diff options
author | Repository mirror & CI <repomirrorci@gentoo.org> | 2021-07-20 04:21:56 +0000 |
---|---|---|
committer | Repository mirror & CI <repomirrorci@gentoo.org> | 2021-07-20 04:21:56 +0000 |
commit | 5ce27249ea4001a62d38154b0c7e1897b60513f7 (patch) | |
tree | c9939e6873cd326460c603ef65ce36a25b850fe7 /metadata/glsa | |
parent | 2021-07-20 03:36:30 UTC (diff) | |
parent | [ GLSA 202107-47 ] libpano13: Format string vulnerability (diff) | |
download | gentoo-5ce27249ea4001a62d38154b0c7e1897b60513f7.tar.gz gentoo-5ce27249ea4001a62d38154b0c7e1897b60513f7.tar.bz2 gentoo-5ce27249ea4001a62d38154b0c7e1897b60513f7.zip |
Merge commit '70f6b22fdc35c66bbf40629b009ef83024d2d2d1'
Diffstat (limited to 'metadata/glsa')
-rw-r--r-- | metadata/glsa/glsa-202107-42.xml | 50 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-43.xml | 52 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-44.xml | 51 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-45.xml | 61 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-46.xml | 48 | ||||
-rw-r--r-- | metadata/glsa/glsa-202107-47.xml | 49 |
6 files changed, 311 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-202107-42.xml b/metadata/glsa/glsa-202107-42.xml new file mode 100644 index 000000000000..8b6fc8a9b409 --- /dev/null +++ b/metadata/glsa/glsa-202107-42.xml @@ -0,0 +1,50 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-42"> + <title>PJSIP: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in PJSIP, the worst of + which could result in a Denial of Service condition. + </synopsis> + <product type="ebuild">pjproject</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>775359</bug> + <access>remote</access> + <affected> + <package name="net-libs/pjproject" auto="yes" arch="*"> + <unaffected range="ge">2.10-r1</unaffected> + <vulnerable range="lt">2.10-r1</vulnerable> + </package> + </affected> + <background> + <p>PJSIP is a free and open source multimedia communication library written + in C language implementing standard based protocols such as SIP, SDP, + RTP, STUN, TURN, and ICE. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in PJSIP. Please review + the CVE identifiers referenced below for details. + </p> + </description> + <impact type="low"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All PJSIP users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/pjproject-2.10-r1" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15260">CVE-2020-15260</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-21375">CVE-2021-21375</uri> + </references> + <metadata tag="requester" timestamp="2021-07-16T02:16:25Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T03:48:47Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-43.xml b/metadata/glsa/glsa-202107-43.xml new file mode 100644 index 000000000000..aa7e48b71929 --- /dev/null +++ b/metadata/glsa/glsa-202107-43.xml @@ -0,0 +1,52 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-43"> + <title>RPM: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in RPM, the worst of which + could result in remote code execution. + </synopsis> + <product type="ebuild">rpm</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>778533</bug> + <bug>787944</bug> + <access>remote</access> + <affected> + <package name="app-arch/rpm" auto="yes" arch="*"> + <unaffected range="ge">4.16.1.3</unaffected> + <vulnerable range="lt">4.16.1.3</vulnerable> + </package> + </affected> + <background> + <p>The Red Hat Package Manager (RPM) is a command line driven package + management system capable of installing, uninstalling, verifying, + querying, and updating computer software packages. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in RPM. Please review the + CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All RPM users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-arch/rpm-4.16.1.3" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-20266">CVE-2021-20266</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3421">CVE-2021-3421</uri> + </references> + <metadata tag="requester" timestamp="2021-07-16T01:57:38Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T04:06:54Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-44.xml b/metadata/glsa/glsa-202107-44.xml new file mode 100644 index 000000000000..30a974dc968c --- /dev/null +++ b/metadata/glsa/glsa-202107-44.xml @@ -0,0 +1,51 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-44"> + <title>libslirp: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in libslirp, the worst of + which could result in a Denial of Service condition. + </synopsis> + <product type="ebuild">libslirp</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>796347</bug> + <access>local</access> + <affected> + <package name="net-libs/libslirp" auto="yes" arch="*"> + <unaffected range="ge">4.6.0</unaffected> + <vulnerable range="lt">4.6.0</vulnerable> + </package> + </affected> + <background> + <p>libslirp is a TCP/IP emulator used to provide virtual networking + services. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in libslirp. Please review + the CVE identifiers referenced below for details. + </p> + </description> + <impact type="low"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All libslirp users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libslirp-4.6.0" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595</uri> + </references> + <metadata tag="requester" timestamp="2021-07-10T00:29:05Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T04:11:18Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-45.xml b/metadata/glsa/glsa-202107-45.xml new file mode 100644 index 000000000000..253cc37b6db7 --- /dev/null +++ b/metadata/glsa/glsa-202107-45.xml @@ -0,0 +1,61 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-45"> + <title>PyCharm Community, Professional: Remote code execution</title> + <synopsis>A vulnerability has been found in PyCharm Community and + Professional, potentially resulting in arbitrary code execution. + </synopsis> + <product type="ebuild">pycharm</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>797892</bug> + <access>remote</access> + <affected> + <package name="dev-util/pycharm-community" auto="yes" arch="*"> + <unaffected range="ge">2021.1.2</unaffected> + <vulnerable range="lt">2021.1.2</vulnerable> + </package> + <package name="dev-util/pycharm-professional" auto="yes" arch="*"> + <unaffected range="ge">2021.1.2</unaffected> + <vulnerable range="lt">2021.1.2</vulnerable> + </package> + </affected> + <background> + <p>PyCharm is the Python IDE for professional developers.</p> + </background> + <description> + <p>Insufficient validation exists within PyCharm’s checks for fetching + projects from VCS. + </p> + </description> + <impact type="normal"> + <p>If a victim can be enticed into fetching a VCS project via PyCharm, a + remote attacker could achieve remote code execution. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All PyCharm Community users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-util/pycharm-community-2021.1.2" + </code> + + <p>All PyCharm Professional users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=dev-util/pycharm-professional-2021.1.2" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30005">CVE-2021-30005</uri> + </references> + <metadata tag="requester" timestamp="2021-07-16T02:00:34Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T04:13:01Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-46.xml b/metadata/glsa/glsa-202107-46.xml new file mode 100644 index 000000000000..2c4b4415bdd9 --- /dev/null +++ b/metadata/glsa/glsa-202107-46.xml @@ -0,0 +1,48 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-46"> + <title>mpv: Format string vulnerability</title> + <synopsis>A format string vulnerability was found in mpv, potentially + resulting in arbitrary code execution. + </synopsis> + <product type="ebuild">mpv</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>780474</bug> + <access>remote</access> + <affected> + <package name="media-video/mpv" auto="yes" arch="*"> + <unaffected range="ge">0.33.1</unaffected> + <vulnerable range="lt">0.33.1</vulnerable> + </package> + </affected> + <background> + <p>Video player based on MPlayer/mplayer2.</p> + </background> + <description> + <p>mpv uses untrusted input within format strings.</p> + </description> + <impact type="normal"> + <p>A remote attacker could entice a user to open a specially crafted m3u + playlist file using mpv, possibly resulting in execution of arbitrary + code with the privileges of the process or a Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All mpv users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-video/mpv-0.33.1" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30145">CVE-2021-30145</uri> + </references> + <metadata tag="requester" timestamp="2021-07-16T02:03:07Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T04:16:47Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202107-47.xml b/metadata/glsa/glsa-202107-47.xml new file mode 100644 index 000000000000..39653c3ca06c --- /dev/null +++ b/metadata/glsa/glsa-202107-47.xml @@ -0,0 +1,49 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202107-47"> + <title>libpano13: Format string vulnerability</title> + <synopsis>A format string vulnerability has been found in libpano13, + potentially resulting in arbitrary code execution. + </synopsis> + <product type="ebuild">libpano13</product> + <announced>2021-07-20</announced> + <revised count="1">2021-07-20</revised> + <bug>780486</bug> + <access>remote</access> + <affected> + <package name="media-libs/libpano13" auto="yes" arch="*"> + <unaffected range="ge">2.9.20</unaffected> + <vulnerable range="lt">2.9.20</vulnerable> + </package> + </affected> + <background> + <p>libpano13 is Helmut Dersch’s panorama toolbox library.</p> + </background> + <description> + <p>A format string issue exists within panoFileOutputNamesCreate() where + unvalidated input is passed directly into the formatter. + </p> + </description> + <impact type="normal"> + <p>A remote attacker could entice a user to open a specially crafted file + using libpano13, possibly resulting in execution of arbitrary code with + the privileges of the process or a Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All libpano13 users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libpano13-2.9.20" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-20307">CVE-2021-20307</uri> + </references> + <metadata tag="requester" timestamp="2021-07-16T01:54:06Z">ajak</metadata> + <metadata tag="submitter" timestamp="2021-07-20T04:19:22Z">ajak</metadata> +</glsa> |