summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRepository mirror & CI <repomirrorci@gentoo.org>2024-08-09 07:04:15 +0000
committerRepository mirror & CI <repomirrorci@gentoo.org>2024-08-09 07:04:15 +0000
commit07c4501777dc1252d9e0590858c9adbe3591cc62 (patch)
tree3e60ba8bd7f8bad3e7fac49254a564256d5cf777 /metadata
parent2024-08-09 03:33:58 UTC (diff)
parent[ GLSA 202408-15 ] Percona XtraBackup: Multiple Vulnerabilities (diff)
downloadgentoo-07c4501777dc1252d9e0590858c9adbe3591cc62.tar.gz
gentoo-07c4501777dc1252d9e0590858c9adbe3591cc62.tar.bz2
gentoo-07c4501777dc1252d9e0590858c9adbe3591cc62.zip
Merge commit '2b5bbd4f1445dc34005f336c882dfa513aef8a89'
Diffstat (limited to 'metadata')
-rw-r--r--metadata/glsa/glsa-202408-14.xml42
-rw-r--r--metadata/glsa/glsa-202408-15.xml54
2 files changed, 96 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-202408-14.xml b/metadata/glsa/glsa-202408-14.xml
new file mode 100644
index 000000000000..094f1742184f
--- /dev/null
+++ b/metadata/glsa/glsa-202408-14.xml
@@ -0,0 +1,42 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202408-14">
+ <title>Librsvg: Arbitrary File Read</title>
+ <synopsis>A vulnerability has been discovered in Librsvg, which can lead to arbitrary file reads.</synopsis>
+ <product type="ebuild">librsvg</product>
+ <announced>2024-08-09</announced>
+ <revised count="1">2024-08-09</revised>
+ <bug>918100</bug>
+ <access>local and remote</access>
+ <affected>
+ <package name="gnome-base/librsvg" auto="yes" arch="*">
+ <unaffected range="ge">2.56.3</unaffected>
+ <vulnerable range="lt">2.56.3</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Librsvg is a library to render SVG files using cairo as a rendering engine.</p>
+ </background>
+ <description>
+ <p>A directory traversal problem in the URL decoder of librsvg could be used by local or remote attackers to disclose files (on the local filesystem outside of the expected area), as demonstrated by href=&#34;.?../../../../../../../../../../etc/passwd&#34; in an xi:include element.</p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifier for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Librsvg users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=gnome-base/librsvg-2.56.3"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-38633">CVE-2023-38633</uri>
+ </references>
+ <metadata tag="requester" timestamp="2024-08-09T06:49:19.778412Z">graaff</metadata>
+ <metadata tag="submitter" timestamp="2024-08-09T06:49:19.781284Z">graaff</metadata>
+</glsa> \ No newline at end of file
diff --git a/metadata/glsa/glsa-202408-15.xml b/metadata/glsa/glsa-202408-15.xml
new file mode 100644
index 000000000000..c1c44f043f37
--- /dev/null
+++ b/metadata/glsa/glsa-202408-15.xml
@@ -0,0 +1,54 @@
+<?xml version="1.0" encoding="UTF-8"?>
+<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
+<glsa id="202408-15">
+ <title>Percona XtraBackup: Multiple Vulnerabilities</title>
+ <synopsis>Multiple vulnerabilities have been discovered in Percona XtraBackup, the worst of which could lead to arbitrary code execution.</synopsis>
+ <product type="ebuild">percona-xtrabackup,percona-xtrabackup-bin</product>
+ <announced>2024-08-09</announced>
+ <revised count="1">2024-08-09</revised>
+ <bug>849389</bug>
+ <bug>908033</bug>
+ <access>remote</access>
+ <affected>
+ <package name="dev-db/percona-xtrabackup" auto="yes" arch="*">
+ <unaffected range="ge">8.0.29.22</unaffected>
+ <vulnerable range="lt">8.0.29.22</vulnerable>
+ </package>
+ <package name="dev-db/percona-xtrabackup-bin" auto="yes" arch="*">
+ <vulnerable range="lt">8.0.29.22</vulnerable>
+ </package>
+ </affected>
+ <background>
+ <p>Percona XtraBackup is a complete and open source online backup solution for all versions of MySQL.</p>
+ </background>
+ <description>
+ <p>Multiple vulnerabilities have been discovered in Percona XtraBackup. Please review the CVE identifiers referenced below for details.</p>
+ </description>
+ <impact type="normal">
+ <p>Please review the referenced CVE identifiers for details.</p>
+ </impact>
+ <workaround>
+ <p>There is no known workaround at this time.</p>
+ </workaround>
+ <resolution>
+ <p>All Percona XtraBackup users should upgrade to the latest version:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-db/percona-xtrabackup-8.0.29.22"
+ </code>
+
+ <p>Gentoo has discontinued support for the binary package. Users should remove this from their system:</p>
+
+ <code>
+ # emerge --sync
+ # emerge --ask --verbose --depclean "dev-db/percona-xtrabackup-bin"
+ </code>
+ </resolution>
+ <references>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-25834">CVE-2022-25834</uri>
+ <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-26944">CVE-2022-26944</uri>
+ </references>
+ <metadata tag="requester" timestamp="2024-08-09T06:59:52.845544Z">graaff</metadata>
+ <metadata tag="submitter" timestamp="2024-08-09T06:59:52.849111Z">graaff</metadata>
+</glsa> \ No newline at end of file