diff options
author | Repository mirror & CI <repomirrorci@gentoo.org> | 2020-03-16 21:38:16 +0000 |
---|---|---|
committer | Repository mirror & CI <repomirrorci@gentoo.org> | 2020-03-16 21:38:16 +0000 |
commit | a68ee8561044eded1d25b70e880b825c845d90c9 (patch) | |
tree | 72a2272d11037aec07a237a0aab94c3ecd49045f /metadata | |
parent | Merge updates from master (diff) | |
parent | [ GLSA 202003-37 ] Fix code (diff) | |
download | gentoo-a68ee8561044eded1d25b70e880b825c845d90c9.tar.gz gentoo-a68ee8561044eded1d25b70e880b825c845d90c9.tar.bz2 gentoo-a68ee8561044eded1d25b70e880b825c845d90c9.zip |
Merge commit '15f0a0a24f48a6e5a0f0fd36d14996794f11a129'
Diffstat (limited to 'metadata')
-rw-r--r-- | metadata/glsa/glsa-202003-35.xml | 55 | ||||
-rw-r--r-- | metadata/glsa/glsa-202003-36.xml | 55 | ||||
-rw-r--r-- | metadata/glsa/glsa-202003-37.xml | 63 |
3 files changed, 173 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-202003-35.xml b/metadata/glsa/glsa-202003-35.xml new file mode 100644 index 000000000000..fa72b90a87d1 --- /dev/null +++ b/metadata/glsa/glsa-202003-35.xml @@ -0,0 +1,55 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202003-35"> + <title>ProFTPd: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in ProFTPd, the worst of + which may lead to arbitrary code execution. + </synopsis> + <product type="ebuild">proftpd</product> + <announced>2020-03-16</announced> + <revised count="1">2020-03-16</revised> + <bug>699520</bug> + <bug>701814</bug> + <bug>710730</bug> + <access>remote</access> + <affected> + <package name="net-ftp/proftpd" auto="yes" arch="*"> + <unaffected range="ge">1.3.6c</unaffected> + <vulnerable range="lt">1.3.6c</vulnerable> + </package> + </affected> + <background> + <p>ProFTPD is an advanced and very configurable FTP server.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in ProFTPd. Please review + the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>A remote attacker, by interrupting the data transfer channel, could + possibly execute arbitrary code with the privileges of the process or + cause a Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All ProFTPd users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-ftp/proftpd-1.3.6c" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-18217">CVE-2019-18217</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-19269">CVE-2019-19269</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-9272">CVE-2020-9272</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-9273">CVE-2020-9273</uri> + </references> + <metadata tag="requester" timestamp="2020-03-15T06:37:49Z">BlueKnight</metadata> + <metadata tag="submitter" timestamp="2020-03-16T21:08:17Z">whissi</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202003-36.xml b/metadata/glsa/glsa-202003-36.xml new file mode 100644 index 000000000000..77b24063e94f --- /dev/null +++ b/metadata/glsa/glsa-202003-36.xml @@ -0,0 +1,55 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202003-36"> + <title>libvorbis: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in libvorbis, the worst of + which could result in a Denial of Service condition. + </synopsis> + <product type="ebuild">libvorbis</product> + <announced>2020-03-16</announced> + <revised count="1">2020-03-16</revised> + <bug>631646</bug> + <bug>699862</bug> + <access>local, remote</access> + <affected> + <package name="media-libs/libvorbis" auto="yes" arch="*"> + <unaffected range="ge">1.3.6-r1</unaffected> + <vulnerable range="lt">1.3.6-r1</vulnerable> + </package> + </affected> + <background> + <p>libvorbis is the reference implementation of the Xiph.org Ogg Vorbis + audio file format. It is used by many applications for playback of Ogg + Vorbis files. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in libvorbis. Please + review the CVE identifiers referenced below for details. + </p> + </description> + <impact type="normal"> + <p>A remote attacker, by enticing the user to process a specially crafted + audio file, could possibly cause a Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All libvorbis users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libvorbis-1.3.6-r1" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-14160">CVE-2017-14160</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-10392">CVE-2018-10392</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-10393">CVE-2018-10393</uri> + </references> + <metadata tag="requester" timestamp="2020-03-15T15:16:28Z">whissi</metadata> + <metadata tag="submitter" timestamp="2020-03-16T21:12:28Z">whissi</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202003-37.xml b/metadata/glsa/glsa-202003-37.xml new file mode 100644 index 000000000000..27963a656f92 --- /dev/null +++ b/metadata/glsa/glsa-202003-37.xml @@ -0,0 +1,63 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202003-37"> + <title>Mozilla Network Security Service: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Mozilla Network + Security Service (NSS), the worst of which may lead to arbitrary code + execution. + </synopsis> + <product type="ebuild">nss</product> + <announced>2020-03-16</announced> + <revised count="2">2020-03-16</revised> + <bug>627534</bug> + <bug>676868</bug> + <bug>701840</bug> + <access>local, remote</access> + <affected> + <package name="dev-libs/nss" auto="yes" arch="*"> + <unaffected range="ge">3.49</unaffected> + <vulnerable range="lt">3.49</vulnerable> + </package> + </affected> + <background> + <p>The Mozilla Network Security Service (NSS) is a library implementing + security features like SSL v.2/v.3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS + #12, S/MIME and X.509 certificates. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Mozilla Network + Security Service (NSS). Please review the CVE identifiers referenced + below for details. + </p> + </description> + <impact type="normal"> + <p>An attacker could execute arbitrary code, cause a Denial of Service + condition or have other unspecified impact. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Mozilla Network Security Service (NSS) users should upgrade to the + latest version: + </p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/nss-3.49" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-11695">CVE-2017-11695</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-11696">CVE-2017-11696</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-11697">CVE-2017-11697</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-11698">CVE-2017-11698</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-18508">CVE-2018-18508</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2019-11745">CVE-2019-11745</uri> + </references> + <metadata tag="requester" timestamp="2020-03-15T15:34:44Z">whissi</metadata> + <metadata tag="submitter" timestamp="2020-03-16T21:17:42Z">whissi</metadata> +</glsa> |