From 9173f73d44f3cbc858477bd71e7680ede7d98e0d Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Fri, 22 Dec 2023 13:48:31 +0000 Subject: gentoo auto-resync : 22:12:2023 - 13:48:30 --- metadata/glsa/Manifest | 30 +++++++------- metadata/glsa/Manifest.files.gz | Bin 555967 -> 556922 bytes metadata/glsa/glsa-202312-04.xml | 42 +++++++++++++++++++ metadata/glsa/glsa-202312-05.xml | 46 +++++++++++++++++++++ metadata/glsa/glsa-202312-06.xml | 69 +++++++++++++++++++++++++++++++ metadata/glsa/glsa-202312-07.xml | 87 +++++++++++++++++++++++++++++++++++++++ metadata/glsa/glsa-202312-08.xml | 42 +++++++++++++++++++ metadata/glsa/glsa-202312-09.xml | 45 ++++++++++++++++++++ metadata/glsa/timestamp.chk | 2 +- metadata/glsa/timestamp.commit | 2 +- 10 files changed, 348 insertions(+), 17 deletions(-) create mode 100644 metadata/glsa/glsa-202312-04.xml create mode 100644 metadata/glsa/glsa-202312-05.xml create mode 100644 metadata/glsa/glsa-202312-06.xml create mode 100644 metadata/glsa/glsa-202312-07.xml create mode 100644 metadata/glsa/glsa-202312-08.xml create mode 100644 metadata/glsa/glsa-202312-09.xml (limited to 'metadata/glsa') diff --git a/metadata/glsa/Manifest b/metadata/glsa/Manifest index 53c7ffd3e8b1..775096a7f6f3 100644 --- a/metadata/glsa/Manifest +++ b/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 555967 BLAKE2B f8d4fef48648a9d09bbe93d208448de86b22cd76da4d314ac930d88c564c4839518a18954f79ce2207b72e6559b200a25946f00b481a39f8f280a3da7d8bd5d0 SHA512 e6bd36f85039b3e2f213edf290b2f44b0dfedc95bf381b126768d42ddf622495421571000978e136eb8f92aa4df5801ecf04d531f791c017b32a4ad73b757884 -TIMESTAMP 2023-12-22T07:10:03Z +MANIFEST Manifest.files.gz 556922 BLAKE2B 4af97573db7aa951e408380dafaf4564604dab984a92046d73d1682616bf5972d8277f1ff5a139ca402707c848cbc37c64071d88cba8e2a217aa0fa1c81922f9 SHA512 ff2c1ae85d7fd96100abd1ac489ec14ce252228d4d7f01d4cc15ce1d273416a97c18a8c2879acb4b68cc91a2cec9f67808cb86557333ea7c653ae804465d62e0 +TIMESTAMP 2023-12-22T12:53:56Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmWFNktfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmWFhuVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klDryw/6AwqEfxmMZ44e7J80Jf8odi31BoRGEDjQNMzkiS1fx/AB3Hbtf9GVin/k -D3okI/vyvxmtq+3ZphJ/LM9NYCiFKZleRRALIvxMjOAK0SiZur7GC5EuiFl5CSib -BvmssBlGNflevb7d/2l3lJFJG5XTVwfyFswzdp9+DcRnIBVUS28JLWKZSVilhRBB -UoYPF/LFl48d6AaCgB0N5W+ZTqgSxUZ59xQda7/ya8OPshb+FsqbhTr4g3Hih1FM -ixEe5uNjvsSNpbzdvHOijDYo78rhmRFjAJu8rLOlGXjY8P31bva7mvN5bkDTRgBp -KCBMUiNEFWBKA3B6ldh0dTnTcbD7c3edOh4O1mAE4upCC2NlzPS4qyGnv05/goXG -j+Fw9+9VK6ZWs2mMskHe2N24dSFl/uzD/wYgjSSl8m3aNoqBMCsOvq2cIK8U5/gO -DQ5t2Ayu4Dy1VD5UOxxvy0b9z9yWtEs9PpKtirvcC33Qb+GvQSN+thn0LcFQkYHv -x9xlnNDLVxJ3HC9I7nnEdufub3wIqqV7+HKSNHAvahgRuPK6ZaE1L7MmTR8DYLfq -tgRsnFBY5vR5vhi5+597v+wxuLkZlP97rLq1XxCopvSo5YVQt14fYET6tVX+NAnv -tgXfYtoLKjXT9uwisWZRG8vJ54F9Md6cj0UBKLeQT2L/vEaxNFM= -=cQ8t +klAaFQ/9HX+qDTHNEBNATtuTCYOCoSig88NaIjtgW/fTNTqKXykgUDRENc7GTl4+ +ix09n2RUeOiuo0XZEeDln1ByjxWcZW9xuigj1D1ZgltDOuAcxnVvbjvBLA0rL0cu +B7dWC6iXz8N+3jk0Xz8r+wgOfkE2tCqqu443FYzAXNwybafMQ4BT+Uyq6FxWC1RP ++iKED/2BQqWJ9VzD7UiXil2WbPLMVK8dV52BanMoSP4EO/qvcbTMrtlNWZXHz/SM +9nxs2ixD1bw7JicNf5JNS1VD+ogjM7eTZHLCR+d5r7/KoNY2H3jXGm+Qga8vVuoF +WbBWbWPy13zhsgsNTM6WI0v5VNo3MdLwm4ujWNRsNSskhk/54F53MUJ+ADmtoazy +rMyzn+oR/ssk8rYyrBdx/6SvSkCdvXtqrDL/t5H7x0Di8NSbI/OWVCQLcEXjgEhY +jOkhqAZ0ye9aFWxLphXkR27IkL/HFRurGgwWbf6lAxSzO8iJSAyRm381JpHQiMGI +pmpiW3/o7GhrEWfCEJhnpoU7xnxJYqEOZxttrwJC8+pKRUo/J6fGMyob3DylDI5O +Ed664jTNoI5oY0pTDomVa4glwr4qbGYX4Z1WieCfEv3jnMmelzl4+5oFmKAkaxoM +68sxMi96y+zMrgytjDv0b7YcdRSjzcAgRrEqsQbd7JiWcZzdets= +=jBjJ -----END PGP SIGNATURE----- diff --git a/metadata/glsa/Manifest.files.gz b/metadata/glsa/Manifest.files.gz index 16c98dfcf002..fbe6d36a44bb 100644 Binary files a/metadata/glsa/Manifest.files.gz and b/metadata/glsa/Manifest.files.gz differ diff --git a/metadata/glsa/glsa-202312-04.xml b/metadata/glsa/glsa-202312-04.xml new file mode 100644 index 000000000000..6bd77e7aabfc --- /dev/null +++ b/metadata/glsa/glsa-202312-04.xml @@ -0,0 +1,42 @@ + + + + Arduino: Remote Code Execution + A vulnerability has been found in Arduino which bundled a vulnerable version of log4j. + arduino + 2023-12-22 + 2023-12-22 + 830716 + remote + + + 1.8.19 + 1.8.19 + + + +

Arduino is an open-source AVR electronics prototyping platform.

+
+ +

A vulnerability has been discovered in Arduino. Please review the CVE identifier referenced below for details.

+
+ +

Arduino bundles a vulnerable version of log4j that may lead to remote code execution.

+
+ +

There is no known workaround at this time.

+
+ +

All Arduino users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-embedded/arduino-1.8.19" + +
+ + CVE-2021-4104 + + graaff + graaff +
\ No newline at end of file diff --git a/metadata/glsa/glsa-202312-05.xml b/metadata/glsa/glsa-202312-05.xml new file mode 100644 index 000000000000..7f286dd03d20 --- /dev/null +++ b/metadata/glsa/glsa-202312-05.xml @@ -0,0 +1,46 @@ + + + + libssh: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in libssh, the worst of which could lead to remote code execution. + libssh + 2023-12-22 + 2023-12-22 + 810517 + 905746 + remote + + + 0.10.5 + 0.10.5 + + + +

libssh is a multiplatform C library implementing the SSHv2 protocol on client and server side.

+
+ +

Multiple vulnerabilities have been discovered in libssh. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libssh users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/libssh-0.10.5" + +
+ + CVE-2021-3634 + CVE-2023-1667 + CVE-2023-2283 + GHSL-2023-085 + + graaff + graaff +
\ No newline at end of file diff --git a/metadata/glsa/glsa-202312-06.xml b/metadata/glsa/glsa-202312-06.xml new file mode 100644 index 000000000000..9943781b2989 --- /dev/null +++ b/metadata/glsa/glsa-202312-06.xml @@ -0,0 +1,69 @@ + + + + Exiv2: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Exiv2, the worst of which can lead to remote code execution. + exiv2 + 2023-12-22 + 2023-12-22 + 785646 + 807346 + 917650 + local and remote + + + 0.28.1 + 0.28.1 + + + +

Exiv2 is a C++ library and set of tools for parsing, editing and saving Exif and IPTC metadata from images. Exif, the Exchangeable image file format, specifies the addition of metadata tags to JPEG, TIFF and RIFF files.

+
+ +

Multiple vulnerabilities have been discovered in Exiv2. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Exiv2 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-gfx/exiv2-0.28.1" + +
+ + CVE-2020-18771 + CVE-2020-18773 + CVE-2020-18774 + CVE-2020-18899 + CVE-2021-29457 + CVE-2021-29458 + CVE-2021-29463 + CVE-2021-29464 + CVE-2021-29470 + CVE-2021-29473 + CVE-2021-29623 + CVE-2021-31291 + CVE-2021-31292 + CVE-2021-32617 + CVE-2021-32815 + CVE-2021-34334 + CVE-2021-34335 + CVE-2021-37615 + CVE-2021-37616 + CVE-2021-37618 + CVE-2021-37619 + CVE-2021-37620 + CVE-2021-37621 + CVE-2021-37622 + CVE-2021-37623 + CVE-2023-44398 + + graaff + graaff +
\ No newline at end of file diff --git a/metadata/glsa/glsa-202312-07.xml b/metadata/glsa/glsa-202312-07.xml new file mode 100644 index 000000000000..66081cf21c67 --- /dev/null +++ b/metadata/glsa/glsa-202312-07.xml @@ -0,0 +1,87 @@ + + + + QtWebEngine: Multiple Vulnerabilities + Multiple vulnerabilitiies have been discovered in QtWebEngine, the worst of which could lead to remote code execution. + qtwebengine + 2023-12-22 + 2023-12-22 + 913050 + 915465 + remote + + + 5.15.11_p20231120 + 5.15.11_p20231120 + + + +

QtWebEngine is a library for rendering dynamic web content in Qt5 and Qt6 C++ and QML applications.

+
+ +

Multiple vulnerabilities have been discovered in QtWebEngine. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All QtWebEngine users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtwebengine-5.15.11_p20231120" + +
+ + CVE-2023-4068 + CVE-2023-4069 + CVE-2023-4070 + CVE-2023-4071 + CVE-2023-4072 + CVE-2023-4073 + CVE-2023-4074 + CVE-2023-4075 + CVE-2023-4076 + CVE-2023-4077 + CVE-2023-4078 + CVE-2023-4761 + CVE-2023-4762 + CVE-2023-4763 + CVE-2023-4764 + CVE-2023-5218 + CVE-2023-5473 + CVE-2023-5474 + CVE-2023-5475 + CVE-2023-5476 + CVE-2023-5477 + CVE-2023-5478 + CVE-2023-5479 + CVE-2023-5480 + CVE-2023-5481 + CVE-2023-5482 + CVE-2023-5483 + CVE-2023-5484 + CVE-2023-5485 + CVE-2023-5486 + CVE-2023-5487 + CVE-2023-5849 + CVE-2023-5850 + CVE-2023-5851 + CVE-2023-5852 + CVE-2023-5853 + CVE-2023-5854 + CVE-2023-5855 + CVE-2023-5856 + CVE-2023-5857 + CVE-2023-5858 + CVE-2023-5859 + CVE-2023-5996 + CVE-2023-5997 + CVE-2023-6112 + + graaff + graaff +
\ No newline at end of file diff --git a/metadata/glsa/glsa-202312-08.xml b/metadata/glsa/glsa-202312-08.xml new file mode 100644 index 000000000000..ef351a71a433 --- /dev/null +++ b/metadata/glsa/glsa-202312-08.xml @@ -0,0 +1,42 @@ + + + + LibRaw: Heap Buffer Overflow + A vulnerability has been found in LibRaw where a heap buffer overflow may lead to an application crash. + libraw + 2023-12-22 + 2023-12-22 + 908041 + remote + + + 0.21.1-r1 + 0.21.1-r1 + + + +

LibRaw is a library for reading RAW files obtained from digital photo cameras.

+
+ +

A vulnerability has been discovered in LibRaw. Please review the CVE identifier referenced below for details.

+
+ +

A heap-buffer-overflow in raw2image_ex() caused by a maliciously crafted file may lead to an application crash.

+
+ +

There is no known workaround at this time.

+
+ +

All LibRaw users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libraw-0.21.1-r1" + +
+ + CVE-2023-1729 + + graaff + graaff +
\ No newline at end of file diff --git a/metadata/glsa/glsa-202312-09.xml b/metadata/glsa/glsa-202312-09.xml new file mode 100644 index 000000000000..2073312aa85e --- /dev/null +++ b/metadata/glsa/glsa-202312-09.xml @@ -0,0 +1,45 @@ + + + + NASM: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in NASM, the worst of which could lead to arbitrary code execution. + nasm + 2023-12-22 + 2023-12-22 + 686720 + 903755 + local and remote + + + 2.16.01 + 2.16.01 + + + +

NASM is a 80x86 assembler that has been created for portability and modularity. NASM supports Pentium, P6, SSE MMX, and 3DNow extensions. It also supports a wide range of objects formats (ELF, a.out, COFF, etc), and has its own disassembler.

+
+ +

Multiple vulnerabilities have been discovered in NASM. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All NASM users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/nasm-2.16.01" + +
+ + CVE-2019-8343 + CVE-2020-21528 + CVE-2022-44370 + + graaff + graaff +
\ No newline at end of file diff --git a/metadata/glsa/timestamp.chk b/metadata/glsa/timestamp.chk index 2fa20aca64d3..0fce71efb089 100644 --- a/metadata/glsa/timestamp.chk +++ b/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Fri, 22 Dec 2023 07:10:00 +0000 +Fri, 22 Dec 2023 12:53:51 +0000 diff --git a/metadata/glsa/timestamp.commit b/metadata/glsa/timestamp.commit index a634e4ed0d72..920ff58ffd43 100644 --- a/metadata/glsa/timestamp.commit +++ b/metadata/glsa/timestamp.commit @@ -1 +1 @@ -d581a8407333114280b6515712cb22816e2b9f36 1703057325 2023-12-20T07:28:45+00:00 +9f9ee310bf6c4ebf26d43ff75e027e27f23beb80 1703247114 2023-12-22T12:11:54+00:00 -- cgit v1.2.3