diff options
author | 2018-11-10 00:24:19 +0000 | |
---|---|---|
committer | 2018-11-10 00:24:19 +0000 | |
commit | c8d540460bb4285be7ca5f453314d9dd0cf168e4 (patch) | |
tree | 974822eabd6eac925f17130ceb20b2986fe1d917 /metadata/glsa | |
parent | 2018-11-09 23:44:33 UTC (diff) | |
parent | GLSA-201811-09 added: Icecast: Arbitrary code execution (diff) | |
download | gentoo-c8d540460bb4285be7ca5f453314d9dd0cf168e4.tar.gz gentoo-c8d540460bb4285be7ca5f453314d9dd0cf168e4.tar.bz2 gentoo-c8d540460bb4285be7ca5f453314d9dd0cf168e4.zip |
Merge commit 'd0ed5c4d9d5a03355ab534b5784906e0956ea022'
Diffstat (limited to 'metadata/glsa')
-rw-r--r-- | metadata/glsa/glsa-201811-05.xml | 52 | ||||
-rw-r--r-- | metadata/glsa/glsa-201811-06.xml | 53 | ||||
-rw-r--r-- | metadata/glsa/glsa-201811-07.xml | 49 | ||||
-rw-r--r-- | metadata/glsa/glsa-201811-08.xml | 50 | ||||
-rw-r--r-- | metadata/glsa/glsa-201811-09.xml | 52 |
5 files changed, 256 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-201811-05.xml b/metadata/glsa/glsa-201811-05.xml new file mode 100644 index 000000000000..f37e9af492b9 --- /dev/null +++ b/metadata/glsa/glsa-201811-05.xml @@ -0,0 +1,52 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201811-05"> + <title>PHProjekt: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in PHProjekt due to + embedded Zend Framework, the worst of which could allow attackers to + remotely execute arbitrary commands. + </synopsis> + <product type="ebuild">PHProjekt</product> + <announced>2018-11-10</announced> + <revised count="1">2018-11-10</revised> + <bug>650936</bug> + <access>remote</access> + <affected> + <package name="www-apps/phprojekt" auto="yes" arch="*"> + <vulnerable range="le">6.1.2</vulnerable> + </package> + </affected> + <background> + <p>PHProjekt is an application suite that supports communication and + management of teams and companies. + </p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in PHProjekt due to + embedded Zend Framework. Please review the GLSA identifiers referenced + below for details. + </p> + </description> + <impact type="normal"> + <p>Remote attackers could execute arbitrary commands or conduct SQL + injection attacks. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>Gentoo has discontinued support for PHProjekt and recommends that users + unmerge the package: + </p> + + <code> + # emerge --unmerge "www-apps/phprojekt" + </code> + </resolution> + <references> + <uri link="https://security.gentoo.org/glsa/201804-10">GLSA 201804-10</uri> + </references> + <metadata tag="requester" timestamp="2018-10-10T16:56:26Z">whissi</metadata> + <metadata tag="submitter" timestamp="2018-11-10T00:10:47Z">whissi</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201811-06.xml b/metadata/glsa/glsa-201811-06.xml new file mode 100644 index 000000000000..6083ad9ef3d7 --- /dev/null +++ b/metadata/glsa/glsa-201811-06.xml @@ -0,0 +1,53 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201811-06"> + <title>libde265: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in libde265, the worst of + which allows remote attackers to execute arbitrary code. + </synopsis> + <product type="ebuild">libde265</product> + <announced>2018-11-10</announced> + <revised count="1">2018-11-10</revised> + <bug>665520</bug> + <access>remote</access> + <affected> + <package name="media-libs/libde265" auto="yes" arch="*"> + <unaffected range="ge">1.0.3</unaffected> + <vulnerable range="lt">1.0.3</vulnerable> + </package> + </affected> + <background> + <p>Open h.265 video codec implementation.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in libde265. Please review + libde265 changelog referenced below for details. + </p> + </description> + <impact type="normal"> + <p>A remote attacker could entice a user to open a specially crafted media + file using libde265 or linked applications, possibly resulting in + execution of arbitrary code with the privileges of the process or a + Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All libde265 users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libde265-1.0.3" + </code> + + </resolution> + <references> + <uri link="https://github.com/strukturag/libde265/compare/v1.0.2...v1.0.3"> + libde265 v1.03 Changelog + </uri> + </references> + <metadata tag="requester" timestamp="2018-09-21T12:42:46Z">whissi</metadata> + <metadata tag="submitter" timestamp="2018-11-10T00:11:04Z">whissi</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201811-07.xml b/metadata/glsa/glsa-201811-07.xml new file mode 100644 index 000000000000..a8cd2f63051d --- /dev/null +++ b/metadata/glsa/glsa-201811-07.xml @@ -0,0 +1,49 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201811-07"> + <title>Pango: Denial of Service</title> + <synopsis>A vulnerability in Pango could result in a Denial of Service + condition. + </synopsis> + <product type="ebuild">pango</product> + <announced>2018-11-10</announced> + <revised count="1">2018-11-10</revised> + <bug>664108</bug> + <access>remote</access> + <affected> + <package name="x11-libs/pango" auto="yes" arch="*"> + <unaffected range="ge">1.42.4</unaffected> + <vulnerable range="lt">1.42.4</vulnerable> + </package> + </affected> + <background> + <p>Library for layout and rendering of internationalized text.</p> + </background> + <description> + <p>Processing certain invalid Emoji sequences in a GTK+ application can + trigger a reachable assertion resulting in an application crash. + </p> + </description> + <impact type="normal"> + <p>A remote attacker could provide a specially crafted Emoji sequences, + possibly resulting in a Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Pango users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-libs/pango-1.42.4" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-15120">CVE-2018-15120</uri> + </references> + <metadata tag="requester" timestamp="2018-08-30T12:31:14Z">whissi</metadata> + <metadata tag="submitter" timestamp="2018-11-10T00:11:22Z">whissi</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201811-08.xml b/metadata/glsa/glsa-201811-08.xml new file mode 100644 index 000000000000..7b0bc67ea86f --- /dev/null +++ b/metadata/glsa/glsa-201811-08.xml @@ -0,0 +1,50 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201811-08"> + <title>Okular: Directory traversal</title> + <synopsis>Okular is vulnerable to a directory traversal attack.</synopsis> + <product type="ebuild">Okular</product> + <announced>2018-11-10</announced> + <revised count="1">2018-11-10</revised> + <bug>665662</bug> + <access>remote</access> + <affected> + <package name="kde-apps/okular" auto="yes" arch="*"> + <unaffected range="ge">18.04.3-r1</unaffected> + <vulnerable range="lt">18.04.3-r1</vulnerable> + </package> + </affected> + <background> + <p>Okular is a universal document viewer based on KPDF for KDE 4.</p> + </background> + <description> + <p>It was discovered that Okular contains a Directory Traversal + vulnerability in function unpackDocumentArchive() in core/document.cpp. + </p> + </description> + <impact type="normal"> + <p>A remote attacker could entice a user to open a specially crafted Okular + archive, possibly allowing the writing of arbitrary files with the + privileges of the process. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Okular users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=kde-apps/okular-18.04.3-r1" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-1000801"> + CVE-2018-1000801 + </uri> + </references> + <metadata tag="requester" timestamp="2018-10-09T10:06:04Z">Zlogene</metadata> + <metadata tag="submitter" timestamp="2018-11-10T00:11:36Z">whissi</metadata> +</glsa> diff --git a/metadata/glsa/glsa-201811-09.xml b/metadata/glsa/glsa-201811-09.xml new file mode 100644 index 000000000000..c2c62151e471 --- /dev/null +++ b/metadata/glsa/glsa-201811-09.xml @@ -0,0 +1,52 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="201811-09"> + <title>Icecast: Arbitrary code execution</title> + <synopsis>A vulnerability in Icecast might allow remote attackers to execute + arbitrary code. + </synopsis> + <product type="ebuild">Icecast</product> + <announced>2018-11-10</announced> + <revised count="1">2018-11-10</revised> + <bug>670148</bug> + <access>remote</access> + <affected> + <package name="net-misc/icecast" auto="yes" arch="*"> + <unaffected range="ge">2.4.4</unaffected> + <vulnerable range="lt">2.4.4</vulnerable> + </package> + </affected> + <background> + <p>Icecast is an open source alternative to SHOUTcast that supports MP3, + OGG (Vorbis/Theora) and AAC streaming. + </p> + </background> + <description> + <p>Multiple buffer overflows have been discovered in Icecast. Please review + the CVE identifier referenced below for details. + </p> + </description> + <impact type="high"> + <p>A remote attacker, by sending a specially crafted request using + authentication type “url”, could possibly execute arbitrary code with + the privileges of the process, or cause a Denial of Service condition. + </p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Icecast users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-misc/icecast-2.4.4" + </code> + + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-18820">CVE-2018-18820</uri> + </references> + <metadata tag="requester" timestamp="2018-11-08T14:07:15Z">whissi</metadata> + <metadata tag="submitter" timestamp="2018-11-10T00:11:51Z">whissi</metadata> +</glsa> |