415">
+ CVE-2017-15415
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15416">
+ CVE-2017-15416
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15417">
+ CVE-2017-15417
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15418">
+ CVE-2017-15418
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15419">
+ CVE-2017-15419
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15420">
+ CVE-2017-15420
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15422">
+ CVE-2017-15422
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15423">
+ CVE-2017-15423
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15424">
+ CVE-2017-15424
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15425">
+ CVE-2017-15425
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15426">
+ CVE-2017-15426
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15427">
+ CVE-2017-15427
+ </uri>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15429">
+ CVE-2017-15429
+ </uri>
+ <uri link="https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop.html">
+ Google Chrome Release 20171206
+ </uri>
+ <uri link="https://chromereleases.googleblog.com/2017/12/stable-channel-update-for-desktop_14.html">
+ Google Chrome Release 20171214
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-01-05T05:50:33Z">jmbailey</metadata>
+ <metadata tag="submitter" timestamp="2018-01-07T23:22:12Z">jmbailey</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201801-04.xml b/metadata/glsa/glsa-201801-04.xml
new file mode 100644
index 000000000000..e49cf9f43606
--- /dev/null
+++ b/metadata/glsa/glsa-201801-04.xml
@@ -0,0 +1,51 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201801-04">
+ <title>LibXcursor: User-assisted execution of arbitrary code</title>
+ <synopsis>A vulnerability in LibXcursor might allow remote attackers to
+ execute arbitrary code.
+ </synopsis>
+ <product type="ebuild">LibXcursor</product>
+ <announced>2018-01-07</announced>
+ <revised>2018-01-07: 1</revised>
+ <bug>639062</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="x11-libs/libXcursor" auto="yes" arch="*">
+ <unaffected range="ge">1.1.15</unaffected>
+ <vulnerable range="lt">1.1.15</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>X.Org X11 libXcursor runtime library.</p>
+ </background>
+ <description>
+ <p>It was discovered that libXcursor is prone to several heap overflows
+ when parsing malicious files.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker, by enticing a user to process a specially crafted
+ cursor file, could possibly execute arbitrary code with the privileges of
+ the process or cause a Denial of Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All LibXcursor users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/libXcursor-1.1.15"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-16612">
+ CVE-2017-16612
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-01-05T05:33:40Z">jmbailey</metadata>
+ <metadata tag="submitter" timestamp="2018-01-07T23:27:33Z">jmbailey</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201801-05.xml b/metadata/glsa/glsa-201801-05.xml
new file mode 100644
index 000000000000..0522284c6ea3
--- /dev/null
+++ b/metadata/glsa/glsa-201801-05.xml
@@ -0,0 +1,50 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201801-05">
+ <title>OpenSSH: Permission issue</title>
+ <synopsis>A flaw has been discovered in OpenSSH which could allow a remote
+ attacker to create zero-length files.
+ </synopsis>
+ <product type="ebuild">OpenSSH</product>
+ <announced>2018-01-07</announced>
+ <revised>2018-01-07: 1</revised>
+ <bug>633428</bug>
+ <access>remote</access>
+ <affected>
+ <package name="net-misc/openssh" auto="yes" arch="*">
+ <unaffected range="ge">7.5_p1-r3</unaffected>
+ <vulnerable range="lt">7.5_p1-r3</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>OpenSSH is a complete SSH protocol implementation that includes SFTP
+ client and server support.
+ </p>
+ </background>
+ <description>
+ <p>The process_open function in sftp-server.c in OpenSSH did not properly
+ prevent write operations in readonly mode.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could cause the creation of zero-length files.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All OpenSSH users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/openssh-7.5_p1-r3"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-15906">
+ CVE-2017-15906
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-01-05T05:55:47Z">jmbailey</metadata>
+ <metadata tag="submitter" timestamp="2018-01-07T23:36:33Z">jmbailey</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201801-06.xml b/metadata/glsa/glsa-201801-06.xml
new file mode 100644
index 000000000000..a0725d7cc0f7
--- /dev/null
+++ b/metadata/glsa/glsa-201801-06.xml
@@ -0,0 +1,51 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201801-06">
+ <title>Back In Time: Command injection</title>
+ <synopsis>A command injection vulnerability in 'Back in Time' may allow for
+ the execution of arbitrary shell commands.
+ </synopsis>
+ <product type="ebuild">backintime</product>
+ <announced>2018-01-07</announced>
+ <revised>2018-01-07: 1</revised>
+ <bug>636974</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="app-backup/backintime" auto="yes" arch="*">
+ <unaffected range="ge">1.1.24</unaffected>
+ <vulnerable range="lt">1.1.24</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>A simple backup tool for Linux, inspired by “flyback project”.</p>
+ </background>
+ <description>
+ <p>‘Back in Time’ did improper escaping/quoting of file paths used as
+ arguments to the ‘notify-send’ command leading to some parts of file
+ paths being executed as shell commands within an os.system call.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A context-dependent attacker could execute arbitrary shell commands via
+ a specially crafted file.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All ‘Back In Time’ users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=app-backup/backintime-1.1.24"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-16667">
+ CVE-2017-16667
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-01-05T05:36:24Z">jmbailey</metadata>
+ <metadata tag="submitter" timestamp="2018-01-07T23:41:27Z">jmbailey</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201801-07.xml b/metadata/glsa/glsa-201801-07.xml
new file mode 100644
index 000000000000..554e946dd132
--- /dev/null
+++ b/metadata/glsa/glsa-201801-07.xml
@@ -0,0 +1,68 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201801-07">
+ <title>GNU Emacs: Command injection</title>
+ <synopsis>A vulnerability has been found in Emacs which may allow for
+ arbitrary command execution.
+ </synopsis>
+ <product type="ebuild">Emacs</product>
+ <announced>2018-01-07</announced>
+ <revised>2018-01-07: 1</revised>
+ <bug>630680</bug>
+ <access>remote</access>
+ <affected>
+ <package name="app-editors/emacs" auto="yes" arch="*">
+ <unaffected range="ge" slot="23">23.4-r16</unaffected>
+ <unaffected range="ge" slot="24">24.5-r4</unaffected>
+ <unaffected range="ge" slot="25">25.2-r1</unaffected>
+ <vulnerable range="lt" slot="23">23.4-r16</vulnerable>
+ <vulnerable range="lt" slot="24">24.5-r4</vulnerable>
+ <vulnerable range="lt" slot="25">25.2-r1</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>GNU Emacs is a highly extensible and customizable text editor.</p>
+ </background>
+ <description>
+ <p>A command injection flaw within the Emacs “enriched mode” handling
+ has been discovered.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker, by enticing a user to open a specially crafted file,
+ could execute arbitrary commands with the privileges of process.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All GNU Emacs 23.x users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/emacs-23.4-r16"
+ </code>
+
+ <p>All GNU Emacs 24.x users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/emacs-24.5-r4"
+ </code>
+
+ <p>All GNU Emacs 25.x users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=app-editors/emacs-,25.2-r1"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-14482">
+ CVE-2017-14482
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-01-05T05:59:49Z">jmbailey</metadata>
+ <metadata tag="submitter" timestamp="2018-01-07T23:47:51Z">jmbailey</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201801-08.xml b/metadata/glsa/glsa-201801-08.xml
new file mode 100644
index 000000000000..71a3eac590d4
--- /dev/null
+++ b/metadata/glsa/glsa-201801-08.xml
@@ -0,0 +1,53 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201801-08">
+ <title>MiniUPnPc: Arbitrary code execution</title>
+ <synopsis>A vulnerability in MiniUPnPc might allow remote attackers to
+ execute arbitrary code.
+ </synopsis>
+ <product type="ebuild">MiniUPnP</product>
+ <announced>2018-01-07</announced>
+ <revised>2018-01-07: 1</revised>
+ <bug>562684</bug>
+ <access>remote</access>
+ <affected>
+ <package name="net-libs/miniupnpc" auto="yes" arch="*">
+ <unaffected range="ge">2.0.20170509</unaffected>
+ <vulnerable range="lt">2.0.20170509</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>The client library, enabling applications to access the services
+ provided by an UPnP “Internet Gateway Device” present on the network.
+ </p>
+ </background>
+ <description>
+ <p>An exploitable buffer overflow vulnerability exists in the XML parser
+ functionality of the MiniUPnP library.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker, by enticing a user to connect to a malicious server,
+ could cause the execution of arbitrary code with the privileges of the
+ user running a MiniUPnPc linked application.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All MiniUPnPc users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/miniupnpc-2.0.20170509"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2015-6031">
+ CVE-2015-6031
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-01-05T06:06:14Z">jmbailey</metadata>
+ <metadata tag="submitter" timestamp="2018-01-07T23:51:08Z">jmbailey</metadata>
+</glsa>