summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRepository mirror & CI <repomirrorci@gentoo.org>2021-07-20 04:21:56 +0000
committerRepository mirror & CI <repomirrorci@gentoo.org>2021-07-20 04:21:56 +0000
commit5ce27249ea4001a62d38154b0c7e1897b60513f7 (patch)
treec9939e6873cd326460c603ef65ce36a25b850fe7 /metadata/glsa
parent2021-07-20 03:36:30 UTC (diff)
parent[ GLSA 202107-47 ] libpano13: Format string vulnerability (diff)
downloadgentoo-5ce27249ea4001a62d38154b0c7e1897b60513f7.tar.gz
gentoo-5ce27249ea4001a62d38154b0c7e1897b60513f7.tar.bz2
gentoo-5ce27249ea4001a62d38154b0c7e1897b60513f7.zip
Merge commit '70f6b22fdc35c66bbf40629b009ef83024d2d2d1'
Diffstat (limited to 'metadata/glsa')
-rw-r--r--metadata/glsa/glsa-202107-42.xml50
-rw-r--r--metadata/glsa/glsa-202107-43.xml52
-rw-r--r--metadata/glsa/glsa-202107-44.xml51
-rw-r--r--metadata/glsa/glsa-202107-45.xml61
-rw-r--r--metadata/glsa/glsa-202107-46.xml48
-rw-r--r--metadata/glsa/glsa-202107-47.xml49
6 files changed, 311 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-202107-42.xml b/metadata/glsa/glsa-202107-42.xml
new file mode 100644
index 000000000000..8b6fc8a9b409
--- /dev/null
+++ b/metadata/glsa/glsa-202107-42.xml
@@ -0,0 +1,50 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202107-42">
+ <title>PJSIP: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in PJSIP, the worst of
+ which could result in a Denial of Service condition.
+ </synopsis>
+ <product type="ebuild">pjproject</product>
+ <announced>2021-07-20</announced>
+ <revised count="1">2021-07-20</revised>
+ <bug>775359</bug>
+ <access>remote</access>
+ <affected>
+ <package name="net-libs/pjproject" auto="yes" arch="*">
+ <unaffected range="ge">2.10-r1</unaffected>
+ <vulnerable range="lt">2.10-r1</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>PJSIP is a free and open source multimedia communication library written
+ in C language implementing standard based protocols such as SIP, SDP,
+ RTP, STUN, TURN, and ICE.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in PJSIP. Please review
+ the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="low">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All PJSIP users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/pjproject-2.10-r1"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15260">CVE-2020-15260</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-21375">CVE-2021-21375</uri>
+ </references>
+ <metadata tag="requester" timestamp="2021-07-16T02:16:25Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2021-07-20T03:48:47Z">ajak</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202107-43.xml b/metadata/glsa/glsa-202107-43.xml
new file mode 100644
index 000000000000..aa7e48b71929
--- /dev/null
+++ b/metadata/glsa/glsa-202107-43.xml
@@ -0,0 +1,52 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202107-43">
+ <title>RPM: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in RPM, the worst of which
+ could result in remote code execution.
+ </synopsis>
+ <product type="ebuild">rpm</product>
+ <announced>2021-07-20</announced>
+ <revised count="1">2021-07-20</revised>
+ <bug>778533</bug>
+ <bug>787944</bug>
+ <access>remote</access>
+ <affected>
+ <package name="app-arch/rpm" auto="yes" arch="*">
+ <unaffected range="ge">4.16.1.3</unaffected>
+ <vulnerable range="lt">4.16.1.3</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>The Red Hat Package Manager (RPM) is a command line driven package
+ management system capable of installing, uninstalling, verifying,
+ querying, and updating computer software packages.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in RPM. Please review the
+ CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All RPM users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/rpm-4.16.1.3"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-20266">CVE-2021-20266</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-20271">CVE-2021-20271</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3421">CVE-2021-3421</uri>
+ </references>
+ <metadata tag="requester" timestamp="2021-07-16T01:57:38Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2021-07-20T04:06:54Z">ajak</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202107-44.xml b/metadata/glsa/glsa-202107-44.xml
new file mode 100644
index 000000000000..30a974dc968c
--- /dev/null
+++ b/metadata/glsa/glsa-202107-44.xml
@@ -0,0 +1,51 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202107-44">
+ <title>libslirp: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in libslirp, the worst of
+ which could result in a Denial of Service condition.
+ </synopsis>
+ <product type="ebuild">libslirp</product>
+ <announced>2021-07-20</announced>
+ <revised count="1">2021-07-20</revised>
+ <bug>796347</bug>
+ <access>local</access>
+ <affected>
+ <package name="net-libs/libslirp" auto="yes" arch="*">
+ <unaffected range="ge">4.6.0</unaffected>
+ <vulnerable range="lt">4.6.0</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>libslirp is a TCP/IP emulator used to provide virtual networking
+ services.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in libslirp. Please review
+ the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="low">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All libslirp users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/libslirp-4.6.0"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3592">CVE-2021-3592</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3593">CVE-2021-3593</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3594">CVE-2021-3594</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3595">CVE-2021-3595</uri>
+ </references>
+ <metadata tag="requester" timestamp="2021-07-10T00:29:05Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2021-07-20T04:11:18Z">ajak</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202107-45.xml b/metadata/glsa/glsa-202107-45.xml
new file mode 100644
index 000000000000..253cc37b6db7
--- /dev/null
+++ b/metadata/glsa/glsa-202107-45.xml
@@ -0,0 +1,61 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202107-45">
+ <title>PyCharm Community, Professional: Remote code execution</title>
+ <synopsis>A vulnerability has been found in PyCharm Community and
+ Professional, potentially resulting in arbitrary code execution.
+ </synopsis>
+ <product type="ebuild">pycharm</product>
+ <announced>2021-07-20</announced>
+ <revised count="1">2021-07-20</revised>
+ <bug>797892</bug>
+ <access>remote</access>
+ <affected>
+ <package name="dev-util/pycharm-community" auto="yes" arch="*">
+ <unaffected range="ge">2021.1.2</unaffected>
+ <vulnerable range="lt">2021.1.2</vulnerable>
+ </package>
+ <package name="dev-util/pycharm-professional" auto="yes" arch="*">
+ <unaffected range="ge">2021.1.2</unaffected>
+ <vulnerable range="lt">2021.1.2</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>PyCharm is the Python IDE for professional developers.</p>
+ </background>
+ <description>
+ <p>Insufficient validation exists within PyCharm’s checks for fetching
+ projects from VCS.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>If a victim can be enticed into fetching a VCS project via PyCharm, a
+ remote attacker could achieve remote code execution.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All PyCharm Community users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=dev-util/pycharm-community-2021.1.2"
+ </code>
+
+ <p>All PyCharm Professional users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=dev-util/pycharm-professional-2021.1.2"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30005">CVE-2021-30005</uri>
+ </references>
+ <metadata tag="requester" timestamp="2021-07-16T02:00:34Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2021-07-20T04:13:01Z">ajak</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202107-46.xml b/metadata/glsa/glsa-202107-46.xml
new file mode 100644
index 000000000000..2c4b4415bdd9
--- /dev/null
+++ b/metadata/glsa/glsa-202107-46.xml
@@ -0,0 +1,48 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202107-46">
+ <title>mpv: Format string vulnerability</title>
+ <synopsis>A format string vulnerability was found in mpv, potentially
+ resulting in arbitrary code execution.
+ </synopsis>
+ <product type="ebuild">mpv</product>
+ <announced>2021-07-20</announced>
+ <revised count="1">2021-07-20</revised>
+ <bug>780474</bug>
+ <access>remote</access>
+ <affected>
+ <package name="media-video/mpv" auto="yes" arch="*">
+ <unaffected range="ge">0.33.1</unaffected>
+ <vulnerable range="lt">0.33.1</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Video player based on MPlayer/mplayer2.</p>
+ </background>
+ <description>
+ <p>mpv uses untrusted input within format strings.</p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could entice a user to open a specially crafted m3u
+ playlist file using mpv, possibly resulting in execution of arbitrary
+ code with the privileges of the process or a Denial of Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All mpv users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=media-video/mpv-0.33.1"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-30145">CVE-2021-30145</uri>
+ </references>
+ <metadata tag="requester" timestamp="2021-07-16T02:03:07Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2021-07-20T04:16:47Z">ajak</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202107-47.xml b/metadata/glsa/glsa-202107-47.xml
new file mode 100644
index 000000000000..39653c3ca06c
--- /dev/null
+++ b/metadata/glsa/glsa-202107-47.xml
@@ -0,0 +1,49 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202107-47">
+ <title>libpano13: Format string vulnerability</title>
+ <synopsis>A format string vulnerability has been found in libpano13,
+ potentially resulting in arbitrary code execution.
+ </synopsis>
+ <product type="ebuild">libpano13</product>
+ <announced>2021-07-20</announced>
+ <revised count="1">2021-07-20</revised>
+ <bug>780486</bug>
+ <access>remote</access>
+ <affected>
+ <package name="media-libs/libpano13" auto="yes" arch="*">
+ <unaffected range="ge">2.9.20</unaffected>
+ <vulnerable range="lt">2.9.20</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>libpano13 is Helmut Dersch’s panorama toolbox library.</p>
+ </background>
+ <description>
+ <p>A format string issue exists within panoFileOutputNamesCreate() where
+ unvalidated input is passed directly into the formatter.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could entice a user to open a specially crafted file
+ using libpano13, possibly resulting in execution of arbitrary code with
+ the privileges of the process or a Denial of Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All libpano13 users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libpano13-2.9.20"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-20307">CVE-2021-20307</uri>
+ </references>
+ <metadata tag="requester" timestamp="2021-07-16T01:54:06Z">ajak</metadata>
+ <metadata tag="submitter" timestamp="2021-07-20T04:19:22Z">ajak</metadata>
+</glsa>