diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 4f017eb9f89..6cf0235b2e3 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 591718 BLAKE2B cd53ee1575b57b03315f3e2b15f89a06fbc6711259ee7a82e1ca6f8970d8fdd183ea1f95f313b15f9f7f905c2c8641fa9ae9f0d8a12e8fedc6851ee3f7c15bbd SHA512 1cf337d112115a521c08a9fa208a2c60a1ef9651426b5a20b7ff05709eda7e21b384c627f1dedd2abb84476daf5fadea280b479585390abd903daec89814b24f -TIMESTAMP 2024-12-01T06:40:23Z +MANIFEST Manifest.files.gz 594915 BLAKE2B 220d9175cb1796cb5045abb4a1dd895efa478aa604a6eb3dde800553a73ce6b12ecf630b6574e1fc834659bac119417be17231464d8355e60ed5ed18f51b8044 SHA512 db425e75cb49a2ea05358c8e7f4e366d86628930a1e26279cb8287fe250565842ac004358a56986eb2aa4342ed7217cf30c8f78d97a02ed24483cca80fd1b2eb +TIMESTAMP 2025-01-01T06:40:41Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmdMBNdfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmd042lfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klANZw/+KSWqV2sDOVWslomj90wmI4kWrUE4ZC46YZtvjGz4Faf9D8i9RzkuV9nB -Lt6HhwNbrTFYYyFv0wAYLBUbNzQUDKl0KwOXs7SjRD+hV2lNRakA/dM1FbHsN0wF -qUd+S3Slmis3NGaIQ5UstxqdG5wjZ04q6BnjdrA5Yaqxj+S8bS04D3HUr5jhKU8A -vR9e7h6fkiABZW52mXVcBvqkSTmqrZcxGss3LpTiWU1VDcbFoVXcjsNQKYUEj9dt -IgWaVX/LwVj3yPSI2TPF2PO8lenyiroADclFwXPHHyuDm6qxXb0v0nie3h4PuG5O -yFVWmpLPkgdO2oCnJhh1W2sh+vu5iV4xnfoxT5U0BMp24s2wt2oKzPieJUhslk4s -lINvCPAVF8VFwgvop3rdwvwQWE7yZCAZuKxD0Y6m8WORExR/MB33Qmc0gm7b6ksC -yFG7AjN6y0qUd2yL1vpl9lvy4Rv0izZnVmuhd0+Jsq/8lgzY8+oiiZMzTxEc8Y/e -8BcxWkB64/Sta0U+GYEYypxS2nPtPAb7BvPu1f2dyBEqO+vDRN5M+0LuhfucKDTo -fuNw7Ri6zyv4thIvUJI7f54AHcGvAGmxQ+ObXHoHrBHtKacSXG6VF/P48rAwX165 -WblhbkW1T4kqLrUiFl/pt9BHP2zCXFkphVMrw4GJyp6KquSqfFA= -=l52K +klBoyg//VQm7GsyyuffSjKJO3H/YJF558ygX0IxnZPwgQweC9ERRd3NlONm2mlph +TzmZhAC+PnRGN+QTZh3M/kNuxPytaf6bg9vSNs2v221CHcSqErbzbMAiDO8ZRPoj +ToTfCC1jH2AoEAAmCWd120MK7nA1dzKx0DSvWhuTv02ssdS9Plj+SJ0SY6stjE3w +vfyYTvVjsz90UppvVl9zdKPQa5st2ojC9/tJxCFEjTxV1ubGJDI/7TdArgyTTSDg +rx4Bbc5su4ANjXbYHofhar2X0/YYF6l/bglDMhCJIn8OwOyzWqXufgrmhmnCrCgt +V6FLxXqWimOmIiIL1YUwUgc3p0JYNuYAwGt5I6Tf/gX2h/4aHOxUvgDdvRf+hoUl +9USr4sw5qovn+pFdDNwYrZ2+Uat83IYET85Mnlc8sqf3wH8I17lPKOzLtcgtkRND +i062wD9kU6gCen6fM80vuW4k40UphiAkrLhy8nMaWjBBVbRdXpGddGdOuPk0yX+b +g+qjOXnkY/rZPek+u0lpS1MPU661IFJgXQs9wFaV9++VXpcpVCyFoyUNhhaIxEH9 +KEQwa8bz2DkoBCeJMYjH3xigcXMavQ9KTrRqkl2lUk1tLf/dBwY3d7Ao8rpCkirO +AF2w3sJ5hbD7PXm4OEDG3EYt1uQftsnV/UcNB26SVu8UT1tfmR0= +=IQdp -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 22441536c90..1b987a323dd 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-01.xml new file mode 100644 index 00000000000..1bc02fe634c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-01.xml @@ -0,0 +1,42 @@ + + + + R: Arbitrary Code Execution + A vulnerability has been discovered in R, which can lead to arbitrary code execution. + R + 2024-12-07 + 2024-12-07 + 930936 + local + + + 4.4.1 + 4.4.1 + + + +

R is a language and environment for statistical computing and graphics.

+
+ +

Deserialization of untrusted data can occur in the R statistical programming language, enabling a maliciously crafted RDS (R Data Serialization) formatted file or R package to run arbitrary code on an end user’s system when interacted with.

+
+ +

Arbitrary code may be run when deserializing untrusted data.

+
+ +

There is no known workaround at this time.

+
+ +

All R users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/R-4.4.1" + +
+ + CVE-2024-27322 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-02.xml new file mode 100644 index 00000000000..406294fbcda --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-02.xml @@ -0,0 +1,63 @@ + + + + Cacti: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Cacti, the worst of which can lead to privilege escalation. + cacti + 2024-12-07 + 2024-12-07 + 823788 + 834597 + 884799 + remote + + + 1.2.26 + 1.2.26 + + + +

Cacti is a web-based network graphing and reporting tool.

+
+ +

Multiple vulnerabilities have been discovered in Cacti. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Cacti users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-1.2.26" + +
+ + CVE-2020-14424 + CVE-2022-0730 + CVE-2022-46169 + CVE-2022-48547 + CVE-2023-30534 + CVE-2023-31132 + CVE-2023-39357 + CVE-2023-39358 + CVE-2023-39359 + CVE-2023-39360 + CVE-2023-39361 + CVE-2023-39362 + CVE-2023-39365 + CVE-2023-39510 + CVE-2023-39511 + CVE-2023-39512 + CVE-2023-39513 + CVE-2023-39514 + CVE-2023-39515 + CVE-2023-39516 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-03.xml new file mode 100644 index 00000000000..cf4f8ff726a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-03.xml @@ -0,0 +1,64 @@ + + + + Asterisk: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to privilege escalation. + asterisk + 2024-12-07 + 2024-12-07 + 771318 + 803440 + 838391 + 884797 + 920026 + 937844 + 939159 + remote + + + 18.24.3 + 18.24.3 + + + +

Asterisk is an open source telephony engine and toolkit.

+
+ +

Multiple vulnerabilities have been discovered in Asterisk. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Asterisk users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/asterisk-18.24.3" + +
+ + CVE-2020-35776 + CVE-2021-26712 + CVE-2021-26713 + CVE-2021-26714 + CVE-2021-26717 + CVE-2021-26906 + CVE-2021-31878 + CVE-2021-32558 + CVE-2022-26498 + CVE-2022-26499 + CVE-2022-26651 + CVE-2022-37325 + CVE-2022-42705 + CVE-2022-42706 + CVE-2023-37457 + CVE-2023-49294 + CVE-2023-49786 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-04.xml new file mode 100644 index 00000000000..65ac03ed874 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-04.xml @@ -0,0 +1,129 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which arbitrary code execution. + firefox,firefox-bin + 2024-12-07 + 2024-12-07 + 936215 + 937467 + 941169 + 941174 + 941224 + remote + + + 131.0.2 + 123.3.1 + 131.0.2 + 128.3.1 + + + 131.0.2 + 128.3.1 + 131.0.2 + 128.3.1 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox users should upgrade to the latest version in their release channel:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-131.0.2:rapid" + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-128.3.1:esr" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-131.0.2:rapid" + # emerge --ask --oneshot --verbose ">=www-client/firefox-128.3.1:esr" + +
+ + CVE-2024-6601 + CVE-2024-6602 + CVE-2024-6603 + CVE-2024-6604 + CVE-2024-6606 + CVE-2024-6607 + CVE-2024-6608 + CVE-2024-6609 + CVE-2024-6610 + CVE-2024-6611 + CVE-2024-6612 + CVE-2024-6613 + CVE-2024-6614 + CVE-2024-6615 + CVE-2024-7518 + CVE-2024-7519 + CVE-2024-7520 + CVE-2024-7521 + CVE-2024-7522 + CVE-2024-7523 + CVE-2024-7524 + CVE-2024-7525 + CVE-2024-7526 + CVE-2024-7527 + CVE-2024-7528 + CVE-2024-7529 + CVE-2024-7530 + CVE-2024-7531 + CVE-2024-8381 + CVE-2024-8382 + CVE-2024-8383 + CVE-2024-8384 + CVE-2024-8385 + CVE-2024-8386 + CVE-2024-8387 + CVE-2024-8389 + CVE-2024-8394 + CVE-2024-8900 + CVE-2024-9391 + CVE-2024-9392 + CVE-2024-9395 + CVE-2024-9396 + CVE-2024-9397 + CVE-2024-9399 + CVE-2024-9400 + CVE-2024-9401 + CVE-2024-9402 + CVE-2024-9403 + CVE-2024-9680 + MFSA2024-29 + MFSA2024-30 + MFSA2024-31 + MFSA2024-33 + MFSA2024-34 + MFSA2024-35 + MFSA2024-38 + MFSA2024-39 + MFSA2024-40 + MFSA2024-41 + MFSA2024-43 + MFSA2024-44 + MFSA2024-46 + MFSA2024-47 + MFSA2024-48 + MFSA2024-49 + MFSA2024-50 + MFSA2024-51 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-05.xml new file mode 100644 index 00000000000..f68005802f5 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-05.xml @@ -0,0 +1,121 @@ + + + + Chromium, Google Chrome, Microsoft Edge. Opera: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. + chromium,google-chrome,microsoft-edge,microsoft-edge,opera + 2024-12-07 + 2024-12-07 + 924450 + 925161 + 925666 + 926230 + 926869 + 927312 + 927928 + 928462 + 929112 + 930124 + 930647 + 930994 + 931548 + remote + + + 124.0.2478.97 + + + 124.0.6367.155 + 124.0.6367.155 + + + 124.0.6367.155 + 124.0.6367.155 + + + 124.0.2478.97 + + + 110.0.5130.35 + 110.0.5130.35 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. Google Chrome is one fast, simple, and secure browser for all your devices. Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. Opera is a fast and secure web browser.

+
+ +

Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-124.0.6367.155" + + +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-124.0.6367.155 " + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-124.0.2478.97" + + +

All Oprea users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/opera-110.0.5130.35" + +
+ + CVE-2024-1669 + CVE-2024-1670 + CVE-2024-1671 + CVE-2024-1672 + CVE-2024-1673 + CVE-2024-1674 + CVE-2024-1675 + CVE-2024-1676 + CVE-2024-2173 + CVE-2024-2174 + CVE-2024-2176 + CVE-2024-2400 + CVE-2024-2625 + CVE-2024-2626 + CVE-2024-2627 + CVE-2024-2628 + CVE-2024-2883 + CVE-2024-2885 + CVE-2024-2886 + CVE-2024-2887 + CVE-2024-3156 + CVE-2024-3158 + CVE-2024-3159 + CVE-2024-3832 + CVE-2024-3833 + CVE-2024-3834 + CVE-2024-4058 + CVE-2024-4059 + CVE-2024-4060 + CVE-2024-4331 + CVE-2024-4368 + CVE-2024-4558 + CVE-2024-4559 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-06.xml new file mode 100644 index 00000000000..a7fb73b9eba --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-06.xml @@ -0,0 +1,133 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. + thunderbird,thunderbird-bin + 2024-12-07 + 2024-12-07 + 935551 + 936216 + 937468 + 941170 + 941175 + 942470 + remote + + + 128.4.0 + 128.4.0 + + + 128.4.0 + 128.4.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-128.4.0" + + +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-128.4.0" + +
+ + CVE-2024-5693 + CVE-2024-5696 + CVE-2024-5700 + CVE-2024-6601 + CVE-2024-6602 + CVE-2024-6603 + CVE-2024-6604 + CVE-2024-7518 + CVE-2024-7519 + CVE-2024-7520 + CVE-2024-7521 + CVE-2024-7522 + CVE-2024-7523 + CVE-2024-7524 + CVE-2024-7525 + CVE-2024-7526 + CVE-2024-7527 + CVE-2024-7528 + CVE-2024-7529 + CVE-2024-7531 + CVE-2024-8381 + CVE-2024-8382 + CVE-2024-8383 + CVE-2024-8384 + CVE-2024-8385 + CVE-2024-8386 + CVE-2024-8387 + CVE-2024-8389 + CVE-2024-8394 + CVE-2024-8900 + CVE-2024-9391 + CVE-2024-9392 + CVE-2024-9395 + CVE-2024-9396 + CVE-2024-9397 + CVE-2024-9399 + CVE-2024-9400 + CVE-2024-9401 + CVE-2024-9402 + CVE-2024-9403 + CVE-2024-10458 + CVE-2024-10459 + CVE-2024-10460 + CVE-2024-10461 + CVE-2024-10462 + CVE-2024-10463 + CVE-2024-10464 + CVE-2024-10465 + CVE-2024-10466 + CVE-2024-10467 + CVE-2024-10468 + MFSA-2024-25 + MFSA-2024-26 + MFSA-2024-28 + MFSA2024-29 + MFSA2024-30 + MFSA2024-31 + MFSA2024-33 + MFSA2024-34 + MFSA2024-35 + MFSA2024-38 + MFSA2024-39 + MFSA2024-40 + MFSA2024-41 + MFSA2024-43 + MFSA2024-44 + MFSA2024-46 + MFSA2024-47 + MFSA2024-48 + MFSA2024-49 + MFSA2024-50 + MFSA2024-55 + MFSA2024-56 + MFSA2024-57 + MFSA2024-58 + MFSA2024-59 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-07.xml new file mode 100644 index 00000000000..f2ac638e2f8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-07.xml @@ -0,0 +1,104 @@ + + + + OpenJDK: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenJDK, the worst of which could lead to remote code execution. + openjdk,openjdk-bin,openjdk-jre-bin + 2024-12-07 + 2024-12-07 + 912719 + 916211 + 925020 + 941689 + local and remote + + + 8.422_p05 + 11.0.24_p8 + 17.0.12_p7 + 8.422_p05 + 11.0.24_p8 + 17.0.12_p7 + + + 8.422_p05 + 11.0.24_p8 + 17.0.12_p7 + 8.422_p05 + 11.0.24_p8 + 17.0.12_p7 + + + 8.422_p05 + 11.0.24_p8 + 17.0.12_p7 + 8.422_p05 + 11.0.24_p8 + 17.0.12_p7 + + + +

OpenJDK is an open source implementation of the Java programming language.

+
+ +

Multiple vulnerabilities have been discovered in OpenJDK. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenJDK users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-8.422_p05:8" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-11.0.24_p8:11" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-17.0.12_p7:17" + + +

All OpenJDK users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-8.442_p05:8" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-11.0.24_p8:11" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-jre-bin-17.0.12_p7:17" + + +

All OpenJDK users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-8.442_p05:8" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-11.0.24_p8:11" + # emerge --ask --oneshot --verbose ">=dev-java/openjdk-bin-17.0.12_p7:17" + +
+ + CVE-2023-22006 + CVE-2023-22025 + CVE-2023-22036 + CVE-2023-22041 + CVE-2023-22044 + CVE-2023-22045 + CVE-2023-22049 + CVE-2023-22067 + CVE-2023-22081 + CVE-2024-20918 + CVE-2024-20919 + CVE-2024-20921 + CVE-2024-20926 + CVE-2024-20932 + CVE-2024-20945 + CVE-2024-20952 + CVE-2024-21208 + CVE-2024-21210 + CVE-2024-21217 + CVE-2024-21235 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-08.xml new file mode 100644 index 00000000000..e886a101b87 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-08.xml @@ -0,0 +1,47 @@ + + + + icinga2: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Icinga2, the worst of which could lead to arbitrary code execution. + icinga2 + 2024-12-07 + 2024-12-07 + 760660 + 943329 + remote + + + 2.14.3 + 2.14.3 + + + +

Icinga2 is a distributed, general purpose, network monitoring engine.

+
+ +

Multiple vulnerabilities have been discovered in Icinga2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Icinga2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-analyzer/icinga2-2.14.3" + +
+ + CVE-2020-29663 + CVE-2021-32739 + CVE-2021-32743 + CVE-2021-37698 + CVE-2024-49369 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-09.xml new file mode 100644 index 00000000000..a4213f22a46 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-09.xml @@ -0,0 +1,47 @@ + + + + Salt: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Salt, the worst of which can lead to arbitrary code execution. + salt + 2024-12-07 + 2024-12-07 + 916512 + 925021 + remote + + + 3006.6 + 3006.6 + + + +

Salt is a fast, intelligent and scalable automation engine.

+
+ +

Multiple vulnerabilities have been discovered in Salt. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Salt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/salt-3006.6" + +
+ + CVE-2023-20897 + CVE-2023-20898 + CVE-2023-34049 + CVE-2024-22231 + CVE-2024-22232 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-10.xml new file mode 100644 index 00000000000..264249f3268 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-10.xml @@ -0,0 +1,47 @@ + + + + Dnsmasq: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Dnsmasq, the worst of which could lead to a denial of service. + dnsmasq + 2024-12-07 + 2024-12-07 + 867322 + 905321 + 924448 + remote + + + 2.90 + 2.90 + + + +

Dnsmasq is a lightweight and easily-configurable DNS forwarder and DHCP server.

+
+ +

Multiple vulnerabilities have been discovered in Dnsmasq. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Dnsmasq users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-dns/dnsmasq-2.90" + +
+ + CVE-2022-0934 + CVE-2023-28450 + CVE-2023-50387 + CVE-2023-50868 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-11.xml new file mode 100644 index 00000000000..8596c449aad --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-11.xml @@ -0,0 +1,42 @@ + + + + OATH Toolkit: Privilege Escalation + A vulnerability has been discovered in OATH Toolkit, which could lead to local root privilege escalation. + oath-toolkit + 2024-12-07 + 2024-12-07 + 940778 + local + + + 2.6.12 + 2.6.12 + + + +

OATH Toolkit provide components to build one-time password authentication systems. It contains shared C libraries, command line tools and a PAM module. Supported technologies include the event-based HOTP algorithm (RFC 4226), the time-based TOTP algorithm (RFC 6238), and Portable Symmetric Key Container (PSKC, RFC 6030) to manage secret key data. OATH stands for Open AuTHentication, which is the organization that specify the algorithms.

+
+ +

A vulnerability has been discovered in OATH Toolkit. Please review the CVE identifier referenced below for details.

+
+ +

Please review the referenced CVE identifier for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OATH Toolkit users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-auth/oath-toolkit-2.6.12" + +
+ + CVE-2024-47191 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-12.xml new file mode 100644 index 00000000000..c9363090995 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-12.xml @@ -0,0 +1,60 @@ + + + + PostgreSQL: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in PostgreSQL, the worst of which could lead to arbitrary code execution. + postgresql + 2024-12-08 + 2024-12-08 + 943512 + remote + + + 12.21 + 13.17 + 14.14 + 15.9 + 16.5 + 17.1 + 12.21 + 13.17 + 14.14 + 15.9 + 16.5 + 17.1 + + + +

PostgreSQL is an open source object-relational database management system.

+
+ +

Multiple vulnerabilities have been discovered in PostgreSQL. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All PostgreSQL users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-12.21:12" + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-13.17:13" + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-14.14:14" + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-15.9:15" + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-16.5:16" + # emerge --ask --oneshot --verbose ">=dev-db/postgresql-17.1:17" + +
+ + CVE-2024-10976 + CVE-2024-10977 + CVE-2024-10978 + CVE-2024-10979 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-13.xml new file mode 100644 index 00000000000..77a0f6a0270 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-13.xml @@ -0,0 +1,88 @@ + + + + Spidermonkey: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Spidermonkey, the worst of which could lead to arbitrary code execution. + spidermonkey + 2024-12-08 + 2024-12-08 + 935552 + 936217 + 937469 + 941176 + local and remote + + + 115.15.0 + 115.15.0 + + + +

SpiderMonkey is Mozilla’s JavaScript and WebAssembly Engine, used in Firefox, Servo and various other projects. It is written in C++, Rust and JavaScript. You can embed it into C++ and Rust projects, and it can be run as a stand-alone shell.

+
+ +

Multiple vulnerabilities have been discovered in Spidermonkey. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Spidermonkey users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/spidermonkey-115.15.0:115" + +
+ + CVE-2024-5693 + CVE-2024-5696 + CVE-2024-5700 + CVE-2024-6601 + CVE-2024-6602 + CVE-2024-6603 + CVE-2024-6604 + CVE-2024-7518 + CVE-2024-7519 + CVE-2024-7520 + CVE-2024-7521 + CVE-2024-7522 + CVE-2024-7523 + CVE-2024-7524 + CVE-2024-7525 + CVE-2024-7526 + CVE-2024-7527 + CVE-2024-7528 + CVE-2024-7529 + CVE-2024-7531 + CVE-2024-8381 + CVE-2024-8382 + CVE-2024-8383 + CVE-2024-8384 + CVE-2024-8385 + CVE-2024-8386 + CVE-2024-8387 + CVE-2024-8389 + CVE-2024-8394 + MFSA-2024-25 + MFSA-2024-26 + MFSA-2024-28 + MFSA2024-29 + MFSA2024-30 + MFSA2024-31 + MFSA2024-33 + MFSA2024-34 + MFSA2024-35 + MFSA2024-38 + MFSA2024-39 + MFSA2024-40 + MFSA2024-41 + MFSA2024-43 + MFSA2024-44 + + graaff + graaff +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-14.xml new file mode 100644 index 00000000000..f351fb59fd2 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-14.xml @@ -0,0 +1,51 @@ + + + + HashiCorp Consul: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in HashiCorp Consul, the worst of which could result in denial of service. + consul + 2024-12-08 + 2024-12-08 + 907925 + 917614 + 925030 + remote + + + 1.15.10 + 1.15.10 + + + +

HashiCorp Consul is a tool for service discovery, monitoring and configuration.

+
+ +

Multiple vulnerabilities have been discovered in HashiCorp Consul. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All HashiCorp Consul users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-admin/consul-1.15.10" + +
+ + CVE-2023-1297 + CVE-2023-2816 + CVE-2023-44487 + CVE-2024-23322 + CVE-2024-23323 + CVE-2024-23324 + CVE-2024-23325 + CVE-2024-23327 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-15.xml new file mode 100644 index 00000000000..762abfb6f9c --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-15.xml @@ -0,0 +1,46 @@ + + + + OpenSC: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in OpenSC, the worst of which could lead to arbitrary code execution. + opensc + 2024-12-11 + 2024-12-11 + 907930 + 917651 + local + + + 0.24.0 + 0.24.0 + + + +

OpenSC contains tools and libraries for smart cards.

+
+ +

Multiple vulnerabilities have been discovered in OpenSC. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All OpenSC users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-libs/opensc-0.24.0" + +
+ + CVE-2023-2977 + CVE-2023-4535 + CVE-2023-40660 + CVE-2023-40661 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-16.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-16.xml new file mode 100644 index 00000000000..af826ff2839 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-16.xml @@ -0,0 +1,46 @@ + + + + libvirt: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libvirt, the worst of which could lead to a denial of service. + libvirt + 2024-12-11 + 2024-12-11 + 908042 + 916497 + 929966 + remote + + + 10.2.0 + 10.2.0 + + + +

libvirt is a C toolkit for manipulating virtual machines.

+
+ +

Multiple vulnerabilities have been discovered in libvirt. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libvirt users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-emulation/libvirt-10.2.0" + +
+ + CVE-2023-2700 + CVE-2023-3750 + CVE-2024-2494 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-17.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-17.xml new file mode 100644 index 00000000000..e30b8e8c0bf --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-17.xml @@ -0,0 +1,42 @@ + + + + idna: Denial of Service + A vulnerability has been discovered in idna, which can lead to a denial of service. + idna + 2024-12-11 + 2024-12-11 + 929208 + local + + + 3.7 + 3.7 + + + +

Internationalized Domain Names for Python (IDNA 2008 and UTS #46)

+
+ +

A vulnerability has been discovered in idna. Please review the CVE identifier referenced below for details.

+
+ +

Please review the referenced CVE identifier for details.

+
+ +

There is no known workaround at this time.

+
+ +

All idna users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-python/idna-3.7" + +
+ + CVE-2024-3651 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-18.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-18.xml new file mode 100644 index 00000000000..6d486fe4884 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-18.xml @@ -0,0 +1,42 @@ + + + + Distrobox: Arbitrary Code Execution + A vulnerability has been discovered in Distrobox, which can lead to arbitrary code execution. + distrobox + 2024-12-11 + 2024-12-11 + 927742 + local + + + 1.7.0.1 + 1.7.0.1 + + + +

Use any Linux distribution inside your terminal. Enable both backward and forward compatibility with software and freedom to use whatever distribution you’re more comfortable with. Distrobox uses podman, docker or lilipod to create containers using the Linux distribution of your choice. The created container will be tightly integrated with the host, allowing sharing of the HOME directory of the user, external storage, external USB devices and graphical apps (X11/Wayland), and audio.

+
+ +

A vulnerability has been discovered in Distrobox. Please review the CVE identifier referenced below for details.

+
+ +

Please review the referenced CVE identifier for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Distrobox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-containers/distrobox-1.7.0.1" + +
+ + CVE-2024-29864 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-19.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-19.xml new file mode 100644 index 00000000000..e00b2b93e21 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-19.xml @@ -0,0 +1,42 @@ + + + + eza: Arbitrary Code Execution + A vulnerability has been discovered in eza, which can lead to arbitrary code execution. + eza + 2024-12-11 + 2024-12-11 + 926532 + local + + + 0.18.6 + 0.18.6 + + + +

eza is a modern, maintained replacement for ls, written in rust.

+
+ +

A vulnerability has been discovered in eza. Please review the CVE identifier referenced below for details.

+
+ +

A buffer overflow vulnerability in eza allows local attackers to execute arbitrary code via the .git/HEAD, .git/refs, and .git/objects components.

+
+ +

There is no known workaround at this time.

+
+ +

All eza users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-apps/eza-0.18.6" + +
+ + CVE-2024-25817 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-20.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-20.xml new file mode 100644 index 00000000000..0156abad3cb --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202412-20.xml @@ -0,0 +1,51 @@ + + + + NVIDIA Drivers: Privilege Escalation + Multiple vulnerabilities have been discovered in NVIDIA Drivers, the worst of which could result in privilege escalation. + nvidia-drivers + 2024-12-14 + 2024-12-14 + 942031 + local + + + 535.216.01 + 550.127.05 + 535.216.01 + 550.127.05 + + + +

NVIDIA Drivers are NVIDIA's accelerated graphics driver.

+
+ +

A vulnerability has been discovered in NVIDIA Drivers. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifier for details.

+
+ +

There is no known workaround at this time.

+
+ +

All NVIDIA Drivers 535 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-535.216.01:0/535" + + +

All NVIDIA Drivers 550 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-550.127.05:0/550" + +
+ + CVE-2024-0126 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 264273a75fd..9828bb002c9 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Sun, 01 Dec 2024 06:40:21 +0000 +Wed, 01 Jan 2025 06:40:39 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index 0858bad8cc1..9f09f9ad7dc 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -06b1665a387d4d7cb73b9b91b99b6ed644d013ed 1731837118 2024-11-17T09:51:58Z +75999cf3645e45cf60bdeaf1621c235c071cf08b 1734174153 2024-12-14T11:02:33Z