diff options
author | Repository mirror & CI <repomirrorci@gentoo.org> | 2020-07-26 23:35:16 +0000 |
---|---|---|
committer | Repository mirror & CI <repomirrorci@gentoo.org> | 2020-07-26 23:35:16 +0000 |
commit | c00174b9bb34b3a3e345e40f243b5c99ca6ef658 (patch) | |
tree | 2c3eab31a0cb0c49ac1459dd478d608f849af809 /metadata/glsa | |
parent | Merge updates from master (diff) | |
parent | [ GLSA 202007-07 ] Transmission: Remote code execution (diff) | |
download | gentoo-c00174b9bb34b3a3e345e40f243b5c99ca6ef658.tar.gz gentoo-c00174b9bb34b3a3e345e40f243b5c99ca6ef658.tar.bz2 gentoo-c00174b9bb34b3a3e345e40f243b5c99ca6ef658.zip |
Merge commit 'f5f4f8bf28ada13b5f99c0471a463b426ea65b83'
Diffstat (limited to 'metadata/glsa')
-rw-r--r-- | metadata/glsa/glsa-202007-02.xml | 62 | ||||
-rw-r--r-- | metadata/glsa/glsa-202007-03.xml | 61 | ||||
-rw-r--r-- | metadata/glsa/glsa-202007-04.xml | 61 | ||||
-rw-r--r-- | metadata/glsa/glsa-202007-05.xml | 55 | ||||
-rw-r--r-- | metadata/glsa/glsa-202007-06.xml | 50 | ||||
-rw-r--r-- | metadata/glsa/glsa-202007-07.xml | 51 |
6 files changed, 340 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-202007-02.xml b/metadata/glsa/glsa-202007-02.xml new file mode 100644 index 000000000000..7cc7db21c7aa --- /dev/null +++ b/metadata/glsa/glsa-202007-02.xml @@ -0,0 +1,62 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202007-02"> + <title>Xen: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Xen, the worst of which + could result in the arbitrary execution of code. + </synopsis> + <product type="ebuild">xen</product> + <announced>2020-07-26</announced> + <revised count="1">2020-07-26</revised> + <bug>731658</bug> + <access>remote</access> + <affected> + <package name="app-emulation/xen" auto="yes" arch="*"> + <unaffected range="ge">4.12.3-r2</unaffected> + <vulnerable range="lt">4.12.3-r2</vulnerable> + </package> + <package name="app-emulation/xen-tools" auto="yes" arch="*"> + <unaffected range="ge">4.12.3-r2</unaffected> + <vulnerable range="lt">4.12.3-r2</vulnerable> + </package> + </affected> + <background> + <p>Xen is a bare-metal hypervisor.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Xen. Please review the + CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Xen users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.12.3-r2" + </code> + + <p>All Xen Tools users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose + ">=app-emulation/xen-tools-4.12.3-r2" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15563">CVE-2020-15563</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15564">CVE-2020-15564</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15566">CVE-2020-15566</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567</uri> + </references> + <metadata tag="requester" timestamp="2020-07-17T21:12:47Z">sam_c</metadata> + <metadata tag="submitter" timestamp="2020-07-26T22:28:47Z">sam_c</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202007-03.xml b/metadata/glsa/glsa-202007-03.xml new file mode 100644 index 000000000000..93079b9e24c7 --- /dev/null +++ b/metadata/glsa/glsa-202007-03.xml @@ -0,0 +1,61 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202007-03"> + <title>Cacti: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Cacti, the worst of + which could result in the arbitrary execution of code. + </synopsis> + <product type="ebuild">cacti</product> + <announced>2020-07-26</announced> + <revised count="1">2020-07-26</revised> + <bug>728678</bug> + <bug>732522</bug> + <access>remote</access> + <affected> + <package name="net-analyzer/cacti" auto="yes" arch="*"> + <unaffected range="ge">1.2.13</unaffected> + <vulnerable range="lt">1.2.13</vulnerable> + </package> + <package name="net-analyzer/cacti-spine" auto="yes" arch="*"> + <unaffected range="ge">1.2.13</unaffected> + <vulnerable range="lt">1.2.13</vulnerable> + </package> + </affected> + <background> + <p>Cacti is a complete frontend to rrdtool.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Cacti. Please review + the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Cacti users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-1.2.13" + </code> + + <p>All Cacti Spine users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-spine-1.2.13" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-11022">CVE-2020-11022</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14295">CVE-2020-14295</uri> + </references> + <metadata tag="requester" timestamp="2020-07-19T01:50:59Z">sam_c</metadata> + <metadata tag="submitter" timestamp="2020-07-26T22:31:38Z">sam_c</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202007-04.xml b/metadata/glsa/glsa-202007-04.xml new file mode 100644 index 000000000000..b04ea7893e90 --- /dev/null +++ b/metadata/glsa/glsa-202007-04.xml @@ -0,0 +1,61 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202007-04"> + <title>fwupd, libjcat: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in fwupd and libjcat, the + worst of which could result in the arbitrary execution of code. + </synopsis> + <product type="ebuild">fwupd,libjfcat</product> + <announced>2020-07-26</announced> + <revised count="1">2020-07-26</revised> + <bug>727656</bug> + <access>remote</access> + <affected> + <package name="sys-apps/fwupd" auto="yes" arch="*"> + <unaffected range="ge">1.3.10</unaffected> + <vulnerable range="lt">1.3.10</vulnerable> + </package> + <package name="dev-libs/libjcat" auto="yes" arch="*"> + <unaffected range="ge">0.1.3</unaffected> + <vulnerable range="lt">0.1.3</vulnerable> + </package> + </affected> + <background> + <p>fwupd aims to make updating firmware on Linux automatic, safe and + reliable. libjcat is a library and tool for reading and writing Jcat + files. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in fwupd and libjcat. + Please review the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All fwupd users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/fwupd-1.3.10" + </code> + + <p>All libjcat users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/libjcat-0.1.3" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-10759">CVE-2020-10759</uri> + </references> + <metadata tag="requester" timestamp="2020-06-29T00:15:07Z">sam_c</metadata> + <metadata tag="submitter" timestamp="2020-07-26T22:34:10Z">sam_c</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202007-05.xml b/metadata/glsa/glsa-202007-05.xml new file mode 100644 index 000000000000..75ae7ba35b88 --- /dev/null +++ b/metadata/glsa/glsa-202007-05.xml @@ -0,0 +1,55 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202007-05"> + <title>libexif: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in libexif, the worst of + which could result in the arbitrary execution of code. + </synopsis> + <product type="ebuild">libexif</product> + <announced>2020-07-26</announced> + <revised count="1">2020-07-26</revised> + <bug>708728</bug> + <access>remote</access> + <affected> + <package name="media-libs/libexif" auto="yes" arch="*"> + <unaffected range="ge">0.6.22</unaffected> + <vulnerable range="lt">0.6.22</vulnerable> + </package> + </affected> + <background> + <p>libexif is a library for parsing, editing and saving Exif metadata from + images. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in libexif. Please review + the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All libexif users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libexif-0.6.22" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2016-6328">CVE-2016-6328</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114</uri> + </references> + <metadata tag="requester" timestamp="2020-07-16T01:09:55Z">sam_c</metadata> + <metadata tag="submitter" timestamp="2020-07-26T22:40:47Z">sam_c</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202007-06.xml b/metadata/glsa/glsa-202007-06.xml new file mode 100644 index 000000000000..e8f7cd438d97 --- /dev/null +++ b/metadata/glsa/glsa-202007-06.xml @@ -0,0 +1,50 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202007-06"> + <title>HylaFAX: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in HylaFAX, the worst of + which could result in privilege escalation. + </synopsis> + <product type="ebuild">hylafax</product> + <announced>2020-07-26</announced> + <revised count="1">2020-07-26</revised> + <bug>730290</bug> + <access>local</access> + <affected> + <package name="net-misc/hylafaxplus" auto="yes" arch="*"> + <unaffected range="ge">7.0.2</unaffected> + <vulnerable range="lt">7.0.2</vulnerable> + </package> + </affected> + <background> + <p>HylaFAX is an enterprise-class system for sending and receiving + facsimile messages and for sending alpha-numeric pages. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in HylaFAX. Please review + the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All HylaFAX users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/hylafaxplus-7.0.2" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15396">CVE-2020-15396</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15397">CVE-2020-15397</uri> + </references> + <metadata tag="requester" timestamp="2020-07-18T14:34:58Z">sam_c</metadata> + <metadata tag="submitter" timestamp="2020-07-26T22:44:15Z">sam_c</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202007-07.xml b/metadata/glsa/glsa-202007-07.xml new file mode 100644 index 000000000000..3093043f627d --- /dev/null +++ b/metadata/glsa/glsa-202007-07.xml @@ -0,0 +1,51 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202007-07"> + <title>Transmission: Remote code execution</title> + <synopsis>A use-after-free possibly allowing remote execution of code was + discovered in Transmission. + </synopsis> + <product type="ebuild">transmission</product> + <announced>2020-07-26</announced> + <revised count="1">2020-07-26</revised> + <bug>723258</bug> + <access>remote</access> + <affected> + <package name="net-p2p/transmission" auto="yes" arch="*"> + <unaffected range="ge">3.00</unaffected> + <vulnerable range="lt">3.00</vulnerable> + </package> + </affected> + <background> + <p>Transmission is a cross-platform BitTorrent client.</p> + </background> + <description> + <p>Transmission mishandles some memory management which may allow + manipulation of the heap. + </p> + </description> + <impact type="normal"> + <p>A remote attacker could entice a user to open a specially crafted + torrent file using Transmission, possibly resulting in execution of + arbitrary code with the privileges of the process or a Denial of Service + condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Transmission users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-p2p/transmission-3.00" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-10756">CVE-2018-10756</uri> + </references> + <metadata tag="requester" timestamp="2020-06-20T02:12:52Z">sam_c</metadata> + <metadata tag="submitter" timestamp="2020-07-26T23:30:38Z">sam_c</metadata> +</glsa> |