diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index c5c01abd1b..5d35c406a4 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 604600 BLAKE2B 67fa11a1e6485039ed07ecb341dd3eed3351c2e805dffb942c7b1d5a67de5ce334f9c7e8c5cb91c69c6b47f09ddfab8f9675421c6bbcbc7edbff873eafe92a4e SHA512 ca8da2d1e3d921194da4de308aa6824a3315fadb8fa8032bf4faea9a454874b09a269bfba3178304da1473e32d3744bc06c1991003b11e8e16b1624b75ee3551 -TIMESTAMP 2025-11-01T06:40:07Z +MANIFEST Manifest.files.gz 605865 BLAKE2B bcadc158253762e9f24c9e6b055b713a9641d9bfc450941217534a559d82b06bbcb49cffa8d81ca2f49f67ef4ee9530b6f3fe207bd5cb748ba4d010bf5f05a43 SHA512 0a179d9b6436cf36bf8fe75f2d424c5e5a2787d4f2be30bec99d500009833c9172e6703303a8e695c1b53afa286a8aeaa479d0807e86f5b0a383be84bc9c6bbe +TIMESTAMP 2025-12-01T06:40:11Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmkFq0dfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmktOEtfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klAlqw//Rh+QFG/HU8p/afZwOkCuKiH3EYyTI6xrchUx//UMbrQlEawqkxbcF9S+ -q8cx1x2S0FsrDI7nT0qh7yndM+rBNl0zRuRMzczq8gQo7rCGdePJkklevXUD5B6/ -RmRE0ojr+TZSfNsFtGGAs1Smh7QjViKB7L4OV+lGo+i7q+yFPK5yd2gUFvvDJuYz -Orji4sAhdH8n4eDJ63DgJXn0oqLiDAHN55MizeQ1JmvAnuW6KCcflyzJ8wW4b3bB -3tmpUDq0LcNQ5unffo6YhUhIYaALUivdp0sPLbQ3Z3MYWWoIhL6M9E/RyNU6e1Rw -mX/VwyqNJGv+lTDYIEio4GFh0CiD0xyfW2EDD89ONqym3WwTNFWT0Y891FlaZm9q -czYbX0nN8z91rLOj7olRRjbt9Jh8m4ixb8s/F1afK+eDNMvevNQJcY6+rOInDuog -eCOo6hgBhAdKrBePXpnADD2PUG7HXrjijWZAzoOfThs3IvRfSmRhtd9wAU5a+W4U -YpY8ogO9mwP5HQwCs6hARnZB8cIJJZXBgXC1AK139O88KaRlhLT4dTo9DI5as2Lk -2VEUNAGMAoGRuQIHUvLJ83AtV0A1w/wt8O54lcusXxvcYCaxiLRQ5Lb46IrcmEmD -zihw7ItaE4/sYgbqEgpw5W29XDAFrzKv/Cy4wT9HUznGFu0813A= -=hxuR +klDI2A//f1DEIxwY5RAteoK8kAD1VUen5rTkm8/Ed7BQleONRh4qnYK6ic9G05Ei +nleWa6HgOpMPUPv4AR+xx6vxwBH06sKb2Nwc+dLX0KgMolBryTLz50N1ZDJ6FvLf +CagByOIXykQt0q6ktR3Px+F6nHupywQxquJnMAUMH8sf1UPD2qAMG6peBXc0BIeJ +sJ9+lm8ZCU0SAS1jQeLdwoLTfqlOuIMHjdtRYNbqqXc/KVebVl+rzDWadOUCD938 +P2idhdguAtBYc2KtV+XHKdQfSPsujLoWRsS3/nxBj7qAwIobT8o48hDOdQ8vlldE +ktXxWIdtT2IZL0RbHfwNa9oh7etO/63nGWfZ9/WVoXj5m2MnqM4ZqNINfCpyk4R8 +jtfnQ8YEPk06yfwn/gk4iTgsjU8BTKtQJ8HvIwxQqbCQUXBxeebAPY6wEcO3sN9L +j4dxu1d9gRBtOdzIngnqhLDVc12gDQQYZsmI0WcF8gYRLD3INyyzUBkOQHYCP39q +kGy3x7er7vEPbHWgvmY5FI6twYyGBJRC01Bl7023JAk3s+AKKShiUi1nFyLb26ix +Gwh/vijlztJ5eoqz+MvBosojhKJLaQ5XRMha8z3Hnm26o0dA2h/gW3RDMdzwFFRj +I3YXZvYvS8Fr/vzzlrdQ3mf2nhjS0j8y2kf/qeG3H3eFpW3zWvo= +=4q7u -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 48d4235a90..59dbf607b1 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202509-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202509-01.xml new file mode 100644 index 0000000000..9ef81a046a --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202509-01.xml @@ -0,0 +1,44 @@ + + + + Poppler: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Poppler, the worst of which could lead to execution of arbitrary code. + poppler + 2025-09-17 + 2025-09-17 + 843149 + 959944 + local + + + 25.06.0 + 25.06.0 + + + +

Poppler is a PDF rendering library based on the xpdf-3.0 code base.

+
+ +

Multiple vulnerabilities have been discovered in Poppler. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Poppler users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-text/poppler-25.06.0" + +
+ + CVE-2022-27337 + CVE-2025-52886 + + graaff + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-01.xml new file mode 100644 index 0000000000..042e01f773 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-01.xml @@ -0,0 +1,44 @@ + + + + UDisks: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in UDisks, the worst of which can lead to execution of arbitrary code. + udisks + 2025-11-24 + 2025-11-24 + 827863 + 962126 + remote + + + 2.10.2 + 2.10.2 + + + +

UDisks provides a daemon, tools and libraries to access and manipulate disks, storage devices and technologies.

+
+ +

Multiple vulnerabilities have been discovered in UDisks. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All UDisks users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-fs/udisks-2.10.2" + +
+ + CVE-2021-3802 + CVE-2025-8067 + + graaff + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-02.xml new file mode 100644 index 0000000000..37fcf63146 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-02.xml @@ -0,0 +1,73 @@ + + + + WebKitGTK+: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code. + webkit-gtk + 2025-11-24 + 2025-11-24 + 938026 + 941276 + 951739 + 961021 + remote + + + 2.48.5 + 2.48.5 + 2.48.5 + 2.48.5 + + + +

WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.

+
+ +

Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All WebKitGTK+ users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.48.5:4.1" ">=net-libs/webkit-gtk-2.48.5:6" + +
+ + CVE-2024-40857 + CVE-2024-40866 + CVE-2024-44185 + CVE-2024-44187 + CVE-2024-44192 + CVE-2024-44244 + CVE-2024-44296 + CVE-2024-54467 + CVE-2024-54551 + CVE-2025-24201 + CVE-2025-24208 + CVE-2025-24209 + CVE-2025-24213 + CVE-2025-24216 + CVE-2025-24264 + CVE-2025-30427 + CVE-2025-31273 + CVE-2025-31278 + CVE-2025-43211 + CVE-2025-43212 + CVE-2025-43216 + CVE-2025-43227 + CVE-2025-43228 + CVE-2025-43240 + CVE-2025-43265 + WSA-2025-0002 + WSA-2025-0003 + + graaff + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-03.xml new file mode 100644 index 0000000000..0ee9d44d5d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-03.xml @@ -0,0 +1,45 @@ + + + + qtsvg: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in qtsvg, the worst of which could lead to execution of arbitrary code. + qtsvg + 2025-11-24 + 2025-11-24 + 915998 + 963710 + local and remote + + + 6.9.3:6 + 6.9.3:6 + + + +

qtsvg is a SVG rendering library for the Qt framework.

+
+ +

Multiple vulnerabilities have been discovered in qtsvg. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All qtsvg users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-qt/qtsvg-6.9.3" + +
+ + CVE-2023-45872 + CVE-2025-10728 + CVE-2025-10729 + + graaff + sam +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-04.xml new file mode 100644 index 0000000000..a749be2879 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-04.xml @@ -0,0 +1,106 @@ + + + + Chromium, Google Chrome, Microsoft Edge. Opera: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution. + chromium,google-chrome,microsoft-edge,opera + 2025-11-24 + 2025-11-24 + 961477 + 961834 + 962051 + 963024 + 963638 + 963959 + 964335 + local and remote + + + 141.0.7390.107 + 141.0.7390.107 + + + 141.0.7390.107 + 141.0.7390.107 + + + 141.0.3537.71 + 141.0.3537.71 + + + 122.0.5643.142 + 122.0.5643.142 + + + +

Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. Google Chrome is one fast, simple, and secure browser for all your devices. Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. Opera is a fast and secure web browser.

+
+ +

Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

ll Google Chrome users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/google-chrome-141.0.7390.107" + + +

All Chromium users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/chromium-141.0.7390.107" + + +

All Microsoft Edge users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-141.0.3537.71 " + + +

All Oprea users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/opera-122.0.5643.142" + +
+ + CVE-2025-8879 + CVE-2025-8880 + CVE-2025-8881 + CVE-2025-8882 + CVE-2025-8901 + CVE-2025-9132 + CVE-2025-9478 + CVE-2025-10500 + CVE-2025-10501 + CVE-2025-10502 + CVE-2025-10585 + CVE-2025-11205 + CVE-2025-11206 + CVE-2025-11207 + CVE-2025-11208 + CVE-2025-11209 + CVE-2025-11210 + CVE-2025-11211 + CVE-2025-11212 + CVE-2025-11213 + CVE-2025-11215 + CVE-2025-11216 + CVE-2025-11219 + CVE-2025-11458 + CVE-2025-11460 + CVE-2025-11756 + + graaff + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-05.xml new file mode 100644 index 0000000000..7811966aca --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-05.xml @@ -0,0 +1,63 @@ + + + + redict, redis: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in redis and redict, the worst of which could lead to execution of arbitrary code. + redict,redis + 2025-11-24 + 2025-11-24 + 940609 + 947749 + 954265 + 959657 + local and remote + + + 7.3.5 + 7.3.5 + + + 8.0.3 + 8.0.3 + + + +

Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache and message broker.

+
+ +

Multiple vulnerabilities have been discovered in Redis. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Redis users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/redis-8.0.3" + + +

All Redict users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-db/redict-7.3.5" + +
+ + CVE-2024-31227 + CVE-2024-31228 + CVE-2024-31449 + CVE-2024-46981 + CVE-2024-51741 + CVE-2025-21605 + CVE-2025-32023 + CVE-2025-48367 + + graaff + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-06.xml new file mode 100644 index 0000000000..fb42dc3d9b --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-06.xml @@ -0,0 +1,45 @@ + + + + libpng: Multiple vulnerabilities + Multiple vulnerabilities have been discovered in libpng, the worst of which could lead to execution of arbitrary code. + libpng + 2025-11-26 + 2025-11-26 + 966340 + remote + + + 1.6.51 + 1.6.51 + + + +

libpng is the official PNG reference library used to read, write and manipulate PNG images.

+
+ +

Multiple vulnerabilities have been discovered in libpng. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All libpng users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/libpng-1.6.51" + +
+ + CVE-2025-64505 + CVE-2025-64506 + CVE-2025-64720 + CVE-2025-65018 + + sam + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-07.xml new file mode 100644 index 0000000000..3cfd9ffb87 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202511-07.xml @@ -0,0 +1,45 @@ + + + + librnp: Weak random number generation + librnp uses weak random number generation such that generated keys can be easily cracked. + librnp + 2025-11-26 + 2025-11-26 + 966299 + local and remote + + + 0.18.1 + 0.18 + 0.18.0 + + + +

librnp is a high performance C++ OpenPGP library.

+
+ +

The affected librnp version generated weak session keys for its public key encryption (PKESK) mode.

+
+ +

Messages encrypted using the affected librnp version might be readable by an attacker with just the public key.

+
+ +

There is no known workaround at this time.

+
+ +

All librnp users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-util/librnp-0.18.1" + + +

If sensitive information was sent using e.g. Thunderbird (with USE=system-librnp, the default), it should be considered potentially viewable by an attacker.

+
+ + CVE-2025-13470 + + sam + sam +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 0308df869d..d4092d021a 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Sat, 01 Nov 2025 06:40:04 +0000 +Mon, 01 Dec 2025 06:40:07 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index b2e5aa023f..c7d0129b6b 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -586b6d2f9bc7faf3319e097e41c3f6998d5d8844 1758145365 2025-09-17T21:42:45Z +ec936f5c1002deb9283d4febda05f013db58790c 1764120273 2025-11-26T01:24:33Z