diff options
author | Repository QA checks <repo-qa-checks@gentoo.org> | 2017-10-08 14:03:46 +0000 |
---|---|---|
committer | Repository QA checks <repo-qa-checks@gentoo.org> | 2017-10-08 14:03:46 +0000 |
commit | dbe9f7870e26e1316df0540101a920b2b1de4c06 (patch) | |
tree | 34301a6433fcc6d23aa75e03e1c4412a5cf88f0c /metadata/glsa | |
parent | Merge updates from master (diff) | |
parent | Add GLSA 201710-06 (diff) | |
download | gentoo-dbe9f7870e26e1316df0540101a920b2b1de4c06.tar.gz gentoo-dbe9f7870e26e1316df0540101a920b2b1de4c06.tar.bz2 gentoo-dbe9f7870e26e1316df0540101a920b2b1de4c06.zip |
Merge commit '594bf82c9efc7da9d716af1ec61e4c3b5a3e2126'
Diffstat (limited to 'metadata/glsa')
-rw-r--r-- | metadata/glsa/glsa-201710-05.xml | 50 | ||||
-rw-r--r-- | metadata/glsa/glsa-201710-06.xml | 101 |
2 files changed, 151 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-201710-05.xml b/metadata/glsa/glsa-201710-05.xml new file mode 100644 index 000000000000..9fc4492741e0 --- /dev/null +++ b/metadata/glsa/glsa-201710-05.xml @@ -0,0 +1,50 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201710-05"> + <title>Munin: Arbitrary file write</title> + <synopsis>A vulnerability in Munin allows local attackers to overwrite any + file accessible to the www-data user. + </synopsis> + <product type="ebuild">munin</product> + <announced>2017-10-08</announced> + <revised>2017-10-08: 1</revised> + <bug>610602</bug> + <access>local</access> + <affected> + <package name="net-analyzer/munin" auto="yes" arch="*"> + <unaffected range="ge">2.0.33</unaffected> + <vulnerable range="lt">2.0.33</vulnerable> + </package> + </affected> + <background> + <p>Munin is an open source server monitoring tool.</p> + </background> + <description> + <p>When Munin is compiled with CGI graphics enabled then the files + accessible to the www-data user can be overwritten. + </p> + </description> + <impact type="normal"> + <p>A local attacker, by setting multiple upper_limit GET parameters, could + overwrite files accessible to the www-user. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Munin users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/munin-2.0.33" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-6188"> + CVE-2017-6188 + </uri> + </references> + <metadata tag="requester" timestamp="2017-10-01T22:42:42Z">chrisadr</metadata> + <metadata tag="submitter" timestamp="2017-10-08T13:43:10Z">chrisadr</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201710-06.xml b/metadata/glsa/glsa-201710-06.xml new file mode 100644 index 000000000000..2ffbb73c66e3 --- /dev/null +++ b/metadata/glsa/glsa-201710-06.xml @@ -0,0 +1,101 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201710-06"> + <title>PostgreSQL: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in PostgreSQL, the worst + of which could result in privilege escalation. + </synopsis> + <product type="ebuild">postgresql</product> + <announced>2017-10-08</announced> + <revised>2017-10-08: 1</revised> + <bug>618462</bug> + <bug>627462</bug> + <access>remote</access> + <affected> + <package name="dev-db/postgresql" auto="yes" arch="*"> + <unaffected range="ge" slot="9.6">9.6.4</unaffected> + <unaffected range="ge" slot="9.5">9.5.8</unaffected> + <unaffected range="ge" slot="9.4">9.4.13</unaffected> + <unaffected range="ge" slot="9.3">9.3.18</unaffected> + <unaffected range="ge" slot="9.2">9.2.22</unaffected> + <vulnerable range="lt">9.6.4</vulnerable> + </package> + </affected> + <background> + <p>PostgreSQL is an open source object-relational database management + system. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in PostgreSQL. Please + review the referenced CVE identifiers for details. + </p> + </description> + <impact type="normal"> + <p>A remote attacker could escalate privileges, cause a Denial of Service + condition, obtain passwords, cause a loss in information, or obtain + sensitive information. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All PostgreSQL 9.6.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.6.4" + </code> + + <p>All PostgreSQL 9.5.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.5.8" + </code> + + <p>All PostgreSQL 9.4.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.4.13" + </code> + + <p>All PostgreSQL 9.3.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.3.18" + </code> + + <p>All PostgreSQL 9.2.x users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-9.2.22" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7484"> + CVE-2017-7484 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7485"> + CVE-2017-7485 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7486"> + CVE-2017-7486 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7546"> + CVE-2017-7546 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7547"> + CVE-2017-7547 + </uri> + <uri link="https://nvd.nist.gov/nvd.cfm?cvename=CVE-2017-7548"> + CVE-2017-7548 + </uri> + </references> + <metadata tag="requester" timestamp="2017-10-02T06:12:53Z">BlueKnight</metadata> + <metadata tag="submitter" timestamp="2017-10-08T13:55:26Z">chrisadr</metadata> +</glsa> |