Skip to content

Commit f8b1f79

Browse files
authored
Merge pull request #3683 from flatcar/buildbot/monthly-glsa-metadata-updates-2026-02-01
Monthly GLSA metadata 2026-02-01
2 parents 68d8892 + 6a5f972 commit f8b1f79

File tree

9 files changed

+270
-18
lines changed

9 files changed

+270
-18
lines changed
Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -1,24 +1,24 @@
11
-----BEGIN PGP SIGNED MESSAGE-----
22
Hash: SHA512
33

4-
MANIFEST Manifest.files.gz 606026 BLAKE2B f642a7d3238c8998aee627a1b7086431eb88df4678fdf42f7ddf8d8bb6de107a02fae7c557568660cc9f04cb9ed135534cc32f129482ba4da102bb96be7e68a9 SHA512 aa4b68d334da5329457cfc76655ce927a51c26cff8774aed431df0f4711bf41c231eea1647511c9cabfd8eabec4b84637a0f0f2ccc3d138d509d72522dbd32d7
5-
TIMESTAMP 2026-01-01T06:40:27Z
4+
MANIFEST Manifest.files.gz 606828 BLAKE2B a1b451cbd8b97fba48dcbcc329e204f935247276d40c90ac4cbfb608d79ab2e992895b94ff858963121d1134b508c59270174e7bcdaf0344859da3443b02f1b8 SHA512 7cf2f0457c87986d719605bc843f16fb1b58e94af8217c0a3cfc1d3b7a854459cdf2ac652b4f9271da08b81922bfb4c73aa18e4836c21288bc5adf2c59450d36
5+
TIMESTAMP 2026-02-01T07:02:09Z
66
-----BEGIN PGP SIGNATURE-----
77

8-
iQKuBAEBCgCZFiEE4dartjv8+0ugL98c7FkO6skYklAFAmlWFtsbFIAAAAAABAAO
8+
iQKvBAEBCgCZFiEE4dartjv8+0ugL98c7FkO6skYklAFAml++nIbFIAAAAAABAAO
99
bWFudTIsMi41KzEuMTEsMiwyXxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25z
1010
Lm9wZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRFMUQ2QUJCNjNCRkNGQjRCQTAyRkRG
11-
MUNFQzU5MEVFQUM5MTg5MjUwAAoJEOxZDurJGJJQGU0P+Mj6Fa4IzlNvGfztJ3vt
12-
Mgacid6hW8pHl6WnEcBrVUsMw+QXVZmJNeC1erVZ7duOu/VUDD/y787YPM5CAwYN
13-
fKI5DIrbUvb4vl8r71O6cC0a+7d8t5FERwYkqBwQEHlCJZzy6BIfOswaPdUqyl0m
14-
FS12GwelAZ6vHM1BqFzwA2vcUcREsaSpos9+QUCKRPeQRG7PGb5pWqiLIa+fgnoz
15-
pabOe3fSzVY+SqSVZ2ZzC7QVNPLdmjk5JTK7yp+KQRwNY5Tx0DEGkDFtPv5Lxo+R
16-
zRTCdzL+KmXlpfAYeV21hNbYqCYNJl+/IWts7rr0ykONvHwQpY4qUAtlvsBsTqLg
17-
dJvfIOkV8ILr5vlW+MoPyyuV5ATWdLQow3SkWNUpXuBBH/h6vpM8CGH5gg+eMpwB
18-
v8vVKfc87XdPa+OhBwy+DJCyyWG4weFK5sOZbT1mM0K72ZoHCNuolVwFIfKJvJ3Z
19-
8DWkAq+w6U4ft1nx25TRs0o9/uXkTsLIkJgbeThccuEo5EYLykEmRJ0V8BH4Y5Hc
20-
VhFtafFPtg87bQx8h2M/f0LsFcr6X2R58FIWyt/WRHdfG7G3q6OxF/nFO/djQF2t
21-
0R7XXtN3UTQ+XvSzNG25s6QUP8LL2wGKbLsmaU5fBXTW/44Zn9wDdKMdSVNQaAmi
22-
G6SqbKPoKyQY4uI2gWyvxl0=
23-
=tC7e
11+
MUNFQzU5MEVFQUM5MTg5MjUwAAoJEOxZDurJGJJQtm4QAKn7InAoh6OetjFpQHnP
12+
8bYo6j4twV1tyzIN//aRqQNwTDfyMELCeHie/lh7yGSYVmpqBGArvit2kK/JAi5C
13+
78H11gvBjrlP4fdJ40Lo24PtngJV+LcgBiNHDI76S7WOe58RbcIBFPzQSDLXa6fV
14+
ldhfi5iQQVJrKLn4naX9gzGSa0ERXBdv96d7AIF63lnbAvO1LL9lGo8yc85f7Im4
15+
ldvkSpRJBWNe1o7RLVU9bCnu7kSbexKplVHdPlVJwURarnD0IZPCUWbcI5Dl7tWa
16+
PCoAbvJKAU1Ylz08jHLyyCbWC60XmYPUweGB3K4wrrLT85afYssON7DnCKJyJ88/
17+
Iq/B7m1tFqKmGh4RqeZcVQ62mpSlxrAL6EsaHAuHcGbOGe7wsYF1KDctGCA31IYk
18+
/gF+pZNTE0wVw8XUYppPv8t3m3rCTL8NMEPX/1QEeux7rFsy7HEf+blyOMKhc6zY
19+
y+8M+kwMP9pl9fXr7STNcr0uLNxmgU47bn8JHqdNPz7VdBDnOstWq8ncUXSMox5G
20+
WpuJ4vgnwBwtLSNEVdu0QNpgBoF82ELibyA51Z4sB/dy1PhwhcusD0vy99tBJyHM
21+
WbBObFneNwZZq9lHuoY/4mWCs4J8f/N2B8axphrFPfgQIiepkwYSlh2sCyONF5jS
22+
HB8CfD+GkDbYCkmdWiCgVtj3
23+
=7ZS8
2424
-----END PGP SIGNATURE-----
Binary file not shown.
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202601-01">
4+
<title>inetutils: Remote Code Execution</title>
5+
<synopsis>A vulnerability has been discovered in the telnetd module of inetutils, which allows remote code execution as root.</synopsis>
6+
<product type="ebuild">inetutils</product>
7+
<announced>2026-01-26</announced>
8+
<revised count="1">2026-01-26</revised>
9+
<bug>969065</bug>
10+
<access>remote</access>
11+
<affected>
12+
<package name="net-misc/inetutils" auto="yes" arch="*">
13+
<unaffected range="ge">2.7</unaffected>
14+
<vulnerable range="lt">2.7</vulnerable>
15+
</package>
16+
</affected>
17+
<background>
18+
<p>Inetutils is a collection of common network programs including a telnet client and server.</p>
19+
</background>
20+
<description>
21+
<p>The telnetd server invokes /usr/bin/login (normally running as root) passing the value of the USER environment variable received from the client as the last parameter.
22+
23+
If the client supply a carefully crafted USER environment value being the string &#34;-f root&#34;, and passes the telnet(1) -a or --login parameter to send this USER environment to the server, the client will be automatically logged in as root bypassing normal authentication processes.
24+
25+
This happens because the telnetd server do not sanitize the USER environment variable before passing it on to login(1), and login(1) uses the -f parameter to by-pass normal authentication.</p>
26+
</description>
27+
<impact type="high">
28+
<p>An attacker can login as root via the telnetd daemon.</p>
29+
</impact>
30+
<workaround>
31+
<p>Reinstall inetutils with the telnetd USE flag disabled. This is the default in Gentoo.</p>
32+
</workaround>
33+
<resolution>
34+
<p>All inetutils users with the telnetd USE flag enabled should upgrade to the latest version:</p>
35+
36+
<code>
37+
# emerge --sync
38+
# emerge --ask --oneshot --verbose ">=net-misc/inetutils-2.7"
39+
</code>
40+
</resolution>
41+
<references>
42+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2026-24061">CVE-2026-24061</uri>
43+
</references>
44+
<metadata tag="requester" timestamp="2026-01-26T10:22:35.842111Z">graaff</metadata>
45+
<metadata tag="submitter" timestamp="2026-01-26T10:22:35.844585Z">graaff</metadata>
46+
</glsa>
Lines changed: 65 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,65 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202601-02">
4+
<title>Vim, gVim: Multiple Vulnerabilities</title>
5+
<synopsis>Multiple vulnerabilities have been discovered in Vim and gVim, the worst of which could lead to execution of arbitrary code.</synopsis>
6+
<product type="ebuild">gvim,vim,vim-core</product>
7+
<announced>2026-01-26</announced>
8+
<revised count="1">2026-01-26</revised>
9+
<bug>961498</bug>
10+
<access>local</access>
11+
<affected>
12+
<package name="app-editors/gvim" auto="yes" arch="*">
13+
<unaffected range="ge">9.1.1652</unaffected>
14+
<vulnerable range="lt">9.1.1652</vulnerable>
15+
</package>
16+
<package name="app-editors/vim" auto="yes" arch="*">
17+
<unaffected range="ge">9.1.1652</unaffected>
18+
<vulnerable range="lt">9.1.1652</vulnerable>
19+
</package>
20+
<package name="app-editors/vim-core" auto="yes" arch="*">
21+
<unaffected range="ge">9.1.1652</unaffected>
22+
<vulnerable range="lt">9.1.1652</vulnerable>
23+
</package>
24+
</affected>
25+
<background>
26+
<p>Vim is an efficient, highly configurable improved version of the classic ‘vi’ text editor. gVim is the GUI version of Vim.</p>
27+
</background>
28+
<description>
29+
<p>Multiple vulnerabilities have been discovered in Vim, gVim. Please review the CVE identifiers referenced below for details.</p>
30+
</description>
31+
<impact type="high">
32+
<p>Please review the referenced CVE identifiers for details.</p>
33+
</impact>
34+
<workaround>
35+
<p>There is no known workaround at this time.</p>
36+
</workaround>
37+
<resolution>
38+
<p>All Vim, gVim users should upgrade to the latest version:</p>
39+
40+
<code>
41+
# emerge --sync
42+
# emerge --ask --oneshot --verbose ">=app-editors/vim-9.1.1652"
43+
</code>
44+
45+
<p>All Vim, gVim users should upgrade to the latest version:</p>
46+
47+
<code>
48+
# emerge --sync
49+
# emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.1.1652"
50+
</code>
51+
52+
<p>All Vim, gVim users should upgrade to the latest version:</p>
53+
54+
<code>
55+
# emerge --sync
56+
# emerge --ask --oneshot --verbose ">=app-editors/gvim-9.1.1652"
57+
</code>
58+
</resolution>
59+
<references>
60+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-53905">CVE-2025-53905</uri>
61+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906</uri>
62+
</references>
63+
<metadata tag="requester" timestamp="2026-01-26T10:26:17.924691Z">graaff</metadata>
64+
<metadata tag="submitter" timestamp="2026-01-26T10:26:17.927149Z">graaff</metadata>
65+
</glsa>
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202601-03">
4+
<title>GIMP: Arbitrary Code Execution</title>
5+
<synopsis>A vulnerability has been discovered in GIMP, which can lead to execution of arbitrary code.</synopsis>
6+
<product type="ebuild">gimp</product>
7+
<announced>2026-01-26</announced>
8+
<revised count="1">2026-01-26</revised>
9+
<bug>965334</bug>
10+
<access>local</access>
11+
<affected>
12+
<package name="media-gfx/gimp" auto="yes" arch="*">
13+
<unaffected range="ge">2.10.38-r3</unaffected>
14+
<unaffected range="ge">3.0.6</unaffected>
15+
<vulnerable range="lt">2.10.38-r3</vulnerable>
16+
<vulnerable range="lt">3.0.6</vulnerable>
17+
</package>
18+
</affected>
19+
<background>
20+
<p>GIMP is the GNU Image Manipulation Program. XCF is the native image file format used by GIMP.</p>
21+
</background>
22+
<description>
23+
<p>A vulnerability has been discovered in GIMP. Please review the CVE identifier referenced below for details.</p>
24+
</description>
25+
<impact type="high">
26+
<p>This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
27+
28+
The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process.</p>
29+
</impact>
30+
<workaround>
31+
<p>There is no known workaround at this time.</p>
32+
</workaround>
33+
<resolution>
34+
<p>All GIMP users should upgrade to the latest version:</p>
35+
36+
<code>
37+
# emerge --sync
38+
# emerge --ask --oneshot --verbose ">=media-gfx/gimp-3.0.6"
39+
</code>
40+
41+
<p>All GIMP 2.x users should upgrade to the latest version:</p>
42+
43+
<code>
44+
# emerge --sync
45+
# emerge --ask --oneshot --verbose ">=media-gfx/gimp-2.10.38-r3 =media-gfx/gimp-2*"
46+
</code>
47+
</resolution>
48+
<references>
49+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-10934">CVE-2025-10934</uri>
50+
<uri>GHSA-wv7v-cchq-8fjh</uri>
51+
</references>
52+
<metadata tag="requester" timestamp="2026-01-26T10:28:36.688155Z">graaff</metadata>
53+
<metadata tag="submitter" timestamp="2026-01-26T10:28:36.690919Z">graaff</metadata>
54+
</glsa>
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202601-04">
4+
<title>Asterisk: Multiple Vulnerabilities</title>
5+
<synopsis>Multiple vulnerabilities have been discovered in Asterisk, the worst of which can lead to arbitrary code execution.</synopsis>
6+
<product type="ebuild">asterisk</product>
7+
<announced>2026-01-26</announced>
8+
<revised count="1">2026-01-26</revised>
9+
<bug>960930</bug>
10+
<access>remote</access>
11+
<affected>
12+
<package name="net-misc/asterisk" auto="yes" arch="*">
13+
<unaffected range="ge">18.26.3</unaffected>
14+
<vulnerable range="lt">18.26.3</vulnerable>
15+
</package>
16+
</affected>
17+
<background>
18+
<p>Asterisk is an open source telephony engine and toolkit.</p>
19+
</background>
20+
<description>
21+
<p>Multiple vulnerabilities have been discovered in Asterisk. Please review the CVE identifiers referenced below for details.</p>
22+
</description>
23+
<impact type="high">
24+
<p>Please review the referenced CVE identifiers for details.</p>
25+
</impact>
26+
<workaround>
27+
<p>There is no known workaround at this time.</p>
28+
</workaround>
29+
<resolution>
30+
<code>
31+
# emerge --sync
32+
# emerge --ask --oneshot --verbose ">=net-misc/asterisk-18.26.3"
33+
</code>
34+
</resolution>
35+
<references>
36+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-1131">CVE-2025-1131</uri>
37+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-49832">CVE-2025-49832</uri>
38+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-57767">CVE-2025-57767</uri>
39+
<uri>GHSA-64qc-9x89-rx5j</uri>
40+
<uri>GHSA-mrq5-74j5-f5cr</uri>
41+
<uri>GHSA-v9q8-9j8m-5xwp</uri>
42+
</references>
43+
<metadata tag="requester" timestamp="2026-01-26T10:31:04.790497Z">graaff</metadata>
44+
<metadata tag="submitter" timestamp="2026-01-26T10:31:04.792835Z">graaff</metadata>
45+
</glsa>
Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202601-05">
4+
<title>Commons-BeanUtils: Arbitary Code Execution</title>
5+
<synopsis>A vulnerability has been discovered in Commons-BeanUtils, which can lead to execution of arbitrary code.</synopsis>
6+
<product type="ebuild">commons-beanutils</product>
7+
<announced>2026-01-26</announced>
8+
<revised count="1">2026-01-26</revised>
9+
<bug>960929</bug>
10+
<access>remote</access>
11+
<affected>
12+
<package name="dev-java/commons-beanutils" auto="yes" arch="*">
13+
<unaffected range="ge">1.11.0</unaffected>
14+
<vulnerable range="lt">1.11.0</vulnerable>
15+
</package>
16+
</affected>
17+
<background>
18+
<p>Commons-beanutils provides easy-to-use wrappers around Reflection and Introspection APIs</p>
19+
</background>
20+
<description>
21+
<p>Multiple vulnerabilities have been discovered in Commons-BeanUtils. Please review the CVE identifiers referenced below for details.</p>
22+
</description>
23+
<impact type="high">
24+
<p>A special BeanIntrospector class was added in version 1.9.2. This can be used to stop attackers from using the declared class property of Java enum objects to get access to the classloader. However this protection was not enabled by default. PropertyUtilsBean (and consequently BeanUtilsBean) now disallows declared class level property access by default.</p>
25+
</impact>
26+
<workaround>
27+
<p>There is no known workaround at this time.</p>
28+
</workaround>
29+
<resolution>
30+
<p>All Commons-BeanUtils users should upgrade to the latest version:</p>
31+
32+
<code>
33+
# emerge --sync
34+
# emerge --ask --oneshot --verbose ">=dev-java/commons-beanutils-1.11.0"
35+
</code>
36+
</resolution>
37+
<references>
38+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-48734">CVE-2025-48734</uri>
39+
</references>
40+
<metadata tag="requester" timestamp="2026-01-26T10:32:54.504065Z">graaff</metadata>
41+
<metadata tag="submitter" timestamp="2026-01-26T10:32:54.507391Z">graaff</metadata>
42+
</glsa>
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
Thu, 01 Jan 2026 06:40:24 +0000
1+
Sun, 01 Feb 2026 07:02:03 +0000
Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
9e297cd21fe68d36a7180cf1ead3745d99567474 1766871224 2025-12-27T21:33:44Z
1+
371ee63aaee87b60a1f5a63de7d230d6598a20c8 1769423604 2026-01-26T10:33:24Z

0 commit comments

Comments
 (0)