diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest
index 5403be1514..96a62a9cda 100644
--- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest
@@ -1,23 +1,23 @@
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
-MANIFEST Manifest.files.gz 462212 BLAKE2B 5776c6001abb402454a2b47a7b9bf3bf9047598d1aece9f78d5b9c3c27b9e2beb04358067b23d0aab0fa3a39a6704dbc7989395dc50e173ff19712be407974d6 SHA512 b5ee2fe405b23fa0d01a4455e021e430490898b9d86f37bdd8cdf6f3e1e612bc5782cde9c380e6d19690d6c9d75154b7ece632c229e69202510fa1255c1cb2a6
-TIMESTAMP 2020-04-16T05:39:02Z
+MANIFEST Manifest.files.gz 465570 BLAKE2B a62e99817e32fd8ff7f82db3f63ecd455d8d078254d12926bca9349cd7d4cb7525d19b5ca213653d7ca3a28e5f51b7e4f978944f6a7c39fec3994650ada13ff2 SHA512 ee24891578ae08c29634185ea42adbf62dff9fd502bd411c413a0b0088f0d305dd4dba72180ac6793f6d434a7cc1a30d883831d3d40443eae468994ac283a7ef
+TIMESTAMP 2020-05-15T14:08:26Z
-----BEGIN PGP SIGNATURE-----
-iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl6X73ZfFIAAAAAALgAo
+iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAl6+olpfFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx
RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY
-klAwzA/8Dv2dDluNwUU99HrcwRPXsD+VHkUsSIYQz+76O01a+3ypffDSHH8/fTx3
-Z+vH4aT5UPTzB5pKfmmo8zdgJwJosj8Squ/YCE90pVyiChQHk1GTMMpl0rK3va81
-/higcbCeLg9rAu+9qruPkjLGzbXFEkQLIt8lhPlnh2ddE1R8MTeYKIkNa0g1IFyD
-5lPQxDy3D7R5U1Wn3eqnLNzSmZhXum2Ko/pALX9jHTVt3Tfc2pmVqaS0AuTrUpGf
-Lxha0BFnig4lMWHzniIz7zgwzo8A2upnFRl+caYxNAQwBvBCoJWBSWoGB4Kecwa2
-D+HY/7Y/J1n83//0h+3krFsamRJCwYt4pdFIdv2bBsxWUPlVPLMQWEmN7v06MUCN
-mX4bDu/L25m0xeFeGzlU+LiqeVoyIl6I429OfSovMvSn3Xou8kSx31kAgZVThvGK
-xPYGokcU0SAyJket82M5O4NyH+1sNeJEnLj4uya35a6w6u1ZLc7xawpiDxB8Rw5u
-/bEgf6InZrX2XHD77dmfGOEEujYVnOrR32+8F9lUVzk8HkR+2ZRRM2bA32QeDQVq
-4RGhSSYJHP6uMpipCEGE3NN79y4/t1oAhAREBm4LIRBoi2uwxX7nB9c15rXnTGem
-XRqZUh1Ady6wN+N1iWrsJTmB9I/kaAfMgCjtmfZpsqcnQL5rub8=
-=eM2y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+=VfoR
-----END PGP SIGNATURE-----
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz
index e387e538ae..192d458f15 100644
Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-57.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-57.xml
index 507ece2ce6..a2f9609794 100644
--- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-57.xml
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202003-57.xml
@@ -7,7 +7,7 @@
All PHP 7.3.x users should upgrade to the latest version: All PHP 7.4.x users should upgrade to the latest version: All Mozilla Firefox users should upgrade to the latest version: OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer
+ (SSL v2/v3) and Transport Layer Security (TLS v1/v1.1/v1.2/v1.3) as well
+ as a general purpose cryptography library.
+ Multiple vulnerabilities have been discovered in OpenSSL. Please review
+ the CVE identifiers referenced below for details.
+ A remote attacker could perform a malicious crafted TLS 1.3 handshake
+ against an application using OpenSSL, possibly resulting in a Denial of
+ Service condition.
+ In addition, it’s feasible that an attacker might attack DH512. There is no known workaround at this time. All OpenSSL users should upgrade to the latest version: Mozilla Firefox is a popular open-source web browser from the Mozilla
+ Project.
+ Multiple vulnerabilities have been discovered in Mozilla Firefox. Please
+ review the CVE identifiers referenced below for details.
+ A remote attacker could entice a user to view a specially crafted web
+ page, possibly resulting in the execution of arbitrary code with the
+ privileges of the process, an information leak or a Denial of Service
+ condition.
+ There is no known workaround at this time. All Mozilla Firefox users should upgrade to the latest version: All Mozilla Firefox binary users should upgrade to the latest version: Chromium is an open-source browser project that aims to build a safer,
+ faster, and more stable way for all users to experience the web.
+ Google Chrome is one fast, simple, and secure browser for all your
+ devices.
+ Multiple vulnerabilities have been discovered in Chromium and Google
+ Chrome. Please review the referenced CVE identifiers for details.
+ A remote attacker could entice a user to open a specially crafted HTML
+ or multimedia file using Chromium or Google Chrome, possibly resulting in
+ execution of arbitrary code with the privileges of the process or a
+ Denial of Service condition.
+ There is no known workaround at this time. All Chromium users should upgrade to the latest version: All Google Chrome users should upgrade to the latest version: Git is a free and open source distributed version control system
+ designed to handle everything from small to very large projects with
+ speed and efficiency.
+ Multiple vulnerabilities have been discovered in Git. Please review the
+ CVE identifiers referenced below for details.
+ A remote attacker, by providing a specially crafted URL, could possibly
+ trick Git into returning credential information for a wrong host.
+ Disabling credential helpers will prevent this vulnerability. All Git 2.23.x users should upgrade to the latest version: All Git 2.24.x users should upgrade to the latest version: All Git 2.25.x users should upgrade to the latest version: All Git 2.26.x users should upgrade to the latest version: FontForge is a PostScript font editor and converter. Multiple vulnerabilities have been discovered in FontForge. Please
+ review the CVE identifiers referenced below for details.
+ A remote attacker could entice a user to open a specially crafted font
+ using FontForge, possibly resulting in execution of arbitrary code with
+ the privileges of the process or a Denial of Service condition.
+ There is no known workaround at this time. All FontForge users should upgrade to the latest version: Yubico Universal 2nd Factor (U2F) Host C Library. Multiple vulnerabilities have been discovered in libu2f-host. Please
+ review the CVE identifiers referenced below for details.
+ A remote attacker could entice a user to plug-in a malicious USB device,
+ possibly resulting in execution of arbitrary code with the privileges of
+ the process or a Denial of Service condition.
+ There is no known workaround at this time. All libu2f-host users should upgrade to the latest version: Cacti is a complete frontend to rrdtool. Multiple vulnerabilities have been discovered in Cacti. Please review
+ the CVE identifiers referenced below for details.
+ Please review the referenced CVE identifiers for details. There is no known workaround at this time. All Cacti users should upgrade to the latest version: Django is a Python-based web framework. Multiple vulnerabilities have been discovered in Django. Please review
+ the CVE identifiers referenced below for details.
+ A remote attacker, by sending specially crafted input, could possibly
+ cause a Denial of Service condition, or alter the database.
+ There is no known workaround at this time. All Django users should upgrade to the latest version: Optimized for compressing large files Multiple vulnerabilities have been discovered in Long Range ZIP. Please
+ review the CVE identifiers referenced below for details.
+ A remote attacker could entice a user to open a specially crafted
+ archive file possibly resulting in a Denial of Service condition.
+ There is no known workaround at this time. All Long Range ZIP users should upgrade to the latest version: QEMU is a generic and open source machine emulator and virtualizer. Multiple vulnerabilities have been discovered in QEMU. Please review the
+ CVE identifiers referenced below for details.
+ Please review the referenced CVE identifiers for details. There is no known workaround at this time. All QEMU users should upgrade to the latest version: Mozilla Thunderbird is a popular open-source email client from the
+ Mozilla project.
+ Multiple vulnerabilities have been discovered in Mozilla Thunderbird.
+ Please review the CVE identifiers referenced below for details.
+ A remote attacker may be able to execute arbitrary code, cause a Denial
+ of Service condition or spoof sender email address.
+ There is no known workaround at this time. All Mozilla Thunderbird users should upgrade to the latest version: All Mozilla Thunderbird binary users should upgrade to the latest
+ version:
+ Mozilla Firefox is a popular open-source web browser from the Mozilla
+ Project.
+ Multiple vulnerabilities have been discovered in Mozilla Firefox. Please
+ review the CVE identifiers referenced below for details.
+ A remote attacker could entice a user to view a specially crafted web
+ page, possibly resulting in the execution of arbitrary code with the
+ privileges of the process, an information leak or a Denial of Service
+ condition.
+ There is no known workaround at this time. All Mozilla Firefox users should upgrade to the latest version: All Mozilla Firefox binary users should upgrade to the latest version: Squid is a full-featured Web proxy cache designed to run on Unix
+ systems. It supports proxying and caching of HTTP, FTP, and other URLs,
+ as well as SSL support, cache hierarchies, transparent caching, access
+ control lists and many other features.
+ Multiple vulnerabilities have been discovered in Squid. Please review
+ the CVE identifiers referenced below for details.
+ Please review the referenced CVE identifiers for details. There is no known workaround at this time. All Squid users should upgrade to the latest version: LIVE555 Media Server is a set of libraries for multimedia streaming. Multiple vulnerabilities have been discovered in LIVE555 Media Server.
+ Please review the CVE identifiers referenced below for details.
+ Please review the referenced CVE identifiers for details. There is no known workaround at this time. All LIVE555 Media Server users should upgrade to the latest version: FreeRDP is a free implementation of the Remote Desktop Protocol. Multiple vulnerabilities have been discovered in FreeRDP. Please review
+ the CVE identifiers referenced below for details.
+ An attacker could possibly cause a Denial of Service condition. There is no known workaround at this time. All FreeRDP users should upgrade to the latest version: Xen is a bare-metal hypervisor. Multiple vulnerabilities have been discovered in Xen. Please review the
+ CVE identifiers referenced below for details.
+ Please review the referenced CVE identifiers for details. There is no known workaround at this time. All Xen users should upgrade to the latest version: All Xen Tools users should upgrade to the latest version: Python is an interpreted, interactive, object-oriented programming
+ language.
+ An issue was discovered in urllib.request.AbstractBasicAuthHandler which
+ allowed a remote attacker to send malicious data causing extensive
+ regular expression backtracking.
+ An attacker could cause a possible Denial of Service condition. There is no known workaround at this time. All Python 2.7 users should upgrade to the latest version: All Python 3.6 users should upgrade to the latest version: All Python 3.7 users should upgrade to the latest version: All Python 3.8 users should upgrade to the latest version: libmicrodns is an mDNS library, focused on being simple and
+ cross-platform.
+ Multiple vulnerabilities have been discovered in libmicrodns. Please
+ review the CVE identifiers and the upstream advisory referenced below for
+ details.
+ Please review the referenced CVE identifiers for details. There is no known workaround at this time. All libmicrodns users should upgrade to the latest version: VLC is a cross-platform media player and streaming server. A buffer overflow in DecodeBlock in sdl_image.c was discovered. A remote user could craft a specifically crafted image file that could
+ execute arbitrary code or cause denial of service.
+ The user should refrain from opening files from untrusted third parties
+ or accessing untrusted remote sites (or disable the VLC browser plugins),
+ until they upgrade.
+ All VLC users should upgrade to the latest version: OpenSLP is an open-source implementation of Service Location Protocol
+ (SLP).
+ Multiple vulnerabilities have been discovered in OpenSLP. Please review
+ the CVE identifiers referenced below for details.
+ Please review the referenced CVE identifiers for details. There is no known workaround at this time. Gentoo has discontinued support for OpenSLP. We recommend that users
+ unmerge OpenSLP:
+ NOTE: The Gentoo developer(s) maintaining OpenSLP have discontinued
+ support at this time. It may be possible that a new Gentoo developer
+ will update OpenSLP at a later date. No known alternatives to OpenSLP
+ are in the tree at this time.
+
# emerge --sync
- # emerge --ask --oneshot --verbose ">=dev-lang/php-7.2.29"
+ # emerge --ask --oneshot --verbose ">=dev-lang/php-7.2.29:7.2"
# emerge --sync
- # emerge --ask --oneshot --verbose ">=dev-lang/php-7.3.16"
+ # emerge --ask --oneshot --verbose ">=dev-lang/php-7.3.16:7.3"
# emerge --sync
- # emerge --ask --oneshot --verbose ">=dev-lang/php-7.4.4"
+ # emerge --ask --oneshot --verbose ">=dev-lang/php-7.4.4:7.4"
@@ -74,5 +76,5 @@
- # emerge --sync
- # emerge --ask --oneshot --verbose ">=www-client/firefox-74.0.1"
-
-
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.1.1g"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=www-client/firefox-68.7.0"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-68.7.0"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ ">=www-client/chromium-81.0.4044.122"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ ">=www-client/google-chrome-81.0.4044.122"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.23.3"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.24.3"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.25.4"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.26.2"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=media-gfx/fontforge-20200314"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-crypt/libu2f-host-1.1.10"
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-analyzer/cacti-1.2.11"
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-python/django-2.2.11"
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-arch/lrzip-0.631_p20190619"
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-emulation/qemu-4.2.0-r5"
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-68.8.0"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ ">=mail-client/thunderbird-bin-68.8.0"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=www-client/firefox-68.8.0"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-68.8.0"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-proxy/squid-4.11"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=media-plugins/live-2020.03.06"
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-misc/freerdp-2.1.0"
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.12.2-r2"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ ">=app-emulation/xen-tools-4.12.2-r1"
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-lang/python-2.7.18:2.7"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-lang/python-3.6.10-r2:3.6"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-lang/python-3.7.7-r2:3.7"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-lang/python-3.8.2-r2:3.8"
+
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-libs/libmicrodns-0.1.2"
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=media-video/vlc-3.0.10"
+
+
+ # emerge --unmerge "net-libs/openslp"
+
+
+
Chromium is an open-source browser project that aims to build a safer, + faster, and more stable way for all users to experience the web. +
+ +Google Chrome is one fast, simple, and secure browser for all your + devices. +
+Multiple vulnerabilities have been discovered in Chromium and Google + Chrome. Please review the CVE identifiers referenced below for details. +
+Please review the referenced CVE identifiers for details.
+There is no known workaround at this time.
+All Chromium users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ ">=www-client/chromium-81.0.4044.138"
+
+
+ All Google Chrome users should upgrade to the latest version:
+ +
+ # emerge --sync
+ # emerge --ask --oneshot --verbose
+ ">=www-client/google-chrome-81.0.4044.138"
+
+