summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRepository mirror & CI <repomirrorci@gentoo.org>2020-07-26 23:35:16 +0000
committerRepository mirror & CI <repomirrorci@gentoo.org>2020-07-26 23:35:16 +0000
commitc00174b9bb34b3a3e345e40f243b5c99ca6ef658 (patch)
tree2c3eab31a0cb0c49ac1459dd478d608f849af809 /metadata/glsa
parentMerge updates from master (diff)
parent[ GLSA 202007-07 ] Transmission: Remote code execution (diff)
downloadgentoo-c00174b9bb34b3a3e345e40f243b5c99ca6ef658.tar.gz
gentoo-c00174b9bb34b3a3e345e40f243b5c99ca6ef658.tar.bz2
gentoo-c00174b9bb34b3a3e345e40f243b5c99ca6ef658.zip
Merge commit 'f5f4f8bf28ada13b5f99c0471a463b426ea65b83'
Diffstat (limited to 'metadata/glsa')
-rw-r--r--metadata/glsa/glsa-202007-02.xml62
-rw-r--r--metadata/glsa/glsa-202007-03.xml61
-rw-r--r--metadata/glsa/glsa-202007-04.xml61
-rw-r--r--metadata/glsa/glsa-202007-05.xml55
-rw-r--r--metadata/glsa/glsa-202007-06.xml50
-rw-r--r--metadata/glsa/glsa-202007-07.xml51
6 files changed, 340 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-202007-02.xml b/metadata/glsa/glsa-202007-02.xml
new file mode 100644
index 000000000000..7cc7db21c7aa
--- /dev/null
+++ b/metadata/glsa/glsa-202007-02.xml
@@ -0,0 +1,62 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202007-02">
+ <title>Xen: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in Xen, the worst of which
+ could result in the arbitrary execution of code.
+ </synopsis>
+ <product type="ebuild">xen</product>
+ <announced>2020-07-26</announced>
+ <revised count="1">2020-07-26</revised>
+ <bug>731658</bug>
+ <access>remote</access>
+ <affected>
+ <package name="app-emulation/xen" auto="yes" arch="*">
+ <unaffected range="ge">4.12.3-r2</unaffected>
+ <vulnerable range="lt">4.12.3-r2</vulnerable>
+ </package>
+ <package name="app-emulation/xen-tools" auto="yes" arch="*">
+ <unaffected range="ge">4.12.3-r2</unaffected>
+ <vulnerable range="lt">4.12.3-r2</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Xen is a bare-metal hypervisor.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Xen. Please review the
+ CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Xen users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/xen-4.12.3-r2"
+ </code>
+
+ <p>All Xen Tools users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=app-emulation/xen-tools-4.12.3-r2"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15563">CVE-2020-15563</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15564">CVE-2020-15564</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15565">CVE-2020-15565</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15566">CVE-2020-15566</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15567">CVE-2020-15567</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-07-17T21:12:47Z">sam_c</metadata>
+ <metadata tag="submitter" timestamp="2020-07-26T22:28:47Z">sam_c</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202007-03.xml b/metadata/glsa/glsa-202007-03.xml
new file mode 100644
index 000000000000..93079b9e24c7
--- /dev/null
+++ b/metadata/glsa/glsa-202007-03.xml
@@ -0,0 +1,61 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202007-03">
+ <title>Cacti: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in Cacti, the worst of
+ which could result in the arbitrary execution of code.
+ </synopsis>
+ <product type="ebuild">cacti</product>
+ <announced>2020-07-26</announced>
+ <revised count="1">2020-07-26</revised>
+ <bug>728678</bug>
+ <bug>732522</bug>
+ <access>remote</access>
+ <affected>
+ <package name="net-analyzer/cacti" auto="yes" arch="*">
+ <unaffected range="ge">1.2.13</unaffected>
+ <vulnerable range="lt">1.2.13</vulnerable>
+ </package>
+ <package name="net-analyzer/cacti-spine" auto="yes" arch="*">
+ <unaffected range="ge">1.2.13</unaffected>
+ <vulnerable range="lt">1.2.13</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Cacti is a complete frontend to rrdtool.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Cacti. Please review
+ the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Cacti users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-1.2.13"
+ </code>
+
+ <p>All Cacti Spine users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-analyzer/cacti-spine-1.2.13"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-11022">CVE-2020-11022</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-11023">CVE-2020-11023</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14295">CVE-2020-14295</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-07-19T01:50:59Z">sam_c</metadata>
+ <metadata tag="submitter" timestamp="2020-07-26T22:31:38Z">sam_c</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202007-04.xml b/metadata/glsa/glsa-202007-04.xml
new file mode 100644
index 000000000000..b04ea7893e90
--- /dev/null
+++ b/metadata/glsa/glsa-202007-04.xml
@@ -0,0 +1,61 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202007-04">
+ <title>fwupd, libjcat: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in fwupd and libjcat, the
+ worst of which could result in the arbitrary execution of code.
+ </synopsis>
+ <product type="ebuild">fwupd,libjfcat</product>
+ <announced>2020-07-26</announced>
+ <revised count="1">2020-07-26</revised>
+ <bug>727656</bug>
+ <access>remote</access>
+ <affected>
+ <package name="sys-apps/fwupd" auto="yes" arch="*">
+ <unaffected range="ge">1.3.10</unaffected>
+ <vulnerable range="lt">1.3.10</vulnerable>
+ </package>
+ <package name="dev-libs/libjcat" auto="yes" arch="*">
+ <unaffected range="ge">0.1.3</unaffected>
+ <vulnerable range="lt">0.1.3</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>fwupd aims to make updating firmware on Linux automatic, safe and
+ reliable. libjcat is a library and tool for reading and writing Jcat
+ files.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in fwupd and libjcat.
+ Please review the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All fwupd users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=sys-apps/fwupd-1.3.10"
+ </code>
+
+ <p>All libjcat users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=dev-libs/libjcat-0.1.3"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-10759">CVE-2020-10759</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-06-29T00:15:07Z">sam_c</metadata>
+ <metadata tag="submitter" timestamp="2020-07-26T22:34:10Z">sam_c</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202007-05.xml b/metadata/glsa/glsa-202007-05.xml
new file mode 100644
index 000000000000..75ae7ba35b88
--- /dev/null
+++ b/metadata/glsa/glsa-202007-05.xml
@@ -0,0 +1,55 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202007-05">
+ <title>libexif: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in libexif, the worst of
+ which could result in the arbitrary execution of code.
+ </synopsis>
+ <product type="ebuild">libexif</product>
+ <announced>2020-07-26</announced>
+ <revised count="1">2020-07-26</revised>
+ <bug>708728</bug>
+ <access>remote</access>
+ <affected>
+ <package name="media-libs/libexif" auto="yes" arch="*">
+ <unaffected range="ge">0.6.22</unaffected>
+ <vulnerable range="lt">0.6.22</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>libexif is a library for parsing, editing and saving Exif metadata from
+ images.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in libexif. Please review
+ the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All libexif users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libexif-0.6.22"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2016-6328">CVE-2016-6328</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-9278">CVE-2019-9278</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-0093">CVE-2020-0093</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-12767">CVE-2020-12767</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-13112">CVE-2020-13112</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-13113">CVE-2020-13113</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-13114">CVE-2020-13114</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-07-16T01:09:55Z">sam_c</metadata>
+ <metadata tag="submitter" timestamp="2020-07-26T22:40:47Z">sam_c</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202007-06.xml b/metadata/glsa/glsa-202007-06.xml
new file mode 100644
index 000000000000..e8f7cd438d97
--- /dev/null
+++ b/metadata/glsa/glsa-202007-06.xml
@@ -0,0 +1,50 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202007-06">
+ <title>HylaFAX: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in HylaFAX, the worst of
+ which could result in privilege escalation.
+ </synopsis>
+ <product type="ebuild">hylafax</product>
+ <announced>2020-07-26</announced>
+ <revised count="1">2020-07-26</revised>
+ <bug>730290</bug>
+ <access>local</access>
+ <affected>
+ <package name="net-misc/hylafaxplus" auto="yes" arch="*">
+ <unaffected range="ge">7.0.2</unaffected>
+ <vulnerable range="lt">7.0.2</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>HylaFAX is an enterprise-class system for sending and receiving
+ facsimile messages and for sending alpha-numeric pages.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in HylaFAX. Please review
+ the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All HylaFAX users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/hylafaxplus-7.0.2"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15396">CVE-2020-15396</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15397">CVE-2020-15397</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-07-18T14:34:58Z">sam_c</metadata>
+ <metadata tag="submitter" timestamp="2020-07-26T22:44:15Z">sam_c</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202007-07.xml b/metadata/glsa/glsa-202007-07.xml
new file mode 100644
index 000000000000..3093043f627d
--- /dev/null
+++ b/metadata/glsa/glsa-202007-07.xml
@@ -0,0 +1,51 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202007-07">
+ <title>Transmission: Remote code execution</title>
+ <synopsis>A use-after-free possibly allowing remote execution of code was
+ discovered in Transmission.
+ </synopsis>
+ <product type="ebuild">transmission</product>
+ <announced>2020-07-26</announced>
+ <revised count="1">2020-07-26</revised>
+ <bug>723258</bug>
+ <access>remote</access>
+ <affected>
+ <package name="net-p2p/transmission" auto="yes" arch="*">
+ <unaffected range="ge">3.00</unaffected>
+ <vulnerable range="lt">3.00</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Transmission is a cross-platform BitTorrent client.</p>
+ </background>
+ <description>
+ <p>Transmission mishandles some memory management which may allow
+ manipulation of the heap.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could entice a user to open a specially crafted
+ torrent file using Transmission, possibly resulting in execution of
+ arbitrary code with the privileges of the process or a Denial of Service
+ condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Transmission users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-p2p/transmission-3.00"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-10756">CVE-2018-10756</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-06-20T02:12:52Z">sam_c</metadata>
+ <metadata tag="submitter" timestamp="2020-07-26T23:30:38Z">sam_c</metadata>
+</glsa>