summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRepository QA checks <repo-qa-checks@gentoo.org>2018-04-08 23:39:05 +0000
committerRepository QA checks <repo-qa-checks@gentoo.org>2018-04-08 23:39:05 +0000
commit992102d7741a24f4141c8015ebff0c063e787196 (patch)
treebba2a8a2e8885f1ec1cc6b6f9ed140eb46b8af0c /metadata/glsa
parentMerge updates from master (diff)
parent[ GLSA 201804-09 ] SPICE VDAgent: Arbitrary command injection (diff)
downloadgentoo-992102d7741a24f4141c8015ebff0c063e787196.tar.gz
gentoo-992102d7741a24f4141c8015ebff0c063e787196.tar.bz2
gentoo-992102d7741a24f4141c8015ebff0c063e787196.zip
Merge commit '77203135b1051fe9e3df91faeda1da6ffccadbdf'
Diffstat (limited to 'metadata/glsa')
-rw-r--r--metadata/glsa/glsa-201804-06.xml50
-rw-r--r--metadata/glsa/glsa-201804-07.xml50
-rw-r--r--metadata/glsa/glsa-201804-08.xml61
-rw-r--r--metadata/glsa/glsa-201804-09.xml50
4 files changed, 211 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-201804-06.xml b/metadata/glsa/glsa-201804-06.xml
new file mode 100644
index 000000000000..a038c242317f
--- /dev/null
+++ b/metadata/glsa/glsa-201804-06.xml
@@ -0,0 +1,50 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201804-06">
+ <title>mailx: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities were discovered in mailx, the worst of
+ which may allow a remote attacker to execute arbitrary commands.
+ </synopsis>
+ <product type="ebuild">mailx</product>
+ <announced>2018-04-08</announced>
+ <revised count="1">2018-04-08</revised>
+ <bug>533208</bug>
+ <access>remote</access>
+ <affected>
+ <package name="mail-client/mailx" auto="yes" arch="*">
+ <unaffected range="ge">8.1.2.20160123</unaffected>
+ <vulnerable range="lt">8.1.2.20160123</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>A utility program for sending and receiving mail, also known as a Mail
+ User Agent program.
+ </p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in mailx. Please review
+ the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A remote attacker could execute arbitrary commands.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All mailx users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=mail-client/mailx-8.1.2.20160123"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2004-2771">CVE-2004-2771</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2014-7844">CVE-2014-7844</uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-04-08T17:41:56Z">chrisadr</metadata>
+ <metadata tag="submitter" timestamp="2018-04-08T23:25:59Z">b-man</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201804-07.xml b/metadata/glsa/glsa-201804-07.xml
new file mode 100644
index 000000000000..e47a94f67e7d
--- /dev/null
+++ b/metadata/glsa/glsa-201804-07.xml
@@ -0,0 +1,50 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201804-07">
+ <title>libvirt: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been discovered in libvirt, the worst
+ of which may result in the execution of arbitrary commands.
+ </synopsis>
+ <product type="ebuild">libvirt</product>
+ <announced>2018-04-08</announced>
+ <revised count="1">2018-04-08</revised>
+ <bug>647338</bug>
+ <bug>650018</bug>
+ <access>local</access>
+ <affected>
+ <package name="app-emulation/libvirt" auto="yes" arch="*">
+ <unaffected range="ge">4.1.0</unaffected>
+ <vulnerable range="lt">4.1.0</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>libvirt is a C toolkit for manipulating virtual machines.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in libvirt. Please review
+ the CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A local privileged attacker could execute arbitrary commands or cause a
+ Denial of Service condition.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All libvirt users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/libvirt-4.1.0"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-5748">CVE-2018-5748</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-6764">CVE-2018-6764</uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-04-08T17:45:31Z">chrisadr</metadata>
+ <metadata tag="submitter" timestamp="2018-04-08T23:28:32Z">b-man</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201804-08.xml b/metadata/glsa/glsa-201804-08.xml
new file mode 100644
index 000000000000..16b031554877
--- /dev/null
+++ b/metadata/glsa/glsa-201804-08.xml
@@ -0,0 +1,61 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201804-08">
+ <title>QEMU: Multiple vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been found in QEMU, the worst of
+ which may allow an attacker to execute arbitrary code.
+ </synopsis>
+ <product type="ebuild">qemu</product>
+ <announced>2018-04-08</announced>
+ <revised count="1">2018-04-08</revised>
+ <bug>629348</bug>
+ <bug>638506</bug>
+ <bug>643432</bug>
+ <bug>646814</bug>
+ <bug>649616</bug>
+ <access>local, remote</access>
+ <affected>
+ <package name="app-emulation/qemu" auto="yes" arch="*">
+ <unaffected range="ge">2.11.1-r1</unaffected>
+ <vulnerable range="lt">2.11.1-r1</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>QEMU is a generic and open source machine emulator and virtualizer.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in QEMU. Please review the
+ CVE identifiers referenced below for details.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>An attacker could execute arbitrary code, cause a Denial of Service
+ condition, or obtain sensitive information.
+ </p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All QEMU users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose "&gt;=app-emulation/qemu-2.11.1-r1"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-13672">CVE-2017-13672</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-15124">CVE-2017-15124</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-16845">CVE-2017-16845</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-17381">CVE-2017-17381</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-18030">CVE-2017-18030</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-18043">CVE-2017-18043</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-5715">CVE-2017-5715</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-5683">CVE-2018-5683</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-5748">CVE-2018-5748</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-7550">CVE-2018-7550</uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-04-08T17:31:53Z">chrisadr</metadata>
+ <metadata tag="submitter" timestamp="2018-04-08T23:30:08Z">b-man</metadata>
+</glsa>
diff --git a/metadata/glsa/glsa-201804-09.xml b/metadata/glsa/glsa-201804-09.xml
new file mode 100644
index 000000000000..ab4be111389b
--- /dev/null
+++ b/metadata/glsa/glsa-201804-09.xml
@@ -0,0 +1,50 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="201804-09">
+ <title>SPICE VDAgent: Arbitrary command injection</title>
+ <synopsis>A vulnerability in SPICE VDAgent could allow local attackers to
+ execute arbitrary commands.
+ </synopsis>
+ <product type="ebuild">spice,vdagent</product>
+ <announced>2018-04-08</announced>
+ <revised count="1">2018-04-08</revised>
+ <bug>650020</bug>
+ <access>local</access>
+ <affected>
+ <package name="app-emulation/spice-vdagent" auto="yes" arch="*">
+ <unaffected range="ge">0.17.0_p20180319</unaffected>
+ <vulnerable range="lt">0.17.0_p20180319</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Provides a complete open source solution for remote access to virtual
+ machines in a seamless way so you can play videos, record audio, share
+ USB devices and share folders without complications.
+ </p>
+ </background>
+ <description>
+ <p>SPICE VDAgent does not properly escape save directory before passing to
+ shell.
+ </p>
+ </description>
+ <impact type="normal">
+ <p>A local attacker could execute arbitrary commands.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All SPICE VDAgent users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ "&gt;=app-emulation/spice-vdagent-0.17.0_p20180319"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-15108">CVE-2017-15108</uri>
+ </references>
+ <metadata tag="requester" timestamp="2018-04-08T17:31:09Z">b-man</metadata>
+ <metadata tag="submitter" timestamp="2018-04-08T23:32:55Z">b-man</metadata>
+</glsa>