summaryrefslogtreecommitdiff
path: root/metadata/glsa
diff options
context:
space:
mode:
authorV3n3RiX <venerix@redcorelinux.org>2020-09-16 09:32:48 +0100
committerV3n3RiX <venerix@redcorelinux.org>2020-09-16 09:32:48 +0100
commit9ee6d97c2883d42f204a533a8bc1f4562df778fb (patch)
treeb690ddc0ca30f1472887edbb0b8313629bfcbbb2 /metadata/glsa
parentb17a3ef12038de50228bade1f05502c74e135321 (diff)
gentoo resync : 16.09.2020
Diffstat (limited to 'metadata/glsa')
-rw-r--r--metadata/glsa/Manifest30
-rw-r--r--metadata/glsa/Manifest.files.gzbin483364 -> 485271 bytes
-rw-r--r--metadata/glsa/glsa-202009-01.xml49
-rw-r--r--metadata/glsa/glsa-202009-02.xml52
-rw-r--r--metadata/glsa/glsa-202009-03.xml68
-rw-r--r--metadata/glsa/glsa-202009-04.xml44
-rw-r--r--metadata/glsa/glsa-202009-05.xml50
-rw-r--r--metadata/glsa/glsa-202009-06.xml44
-rw-r--r--metadata/glsa/glsa-202009-07.xml47
-rw-r--r--metadata/glsa/glsa-202009-08.xml49
-rw-r--r--metadata/glsa/glsa-202009-09.xml53
-rw-r--r--metadata/glsa/glsa-202009-10.xml67
-rw-r--r--metadata/glsa/glsa-202009-11.xml48
-rw-r--r--metadata/glsa/glsa-202009-12.xml51
-rw-r--r--metadata/glsa/timestamp.chk2
-rw-r--r--metadata/glsa/timestamp.commit2
16 files changed, 639 insertions, 17 deletions
diff --git a/metadata/glsa/Manifest b/metadata/glsa/Manifest
index 954a48c6a013..f2ecd5c95463 100644
--- a/metadata/glsa/Manifest
+++ b/metadata/glsa/Manifest
@@ -1,23 +1,23 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
-MANIFEST Manifest.files.gz 483364 BLAKE2B 60cb97b03631cf8e2ae2dc903bd9513cac6afc60670d0423e1cab2611545e32583d3cb6ec2628b442c618e39c0dfdf0a41a4e059ac3f323c3c8841b043b7d7cf SHA512 fb8ac7dcc2d9321108b64db583eaeee4a860f2b22afca3fbbd447088e69446c3286299604418071d8c2b233df8f2a4fc97ca2f2a7cc68829b3f5c007c7214a87
-TIMESTAMP 2020-09-02T12:38:34Z
+MANIFEST Manifest.files.gz 485271 BLAKE2B 4eb8988705304f2e383081a3133de4ec8449e5f0f46de62a4f4c2c2af6353817ee8ec26fe0ae3fd4c8426b8050e7c0de9c3059ab313f7900ebd16aafc208995f SHA512 fa3aa9f4ae7a8c7e47f52390c6374a7742be939c44aa7705cde67726e11710429dacc0c2688d754eb68f752d311d29aaf6454c0cefcd866c171ec1f1a33d76df
+TIMESTAMP 2020-09-16T01:38:38Z
-----BEGIN PGP SIGNATURE-----
-iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl9PkkpfFIAAAAAALgAo
+iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl9hbJ5fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx
RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY
-klDPzQ//T3T681/eHoAPg4b/QKVB+/3J5EERVYoJcK+9jO9o9FF13k8nJ052Wysa
-d2RHZ7FnVCwLv45hhzqz1bnKcCJkvNB9m4L3mIWTKLoNZLoNN4MOU0Ynrio92CMT
-3TAOViLTtglSOUWrEL2speNZoc1hwxMjGeLUZ6TIWKKKfY+oP5miM8Z/DMsMCY61
-9z4xaBP9DjCmOvhdvcuQCk+OOu1bBlQc/uEKhGXUC8DffwYL4JJooNskHEmzO771
-UImbjGurYXPgqBTdF8MRPjrJVM3u1cP1a3sVBwvjQ4mDSDFcNuEwu5hsk2yVqQVS
-+hSTHoHdDybAb/EF68UPqRsVl2En4H5hMKiR4Civr7dMO1mR5ft0U0wN9k1y+Bmg
-VZhAOhWPdPZ1X5/P3Jioz11HfFt9o3Y8Pw7pHMDL6hWqwndmVoYZjosPvya9NYEn
-sRxBaxiiYnxG153ZP5tVM5vcNciKQ6/aMs9bDWOWSlibObzaZTR/WFRIO2oBub3z
-8E0k/KDKeqwjJu7PLg4/ah1UzColwE4L+mDC4Xm/5/aZbXSeLPN4+kiIQ2mNWZmc
-NITiZcDUaKmJO7eaofcEcvQw5cpJ0211vswgOZYxqJnuAzG2EurtPYDfgmrTg2Lb
-Wb8D69VJDmh5Xe5/7+oVlyFGeWHr7NAyV3r+c6GaHPHm5c6iE5s=
-=ysAp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+=+FyX
-----END PGP SIGNATURE-----
diff --git a/metadata/glsa/Manifest.files.gz b/metadata/glsa/Manifest.files.gz
index 900daea608e2..3bdc6fcc838a 100644
--- a/metadata/glsa/Manifest.files.gz
+++ b/metadata/glsa/Manifest.files.gz
Binary files differ
diff --git a/metadata/glsa/glsa-202009-01.xml b/metadata/glsa/glsa-202009-01.xml
new file mode 100644
index 000000000000..0bb5e7ea2a7c
--- /dev/null
+++ b/metadata/glsa/glsa-202009-01.xml
@@ -0,0 +1,49 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-01">
+ <title>GnuTLS: Denial of service</title>
+ <synopsis>A flaw was found in GnuTLS, possibly allowing a Denial of Service
+ condition.
+ </synopsis>
+ <product type="ebuild">gnutls</product>
+ <announced>2020-09-06</announced>
+ <revised count="1">2020-09-06</revised>
+ <bug>740390</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="net-libs/gnutls" auto="yes" arch="*">
+ <unaffected range="ge">3.6.15</unaffected>
+ <vulnerable range="lt">3.6.15</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>GnuTLS is an Open Source implementation of the TLS and SSL protocols.</p>
+ </background>
+ <description>
+ <p>It was found that GnuTLS didn’t handle “no_renegotiation” alert
+ properly.
+ </p>
+ </description>
+ <impact type="low">
+ <p>A remote attacker could entice a user to connect to a malicious TLS
+ endpoint using an application linked against GnuTLS, possibly resulting
+ in a Denial of Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All GnuTLS users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/gnutls-3.6.15"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-24659">CVE-2020-24659</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-05T22:09:30Z">sam_c</metadata>
+ <metadata tag="submitter" timestamp="2020-09-06T00:19:19Z">sam_c</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202009-02.xml b/metadata/glsa/glsa-202009-02.xml
new file mode 100644
index 000000000000..72f3601248a3
--- /dev/null
+++ b/metadata/glsa/glsa-202009-02.xml
@@ -0,0 +1,52 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-02">
+ <title>Dovecot: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in Dovecot, the worst of
+ which could allow remote attackers to cause a Denial of Service condition.
+ </synopsis>
+ <product type="ebuild">dovecot</product>
+ <announced>2020-09-06</announced>
+ <revised count="1">2020-09-06</revised>
+ <bug>736617</bug>
+ <access>remote</access>
+ <affected>
+ <package name="net-mail/dovecot" auto="yes" arch="*">
+ <unaffected range="ge">2.3.11.3</unaffected>
+ <vulnerable range="lt">2.3.11.3</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Dovecot is an open source IMAP and POP3 email server.</p>
+ </background>
+ <description>
+ <p>It was discovered that Dovecot incorrectly handled deeply nested MIME
+ parts, incorrectly handled memory when using NTLM, and incorrectly
+ handled zero-length messages.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could send a specially crafted mail or send specially
+ crafted authentication requests possibly resulting in a Denial of Service
+ condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Dovecot users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-mail/dovecot-2.3.11.3"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-12100">CVE-2020-12100</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-12673">CVE-2020-12673</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-12674">CVE-2020-12674</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-06T00:07:17Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2020-09-06T00:20:00Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202009-03.xml b/metadata/glsa/glsa-202009-03.xml
new file mode 100644
index 000000000000..fe967a8a1eb8
--- /dev/null
+++ b/metadata/glsa/glsa-202009-03.xml
@@ -0,0 +1,68 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-03">
+ <title>Chromium, Google Chrome: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in Chromium and Google
+ Chrome, the worst of which could result in the arbitrary execution of code.
+ </synopsis>
+ <product type="ebuild">chromium,google-chrome</product>
+ <announced>2020-09-10</announced>
+ <revised count="1">2020-09-10</revised>
+ <bug>741312</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="www-client/chromium" auto="yes" arch="*">
+ <unaffected range="ge">85.0.4183.102</unaffected>
+ <vulnerable range="lt">85.0.4183.102</vulnerable>
+ </package>
+ <package name="www-client/google-chrome" auto="yes" arch="*">
+ <unaffected range="ge">85.0.4183.102</unaffected>
+ <vulnerable range="lt">85.0.4183.102</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Chromium is an open-source browser project that aims to build a safer,
+ faster, and more stable way for all users to experience the web.
+ </p>
+
+ <p>Google Chrome is one fast, simple, and secure browser for all your
+ devices.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Chromium and Google
+ Chrome. Please review the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Chromium users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=www-client/chromium-85.0.4183.102"
+ </code>
+
+ <p>All Google Chrome users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=www-client/google-chrome-85.0.4183.102"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15959">CVE-2020-15959</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-6573">CVE-2020-6573</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-6575">CVE-2020-6575</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-6576">CVE-2020-6576</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-08T19:09:18Z">sam_c</metadata>
+ <metadata tag="submitter" timestamp="2020-09-10T00:02:20Z">sam_c</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202009-04.xml b/metadata/glsa/glsa-202009-04.xml
new file mode 100644
index 000000000000..c3a3e40d2dba
--- /dev/null
+++ b/metadata/glsa/glsa-202009-04.xml
@@ -0,0 +1,44 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-04">
+ <title>Qt GUI: Buffer overflow</title>
+ <synopsis>Qt GUI has a buffer overflow with unspecified impact.</synopsis>
+ <product type="ebuild">qtgui</product>
+ <announced>2020-09-13</announced>
+ <revised count="1">2020-09-13</revised>
+ <bug>736924</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="dev-qt/qtgui" auto="yes" arch="*">
+ <unaffected range="ge">5.14.2-r1</unaffected>
+ <vulnerable range="lt">5.14.2-r1</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>The GUI module and platform plugins for the Qt5 framework.</p>
+ </background>
+ <description>
+ <p>It was discovered that Qt GUI’s XBM parser did not properly handle X
+ BitMap files.
+ </p>
+ </description>
+ <impact type="low">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Qt GUI users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=dev-qt/qtgui-5.14.2-r1"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-17507">CVE-2020-17507</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-13T22:36:51Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2020-09-13T23:24:26Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202009-05.xml b/metadata/glsa/glsa-202009-05.xml
new file mode 100644
index 000000000000..6ae334f3e7dd
--- /dev/null
+++ b/metadata/glsa/glsa-202009-05.xml
@@ -0,0 +1,50 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-05">
+ <title>GStreamer RTSP Server: Denial of service</title>
+ <synopsis>A vulnerability in GStreamer RTSP Server could lead to a Denial of
+ Service condition.
+ </synopsis>
+ <product type="ebuild">gst-rtsp-server</product>
+ <announced>2020-09-13</announced>
+ <revised count="1">2020-09-13</revised>
+ <bug>715100</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="media-libs/gst-rtsp-server" auto="yes" arch="*">
+ <unaffected range="ge">1.16.2</unaffected>
+ <vulnerable range="lt">1.16.2</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>RTSP server library based on GStreamer.</p>
+ </background>
+ <description>
+ <p>It was discovered that GStreamer RTSP Server did not properly handle
+ authentication.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker, by sending specially crafted authentication requests,
+ could possibly cause a Denial of Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All GStreamer RTSP Server users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=media-libs/gst-rtsp-server-1.16.2"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-6095">CVE-2020-6095</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-13T22:27:11Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2020-09-13T23:24:44Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202009-06.xml b/metadata/glsa/glsa-202009-06.xml
new file mode 100644
index 000000000000..4b5a2bdb6342
--- /dev/null
+++ b/metadata/glsa/glsa-202009-06.xml
@@ -0,0 +1,44 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-06">
+ <title>GNOME File Roller: Directory traversal</title>
+ <synopsis>A vulnerability in GNOME File Roller could lead to a directory
+ traversal attack.
+ </synopsis>
+ <product type="ebuild">file-roller</product>
+ <announced>2020-09-13</announced>
+ <revised count="1">2020-09-13</revised>
+ <bug>717362</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="app-arch/file-roller" auto="yes" arch="*">
+ <unaffected range="ge">3.36.3</unaffected>
+ <vulnerable range="lt">3.36.3</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>File Roller is an archive manager for the GNOME desktop environment.</p>
+ </background>
+ <description>
+ <p>It was discovered that GNOME File Roller incorrectly handled symlinks.</p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All GNOME File Roller users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=app-arch/file-roller-3.36.3"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-11736">CVE-2020-11736</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-13T22:21:19Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2020-09-13T23:25:31Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202009-07.xml b/metadata/glsa/glsa-202009-07.xml
new file mode 100644
index 000000000000..7722f7890932
--- /dev/null
+++ b/metadata/glsa/glsa-202009-07.xml
@@ -0,0 +1,47 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-07">
+ <title>Perl DBI: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in the Perl module DBI,
+ the worst of which could result in a Denial of Service condition.
+ </synopsis>
+ <product type="ebuild">dbi</product>
+ <announced>2020-09-13</announced>
+ <revised count="1">2020-09-13</revised>
+ <bug>732636</bug>
+ <access>local</access>
+ <affected>
+ <package name="dev-perl/DBI" auto="yes" arch="*">
+ <unaffected range="ge">1.643.0</unaffected>
+ <vulnerable range="lt">1.643.0</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>A database access module for the Perl programming language.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in the Perl module DBI.
+ Please review the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="low">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Perl DBI module users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=dev-perl/DBI-1.643.0"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14392">CVE-2020-14392</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14393">CVE-2020-14393</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-13T21:54:26Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2020-09-13T23:26:05Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202009-08.xml b/metadata/glsa/glsa-202009-08.xml
new file mode 100644
index 000000000000..f95557751113
--- /dev/null
+++ b/metadata/glsa/glsa-202009-08.xml
@@ -0,0 +1,49 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-08">
+ <title>GNOME Shell: Information disclosure</title>
+ <synopsis>An information disclosure vulnerability in GNOME Shell might allow
+ local attackers to obtain sensitive information.
+ </synopsis>
+ <product type="ebuild">gnome-shell</product>
+ <announced>2020-09-13</announced>
+ <revised count="1">2020-09-13</revised>
+ <bug>736802</bug>
+ <access>local</access>
+ <affected>
+ <package name="gnome-base/gnome-shell" auto="yes" arch="*">
+ <unaffected range="ge">3.34.5-r1</unaffected>
+ <vulnerable range="lt">3.34.5-r1</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>GNOME Shell provides core user interface functions for the GNOME 3
+ desktop, like switching to windows and launching applications.
+ </p>
+ </background>
+ <description>
+ <p>It was discovered that GNOME Shell incorrectly handled the login screen
+ password dialog.
+ </p>
+ </description>
+ <impact type="low">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All GNOME Shell users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=gnome-base/gnome-shell-3.34.5-r1"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-17489">CVE-2020-17489</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-13T22:02:20Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2020-09-13T23:26:21Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202009-09.xml b/metadata/glsa/glsa-202009-09.xml
new file mode 100644
index 000000000000..4716f54af843
--- /dev/null
+++ b/metadata/glsa/glsa-202009-09.xml
@@ -0,0 +1,53 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-09">
+ <title>Nextcloud Desktop Sync client: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in Nextcloud Desktop Sync
+ client, the worst of which may allow execution of arbitrary code.
+ </synopsis>
+ <product type="ebuild">nextcloud-client</product>
+ <announced>2020-09-13</announced>
+ <revised count="1">2020-09-13</revised>
+ <bug>736649</bug>
+ <access>remote</access>
+ <affected>
+ <package name="net-misc/nextcloud-client" auto="yes" arch="*">
+ <unaffected range="ge">2.6.5</unaffected>
+ <vulnerable range="lt">2.6.5</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Nextcloud Desktop Sync client can synchronize one or more directories to
+ Nextcloud server.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Nextcloud Desktop Sync
+ client. Please review the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Nextcloud Desktop Sync client users should upgrade to the latest
+ version:
+ </p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/nextcloud-client-2.6.5"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-8189">CVE-2020-8189</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-8224">CVE-2020-8224</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-8227">CVE-2020-8227</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-12T20:28:32Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2020-09-13T23:26:38Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202009-10.xml b/metadata/glsa/glsa-202009-10.xml
new file mode 100644
index 000000000000..3ff0e04b3374
--- /dev/null
+++ b/metadata/glsa/glsa-202009-10.xml
@@ -0,0 +1,67 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-10">
+ <title>PHP: Denial of service</title>
+ <synopsis>A vulnerabilities in PHP could lead to a Denial of Service
+ condition.
+ </synopsis>
+ <product type="ebuild">PHP</product>
+ <announced>2020-09-13</announced>
+ <revised count="1">2020-09-13</revised>
+ <bug>736158</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="dev-lang/php" auto="yes" arch="*">
+ <unaffected range="ge" slot="7.2">7.2.33</unaffected>
+ <unaffected range="ge" slot="7.3">7.3.21</unaffected>
+ <unaffected range="ge" slot="7.4">7.4.9</unaffected>
+ <vulnerable range="lt" slot="7.2">7.2.33</vulnerable>
+ <vulnerable range="lt" slot="7.3">7.3.21</vulnerable>
+ <vulnerable range="lt" slot="7.4">7.4.9</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>PHP is an open source general-purpose scripting language that is
+ especially suited for web development.
+ </p>
+ </background>
+ <description>
+ <p>It was discovered that PHP did not properly handle PHAR files.</p>
+ </description>
+ <impact type="low">
+ <p>A remote attacker could entice a user to open a specially crafted PHAR
+ file using PHP, possibly allowing attacker to obtain sensitive
+ information or cause a Denial of Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All PHP 7.2 users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-7.2.33"
+ </code>
+
+ <p>All PHP 7.3 users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-7.3.21"
+ </code>
+
+ <p>All PHP 7.4 users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=dev-lang/php-7.4.9"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-7068">CVE-2020-7068</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-12T20:12:49Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2020-09-13T23:26:59Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202009-11.xml b/metadata/glsa/glsa-202009-11.xml
new file mode 100644
index 000000000000..0db2968196ad
--- /dev/null
+++ b/metadata/glsa/glsa-202009-11.xml
@@ -0,0 +1,48 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-11">
+ <title>ProFTPD: Denial of service</title>
+ <synopsis>A vulnerability in ProFTPD could lead to a Denial of Service
+ condition.
+ </synopsis>
+ <product type="ebuild">proftpd</product>
+ <announced>2020-09-13</announced>
+ <revised count="1">2020-09-13</revised>
+ <bug>733376</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="net-ftp/proftpd" auto="yes" arch="*">
+ <unaffected range="ge">1.3.7a</unaffected>
+ <vulnerable range="lt">1.3.7a</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>ProFTPD is an advanced and very configurable FTP server.</p>
+ </background>
+ <description>
+ <p>It was found that ProFTPD did not properly handle invalid SCP commands.</p>
+ </description>
+ <impact type="low">
+ <p>An authenticated remote attacker could issue invalid SCP commands,
+ possibly resulting in a Denial of Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All ProFTPD users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-ftp/proftpd-1.3.7a"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://github.com/proftpd/proftpd/issues/1043">Invalid SCP
+ command leads to null pointer dereference
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-12T20:04:18Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2020-09-13T23:27:17Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-202009-12.xml b/metadata/glsa/glsa-202009-12.xml
new file mode 100644
index 000000000000..a29860260437
--- /dev/null
+++ b/metadata/glsa/glsa-202009-12.xml
@@ -0,0 +1,51 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202009-12">
+ <title>ZeroMQ: Denial of service</title>
+ <synopsis>A vulnerability in ZeroMQ could lead to a Denial of Service
+ condition.
+ </synopsis>
+ <product type="ebuild">zeromq</product>
+ <announced>2020-09-13</announced>
+ <revised count="1">2020-09-13</revised>
+ <bug>740574</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="net-libs/zeromq" auto="yes" arch="*">
+ <unaffected range="ge">4.3.3</unaffected>
+ <vulnerable range="lt">4.3.3</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Looks like an embeddable networking library but acts like a concurrency
+ framework.
+ </p>
+ </background>
+ <description>
+ <p>It was discovered that ZeroMQ does not properly handle connecting peers
+ before a handshake is completed.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>An unauthenticated remote attacker able to connect to a ZeroMQ endpoint,
+ even with CURVE encryption/authentication enabled, can cause a Denial of
+ Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All ZeroMQ users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-libs/zeromq-4.3.3"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-15166">CVE-2020-15166</uri>
+ </references>
+ <metadata tag="requester" timestamp="2020-09-12T19:44:05Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2020-09-13T23:27:38Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/timestamp.chk b/metadata/glsa/timestamp.chk
index 0d602e3dd4cf..c2e62f15eacb 100644
--- a/metadata/glsa/timestamp.chk
+++ b/metadata/glsa/timestamp.chk
@@ -1 +1 @@
-Wed, 02 Sep 2020 12:38:30 +0000
+Wed, 16 Sep 2020 01:38:35 +0000
diff --git a/metadata/glsa/timestamp.commit b/metadata/glsa/timestamp.commit
index 1a7e9cc72562..fd63cfbeda80 100644
--- a/metadata/glsa/timestamp.commit
+++ b/metadata/glsa/timestamp.commit
@@ -1 +1 @@
-ea9671c73a3b7457c7e4487c1c538557855dfa44 1598822050 2020-08-30T21:14:10+00:00
+7204454a89cbf14c4905c5fdedcd66553a95e8aa 1600040174 2020-09-13T23:36:14+00:00