diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 8fcad6c22ed..348387df59e 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 585357 BLAKE2B 90b484a7cfadba26e75b941b109643027b5530ea0e0da6565b28a1492ef9b8c6cfc7254e54f18ef93a17f476c8c87b2c8309fbac1afa85d144cc4d664931e811 SHA512 f5bbc1b0b0163958f91ecc02b4f0422622112ac5c642a105fef46e39550fd8622a03abd647b830a766a072ad993d41863d2d1d5ca05368f5af8d868f03aaeae4 -TIMESTAMP 2024-09-01T06:40:36Z +MANIFEST Manifest.files.gz 590436 BLAKE2B 15aabc4185729e136cdcfaf5f8f985f8037a950c2674b40f4a60d6db55b6e66ddf62465183eec797a8745737731f08c9f5b7997b3092ca23932abe139760e3a2 SHA512 d4bc062a4c9898005fcd53314c2db40baaef3e5725ab92e762d55ae3747dcb34a1602299c2aa4bdf60a06b6f322e89ee0b897eafffb10de6e5392274ab828bc5 +TIMESTAMP 2024-10-01T06:40:44Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmbUDGRfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmb7mWxfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klDgsBAAoUHUrodoZqVv+dQRYagMfOtKu+cZ/yb+l9WuJq5v6zJV1SU3HFJjb8jB -yvdsf1tED9myb4iYSBaUa3rGgXbpqT7MEBZDK8lCdxo/i9ATbjbD6eSmQNqMpWCE -XfeWtJ0pa9zLEPJfzUDQ+XfJlGUkhjtiB59+/cP11gOmwRFyANr4lRvhX5hFU1sj -X9HyFfr7RPSEnZNTRjIhtFRJQvWhkZzoZOzMnJPLzzMmJkU50hVsuutiRjsRZvlZ -r+Q6yy23fOJltACl7wu8HL1BYFsMZTzMmsPABXjF20rSYMS1zqaXP/0yEuwUcmRJ -EB9bE4ximGDUD55AI5t9v9M+N3wVCx7FWifhHdOLjr2fQ/aVURbAbXG+SGfSPcgq -LSPafIb5H2N26gk7/Op/FdKb/kZ9KsHt0e63znXhvUsCLScQhrrTbR3Y2zhaZxKd -EjghEbQcdMnVLzS5i/ZlhonjeOohRCeUqWFBTf2nrn/dwFPUEaG9aheroC3h6CNS -P/x1d+kuGTu1nCmo1qyYEswpFhshdWaDphc/DF7X5glI49zT98la3FcViXIJI1NR -+oWLc4T22ObxKiuZadtxFs+fxeDnWKE5K37e5/tAELKDlr/EsmK1lDHr04jThLKh -4jALrrOHx9ELnhV2VQUAR9ZdbEd9jLY0d2LWvE8ZdvlpIXBxkUQ= -=3RjN +klAYfQ/+OORrhaCeew6AHMTI6JedDh1PU9GyUImC7rN1cUyze4keLTTj7PjtwYhA +tdADi7qq9lVBlGdibw3zziyg6pZO6yBOCpBx7nRF6djTCh1PLutgv6YNywKEHNBn +Re8whp1RlIHNLnnWYHrRbz5R1LmdKDXXy97j7JK/JnyAYT1z88DVkGA8aaZlb1Gw +lhVrGeXoY38ak652IYpoCOpMY8klKRd5D2M6G7mccIFHHrPiqtVa+vqrPG1GNulS +z08BF8/xrIG+4UQggWNOHEQvNF826oDwVFQtvSengpH2Sb7oEKzOdD8kCXxlCyQ5 +Tx4+Ig1KQosSdXga91F0z7fdIqtZu8gwa9D1b1f56slQdoMY8oJD1TU0wVCEqwhj +fqU4zimrtssezq7g1JAxXxuBoBkAj5+7Fb6HNptnWZxOBjOnqdsx2EcYmbcbC4By +xcfMpO/pTwYOn1w6OgZrJCuhafnvINOFzjl6+OqgtN294TeFKHXXdUB80ZMsib6r +70gaBqjdgf5Q8GXC8Ry0tiHVCrzxOgL8YX/TluA3sbYlIFn7hy8atNmj0Hg+SDxX +VCphysLRF6YNr74XcWJKPhr4M4YgCxRUwUL/hsb7U6/R2BriPyml9E0yiRCJ9bPC +dKFEQ8OzRQ/4cupRgQGorqrv+ilHmwwh10JKh44yrAS7J6da+4w= +=aTpw -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 0e491fc1977..3b2eab36a09 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-01.xml new file mode 100644 index 00000000000..34f747f52bc --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-01.xml @@ -0,0 +1,42 @@ + + + + Portage: Unverified PGP Signatures + A vulnerability has been discovered in Portage, where PGP signatures would not be verified. + portage + 2024-09-22 + 2024-09-22 + 905356 + local + + + 3.0.47 + 3.0.47 + + + +

Portage is the default Gentoo package management system.

+
+ +

Multiple vulnerabilities have been discovered in Portage. Please review the CVE identifiers referenced below for details.

+
+ +

When using the webrsync mechanism to sync the tree the PGP signatures that protect the integrity of the data in the tree would not be verified. This would allow a man-in-the-middle attack to inject arbitrary content into the tree.

+
+ +

There is no known workaround at this time.

+
+ +

All Portage users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/portage-3.0.47" + +
+ + CVE-2016-20021 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-02.xml new file mode 100644 index 00000000000..03de057fcfd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-02.xml @@ -0,0 +1,54 @@ + + + + PostgreSQL: Privilege Escalation + A vulnerability has been discovered in PostgreSQL, which can lead to privilege escalation. + postgresql + 2024-09-22 + 2024-09-22 + 937573 + local and remote + + + 12.20 + 13.16 + 14.13 + 15.8 + 16.4 + 12.20 + 13.16 + 14.13 + 15.8 + 16.4 + + + +

PostgreSQL is an open source object-relational database management system.

+
+ +

A vulnerability has been discovered in PostgreSQL. Please review the CVE identifier referenced below for details.

+
+ +

An attacker able to create and drop non-temporary objects could inject SQL code that would be executed by a concurrent pg_dump session with the privileges of the role running pg_dump (which is often a superuser). The attack involves replacing a sequence or similar object with a view or foreign table that will execute malicious code. To prevent this, introduce a new server parameter restrict_nonsystem_relation_kind that can disable expansion of non-builtin views as well as access to foreign tables, and teach pg_dump to set it when available. Note that the attack is prevented only if both pg_dump and the server it is dumping from are new enough to have this fix.

+
+ +

There is no known workaround at this time.

+
+ +

All PostgreSQL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-12.20:12" + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-13.16:13" + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-14.13:14" + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-15.8:15" + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-16.4:16" + +
+ + CVE-2024-7348 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-03.xml new file mode 100644 index 00000000000..b7b8bb6e36e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-03.xml @@ -0,0 +1,46 @@ + + + + GPL Ghostscript: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in GPL Ghostscript, the worst of which could lead to arbitrary code execution. + ghostscript-gpl + 2024-09-22 + 2024-09-22 + 932125 + remote + + + 10.03.1 + 10.03.1 + + + +

Ghostscript is an interpreter for the PostScript language and for PDF.

+
+ +

Multiple vulnerabilities have been discovered in GPL Ghostscript. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All GPL Ghostscript users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/ghostscript-gpl-10.03.1" + +
+ + CVE-2023-52722 + CVE-2024-29510 + CVE-2024-33869 + CVE-2024-33870 + CVE-2024-33871 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-04.xml new file mode 100644 index 00000000000..8751d3df645 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-04.xml @@ -0,0 +1,47 @@ + + + + calibre: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in calibre, the worst of which could lead to remote code execution. + calibre + 2024-09-22 + 2024-09-22 + 918429 + 936961 + local and remote + + + 7.16.0 + 7.16.0 + + + +

calibre is a powerful and easy to use e-book manager.

+
+ +

Multiple vulnerabilities have been discovered in calibre. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All calibre users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/calibre-7.16.0" + +
+ + CVE-2023-46303 + CVE-2024-6781 + CVE-2024-6782 + CVE-2024-7008 + CVE-2024-7009 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-05.xml new file mode 100644 index 00000000000..866c0e2164c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-05.xml @@ -0,0 +1,42 @@ + + + + PJSIP: Heap Buffer Overflow + A vulnerability has been discovered in PJSIP, which could lead to arbitrary code execution. + pjproject + 2024-09-22 + 2024-09-22 + 917463 + local and remote + + + 2.13.1 + 2.13.1 + + + +

PJSIP is a free and open source multimedia communication library written in C language implementing standard based protocols such as SIP, SDP, RTP, STUN, TURN, and ICE.

+
+ +

Please review the CVE identifier referenced below for details.

+
+ +

Please review the CVE identifier referenced below for details.

+
+ +

There is no known workaround at this time.

+
+ +

All PJSIP users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/pjproject-2.13.1" + +
+ + CVE-2023-27585 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-06.xml new file mode 100644 index 00000000000..2657dc655f9 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-06.xml @@ -0,0 +1,42 @@ + + + + file: Stack Buffer Overread + A vulnerability has been discovered in file, which could lead to a denial of service. + file + 2024-09-22 + 2024-09-22 + 918554 + remote + + + 5.42 + 5.42 + + + +

The file utility attempts to identify a file’s format by scanning binary data for patterns.

+
+ +

Multiple vulnerabilities have been discovered in file. Please review the CVE identifiers referenced below for details.

+
+ +

File has an stack-based buffer over-read in file_copystr in funcs.c.

+
+ +

There is no known workaround at this time.

+
+ +

All file users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/file-5.42" + +
+ + CVE-2022-48554 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-07.xml new file mode 100644 index 00000000000..da0b0bd2f78 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-07.xml @@ -0,0 +1,55 @@ + + + + Rust: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Rust, the worst of which could lead to arbitrary code execution. + rust,rust-bin + 2024-09-22 + 2024-09-22 + 890371 + 911685 + remote + + + 1.71.1 + 1.71.1 + + + 1.71.1 + 1.71.1 + + + +

A systems programming language that runs blazingly fast, prevents segfaults, and guarantees thread safety.

+
+ +

Multiple vulnerabilities have been discovered in Rust. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Rust binary users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/rust-bin-1.71.1" + + +

All Rust users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/rust-1.71.1" + +
+ + CVE-2022-46176 + CVE-2023-38497 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-08.xml new file mode 100644 index 00000000000..9057b54f01e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-08.xml @@ -0,0 +1,45 @@ + + + + OpenVPN: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenVPN, the worst of which could lead to information disclosure. + openvpn + 2024-09-22 + 2024-09-22 + 835514 + 917272 + remote + + + 2.6.7 + 2.6.7 + + + +

OpenVPN is a multi-platform, full-featured SSL VPN solution.

+
+ +

Multiple vulnerabilities have been discovered in OpenVPN. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenVPN users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-vpn/openvpn-2.6.7" + +
+ + CVE-2022-0547 + CVE-2023-46849 + CVE-2023-46850 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-09.xml new file mode 100644 index 00000000000..3fbc0d2ad49 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-09.xml @@ -0,0 +1,42 @@ + + + + Exo: Arbitrary Code Execution + A vulnerability has been discovered in Exo, which can lead to arbitrary code execution. + exo + 2024-09-22 + 2024-09-22 + 851201 + remote + + + 4.17.2 + 4.17.2 + + + +

Exo is an Xfce library targeted at application development, originally developed by os-cillation. It contains various custom widgets and APIs extending the functionality of GLib and GTK. It also has some helper applications that are used throughout the entire Xfce desktop to manage preferred applications and edit .desktop files.

+
+ +

A vulnerability has been discovered in Exo. Please review the CVE identifiers referenced below for details.

+
+ +

Exo executes remote desktop files which may lead to unexpected arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All Exo users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=xfce-base/exo-4.17.2" + +
+ + CVE-2022-32278 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-10.xml new file mode 100644 index 00000000000..0ed4d14222b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-10.xml @@ -0,0 +1,83 @@ + + + + Xen: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Xen, the worst of which could lead to privilege escalation. + xen + 2024-09-22 + 2024-09-22 + 918669 + 921355 + 923741 + 928620 + 929038 + remote + + + 4.17.4 + 4.17.4 + + + +

Xen is a bare-metal hypervisor.

+
+ +

Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Xen users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.17.4" + +
+ + CVE-2022-4949 + CVE-2022-42336 + CVE-2023-28746 + CVE-2023-34319 + CVE-2023-34320 + CVE-2023-34321 + CVE-2023-34322 + CVE-2023-34323 + CVE-2023-34324 + CVE-2023-34325 + CVE-2023-34327 + CVE-2023-34328 + CVE-2023-46835 + CVE-2023-46836 + CVE-2023-46837 + CVE-2023-46839 + CVE-2023-46840 + CVE-2023-46841 + CVE-2023-46842 + CVE-2024-2193 + CVE-2024-31142 + XSA-431 + XSA-432 + XSA-436 + XSA-437 + XSA-438 + XSA-439 + XSA-440 + XSA-441 + XSA-442 + XSA-447 + XSA-449 + XSA-450 + XSA-451 + XSA-452 + XSA-453 + XSA-454 + XSA-455 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-11.xml new file mode 100644 index 00000000000..af31b005f8d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-11.xml @@ -0,0 +1,44 @@ + + + + Oracle VirtualBox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Oracle VirtualBox, the worst of which could lead to privilege escalation. + virtualbox + 2024-09-22 + 2024-09-22 + 918524 + remote + + + 7.0.12 + 7.0.12 + + + +

VirtualBox is a powerful virtualization product from Oracle.

+
+ +

Multiple vulnerabilities have been discovered in Oracle VirtualBox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Oracle VirtualBox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/virtualbox-7.0.12" + +
+ + CVE-2023-22098 + CVE-2023-22099 + CVE-2023-22100 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-12.xml new file mode 100644 index 00000000000..2eb42e1d866 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-12.xml @@ -0,0 +1,65 @@ + + + + pypy, pypy3: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in pypy and pypy3, the worst of which could lead to arbitrary code execution. + pypy,pypy-exe,pypy-exe-bin,pypy3 + 2024-09-22 + 2024-09-22 + 741496 + 741560 + 774114 + 782520 + local + + + 7.3.3_p37_p1-r1 + 7.3.3_p37_p1-r1 + + + 7.3.2 + 7.3.2 + + + 7.3.2 + + + 7.3.3_p37_p1-r1 + 7.3.3_p37_p1-r1 + + + +

A fast, compliant alternative implementation of the Python language.

+
+ +

Multiple vulnerabilities have been discovered in pypy. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All pypy users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/pypy-7.3.3_p37_p1-r1" + # emerge --ask --oneshot --verbose ">=dev-python/pypy-exe-7.3.2" + # emerge --ask --oneshot --verbose ">=dev-python/pypy-exe-bin-7.3.2" + + +

All pypy3 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/pypy3-7.3.3_p37_p1-r1" + +
+ + CVE-2020-27619 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-13.xml new file mode 100644 index 00000000000..75d6b45d312 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-13.xml @@ -0,0 +1,48 @@ + + + + gst-plugins-good: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in gst-plugins-good, the worst of which could lead to denial of service or arbitrary code execution. + gst-plugins-good + 2024-09-22 + 2024-09-22 + 859418 + local and remote + + + 1.20.3 + 1.20.3 + + + +

gst-plugins-good contains a set of plugins for the GStreamer open source multimedia framework.

+
+ +

Multiple vulnerabilities have been discovered in gst-plugins-good. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All gst-plugins-good users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/gst-plugins-good-1.20.3" + +
+ + CVE-2022-1920 + CVE-2022-1921 + CVE-2022-1922 + CVE-2022-1923 + CVE-2022-1924 + CVE-2022-1925 + CVE-2022-2122 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-14.xml new file mode 100644 index 00000000000..3b6f53f12f0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-14.xml @@ -0,0 +1,48 @@ + + + + Mbed TLS: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mbed TLS, the worst of which could lead to information disclosure or denial of service. + mbedtls + 2024-09-22 + 2024-09-22 + 886001 + 923279 + local and remote + + + 2.28.7 + 2.28.7 + + + +

Mbed TLS (previously PolarSSL) is an “easy to understand, use, integrate and expand” implementation of the TLS and SSL protocols and the respective cryptographic algorithms and support code required.

+
+ +

Multiple vulnerabilities have been discovered in Mbed TLS. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mbed TLS users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/mbedtls-2.28.7" + +
+ + CVE-2022-46392 + CVE-2022-46393 + CVE-2023-43615 + CVE-2023-45199 + CVE-2024-23170 + CVE-2024-23775 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-15.xml new file mode 100644 index 00000000000..343078a82dd --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-15.xml @@ -0,0 +1,54 @@ + + + + stb: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in stb, the worst of which lead to a denial of service. + stb + 2024-09-22 + 2024-09-22 + 818556 + local + + + 20240201 + 20240201 + + + +

A set of single-file public domain (or MIT licensed) libraries for C/C++

+
+ +

Multiple vulnerabilities have been discovered in stb. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All stb users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/stb-20240201" + + +

Note that stb is included at compile time, so all packages that depend on it should also be reinstalled. If you have app-portage/gentoolkit installed you can use:

+ + + # emerge --ask --verbose $( equery depends dev-libs/stb | sed 's/^/=/' ) + +
+ + CVE-2021-28021 + CVE-2021-37789 + CVE-2021-42715 + CVE-2021-42716 + CVE-2022-28041 + CVE-2022-28042 + CVE-2022-28048 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-16.xml new file mode 100644 index 00000000000..45eee08d99b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-16.xml @@ -0,0 +1,47 @@ + + + + Slurm: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Slurm, the worst of which could result in privilege escalation or code execution. + slurm + 2024-09-22 + 2024-09-22 + 631552 + 920104 + remote + + + 22.05.3 + + + +

Slurm is a highly scalable resource manager.

+
+ +

Multiple vulnerabilities have been discovered in Slurm. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for Slurm. We recommend that users unmerge it:

+ + + # emerge --ask --depclean "sys-cluster/slurm" + +
+ + CVE-2020-36770 + CVE-2023-49933 + CVE-2023-49934 + CVE-2023-49935 + CVE-2023-49936 + CVE-2023-49937 + CVE-2023-49938 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-17.xml new file mode 100644 index 00000000000..a675f311b11 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-17.xml @@ -0,0 +1,44 @@ + + + + VLC: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in VLC, the worst of which could result in arbitrary code execution. + vlc + 2024-09-22 + 2024-09-22 + 788226 + 883943 + 917274 + remote + + + 3.0.20 + 3.0.20 + + + +

VLC is a cross-platform media player and streaming server.

+
+ +

Multiple vulnerabilities have been discovered in VLC. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All VLC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/vlc-3.0.20" + +
+ + CVE-2022-41325 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-18.xml new file mode 100644 index 00000000000..6345445d100 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-18.xml @@ -0,0 +1,44 @@ + + + + liblouis: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in liblouis, the worst of which could result in denial of service. + liblouis + 2024-09-22 + 2024-09-22 + 905298 + remote + + + 3.25.0 + 3.25.0 + + + +

liblouis is an open-source braille translator and back-translator.

+
+ +

Multiple vulnerabilities have been discovered in liblouis. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All liblouis users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/liblouis-3.25.0" + +
+ + CVE-2023-26767 + CVE-2023-26768 + CVE-2023-26769 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-19.xml new file mode 100644 index 00000000000..9fb9874f912 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-19.xml @@ -0,0 +1,72 @@ + + + + Emacs, org-mode: Command Execution Vulnerability + A vulnerability has been found in Emacs and org-mode which could result in arbitrary code execution. + emacs,org-mode + 2024-09-22 + 2024-09-22 + 934736 + local + + + 26.3-r19 + 27.2-r17 + 28.2-r13 + 29.3-r3 + 26.3-r19 + 27.2-r17 + 28.2-r13 + 29.3-r3 + + + 9.7.5 + 9.7.5 + + + +

Emacs is the extensible, customizable, self-documenting real-time display editor. org-mode is an Emacs mode for notes and project planning.

+
+ +

%(...) link abbreviations could specify unsafe functions.

+
+ +

Opening a malicious org-mode file could result in arbitrary code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All Emacs users should upgrade to the latest version according to the installed slot, one of:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-editors/emacs-26.3-r19:26" + + +

Alternatively:

+ + + # emerge --ask --oneshot --verbose ">=app-editors/emacs-27.2-r17:27" + + + + # emerge --ask --oneshot --verbose ">=app-editors/emacs-28.2-r13:28" + + + + # emerge --ask --oneshot --verbose ">=app-editors/emacs-29.3-r3:29" + + +

All org-mode users should upgrade to the latest package:

+ + + # emerge --ask --oneshot --verbose ">=app-emacs/org-mode-9.7.5" + +
+ + CVE-2024-39331 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-20.xml new file mode 100644 index 00000000000..0f55e4837a0 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-20.xml @@ -0,0 +1,51 @@ + + + + curl: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in curl, the worst of which could lead to information disclosure. + curl + 2024-09-23 + 2024-09-23 + 919325 + 919889 + 923413 + 927960 + remote + + + 8.7.1 + 8.7.1 + + + +

A command line tool and library for transferring data with URLs.

+
+ +

Multiple vulnerabilities have been discovered in curl. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All curl users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/curl-8.7.1" + +
+ + CVE-2023-42619 + CVE-2023-46218 + CVE-2023-46219 + CVE-2024-0853 + CVE-2024-2004 + CVE-2024-2398 + CVE-2024-2466 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-21.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-21.xml new file mode 100644 index 00000000000..8f68a53102c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-21.xml @@ -0,0 +1,41 @@ + + + + Hunspell: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Hunspell, the worst of which could lead to arbitrary code execution. + hunspell + 2024-09-24 + 2024-09-24 + 866093 + local + + + 1.7.1 + 1.7.1 + + + +

Hunspell is the spell checker of LibreOffice, OpenOffice.org, Mozilla Firefox & Thunderbird, Google Chrome.

+
+ +

Malicious input to the hunspell spell checker could result in an application crash or other unspecified behavior.

+
+ +

Malicious input to the hunspell spell checker could result in an application crash or other unspecified behavior.

+
+ +

There is no known workaround at this time.

+
+ +

All Hunspell users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/hunspell-1.7.1" + +
+ + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-22.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-22.xml new file mode 100644 index 00000000000..2e5cb0cf13c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-22.xml @@ -0,0 +1,54 @@ + + + + GCC: Flawed Code Generation + A vulnerability has been discovered in GCC, which can lead to flawed code generation. + gcc + 2024-09-24 + 2024-09-24 + 719466 + remote + + + 10.0 + 10.0 + + + +

The GNU Compiler Collection includes front ends for C, C++, Objective-C, Fortran, Ada, Go, D and Modula-2 as well as libraries for these languages (libstdc++,...).

+
+ +

A vulnerability has been discovered in GCC. Please review the CVE identifier referenced below for details.

+
+ +

The POWER9 backend in GNU Compiler Collection (GCC) could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile operation was not specified. For example, within a single execution of a program, the output of every __builtin_darn() call may be the same.

+
+ +

There is no known workaround at this time.

+
+ +

All GCC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-devel/gcc-10.0" + + +

And then select it with gcc-config:

+ + + # gcc-config latest + + +

In this case, users should also rebuild all affected packages with emerge -e, e.g.:

+ + + # emerge --usepkg=n --emptytree @world + +
+ + CVE-2019-15847 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-23.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-23.xml new file mode 100644 index 00000000000..7a887839a10 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-23.xml @@ -0,0 +1,42 @@ + + + + ZNC: Remote Code Execution + A vulnerability has been found in ZNC which could result in remote code execution. + znc + 2024-09-24 + 2024-09-24 + 935422 + remote + + + 1.9.1 + 1.9.1 + + + +

ZNC is an advanced IRC bouncer.

+
+ +

ZNC's modtcl could allow for remote code execution via a KICK.

+
+ +

A vulnerable ZNC with the modtcl module loaded could be exploited for remote code execution.

+
+ +

Unload the mod_tcl module.

+
+ +

All ZNC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-irc/znc-1.9.1" + +
+ + CVE-2024-39844 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-24.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-24.xml new file mode 100644 index 00000000000..fd5092cd5d1 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-24.xml @@ -0,0 +1,44 @@ + + + + Tor: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Tor, the worst of which could result in denial of service. + tor + 2024-09-24 + 2024-09-24 + 916759 + 917142 + remote + + + 0.4.8.9 + 0.4.8.9 + + + +

Tor is an implementation of second generation Onion Routing, a connection-oriented anonymizing communication service.

+
+ +

Multiple vulnerabilities have been discovered in Tor. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Tor users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-vpn/tor-0.4.8.9" + +
+ + TROVE-2023-004 + TROVE-2023-006 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-25.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-25.xml new file mode 100644 index 00000000000..c9ff68aa974 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-25.xml @@ -0,0 +1,64 @@ + + + + Xpdf: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Xpdf, the worst of which could result in denial of service. + xpdf + 2024-09-25 + 2024-09-25 + 845027 + 908037 + 936407 + remote + + + 4.05 + 4.05 + + + +

Xpdf is an X viewer for PDF files.

+
+ +

Multiple vulnerabilities have been discovered in Xpdf. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Xpdf users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/xpdf-4.05" + +
+ + CVE-2018-7453 + CVE-2018-16369 + CVE-2022-30524 + CVE-2022-30775 + CVE-2022-33108 + CVE-2022-36561 + CVE-2022-38222 + CVE-2022-38334 + CVE-2022-38928 + CVE-2022-41842 + CVE-2022-41843 + CVE-2022-41844 + CVE-2022-43071 + CVE-2022-43295 + CVE-2022-45586 + CVE-2022-45587 + CVE-2023-2662 + CVE-2023-2663 + CVE-2023-2664 + CVE-2023-3044 + CVE-2023-3436 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-26.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-26.xml new file mode 100644 index 00000000000..c06fb1aaa20 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-26.xml @@ -0,0 +1,88 @@ + + + + IcedTea: Multiple Vulnerabilities + Multiple vulnerabilities have been found in IcedTea, the worst of which could result in arbitrary code execution. + icedtea,icedtea-bin + 2024-09-28 + 2024-09-28 + 732628 + 803608 + 877599 + local + + + 3.21.0 + + + 3.16.0-r2 + + + +

IcedTea’s aim is to provide OpenJDK in a form suitable for easy configuration, compilation and distribution with the primary goal of allowing inclusion in GNU/Linux distributions.

+
+ +

Multiple vulnerabilities have been discovered in IcedTea. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

Gentoo has discontinued support for IcedTea. We recommend that users unmerge it:

+ + + # emerge --sync + # emerge --ask --depclean "dev-java/icedtea" "dev-java/icedtea-bin" + +
+ + CVE-2020-14556 + CVE-2020-14562 + CVE-2020-14573 + CVE-2020-14577 + CVE-2020-14578 + CVE-2020-14579 + CVE-2020-14581 + CVE-2020-14583 + CVE-2020-14593 + CVE-2020-14621 + CVE-2020-14664 + CVE-2020-14779 + CVE-2020-14781 + CVE-2020-14782 + CVE-2020-14792 + CVE-2020-14796 + CVE-2020-14797 + CVE-2020-14798 + CVE-2020-14803 + CVE-2021-2341 + CVE-2021-2369 + CVE-2021-2388 + CVE-2021-2432 + CVE-2021-35550 + CVE-2021-35556 + CVE-2021-35559 + CVE-2021-35561 + CVE-2021-35564 + CVE-2021-35565 + CVE-2021-35567 + CVE-2021-35578 + CVE-2021-35586 + CVE-2021-35588 + CVE-2021-35603 + CVE-2022-21618 + CVE-2022-21619 + CVE-2022-21624 + CVE-2022-21626 + CVE-2022-21628 + CVE-2022-39399 + CVE-2023-21830 + CVE-2023-21835 + CVE-2023-21843 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-27.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-27.xml new file mode 100644 index 00000000000..829708a7722 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-27.xml @@ -0,0 +1,42 @@ + + + + tmux: Null Pointer Dereference + A vulnerability has been found in tmux which could result in application crash. + tmux + 2024-09-28 + 2024-09-28 + 891783 + remote + + + 3.4 + 3.4 + + + +

tmux is a terminal multiplexer.

+
+ +

A null pointer dereference issue was discovered in function window_pane_set_event in window.c in which allows attackers to cause denial of service or other unspecified impacts.

+
+ +

Manipulating tmux window state could result in a null pointer dereference.

+
+ +

There is no known workaround at this time.

+
+ +

All tmux users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-misc/tmux-3.4" + +
+ + CVE-2022-47016 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-28.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-28.xml new file mode 100644 index 00000000000..014f558570e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-28.xml @@ -0,0 +1,42 @@ + + + + HashiCorp Consul: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in HashiCorp Consul, the worst of which could result in denial of service. + consul + 2024-09-28 + 2024-09-28 + 885997 + remote + + + 1.15.10 + 1.15.10 + + + +

HashiCorp Consul is a tool for service discovery, monitoring and configuration.

+
+ +

Multiple vulnerabilities have been found in HashiCorp Consul. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the CVE identifiers referenced below for details.

+
+ +

There is no known workaround at this time.

+
+ +

All HashiCorp Consul users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/consul-1.15.10" + +
+ + CVE-2022-41717 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-29.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-29.xml new file mode 100644 index 00000000000..6450cffbf69 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-29.xml @@ -0,0 +1,60 @@ + + + + Docker: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Docker, the worst of which could result in denial of service. + docker + 2024-09-28 + 2024-09-28 + 816273 + 869407 + 877653 + 886509 + 903804 + 905336 + 925022 + remote + + + 25.0.4 + 25.0.4 + + + +

Docker contains the the core functions you need to create Docker images and run Docker containers

+
+ +

Multiple vulnerabilities have been discovered in Docker. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Docker users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/docker-25.0.4" + +
+ + CVE-2021-41089 + CVE-2021-41091 + CVE-2022-36109 + CVE-2022-41717 + CVE-2023-26054 + CVE-2023-28840 + CVE-2023-28841 + CVE-2023-28842 + CVE-2024-23650 + CVE-2024-23651 + CVE-2024-23652 + CVE-2024-23653 + CVE-2024-24557 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-30.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-30.xml new file mode 100644 index 00000000000..3f0096074d6 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-30.xml @@ -0,0 +1,46 @@ + + + + yt-dlp: Multiple Vulnerabilities + Multiple vulnerabilities have been found in yt-dlp, the worst of which could result in arbitrary code execution. + yt-dlp + 2024-09-28 + 2024-09-28 + 909780 + 917355 + 935316 + remote + + + 2024.07.01 + 2024.07.01 + + + +

yt-dlp is a youtube-dl fork with additional features and fixes.

+
+ +

Multiple vulnerabilities have been found in yt-dlp. Please review the referenced CVE identifiers for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All yt-dlp users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/yt-dlp-2024.07.01" + +
+ + CVE-2023-35934 + CVE-2023-46121 + CVE-2024-38519 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-31.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-31.xml new file mode 100644 index 00000000000..cf98ba3e87e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-31.xml @@ -0,0 +1,58 @@ + + + + Apache HTTPD: Multiple Vulnerabilities + Multiple vulnerabilities have been found in Apache HTTPD, the worst of which could result in denial of service. + apache + 2024-09-28 + 2024-09-28 + 928540 + 935296 + 935427 + 936257 + remote + + + 2.4.62 + 2.4.62 + + + +

The Apache HTTP server is one of the most popular web servers on the Internet.

+
+ +

Multiple vulnerabilities have been discovered in Apache HTTPD. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Apache HTTPD users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/apache-2.4.62" + +
+ + CVE-2023-38709 + CVE-2024-24795 + CVE-2024-27316 + CVE-2024-36387 + CVE-2024-38472 + CVE-2024-38473 + CVE-2024-38474 + CVE-2024-38475 + CVE-2024-38476 + CVE-2024-38477 + CVE-2024-39573 + CVE-2024-39884 + CVE-2024-40725 + CVE-2024-40898 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-32.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-32.xml new file mode 100644 index 00000000000..d9784c35e64 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202409-32.xml @@ -0,0 +1,45 @@ + + + + nginx: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in nginx, the worst of which could result in denial of service. + nginx + 2024-09-28 + 2024-09-28 + 924619 + 937938 + remote + + + 1.26.2-r2 + 1.26.2-r2 + + + +

nginx is a robust, small, and high performance HTTP and reverse proxy server.

+
+ +

Multiple vulnerabilities have been discovered in nginx. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All nginx users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-servers/nginx-1.26.2-r2" + +
+ + CVE-2024-7347 + CVE-2024-24989 + CVE-2024-24990 + + ajak + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index aab3a197386..6dcd480332f 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Sun, 01 Sep 2024 06:40:32 +0000 +Tue, 01 Oct 2024 06:40:39 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 295e40287b6..7474dc84acd 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -7bcc5ebd7295c3c12ac47de41519dc019b4ba538 1723530188 2024-08-13T06:23:08Z +93155fde00088b123d8b46acf068ecadcf7bcfdb 1727512056 2024-09-28T08:27:36Z