diff options
author | Repository mirror & CI <repomirrorci@gentoo.org> | 2024-12-11 12:06:20 +0000 |
---|---|---|
committer | Repository mirror & CI <repomirrorci@gentoo.org> | 2024-12-11 12:06:20 +0000 |
commit | d651a11a4ce8b07f4521063f11958121c2354a5f (patch) | |
tree | ceba0390eac278caac0275a62a63cca2698d664d | |
parent | Merge updates from master (diff) | |
parent | [ GLSA 202412-19 ] eza: Arbitrary Code Execution (diff) | |
download | gentoo-d651a11a4ce8b07f4521063f11958121c2354a5f.tar.gz gentoo-d651a11a4ce8b07f4521063f11958121c2354a5f.tar.bz2 gentoo-d651a11a4ce8b07f4521063f11958121c2354a5f.zip |
Merge commit '874165db3d0e140c9165e4612647b37bfd94cb80'
-rw-r--r-- | metadata/glsa/glsa-202412-18.xml | 42 | ||||
-rw-r--r-- | metadata/glsa/glsa-202412-19.xml | 42 |
2 files changed, 84 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-202412-18.xml b/metadata/glsa/glsa-202412-18.xml new file mode 100644 index 000000000000..6d486fe48840 --- /dev/null +++ b/metadata/glsa/glsa-202412-18.xml @@ -0,0 +1,42 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202412-18"> + <title>Distrobox: Arbitrary Code Execution</title> + <synopsis>A vulnerability has been discovered in Distrobox, which can lead to arbitrary code execution.</synopsis> + <product type="ebuild">distrobox</product> + <announced>2024-12-11</announced> + <revised count="1">2024-12-11</revised> + <bug>927742</bug> + <access>local</access> + <affected> + <package name="app-containers/distrobox" auto="yes" arch="*"> + <unaffected range="ge">1.7.0.1</unaffected> + <vulnerable range="lt">1.7.0.1</vulnerable> + </package> + </affected> + <background> + <p>Use any Linux distribution inside your terminal. Enable both backward and forward compatibility with software and freedom to use whatever distribution you’re more comfortable with. Distrobox uses podman, docker or lilipod to create containers using the Linux distribution of your choice. The created container will be tightly integrated with the host, allowing sharing of the HOME directory of the user, external storage, external USB devices and graphical apps (X11/Wayland), and audio.</p> + </background> + <description> + <p>A vulnerability has been discovered in Distrobox. Please review the CVE identifier referenced below for details.</p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifier for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Distrobox users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/distrobox-1.7.0.1" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-29864">CVE-2024-29864</uri> + </references> + <metadata tag="requester" timestamp="2024-12-11T11:59:52.896177Z">graaff</metadata> + <metadata tag="submitter" timestamp="2024-12-11T11:59:52.901538Z">graaff</metadata> +</glsa>
\ No newline at end of file diff --git a/metadata/glsa/glsa-202412-19.xml b/metadata/glsa/glsa-202412-19.xml new file mode 100644 index 000000000000..e00b2b93e210 --- /dev/null +++ b/metadata/glsa/glsa-202412-19.xml @@ -0,0 +1,42 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202412-19"> + <title>eza: Arbitrary Code Execution</title> + <synopsis>A vulnerability has been discovered in eza, which can lead to arbitrary code execution.</synopsis> + <product type="ebuild">eza</product> + <announced>2024-12-11</announced> + <revised count="1">2024-12-11</revised> + <bug>926532</bug> + <access>local</access> + <affected> + <package name="sys-apps/eza" auto="yes" arch="*"> + <unaffected range="ge">0.18.6</unaffected> + <vulnerable range="lt">0.18.6</vulnerable> + </package> + </affected> + <background> + <p>eza is a modern, maintained replacement for ls, written in rust.</p> + </background> + <description> + <p>A vulnerability has been discovered in eza. Please review the CVE identifier referenced below for details.</p> + </description> + <impact type="normal"> + <p>A buffer overflow vulnerability in eza allows local attackers to execute arbitrary code via the .git/HEAD, .git/refs, and .git/objects components.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All eza users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/eza-0.18.6" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-25817">CVE-2024-25817</uri> + </references> + <metadata tag="requester" timestamp="2024-12-11T12:01:47.731410Z">graaff</metadata> + <metadata tag="submitter" timestamp="2024-12-11T12:01:47.734155Z">graaff</metadata> +</glsa>
\ No newline at end of file |