summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRepository mirror & CI <repomirrorci@gentoo.org>2018-11-10 00:24:19 +0000
committerRepository mirror & CI <repomirrorci@gentoo.org>2018-11-10 00:24:19 +0000
commitc8d540460bb4285be7ca5f453314d9dd0cf168e4 (patch)
tree974822eabd6eac925f17130ceb20b2986fe1d917 /metadata/glsa
parent2018-11-09 23:44:33 UTC (diff)
parentGLSA-201811-09 added: Icecast: Arbitrary code execution (diff)
downloadgentoo-c8d540460bb4285be7ca5f453314d9dd0cf168e4.tar.gz
gentoo-c8d540460bb4285be7ca5f453314d9dd0cf168e4.tar.bz2
gentoo-c8d540460bb4285be7ca5f453314d9dd0cf168e4.zip
Merge commit 'd0ed5c4d9d5a03355ab534b5784906e0956ea022'
Diffstat (limited to 'metadata/glsa')
-rw-r--r--metadata/glsa/glsa-201811-05.xml52
-rw-r--r--metadata/glsa/glsa-201811-06.xml53
-rw-r--r--metadata/glsa/glsa-201811-07.xml49
-rw-r--r--metadata/glsa/glsa-201811-08.xml50
-rw-r--r--metadata/glsa/glsa-201811-09.xml52
5 files changed, 256 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-201811-05.xml b/metadata/glsa/glsa-201811-05.xml
new file mode 100644
index 000000000000..f37e9af492b9
--- /dev/null
+++ b/metadata/glsa/glsa-201811-05.xml
@@ -0,0 +1,52 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201811-05">
+ <title>PHProjekt: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in PHProjekt due to
+ embedded Zend Framework, the worst of which could allow attackers to
+ remotely execute arbitrary commands.
+ </synopsis>
+ <product type="ebuild">PHProjekt</product>
+ <announced>2018-11-10</announced>
+ <revised count="1">2018-11-10</revised>
+ <bug>650936</bug>
+ <access>remote</access>
+ <affected>
+ <package name="www-apps/phprojekt" auto="yes" arch="*">
+ <vulnerable range="le">6.1.2</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>PHProjekt is an application suite that supports communication and
+ management of teams and companies.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in PHProjekt due to
+ embedded Zend Framework. Please review the GLSA identifiers referenced
+ below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>Remote attackers could execute arbitrary commands or conduct SQL
+ injection attacks.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>Gentoo has discontinued support for PHProjekt and recommends that users
+ unmerge the package:
+ </p>
+
+ <code>
+ # emerge --unmerge "www-apps/phprojekt"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://security.gentoo.org/glsa/201804-10">GLSA 201804-10</uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-10-10T16:56:26Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2018-11-10T00:10:47Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201811-06.xml b/metadata/glsa/glsa-201811-06.xml
new file mode 100644
index 000000000000..6083ad9ef3d7
--- /dev/null
+++ b/metadata/glsa/glsa-201811-06.xml
@@ -0,0 +1,53 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201811-06">
+ <title>libde265: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in libde265, the worst of
+ which allows remote attackers to execute arbitrary code.
+ </synopsis>
+ <product type="ebuild">libde265</product>
+ <announced>2018-11-10</announced>
+ <revised count="1">2018-11-10</revised>
+ <bug>665520</bug>
+ <access>remote</access>
+ <affected>
+ <package name="media-libs/libde265" auto="yes" arch="*">
+ <unaffected range="ge">1.0.3</unaffected>
+ <vulnerable range="lt">1.0.3</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Open h.265 video codec implementation.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in libde265. Please review
+ libde265 changelog referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could entice a user to open a specially crafted media
+ file using libde265 or linked applications, possibly resulting in
+ execution of arbitrary code with the privileges of the process or a
+ Denial of Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All libde265 users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=media-libs/libde265-1.0.3"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://github.com/strukturag/libde265/compare/v1.0.2...v1.0.3">
+ libde265 v1.03 Changelog
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-09-21T12:42:46Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2018-11-10T00:11:04Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201811-07.xml b/metadata/glsa/glsa-201811-07.xml
new file mode 100644
index 000000000000..a8cd2f63051d
--- /dev/null
+++ b/metadata/glsa/glsa-201811-07.xml
@@ -0,0 +1,49 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201811-07">
+ <title>Pango: Denial of Service</title>
+ <synopsis>A vulnerability in Pango could result in a Denial of Service
+ condition.
+ </synopsis>
+ <product type="ebuild">pango</product>
+ <announced>2018-11-10</announced>
+ <revised count="1">2018-11-10</revised>
+ <bug>664108</bug>
+ <access>remote</access>
+ <affected>
+ <package name="x11-libs/pango" auto="yes" arch="*">
+ <unaffected range="ge">1.42.4</unaffected>
+ <vulnerable range="lt">1.42.4</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Library for layout and rendering of internationalized text.</p>
+ </background>
+ <description>
+ <p>Processing certain invalid Emoji sequences in a GTK+ application can
+ trigger a reachable assertion resulting in an application crash.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could provide a specially crafted Emoji sequences,
+ possibly resulting in a Denial of Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Pango users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=x11-libs/pango-1.42.4"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-15120">CVE-2018-15120</uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-08-30T12:31:14Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2018-11-10T00:11:22Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201811-08.xml b/metadata/glsa/glsa-201811-08.xml
new file mode 100644
index 000000000000..7b0bc67ea86f
--- /dev/null
+++ b/metadata/glsa/glsa-201811-08.xml
@@ -0,0 +1,50 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201811-08">
+ <title>Okular: Directory traversal</title>
+ <synopsis>Okular is vulnerable to a directory traversal attack.</synopsis>
+ <product type="ebuild">Okular</product>
+ <announced>2018-11-10</announced>
+ <revised count="1">2018-11-10</revised>
+ <bug>665662</bug>
+ <access>remote</access>
+ <affected>
+ <package name="kde-apps/okular" auto="yes" arch="*">
+ <unaffected range="ge">18.04.3-r1</unaffected>
+ <vulnerable range="lt">18.04.3-r1</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Okular is a universal document viewer based on KPDF for KDE 4.</p>
+ </background>
+ <description>
+ <p>It was discovered that Okular contains a Directory Traversal
+ vulnerability in function unpackDocumentArchive() in core/document.cpp.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could entice a user to open a specially crafted Okular
+ archive, possibly allowing the writing of arbitrary files with the
+ privileges of the process.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Okular users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=kde-apps/okular-18.04.3-r1"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-1000801">
+ CVE-2018-1000801
+ </uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-10-09T10:06:04Z">Zlogene</metadata>
+ <metadata tag="submitter" timestamp="2018-11-10T00:11:36Z">whissi</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201811-09.xml b/metadata/glsa/glsa-201811-09.xml
new file mode 100644
index 000000000000..c2c62151e471
--- /dev/null
+++ b/metadata/glsa/glsa-201811-09.xml
@@ -0,0 +1,52 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201811-09">
+ <title>Icecast: Arbitrary code execution</title>
+ <synopsis>A vulnerability in Icecast might allow remote attackers to execute
+ arbitrary code.
+ </synopsis>
+ <product type="ebuild">Icecast</product>
+ <announced>2018-11-10</announced>
+ <revised count="1">2018-11-10</revised>
+ <bug>670148</bug>
+ <access>remote</access>
+ <affected>
+ <package name="net-misc/icecast" auto="yes" arch="*">
+ <unaffected range="ge">2.4.4</unaffected>
+ <vulnerable range="lt">2.4.4</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Icecast is an open source alternative to SHOUTcast that supports MP3,
+ OGG (Vorbis/Theora) and AAC streaming.
+ </p>
+ </background>
+ <description>
+ <p>Multiple buffer overflows have been discovered in Icecast. Please review
+ the CVE identifier referenced below for details.
+ </p>
+ </description>
+ <impact type="high">
+ <p>A remote attacker, by sending a specially crafted request using
+ authentication type “url”, could possibly execute arbitrary code with
+ the privileges of the process, or cause a Denial of Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Icecast users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=net-misc/icecast-2.4.4"
+ </code>
+
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-18820">CVE-2018-18820</uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-11-08T14:07:15Z">whissi</metadata>
+ <metadata tag="submitter" timestamp="2018-11-10T00:11:51Z">whissi</metadata>
+</glsa>