From fcc5224904648a8e6eb528d7603154160a20022f Mon Sep 17 00:00:00 2001 From: V3n3RiX Date: Wed, 2 Feb 2022 01:39:05 +0000 Subject: gentoo resync : 02.02.2022 --- metadata/glsa/Manifest | 30 ++--- metadata/glsa/Manifest.files.gz | Bin 517807 -> 518284 bytes metadata/glsa/glsa-202201-01.xml | 44 +++++++ metadata/glsa/glsa-202201-02.xml | 257 +++++++++++++++++++++++++++++++++++++++ metadata/glsa/glsa-202202-01.xml | 111 +++++++++++++++++ metadata/glsa/timestamp.chk | 2 +- metadata/glsa/timestamp.commit | 2 +- 7 files changed, 429 insertions(+), 17 deletions(-) create mode 100644 metadata/glsa/glsa-202201-01.xml create mode 100644 metadata/glsa/glsa-202201-02.xml create mode 100644 metadata/glsa/glsa-202202-01.xml (limited to 'metadata/glsa') diff --git a/metadata/glsa/Manifest b/metadata/glsa/Manifest index 8fc6ae3d0ff4..c701f32555c8 100644 --- a/metadata/glsa/Manifest +++ b/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 517807 BLAKE2B 2ecdb63e9cfe1a1b71d23ab4fe58b057928be5a410ab9012b87ec1e7c917af227099229248e5b2c7dc5b25edb96e4adad920259d956349d0ecbb204178f8da2c SHA512 4ca9cc06a8ae7d4eefdd8a435b92f1f4e675295b618afdb11cf1d7f45b49f0fd5137f7f0c81b60933a8b942fe25de9928a9f4ffe0d5968bae8eae39c95a7da50 -TIMESTAMP 2022-01-16T19:39:06Z +MANIFEST Manifest.files.gz 518284 BLAKE2B cb5fac863af3ef8aeec2b30770dcc46b92cbbaa35f883be3558623dd9e5b3307de19f033786959c2acefd089b402b92ae2601f1a2c9fbecd7bfee07eeebbf7b1 SHA512 052cb56c55e024e97ce62af25a94a63d53c61d2136da88877dd492ef68703ac7e8da03f6d57bdbf30b2c7ff7dccedfad2ae627469dda5745354b99d6f6e960d8 +TIMESTAMP 2022-02-02T00:09:13Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmHkdFpfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmH5y6lfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klDeKA//fMF7Ebx31DUH5EtGBzIEA5j6gp1dZkqiYmZpZnzNRxEpTKD1yJkdwRj5 -rwbfhlIpJDpWlEwHZVqaGSVc0PNqm7/Q1Yj6XAwy9XFMvwWF/dxpEQFSZnkB3ZH/ -ry3AnmdqCjMo4AH4UNNqBk/1Ny9lQHUurwjdYmtVOajiu7j5a1wfovuCNBN4MJ2M -gQ1lOGbhC76IKD/Svlo6sqbm/pH9R6+TUCvqlf89a2WhLsKbaceNrQNRC+NHhdT7 -lUC8usLvB/aZkxpx5jjboANrkpPX0pe8IhRq9ynokWsIUAS/i61e/TTk+rTnn0uc -kLk3mzaSoGsveizPPlHMuxi53Xxx20u516HUBiqS3Lla+86MkaMjrjs4CcvlsCAF -aMkD1R8+/XvjS0ACHiERN3zGcWyntmur2hdl/KYWAXaASNu35s1tjAb9tltypZgk -p68n7hTpiV4qzO7Fj3l468zpap6XrPgrjpVzZOoAaAOmbocyUIH+YbS6HOCk73Ku -Gd623OJwc5xoZXiG2UClxWLqEju7holTNjTOzPkAeMyM80tT2vmJgmwp89+tLQpT -/5Tz4QTZwvpg2203siQjyDy7redG1grvgofSphDKqvmYL/N5WN97nTpac1o7DuPv -WuBuU4pJUnGr7qXmTuT43IekYgmv/L4UTWsncHYX3Bgf3SsEYFY= -=/rZp +klCWrg/5AQb9fUAY1Z8o2AYlWPpwcfOjZJHf/B9kRiZ1kcFdpPrWsGXUqL/QtXEX +usof0+97y6/nFWhKQxLqVsTY9V6WCq4grT4hV6fwazEs94IGkZcSMd+wgAnaoDzC +aoFyDRxJOH2/liMN33A2t8KpZ3WqTG+vcKLf4ZJlTK2HgjPjlIfpZpiXUSR3kIZ2 +baAP9NwKLvRMBjSYmhANnhYWj8ft7DuF3TMC+6oABmfADzBMolaV2QcwfrPp4ysh +sMnIBQDoDr9OLjx25EFv3woYr6u2W5Re9GbbFoY4vG5JTwc/bWCBI8RSfkxG/Z8o +c7JwsNQBVfrh/bcIrJh1WnOA+cI17nsafMhR4Jm+wYEy0ZUIS2irj/MONpu/0Vgg +djhWzWrVq6s6WNPRDFfQKMQlE2r3sbdmjMiVqSqsP7pzOlfoIcexxcA/6ZtXweom +zfte0O6bsfPi6VU1+eNxwN/MOpdAvgeiCTvIjxhwsivGdJqXmibSXXpEUuDI8TLy +SAD1cOm1O9VO6oxsoUTJLnr6NDhVl3khWtznFO8/Htl+3F41daXz2PTZwwlUDV1c +RMMeM8E/4sQ4+OK8yXFA40Aio2OLXYDJ5lRa+UbKpBqtzXiYJBTJ+YpZZUDzYoum +DNI6t169r/odSFWOaAuq9ostOwf2UJzcT+u9YJrk3FpY1A5falE= +=V5HZ -----END PGP SIGNATURE----- diff --git a/metadata/glsa/Manifest.files.gz b/metadata/glsa/Manifest.files.gz index fb3d67f1010c..c2498e00e944 100644 Binary files a/metadata/glsa/Manifest.files.gz and b/metadata/glsa/Manifest.files.gz differ diff --git a/metadata/glsa/glsa-202201-01.xml b/metadata/glsa/glsa-202201-01.xml new file mode 100644 index 000000000000..ddfef3de5625 --- /dev/null +++ b/metadata/glsa/glsa-202201-01.xml @@ -0,0 +1,44 @@ + + + + Polkit: Local privilege escalation + A vulnerability in polkit could lead to local root privilege escalation. + + polkit + 2022-01-27 + 2022-01-27 + 832057 + local + + + 0.120-r2 + 0.120-r2 + + + +

polkit is a toolkit for managing policies related to unprivileged processes communicating with privileged process.

+
+ +

Flawed input validation of arguments was discovered in the 'pkexec' program's main() function.

+
+ +

A local attacker could achieve root privilege escalation.

+
+ +

Run the following command as root: +# chmod 0755 /usr/bin/pkexec

+
+ +

Upgrade Polkit to a patched version.

+ + + # emerge --sync + # emerge --ask --verbose ">=sys-auth/polkit-0.120-r2" + +
+ + CVE-2021-4034 + + sam + sam +
diff --git a/metadata/glsa/glsa-202201-02.xml b/metadata/glsa/glsa-202201-02.xml new file mode 100644 index 000000000000..f33a7a56854b --- /dev/null +++ b/metadata/glsa/glsa-202201-02.xml @@ -0,0 +1,257 @@ + + + + Chromium, Google Chrome: Multiple vulnerabilities + Multiple vulnerabilities have been found in Chromium and Google + Chrome, the worst of which could result in the arbitrary execution of code. + + chromium,google-chrome + 2022-01-31 + 2022-01-31 + 803167 + 806223 + 808715 + 811348 + 813035 + 814221 + 814617 + 815673 + 816984 + 819054 + 820689 + 824274 + 829190 + 830642 + 831624 + remote + + + 97.0.4692.99 + 97.0.4692.99 + + + 97.0.4692.99 + 97.0.4692.99 + + + +

Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +

+ +

Google Chrome is one, fast, simple, and secure browser for all + your devices. +

+
+ +

Multiple vulnerabilities have been discovered in Chromium + and Google Chrome. Please review the CVE identifiers referenced below + for details. +

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Chromium users should upgrade to the latest version:

+ + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/chromium-97.0.4692.99" + + +

All Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose + ">=www-client/google-chrome-97.0.4692.99" + +
+ + CVE-2021-30565 + CVE-2021-30566 + CVE-2021-30567 + CVE-2021-30568 + CVE-2021-30569 + CVE-2021-30571 + CVE-2021-30572 + CVE-2021-30573 + CVE-2021-30574 + CVE-2021-30575 + CVE-2021-30576 + CVE-2021-30577 + CVE-2021-30578 + CVE-2021-30579 + CVE-2021-30580 + CVE-2021-30581 + CVE-2021-30582 + CVE-2021-30583 + CVE-2021-30584 + CVE-2021-30585 + CVE-2021-30586 + CVE-2021-30587 + CVE-2021-30588 + CVE-2021-30589 + CVE-2021-30590 + CVE-2021-30591 + CVE-2021-30592 + CVE-2021-30593 + CVE-2021-30594 + CVE-2021-30596 + CVE-2021-30597 + CVE-2021-30598 + CVE-2021-30599 + CVE-2021-30600 + CVE-2021-30601 + CVE-2021-30602 + CVE-2021-30603 + CVE-2021-30604 + CVE-2021-30606 + CVE-2021-30607 + CVE-2021-30608 + CVE-2021-30609 + CVE-2021-30610 + CVE-2021-30611 + CVE-2021-30612 + CVE-2021-30613 + CVE-2021-30614 + CVE-2021-30615 + CVE-2021-30616 + CVE-2021-30617 + CVE-2021-30618 + CVE-2021-30619 + CVE-2021-30620 + CVE-2021-30621 + CVE-2021-30622 + CVE-2021-30623 + CVE-2021-30624 + CVE-2021-30625 + CVE-2021-30626 + CVE-2021-30627 + CVE-2021-30628 + CVE-2021-30629 + CVE-2021-30630 + CVE-2021-30631 + CVE-2021-30632 + CVE-2021-30633 + CVE-2021-37956 + CVE-2021-37957 + CVE-2021-37958 + CVE-2021-37959 + CVE-2021-37960 + CVE-2021-37961 + CVE-2021-37962 + CVE-2021-37963 + CVE-2021-37965 + CVE-2021-37966 + CVE-2021-37967 + CVE-2021-37968 + CVE-2021-37970 + CVE-2021-37971 + CVE-2021-37973 + CVE-2021-37974 + CVE-2021-37975 + CVE-2021-37976 + CVE-2021-37977 + CVE-2021-37978 + CVE-2021-37979 + CVE-2021-37981 + CVE-2021-37982 + CVE-2021-37983 + CVE-2021-37984 + CVE-2021-37985 + CVE-2021-37986 + CVE-2021-37987 + CVE-2021-37988 + CVE-2021-37989 + CVE-2021-37990 + CVE-2021-37991 + CVE-2021-37992 + CVE-2021-37993 + CVE-2021-37994 + CVE-2021-37995 + CVE-2021-37996 + CVE-2021-37997 + CVE-2021-37998 + CVE-2021-37999 + CVE-2021-38000 + CVE-2021-38001 + CVE-2021-38002 + CVE-2021-38003 + CVE-2021-38005 + CVE-2021-38006 + CVE-2021-38007 + CVE-2021-38008 + CVE-2021-38009 + CVE-2021-38010 + CVE-2021-38011 + CVE-2021-38012 + CVE-2021-38013 + CVE-2021-38014 + CVE-2021-38015 + CVE-2021-38016 + CVE-2021-38017 + CVE-2021-38018 + CVE-2021-38019 + CVE-2021-38020 + CVE-2021-38021 + CVE-2021-38022 + CVE-2021-4098 + CVE-2021-4099 + CVE-2021-4100 + CVE-2021-4101 + CVE-2021-4102 + CVE-2022-0096 + CVE-2022-0097 + CVE-2022-0098 + CVE-2022-0099 + CVE-2022-0100 + CVE-2022-0101 + CVE-2022-0102 + CVE-2022-0103 + CVE-2022-0104 + CVE-2022-0105 + CVE-2022-0106 + CVE-2022-0107 + CVE-2022-0108 + CVE-2022-0109 + CVE-2022-0110 + CVE-2022-0111 + CVE-2022-0112 + CVE-2022-0113 + CVE-2022-0114 + CVE-2022-0115 + CVE-2022-0116 + CVE-2022-0117 + CVE-2022-0118 + CVE-2022-0120 + CVE-2022-0289 + CVE-2022-0290 + CVE-2022-0291 + CVE-2022-0292 + CVE-2022-0293 + CVE-2022-0294 + CVE-2022-0295 + CVE-2022-0296 + CVE-2022-0297 + CVE-2022-0298 + CVE-2022-0300 + CVE-2022-0301 + CVE-2022-0302 + CVE-2022-0303 + CVE-2022-0304 + CVE-2022-0305 + CVE-2022-0306 + CVE-2022-0307 + CVE-2022-0308 + CVE-2022-0309 + CVE-2022-0310 + CVE-2022-0311 + + ajak + ajak +
diff --git a/metadata/glsa/glsa-202202-01.xml b/metadata/glsa/glsa-202202-01.xml new file mode 100644 index 000000000000..5fef12d043e2 --- /dev/null +++ b/metadata/glsa/glsa-202202-01.xml @@ -0,0 +1,111 @@ + + + + WebkitGTK+: Multiple vulnerabilities + Multiple vulnerabilities have been found in WebkitGTK+, the worst of + which could result in the arbitrary execution of code. + + webkit-gtk + 2022-02-01 + 2022-02-01 + 779175 + 801400 + 813489 + 819522 + 820434 + 829723 + 831739 + remote + + + 2.34.4 + 2.34.4 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, + suitable for projects requiring any kind of web integration, + from hybrid HTML/CSS applications to full-fledged web browsers. +

+
+ +

Multiple vulnerabilities have been discovered in WebkitGTK+. Please + review the CVE identifiers referenced below for details. +

+
+ +

An attacker, by enticing a user to visit maliciously + crafted web content, may be able to execute arbitrary code, violate + iframe sandboxing policy, access restricted ports on arbitrary + servers, cause memory corruption, or could cause a Denial of Service + condition.

+
+ +

There is no known workaround at this time.

+
+ +

All WebkitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.34.4" + +
+ + CVE-2021-1788 + CVE-2021-1817 + CVE-2021-1820 + CVE-2021-1825 + CVE-2021-1826 + CVE-2021-1844 + CVE-2021-1871 + CVE-2021-21775 + CVE-2021-21779 + CVE-2021-21806 + CVE-2021-30661 + CVE-2021-30663 + CVE-2021-30665 + CVE-2021-30666 + CVE-2021-30682 + CVE-2021-30689 + CVE-2021-30720 + CVE-2021-30734 + CVE-2021-30744 + CVE-2021-30749 + CVE-2021-30758 + CVE-2021-30761 + CVE-2021-30762 + CVE-2021-30795 + CVE-2021-30797 + CVE-2021-30799 + CVE-2021-30809 + CVE-2021-30818 + CVE-2021-30823 + CVE-2021-30836 + CVE-2021-30846 + CVE-2021-30848 + CVE-2021-30849 + CVE-2021-30851 + CVE-2021-30858 + CVE-2021-30884 + CVE-2021-30887 + CVE-2021-30888 + CVE-2021-30889 + CVE-2021-30890 + CVE-2021-30897 + CVE-2021-30934 + CVE-2021-30936 + CVE-2021-30951 + CVE-2021-30952 + CVE-2021-30953 + CVE-2021-30954 + CVE-2021-30984 + CVE-2021-42762 + CVE-2021-45482 + WSA-2021-0004 + WSA-2021-0005 + WSA-2021-0006 + + ajak + ajak +
diff --git a/metadata/glsa/timestamp.chk b/metadata/glsa/timestamp.chk index f87021ca4e04..e3077fd5cd3d 100644 --- a/metadata/glsa/timestamp.chk +++ b/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Sun, 16 Jan 2022 19:39:00 +0000 +Wed, 02 Feb 2022 00:09:07 +0000 diff --git a/metadata/glsa/timestamp.commit b/metadata/glsa/timestamp.commit index bbcaf950a9ce..1ddda011c9cc 100644 --- a/metadata/glsa/timestamp.commit +++ b/metadata/glsa/timestamp.commit @@ -1 +1 @@ -7b9e3c731523fe15934efc37e813384c70ecd7b6 1627096087 2021-07-24T03:08:07+00:00 +d2418b0a913a694a55e21440268b44301931867c 1643686264 2022-02-01T03:31:04+00:00 -- cgit v1.2.3