diff options
author | Repository mirror & CI <repomirrorci@gentoo.org> | 2019-11-25 00:26:16 +0000 |
---|---|---|
committer | Repository mirror & CI <repomirrorci@gentoo.org> | 2019-11-25 00:26:16 +0000 |
commit | 2e4eb6f29a7eb41d428ae00e941f2fbd72db1915 (patch) | |
tree | b398fb0710dea12da4d5c31581b861ec3410a6ab /metadata/glsa | |
parent | Merge updates from master (diff) | |
parent | [ GLSA 201911-08 ] Expat: Multiple vulnerabilities (diff) | |
download | gentoo-2e4eb6f29a7eb41d428ae00e941f2fbd72db1915.tar.gz gentoo-2e4eb6f29a7eb41d428ae00e941f2fbd72db1915.tar.bz2 gentoo-2e4eb6f29a7eb41d428ae00e941f2fbd72db1915.zip |
Merge commit '751af6f91da06f53265195cff434eb66a145af73'
Diffstat (limited to 'metadata/glsa')
-rw-r--r-- | metadata/glsa/glsa-201911-05.xml | 50 | ||||
-rw-r--r-- | metadata/glsa/glsa-201911-06.xml | 135 | ||||
-rw-r--r-- | metadata/glsa/glsa-201911-07.xml | 66 | ||||
-rw-r--r-- | metadata/glsa/glsa-201911-08.xml | 48 |
4 files changed, 299 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-201911-05.xml b/metadata/glsa/glsa-201911-05.xml new file mode 100644 index 000000000000..24d2ac578a52 --- /dev/null +++ b/metadata/glsa/glsa-201911-05.xml @@ -0,0 +1,50 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201911-05"> + <title>Adobe Flash Player: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Adobe Flash Player, the + worst of which could result in the arbitrary execution of code. + </synopsis> + <product type="ebuild">adobe,flash</product> + <announced>2019-11-25</announced> + <revised count="1">2019-11-25</revised> + <bug>694352</bug> + <access>remote</access> + <affected> + <package name="www-plugins/adobe-flash" auto="yes" arch="*"> + <unaffected range="ge">32.0.0.255</unaffected> + <vulnerable range="lt">32.0.0.255</vulnerable> + </package> + </affected> + <background> + <p>The Adobe Flash Player is a renderer for the SWF file format, which is + commonly used to provide interactive websites. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Adobe Flash Player. + Please review the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Adobe Flash Player users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-plugins/adobe-flash-32.0.0.255" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-8069">CVE-2019-8069</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-8070">CVE-2019-8070</uri> + </references> + <metadata tag="requester" timestamp="2019-10-26T20:58:44Z">whissi</metadata> + <metadata tag="submitter" timestamp="2019-11-25T00:10:47Z">b-man</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201911-06.xml b/metadata/glsa/glsa-201911-06.xml new file mode 100644 index 000000000000..5a186148231b --- /dev/null +++ b/metadata/glsa/glsa-201911-06.xml @@ -0,0 +1,135 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201911-06"> + <title>Chromium, Google Chrome: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Chromium and Google + Chrome, the worst of which could result in the arbitrary execution of code. + </synopsis> + <product type="ebuild">chromium,chrome,google</product> + <announced>2019-11-25</announced> + <revised count="1">2019-11-25</revised> + <bug>692916</bug> + <bug>694002</bug> + <bug>694954</bug> + <bug>697506</bug> + <bug>698398</bug> + <bug>699068</bug> + <access>remote</access> + <affected> + <package name="www-client/chromium" auto="yes" arch="*"> + <unaffected range="ge">78.0.3904.87</unaffected> + <vulnerable range="lt">78.0.3904.87</vulnerable> + </package> + <package name="www-client/google-chrome" auto="yes" arch="*"> + <unaffected range="ge">78.0.3904.87</unaffected> + <vulnerable range="lt">78.0.3904.87</vulnerable> + </package> + </affected> + <background> + <p>Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. + </p> + + <p>Google Chrome is one fast, simple, and secure browser for all your + devices. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Chromium and Google + Chrome. Please review the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Chromium users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-78.0.3904.87" + </code> + + <p>All Google Chrome users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/google-chrome-78.0.3904.87" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13659">CVE-2019-13659</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13660">CVE-2019-13660</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13661">CVE-2019-13661</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13662">CVE-2019-13662</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13663">CVE-2019-13663</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13664">CVE-2019-13664</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13665">CVE-2019-13665</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13666">CVE-2019-13666</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13667">CVE-2019-13667</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13668">CVE-2019-13668</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13669">CVE-2019-13669</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13670">CVE-2019-13670</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13671">CVE-2019-13671</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13673">CVE-2019-13673</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13674">CVE-2019-13674</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13675">CVE-2019-13675</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13676">CVE-2019-13676</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13677">CVE-2019-13677</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13678">CVE-2019-13678</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13679">CVE-2019-13679</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13680">CVE-2019-13680</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13681">CVE-2019-13681</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13682">CVE-2019-13682</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13683">CVE-2019-13683</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13685">CVE-2019-13685</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13686">CVE-2019-13686</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13687">CVE-2019-13687</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13688">CVE-2019-13688</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13693">CVE-2019-13693</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13694">CVE-2019-13694</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13695">CVE-2019-13695</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13696">CVE-2019-13696</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13697">CVE-2019-13697</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13699">CVE-2019-13699</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13700">CVE-2019-13700</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13701">CVE-2019-13701</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13703">CVE-2019-13703</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13704">CVE-2019-13704</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13705">CVE-2019-13705</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13706">CVE-2019-13706</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13707">CVE-2019-13707</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13708">CVE-2019-13708</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13709">CVE-2019-13709</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13710">CVE-2019-13710</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13711">CVE-2019-13711</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13713">CVE-2019-13713</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13714">CVE-2019-13714</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13715">CVE-2019-13715</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13716">CVE-2019-13716</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13717">CVE-2019-13717</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13718">CVE-2019-13718</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13719">CVE-2019-13719</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-13721">CVE-2019-13721</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5869">CVE-2019-5869</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5870">CVE-2019-5870</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5871">CVE-2019-5871</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5872">CVE-2019-5872</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5873">CVE-2019-5873</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5874">CVE-2019-5874</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5875">CVE-2019-5875</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5876">CVE-2019-5876</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5877">CVE-2019-5877</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5878">CVE-2019-5878</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5879">CVE-2019-5879</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5880">CVE-2019-5880</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-5881">CVE-2019-5881</uri> + </references> + <metadata tag="requester" timestamp="2019-10-26T19:59:08Z">whissi</metadata> + <metadata tag="submitter" timestamp="2019-11-25T00:13:45Z">b-man</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201911-07.xml b/metadata/glsa/glsa-201911-07.xml new file mode 100644 index 000000000000..bc524551476f --- /dev/null +++ b/metadata/glsa/glsa-201911-07.xml @@ -0,0 +1,66 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201911-07"> + <title>Mozilla Firefox: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Mozilla Firefox, the + worst of which could result in the arbitrary execution of code. + </synopsis> + <product type="ebuild">firefox</product> + <announced>2019-11-25</announced> + <revised count="1">2019-11-25</revised> + <bug>693442</bug> + <bug>698512</bug> + <access>remote</access> + <affected> + <package name="www-client/firefox" auto="yes" arch="*"> + <unaffected range="ge">68.2.0</unaffected> + <vulnerable range="lt">68.2.0</vulnerable> + </package> + <package name="www-client/firefox-bin" auto="yes" arch="*"> + <unaffected range="ge">68.2.0</unaffected> + <vulnerable range="lt">68.2.0</vulnerable> + </package> + </affected> + <background> + <p>Mozilla Firefox is a popular open-source web browser from the Mozilla + Project. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Mozilla Firefox. Please + review the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Firefox users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-68.2.0" + </code> + + <p>All Firefox binary users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-68.2.0" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11740">CVE-2019-11740</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11742">CVE-2019-11742</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11743">CVE-2019-11743</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11744">CVE-2019-11744</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11746">CVE-2019-11746</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11752">CVE-2019-11752</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-9812">CVE-2019-9812</uri> + </references> + <metadata tag="requester" timestamp="2019-09-22T23:21:18Z">b-man</metadata> + <metadata tag="submitter" timestamp="2019-11-25T00:16:53Z">b-man</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201911-08.xml b/metadata/glsa/glsa-201911-08.xml new file mode 100644 index 000000000000..4a8bad9133b7 --- /dev/null +++ b/metadata/glsa/glsa-201911-08.xml @@ -0,0 +1,48 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201911-08"> + <title>Expat: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Expat, the worst of + which could result in a Denial of Service condition. + </synopsis> + <product type="ebuild">expat</product> + <announced>2019-11-25</announced> + <revised count="1">2019-11-25</revised> + <bug>688734</bug> + <bug>694362</bug> + <access>remote</access> + <affected> + <package name="dev-libs/expat" auto="yes" arch="*"> + <unaffected range="ge">2.2.8</unaffected> + <vulnerable range="lt">2.2.8</vulnerable> + </package> + </affected> + <background> + <p>Expat is a set of XML parsing libraries.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Expat. Please review + the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Expat users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/expat-2.2.8" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-20843">CVE-2018-20843</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-15903">CVE-2019-15903</uri> + </references> + <metadata tag="requester" timestamp="2019-09-24T11:38:45Z">whissi</metadata> + <metadata tag="submitter" timestamp="2019-11-25T00:18:23Z">b-man</metadata> +</glsa> |