diff options
author | Repository mirror & CI <repomirrorci@gentoo.org> | 2022-09-25 14:03:13 +0000 |
---|---|---|
committer | Repository mirror & CI <repomirrorci@gentoo.org> | 2022-09-25 14:03:13 +0000 |
commit | 5a216dcddcd3938f1bc8077bb5fb152dc5c0cf43 (patch) | |
tree | 559771edecb462d3861a8cc6392a90f591bead53 /metadata/glsa | |
parent | Merge updates from master (diff) | |
parent | [ GLSA 202209-08 ] fix bug reference typo (diff) | |
download | gentoo-5a216dcddcd3938f1bc8077bb5fb152dc5c0cf43.tar.gz gentoo-5a216dcddcd3938f1bc8077bb5fb152dc5c0cf43.tar.bz2 gentoo-5a216dcddcd3938f1bc8077bb5fb152dc5c0cf43.zip |
Merge commit '2570332a2b988e5bec8319e9b7bcfceb39048f5d'
Diffstat (limited to 'metadata/glsa')
-rw-r--r-- | metadata/glsa/glsa-202209-06.xml | 49 | ||||
-rw-r--r-- | metadata/glsa/glsa-202209-07.xml | 40 | ||||
-rw-r--r-- | metadata/glsa/glsa-202209-08.xml | 41 | ||||
-rw-r--r-- | metadata/glsa/glsa-202209-09.xml | 47 | ||||
-rw-r--r-- | metadata/glsa/glsa-202209-10.xml | 40 | ||||
-rw-r--r-- | metadata/glsa/glsa-202209-11.xml | 44 | ||||
-rw-r--r-- | metadata/glsa/glsa-202209-12.xml | 53 | ||||
-rw-r--r-- | metadata/glsa/glsa-202209-13.xml | 42 | ||||
-rw-r--r-- | metadata/glsa/glsa-202209-14.xml | 44 | ||||
-rw-r--r-- | metadata/glsa/glsa-202209-15.xml | 64 |
10 files changed, 464 insertions, 0 deletions
diff --git a/metadata/glsa/glsa-202209-06.xml b/metadata/glsa/glsa-202209-06.xml new file mode 100644 index 000000000000..717b6c92accc --- /dev/null +++ b/metadata/glsa/glsa-202209-06.xml @@ -0,0 +1,49 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202209-06"> + <title>Rizin: Multiple Vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been discovered in Rizin, the worst of which could lead to arbitrary code execution.</synopsis> + <product type="ebuild">rizin</product> + <announced>2022-09-25</announced> + <revised count="1">2022-09-25</revised> + <bug>861524</bug> + <bug>868999</bug> + <access>local and remote</access> + <affected> + <package name="dev-util/rizin" auto="yes" arch="*"> + <unaffected range="ge">0.4.1</unaffected> + <vulnerable range="lt">0.4.1</vulnerable> + </package> + </affected> + <background> + <p>Rizin is a reverse engineering framework for binary analysis.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Rizin. Please review the CVE identifiers referenced below for details.</p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Rizin users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/rizin-0.4.1" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-34612">CVE-2022-34612</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-36039">CVE-2022-36039</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-36040">CVE-2022-36040</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-36041">CVE-2022-36041</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-36042">CVE-2022-36042</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-36043">CVE-2022-36043</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-36044">CVE-2022-36044</uri> + </references> + <metadata tag="requester" timestamp="2022-09-25T13:33:58.550630Z">ajak</metadata> + <metadata tag="submitter" timestamp="2022-09-25T13:33:58.562441Z">ajak</metadata> +</glsa>
\ No newline at end of file diff --git a/metadata/glsa/glsa-202209-07.xml b/metadata/glsa/glsa-202209-07.xml new file mode 100644 index 000000000000..556fa69ed9a8 --- /dev/null +++ b/metadata/glsa/glsa-202209-07.xml @@ -0,0 +1,40 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202209-07"> + <title>Mrxvt: Arbitrary Code Execution</title> + <synopsis>A vulnerability has been discovered in Mrxvt which could allow for arbitrary code execution</synopsis> + <product type="ebuild">mrxvt</product> + <announced>2022-09-25</announced> + <revised count="1">2022-09-25</revised> + <bug>791004</bug> + <access>local and remote</access> + <affected> + <package name="x11-terms/mrxvt" auto="yes" arch="*"> + <vulnerable range="le">0.5.4</vulnerable> + </package> + </affected> + <background> + <p>Mrxvt is a multi-tabbed rxvt clone with XFT, transparent background and CJK support.</p> + </background> + <description> + <p>Mrxvt mishandles certain escape sequences, some of which allow for shell command execution.</p> + </description> + <impact type="normal"> + <p>An attacker with sufficient access to write arbitrary text to the Mrxvt terminal could execute arbitrary code.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>Gentoo has discontinued support for Mrxvt. We recommend that users remove it:</p> + + <code> + # emerge --ask --depclean "x11-terms/mrxvt" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-33477">CVE-2021-33477</uri> + </references> + <metadata tag="requester" timestamp="2022-09-25T13:34:13.204482Z">ajak</metadata> + <metadata tag="submitter" timestamp="2022-09-25T13:34:13.210077Z">ajak</metadata> +</glsa>
\ No newline at end of file diff --git a/metadata/glsa/glsa-202209-08.xml b/metadata/glsa/glsa-202209-08.xml new file mode 100644 index 000000000000..9687477405a8 --- /dev/null +++ b/metadata/glsa/glsa-202209-08.xml @@ -0,0 +1,41 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202209-08"> + <title>Smokeping: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been discovered in Smokeping, the worst of which could result in root privilege escalation.</synopsis> + <product type="ebuild">smokeping</product> + <announced>2022-09-25</announced> + <revised count="1">2022-09-25</revised> + <bug>631140</bug> + <bug>602652</bug> + <access>local</access> + <affected> + <package name="net-analyzer/smokeping" auto="yes" arch="*"> + <vulnerable range="le">2.7.3-r1</vulnerable> + </package> + </affected> + <background> + <p>Smokeping is a powerful latency measurement tool</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Smokeping. Please review the CVE identifiers referenced below for details.</p> + </description> + <impact type="normal"> + <p>A local attacker which gains access to the smokeping user could gain root privileges.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>Gentoo has discontinued support for Smokeping. We recommend that users remove it:</p> + + <code> + # emerge --ask --depclean "net-analyzer/smokeping" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-20147">CVE-2017-20147</uri> + </references> + <metadata tag="requester" timestamp="2022-09-25T13:34:27.263575Z">ajak</metadata> + <metadata tag="submitter" timestamp="2022-09-25T13:34:27.268533Z">ajak</metadata> +</glsa> diff --git a/metadata/glsa/glsa-202209-09.xml b/metadata/glsa/glsa-202209-09.xml new file mode 100644 index 000000000000..83bd6e71ede3 --- /dev/null +++ b/metadata/glsa/glsa-202209-09.xml @@ -0,0 +1,47 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202209-09"> + <title>Smarty: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Smarty, the worst of which could result in remote code execution</synopsis> + <product type="ebuild">smarty</product> + <announced>2022-09-25</announced> + <revised count="1">2022-09-25</revised> + <bug>830980</bug> + <bug>845180</bug> + <bug>870100</bug> + <access>remote</access> + <affected> + <package name="dev-php/smarty" auto="yes" arch="*"> + <unaffected range="ge">4.2.1</unaffected> + <vulnerable range="lt">4.2.1</vulnerable> + </package> + </affected> + <background> + <p>Smarty is a template engine for PHP. The "template security" feature of Smarty is designed to help reduce the risk of a system compromise when you have untrusted parties editing templates.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Smarty. Please review the CVE identifiers referenced below for details.</p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Smarty users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-php/smarty-4.2.1" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2018-25047">CVE-2018-25047</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-21408">CVE-2021-21408</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-29454">CVE-2021-29454</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-29221">CVE-2022-29221</uri> + </references> + <metadata tag="requester" timestamp="2022-09-25T13:34:41.298611Z">ajak</metadata> + <metadata tag="submitter" timestamp="2022-09-25T13:34:41.303400Z">ajak</metadata> +</glsa>
\ No newline at end of file diff --git a/metadata/glsa/glsa-202209-10.xml b/metadata/glsa/glsa-202209-10.xml new file mode 100644 index 000000000000..9e9ae3a3bb95 --- /dev/null +++ b/metadata/glsa/glsa-202209-10.xml @@ -0,0 +1,40 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202209-10"> + <title>Logcheck: Root privilege escalation</title> + <synopsis>A vulnerability has been discovered in Logcheck's ebuilds which could allow for root privilege escalation.</synopsis> + <product type="ebuild">logcheck</product> + <announced>2022-09-25</announced> + <revised count="1">2022-09-25</revised> + <bug>630752</bug> + <access>remote</access> + <affected> + <package name="app-admin/logcheck" auto="yes" arch="*"> + <vulnerable range="le">1.3.23</vulnerable> + </package> + </affected> + <background> + <p>Logcheck mails anomalies in the system logfiles to the administrator.</p> + </background> + <description> + <p>The pkg_postinst phase of the Logcheck ebuilds recursively chown the /etc/logcheck and /var/lib/logcheck directories. If the logcheck adds hardlinks to other files in these directories, the chown call will follow the link and transfer ownership of any file to the logcheck user.</p> + </description> + <impact type="normal"> + <p>A local attacker with access to the logcheck user could escalate to root privileges.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>Gentoo has discontinued support for Logcheck. We recommend that users remove it:</p> + + <code> + # emerge --ask --depclean "app-admin/logcheck" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-20148">CVE-2017-20148</uri> + </references> + <metadata tag="requester" timestamp="2022-09-25T13:34:57.482832Z">ajak</metadata> + <metadata tag="submitter" timestamp="2022-09-25T13:34:57.487714Z">ajak</metadata> +</glsa>
\ No newline at end of file diff --git a/metadata/glsa/glsa-202209-11.xml b/metadata/glsa/glsa-202209-11.xml new file mode 100644 index 000000000000..d1599df5c764 --- /dev/null +++ b/metadata/glsa/glsa-202209-11.xml @@ -0,0 +1,44 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202209-11"> + <title>HarfBuzz: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been discovered in HarfBuzz, the worst of which could result in arbitrary code execution.</synopsis> + <product type="ebuild">harfbuzz</product> + <announced>2022-09-25</announced> + <revised count="1">2022-09-25</revised> + <bug>830372</bug> + <bug>856049</bug> + <access>remote</access> + <affected> + <package name="media-libs/harfbuzz" auto="yes" arch="*"> + <unaffected range="ge">4.4.0</unaffected> + <vulnerable range="lt">4.4.0</vulnerable> + </package> + </affected> + <background> + <p>HarfBuzz is an OpenType text shaping engine.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in HarfBuzz. Please review the CVE identifiers referenced below for details.</p> + </description> + <impact type="high"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All HarfBuzz users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/harfbuzz-4.4.0" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-45931">CVE-2021-45931</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-33068">CVE-2022-33068</uri> + </references> + <metadata tag="requester" timestamp="2022-09-25T13:35:18.213772Z">ajak</metadata> + <metadata tag="submitter" timestamp="2022-09-25T13:35:18.218222Z">ajak</metadata> +</glsa>
\ No newline at end of file diff --git a/metadata/glsa/glsa-202209-12.xml b/metadata/glsa/glsa-202209-12.xml new file mode 100644 index 000000000000..f7b8e7ebc453 --- /dev/null +++ b/metadata/glsa/glsa-202209-12.xml @@ -0,0 +1,53 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202209-12"> + <title>GRUB: Multiple Vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been discovered in GRUB, the worst of which may allow for secureboot bypass.</synopsis> + <product type="ebuild">grub</product> + <announced>2022-09-25</announced> + <revised count="1">2022-09-25</revised> + <bug>850535</bug> + <bug>835082</bug> + <access>local</access> + <affected> + <package name="sys-boot/grub" auto="yes" arch="*"> + <unaffected range="ge">2.06</unaffected> + <vulnerable range="lt">2.06</vulnerable> + </package> + </affected> + <background> + <p>GNU GRUB is a multiboot boot loader used by most Linux systems.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in GRUB. Please review the CVE identifiers referenced below for details.</p> + </description> + <impact type="high"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All GRUB users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-boot/grub-2.06-r3" + </code> + + <p>After upgrading, make sure to run the grub-install command with options appropriate for your system. See the GRUB2 Gentoo Wiki page for directions. Your system will be vulnerable until this action is performed.</p> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3695">CVE-2021-3695</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3696">CVE-2021-3696</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3697">CVE-2021-3697</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3981">CVE-2021-3981</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-28733">CVE-2022-28733</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-28734">CVE-2022-28734</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-28735">CVE-2022-28735</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-28736">CVE-2022-28736</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-28737">CVE-2022-28737</uri> + </references> + <metadata tag="requester" timestamp="2022-09-25T13:35:30.406656Z">ajak</metadata> + <metadata tag="submitter" timestamp="2022-09-25T13:35:30.411250Z">ajak</metadata> +</glsa>
\ No newline at end of file diff --git a/metadata/glsa/glsa-202209-13.xml b/metadata/glsa/glsa-202209-13.xml new file mode 100644 index 000000000000..507d8dd2000e --- /dev/null +++ b/metadata/glsa/glsa-202209-13.xml @@ -0,0 +1,42 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202209-13"> + <title>libaacplus: Denial of Service</title> + <synopsis>Multiple vulnerabilities have been discovered in libaacplus, the worst of which could result in denial of service.</synopsis> + <product type="ebuild">libaacplus</product> + <announced>2022-09-25</announced> + <revised count="1">2022-09-25</revised> + <bug>618000</bug> + <access>local and remote</access> + <affected> + <package name="media-libs/libaacplus" auto="yes" arch="*"> + <vulnerable range="le">2.0.2-r3</vulnerable> + </package> + </affected> + <background> + <p>libaacplus is an HE-AAC+ v2 library, based on the reference implementation.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in libaacplus. Please review the CVE identifiers referenced below for details.</p> + </description> + <impact type="normal"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>Gentoo has discontinued suport for libaacplus. We recommend that users remove it:</p> + + <code> + # emerge --ask --depclean "media-libs/libaacplus" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-7603">CVE-2017-7603</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-7604">CVE-2017-7604</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2017-7605">CVE-2017-7605</uri> + </references> + <metadata tag="requester" timestamp="2022-09-25T13:35:43.192701Z">ajak</metadata> + <metadata tag="submitter" timestamp="2022-09-25T13:35:43.197563Z">ajak</metadata> +</glsa>
\ No newline at end of file diff --git a/metadata/glsa/glsa-202209-14.xml b/metadata/glsa/glsa-202209-14.xml new file mode 100644 index 000000000000..eebe11b4cc67 --- /dev/null +++ b/metadata/glsa/glsa-202209-14.xml @@ -0,0 +1,44 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202209-14"> + <title>Fetchmail: Multiple Vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been discovered in Fetchmail, the worst of which could result in email disclosure to third parties.</synopsis> + <product type="ebuild">fetchmail</product> + <announced>2022-09-25</announced> + <revised count="1">2022-09-25</revised> + <bug>810676</bug> + <bug>804921</bug> + <access>remote</access> + <affected> + <package name="net-mail/fetchmail" auto="yes" arch="*"> + <unaffected range="ge">6.4.22</unaffected> + <vulnerable range="lt">6.4.22</vulnerable> + </package> + </affected> + <background> + <p>Fetchmail is a remote mail retrieval and forwarding utility.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Fetchmail. Please review the CVE identifiers referenced below for details.</p> + </description> + <impact type="low"> + <p>Please review the referenced CVE identifiers for details.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>All Fetchmail users should upgrade to the latest version:</p> + + <code> + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-mail/fetchmail-6.4.22" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-36386">CVE-2021-36386</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-39272">CVE-2021-39272</uri> + </references> + <metadata tag="requester" timestamp="2022-09-25T13:35:56.538201Z">ajak</metadata> + <metadata tag="submitter" timestamp="2022-09-25T13:35:56.542922Z">ajak</metadata> +</glsa>
\ No newline at end of file diff --git a/metadata/glsa/glsa-202209-15.xml b/metadata/glsa/glsa-202209-15.xml new file mode 100644 index 000000000000..17ecb3f121ef --- /dev/null +++ b/metadata/glsa/glsa-202209-15.xml @@ -0,0 +1,64 @@ +<?xml version="1.0" encoding="UTF-8"?> +<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd"> +<glsa id="202209-15"> + <title>Oracle JDK/JRE: Multiple vulnerabilities</title> + <synopsis>Multiple vulnerabilities have been found in Oracle JDK and JRE, the worst of which could result in the arbitrary execution of code.</synopsis> + <product type="ebuild">oracle-jdk-bin,oracle-jre-bin</product> + <announced>2022-09-25</announced> + <revised count="1">2022-09-25</revised> + <bug>732630</bug> + <bug>717638</bug> + <access>remote</access> + <affected> + <package name="dev-java/oracle-jdk-bin" auto="yes" arch="*"> + <vulnerable range="le">11.0.2</vulnerable> + </package> + <package name="dev-java/oracle-jre-bin" auto="yes" arch="*"> + <vulnerable range="le">1.8.0.202</vulnerable> + </package> + </affected> + <background> + <p>Java Platform, Standard Edition (Java SE) lets you develop and deploy Java applications on desktops and servers, as well as in today's demanding embedded environments. Java offers the rich user interface, performance, versatility, portability, and security that today's applications require.</p> + </background> + <description> + <p>Multiple vulnerabilities have been discovered in Oracle's JDK and JRE software suites. Please review the CVE identifiers referenced below for details.</p> + </description> + <impact type="normal"> + <p>Certain uses of untrusted data by Oracle JDK and JRE could result in arbitrary code execution.</p> + </impact> + <workaround> + <p>There is no known workaround at this time.</p> + </workaround> + <resolution> + <p>Gentoo has discontinued support for the Oracle JDK and JRE. We recommend that users remove it, and use dev-java/openjdk, dev-java/openjdk-bin, or dev-java/openjdk-jre-bin instead:</p> + + <code> + # emerge --ask --depclean "dev-java/oracle-jre-bin" + # emerge --ask --depclean "dev-java/oracle-jdk-bin" + </code> + </resolution> + <references> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-2585">CVE-2020-2585</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-2755">CVE-2020-2755</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-2756">CVE-2020-2756</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-2757">CVE-2020-2757</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-2773">CVE-2020-2773</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-2781">CVE-2020-2781</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-2800">CVE-2020-2800</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-2803">CVE-2020-2803</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-2805">CVE-2020-2805</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14556">CVE-2020-14556</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14562">CVE-2020-14562</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14573">CVE-2020-14573</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14577">CVE-2020-14577</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14578">CVE-2020-14578</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14579">CVE-2020-14579</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14581">CVE-2020-14581</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14583">CVE-2020-14583</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14593">CVE-2020-14593</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14621">CVE-2020-14621</uri> + <uri link="https://nvd.nist.gov/vuln/detail/CVE-2020-14664">CVE-2020-14664</uri> + </references> + <metadata tag="requester" timestamp="2022-09-25T13:36:11.652902Z">ajak</metadata> + <metadata tag="submitter" timestamp="2022-09-25T13:36:11.657278Z">ajak</metadata> +</glsa>
\ No newline at end of file |