diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-75.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-75.xml
index 988e1d9dba..d4de61e9a5 100644
--- a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-75.xml
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201701-75.xml
@@ -7,7 +7,7 @@
perl
2017-01-29
- 2017-01-29: 1
+ 2017-06-01: 2
580612
588592
589680
@@ -44,6 +44,11 @@
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-lang/perl-5.22.3_rc4"
+
+
Warning: When you are upgrading to a new major Perl version, the
+ commands above may not be sufficient. Please visit the Gentoo wiki
+ referenced below to learn how to upgrade to a new major Perl version.
+
CVE-2015-8607
@@ -51,7 +56,10 @@
CVE-2016-1238
CVE-2016-2381
CVE-2016-6185
+
+ Gentoo Wiki: How to upgrade Perl
+
whissi
- b-man
+ b-man
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-01.xml
new file mode 100644
index 0000000000..52668f780f
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-01.xml
@@ -0,0 +1,49 @@
+
+
+
+ MUNGE: Privilege escalation
+ Gentoo's MUNGE ebuilds are vulnerable to privilege escalation due
+ to improper permissions.
+
+ munge
+ 2017-06-06
+ 2017-06-06: 1
+ 602596
+ local
+
+
+ 0.5.10-r2
+ 0.5.10-r2
+
+
+
+ An authentication service for creating and validating credentials.
+
+
+ It was discovered that Gentoo’s default MUNGE installation suffered
+ from a privilege escalation vulnerability (munge user to root) due to
+ improper permissions and a runscript which called chown() on a user
+ controlled file.
+
+
+
+ A local attacker, who either is already MUNGE’s system user or belongs
+ to MUNGE’s group, could potentially escalate privileges.
+
+
+
+ There is no known workaround at this time.
+
+
+ All MUNGE users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=sys-auth/munge-0.5.10-r2"
+
+
+
+
+ whissi
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-02.xml
new file mode 100644
index 0000000000..97ad98dfe0
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-02.xml
@@ -0,0 +1,51 @@
+
+
+
+ Shadow: Multiple vulnerabilities
+ Multiple vulnerabilities have been found in Shadow, the worst of
+ which might allow privilege escalation.
+
+ shadow
+ 2017-06-06
+ 2017-06-06: 1
+ 610804
+ 620510
+ local
+
+
+ 4.4-r2
+ 4.4-r2
+
+
+
+ Shadow is a set of tools to deal with user accounts.
+
+
+ Multiple vulnerabilities have been discovered in Shadow. Please review
+ the CVE identifiers referenced below for details.
+
+
+
+ A local attacker could possibly cause a Denial of Service condition,
+ gain privileges via crafted input, or SIGKILL arbitrary processes.
+
+
+
+ There is no known workaround at this time.
+
+
+ All Shadow users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=sys-apps/shadow-4.4-r2"
+
+
+
+
+ CVE-2016-6252
+ CVE-2017-2616
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-03.xml
new file mode 100644
index 0000000000..d23c13f5ea
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-03.xml
@@ -0,0 +1,76 @@
+
+
+
+ QEMU: Multiple vulnerabilities
+ Multiple vulnerabilities have been found in QEMU, the worst of
+ which may allow a remote attacker to cause a Denial of Service or gain
+ elevated privileges from a guest VM.
+
+ qemu
+ 2017-06-06
+ 2017-06-06: 1
+ 614744
+ 615874
+ 616460
+ 616462
+ 616482
+ 616484
+ 616636
+ 616870
+ 616872
+ 616874
+ 618808
+ 619018
+ 619020
+ 620322
+ local, remote
+
+
+ 2.9.0-r2
+ 2.9.0-r2
+
+
+
+ QEMU is a generic and open source machine emulator and virtualizer.
+
+
+ Multiple vulnerabilities have been discovered in QEMU. Please review the
+ CVE identifiers referenced below for details.
+
+
+
+ A remote attacker might cause a Denial of Service or gain escalated
+ privileges from a guest VM.
+
+
+
+ There is no known workaround at this time.
+
+
+ All QEMU users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-emulation/qemu-2.9.0-r2"
+
+
+
+
+ CVE-2016-9603
+ CVE-2017-7377
+ CVE-2017-7471
+ CVE-2017-7493
+ CVE-2017-7718
+ CVE-2017-7980
+ CVE-2017-8086
+ CVE-2017-8112
+ CVE-2017-8309
+ CVE-2017-8379
+ CVE-2017-8380
+ CVE-2017-9060
+ CVE-2017-9310
+ CVE-2017-9330
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-04.xml
new file mode 100644
index 0000000000..33dbc80b44
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-04.xml
@@ -0,0 +1,52 @@
+
+
+
+ Git: Security bypass
+ A vulnerability in Git might allow remote attackers to bypass
+ security restrictions.
+
+ git
+ 2017-06-06
+ 2017-06-06: 1
+ 618126
+ remote
+
+
+ 2.13.0
+ 2.13.0
+
+
+
+ Git is a free and open source distributed version control system
+ designed to handle everything from small to very large projects with
+ speed and efficiency.
+
+
+
+ Timo Schmid discovered that the Git restricted shell incorrectly
+ filtered allowed commands.
+
+
+
+ A remote attacker could possibly bypass security restrictions and access
+ sensitive information.
+
+
+
+ There is no known workaround at this time.
+
+
+ All Git users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-vcs/git-2.13.0"
+
+
+
+
+ CVE-2017-8386
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-05.xml
new file mode 100644
index 0000000000..dc91daa63c
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-05.xml
@@ -0,0 +1,58 @@
+
+
+
+ D-Bus: Multiple vulnerabilities
+ Multiple vulnerabilities in D-Bus might allow an attacker to
+ overwrite files with a fixed filename in arbitrary directories or conduct a
+ symlink attack.
+
+ dbus
+ 2017-06-06
+ 2017-06-06: 1
+ 611392
+ local, remote
+
+
+ 1.10.18
+ 1.10.18
+
+
+
+ D-Bus is a message bus system which processes can use to talk to each
+ other.
+
+
+
+ Multiple vulnerabilities have been discovered in D-Bus. Please review
+ the original report referenced below for details.
+
+
+
+ An attacker could possibly overwrite arbitrary files named “once”
+ with content not controlled by the attacker.
+
+
+ A local attacker could perform a symlink attack against D-Bus’ test
+ suite.
+
+
+
+ There is no known workaround at this time.
+
+
+ All D-Bus users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=sys-apps/dbus-1.10.18"
+
+
+
+
+
+ Original report
+
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-06.xml
new file mode 100644
index 0000000000..900a24ba63
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-06.xml
@@ -0,0 +1,61 @@
+
+
+
+ ImageWorsener: Multiple vulnerabilities
+ Multiple vulnerabilities have been found in ImageWorsener, the
+ worst of which allows remote attackers to cause a Denial of Service
+ condition or have other unspecified impact.
+
+ ImageWorsener
+ 2017-06-06
+ 2017-06-06: 1
+ 618014
+ remote
+
+
+ 1.3.1
+ 1.3.1
+
+
+
+ ImageWorsener is a cross-platform command-line utility and library for
+ image scaling and other image processing.
+
+
+
+ Multiple vulnerabilities have been discovered in ImageWorsener. Please
+ review the CVE identifiers referenced below for details.
+
+
+
+ A remote attacker could entice a user to process a specially crafted
+ image file using ImageWorsener, possibly resulting in a Denial of Service
+ condition or have other unspecified impacts.
+
+
+
+ There is no known workaround at this time.
+
+
+ All ImageWorsener users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=media-gfx/imageworsener-1.3.1"
+
+
+
+
+ CVE-2017-7452
+ CVE-2017-7453
+ CVE-2017-7454
+ CVE-2017-7939
+ CVE-2017-7940
+ CVE-2017-7962
+ CVE-2017-8325
+ CVE-2017-8326
+ CVE-2017-8327
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-07.xml
new file mode 100644
index 0000000000..738142005b
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-07.xml
@@ -0,0 +1,64 @@
+
+
+
+ Libtirpc and RPCBind: Denial of Service
+ A vulnerability has been found in Libtirpc and RPCBind which may
+ allow a remote attacker to cause a Denial of Service condition.
+
+ RPCBind,Libtirpc
+ 2017-06-06
+ 2017-06-06: 2
+ 617472
+ remote
+
+
+ 0.2.4-r1
+ 0.2.4-r1
+
+
+ 1.0.1-r1
+ 1.0.1-r1
+
+
+
+ The RPCBind utility is a server that converts RPC program numbers into
+ universal addresses.
+
+
+ Libtirpc is a port of Suns Transport-Independent RPC library to Linux.
+
+
+ It was found that due to the way RPCBind uses libtirpc (libntirpc), a
+ memory leak can occur when parsing specially crafted XDR messages.
+
+
+
+ A remote attacker could send thousands of messages to RPCBind, possibly
+ resulting in a Denial of Service condition.
+
+
+
+ There is no known workaround at this time.
+
+
+ All RPCBind users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-nds/rpcbind-0.2.4-r1"
+
+
+ All Libtirpc users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-libs/libtirpc-1.0.1-r1"
+
+
+
+
+ CVE-2017-8779
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-08.xml
new file mode 100644
index 0000000000..a57a37f043
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-08.xml
@@ -0,0 +1,57 @@
+
+
+
+ MuPDF: Multiple vulnerabilities
+ Multiple vulnerabilities have been found in MuPDF, the worst of
+ which allows remote attackers to cause a Denial of Service condition or
+ have other unspecified impact.
+
+ mupdf
+ 2017-06-06
+ 2017-06-06: 1
+ 611444
+ 614044
+ 614852
+ remote
+
+
+ 1.11-r1
+ 1.11-r1
+
+
+
+ A lightweight PDF, XPS, and E-book viewer.
+
+
+ Multiple vulnerabilities have been discovered in MuPDF. Please review
+ the CVE identifiers referenced below for details.
+
+
+
+ A remote attacker could entice a user to process a specially crafted PDF
+ document or image using MuPDF, possibly resulting in a Denial of Service
+ condition or have other unspecified impact.
+
+
+
+ There is no known workaround at this time.
+
+
+ All MuPDF users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=app-text/mupdf-1.11-r1"
+
+
+
+
+
+ CVE-2016-10221
+
+ CVE-2017-5991
+ CVE-2017-6060
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-09.xml
new file mode 100644
index 0000000000..f6f851c717
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-09.xml
@@ -0,0 +1,52 @@
+
+
+
+ FileZilla: Buffer overflow
+ A vulnerability in a bundled copy of PuTTY in FileZilla might allow
+ remote attackers to execute arbitrary code or cause a denial of service.
+
+ filezilla
+ 2017-06-06
+ 2017-06-06: 1
+ 610554
+ remote
+
+
+ 3.25.2
+ 3.25.2
+
+
+
+ FileZilla is an open source FTP client.
+
+
+ FileZilla is affected by the same vulnerability as reported in “GLSA
+ 201703-03” because the package included a vulnerable copy of PuTTY.
+ Please read the GLSA for PuTTY referenced below for details.
+
+
+
+ A remote attacker, utilizing the SSH agent forwarding of an SSH server,
+ could execute arbitrary code with the privileges of the user running
+ FileZilla or cause a Denial of Service condition.
+
+
+
+ There is no known workaround at this time.
+
+
+ All FileZilla users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-ftp/filezilla-3.25.2"
+
+
+
+
+ CVE-2017-6542
+ GLSA 201703-03
+
+ whissi
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-10.xml
new file mode 100644
index 0000000000..f694d03813
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-10.xml
@@ -0,0 +1,52 @@
+
+
+
+ Pidgin: Arbitrary code execution
+ A vulnerability in Pidgin might allow remote attackers to execute
+ arbitrary code.
+
+ pidgin
+ 2017-06-06
+ 2017-06-06: 1
+ 612188
+ remote
+
+
+ 2.12.0
+ 2.12.0
+
+
+
+ Pidgin is a GTK Instant Messenger client for a variety of instant
+ messaging protocols.
+
+
+
+ Joseph Bisch discovered that Pidgin incorrectly handled certain xml
+ messages.
+
+
+
+ A remote attacker could send a specially crafted instant message,
+ possibly resulting in execution of arbitrary code with the privileges of
+ the Pidgin process.
+
+
+
+ There is no known workaround at this time.
+
+
+ All Pidgin users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-im/pidgin-2.12.0"
+
+
+
+
+ CVE-2017-2640
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-11.xml
new file mode 100644
index 0000000000..fc7b750346
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-11.xml
@@ -0,0 +1,52 @@
+
+
+
+ PCRE library: Denial of Service
+ A vulnerability in PCRE library allows remote attackers to cause a
+ Denial of Service condition.
+
+ PCRE
+ 2017-06-06
+ 2017-06-06: 1
+ 609592
+ remote
+
+
+ 8.40-r1
+ 8.40-r1
+
+
+
+ PCRE library is a set of functions that implement regular expression
+ pattern matching using the same syntax and semantics as Perl 5.
+
+
+
+ It was found that the compile_bracket_matchingpath function in
+ pcre_jit_compile.c in PCRE library is vulnerable to an out-of-bounds
+ read.
+
+
+
+ A remote attacker could possibly cause a Denial of Service condition via
+ a special crafted regular expression.
+
+
+
+ There is no known workaround at this time.
+
+
+ All PCRE library users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=dev-libs/libpcre-8.40-r1"
+
+
+
+
+ CVE-2017-6004
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-12.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-12.xml
new file mode 100644
index 0000000000..960b5cb8a8
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-12.xml
@@ -0,0 +1,57 @@
+
+
+
+ Wireshark: Multiple vulnerabilities
+ Multiple vulnerabilities have been found in Wireshark, the worst of
+ which allows remote attackers to cause a Denial of Service condition.
+
+ wireshark
+ 2017-06-06
+ 2017-06-06: 1
+ 609646
+ 615462
+ remote
+
+
+ 2.2.6
+ 2.2.6
+
+
+
+ Wireshark is a network protocol analyzer formerly known as ethereal.
+
+
+ Multiple vulnerabilities have been discovered in Wireshark. Please
+ review the CVE identifiers referenced below for details.
+
+
+
+ A remote attacker could entice a user to process a specially crafted
+ network packet using Wireshark, possibly resulting a Denial of Service
+ condition.
+
+
+
+ There is no known workaround at this time.
+
+
+ All Wireshark users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-analyzer/wireshark-2.2.6"
+
+
+
+
+ CVE-2017-6014
+ CVE-2017-7700
+ CVE-2017-7701
+ CVE-2017-7702
+ CVE-2017-7703
+ CVE-2017-7704
+ CVE-2017-7705
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-13.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-13.xml
new file mode 100644
index 0000000000..eadd50981f
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-13.xml
@@ -0,0 +1,50 @@
+
+
+
+ minicom: Remote execution of arbitrary code
+ An out-of-bounds data access in minicom might allow remote
+ attackers to execute arbitrary code.
+
+ minicom
+ 2017-06-06
+ 2017-06-06: 1
+ 615996
+ remote
+
+
+ 2.7.1
+ 2.7.1
+
+
+
+ Minicom is a text-based serial port communications program.
+
+
+ In minicom before version 2.7.1, the escparms[] buffer in vt100.c is
+ vulnerable to an overflow.
+
+
+
+ A remote attacker, able to connect to a minicom port, could possibly
+ execute arbitrary code with the privileges of the process, or cause a
+ Denial of Service condition.
+
+
+
+ There is no known workaround at this time.
+
+
+ All minicom users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-dialup/minicom-2.7.1"
+
+
+
+
+ CVE-2017-7467
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-14.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-14.xml
new file mode 100644
index 0000000000..67f67bb4db
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-14.xml
@@ -0,0 +1,61 @@
+
+
+
+ FreeType: Multiple vulnerabilities
+ Multiple vulnerabilities have been found in FreeType, the worst of
+ which allows remote attackers to execute arbitrary code.
+
+ freetype
+ 2017-06-06
+ 2017-06-06: 1
+ 612192
+ 616730
+ remote
+
+
+ 2.8
+ 2.8
+
+
+
+ FreeType is a high-quality and portable font engine.
+
+
+ Multiple vulnerabilities have been discovered in FreeType. Please review
+ the CVE identifiers referenced below for details.
+
+
+
+ A remote attacker could entice a user to use a specially crafted font
+ file using FreeType, possibly resulting in execution of arbitrary code
+ with the privileges of the process or a Denial of Service condition.
+
+
+
+ There is no known workaround at this time.
+
+
+ All FreeType users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.8"
+
+
+
+
+
+ CVE-2016-10244
+
+
+ CVE-2016-10328
+
+ CVE-2017-7857
+ CVE-2017-7858
+ CVE-2017-7864
+ CVE-2017-8105
+ CVE-2017-8287
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-15.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-15.xml
new file mode 100644
index 0000000000..d7c2f08d8a
--- /dev/null
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-201706-15.xml
@@ -0,0 +1,152 @@
+
+
+
+ WebKitGTK+: Multiple vulnerabilities
+ Multiple vulnerabilities have been found in WebKitGTK+, the worst
+ of which allows remote attackers to execute arbitrary code.
+
+ webkit-gtk
+ 2017-06-07
+ 2017-06-07: 1
+ 543650
+ 573656
+ 577068
+ 608958
+ 614876
+ 619788
+ remote
+
+
+ 2.16.3
+ 2.16.3
+
+
+
+ WebKitGTK+ is a full-featured port of the WebKit rendering engine.
+
+
+ Multiple vulnerabilities have been discovered in WebKitGTK+. Please
+ review the CVE identifiers referenced below for details.
+
+
+
+ A remote attack can use multiple vectors to execute arbitrary code or
+ cause a denial of service condition.
+
+
+
+ There is no known workaround at this time.
+
+
+ All WebKitGTK+ users should upgrade to the latest version:
+
+
+ # emerge --sync
+ # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.16.3:4"
+
+
+
+
+ CVE-2015-2330
+ CVE-2015-7096
+ CVE-2015-7098
+ CVE-2016-1723
+ CVE-2016-1724
+ CVE-2016-1725
+ CVE-2016-1726
+ CVE-2016-1727
+ CVE-2016-1728
+ CVE-2016-4692
+ CVE-2016-4743
+ CVE-2016-7586
+ CVE-2016-7587
+ CVE-2016-7589
+ CVE-2016-7592
+ CVE-2016-7598
+ CVE-2016-7599
+ CVE-2016-7610
+ CVE-2016-7611
+ CVE-2016-7623
+ CVE-2016-7632
+ CVE-2016-7635
+ CVE-2016-7639
+ CVE-2016-7640
+ CVE-2016-7641
+ CVE-2016-7642
+ CVE-2016-7645
+ CVE-2016-7646
+ CVE-2016-7648
+ CVE-2016-7649
+ CVE-2016-7652
+ CVE-2016-7654
+ CVE-2016-7656
+ CVE-2016-9642
+ CVE-2016-9643
+ CVE-2017-2350
+ CVE-2017-2354
+ CVE-2017-2355
+ CVE-2017-2356
+ CVE-2017-2362
+ CVE-2017-2363
+ CVE-2017-2364
+ CVE-2017-2365
+ CVE-2017-2366
+ CVE-2017-2367
+ CVE-2017-2369
+ CVE-2017-2371
+ CVE-2017-2373
+ CVE-2017-2376
+ CVE-2017-2377
+ CVE-2017-2386
+ CVE-2017-2392
+ CVE-2017-2394
+ CVE-2017-2395
+ CVE-2017-2396
+ CVE-2017-2405
+ CVE-2017-2415
+ CVE-2017-2419
+ CVE-2017-2433
+ CVE-2017-2442
+ CVE-2017-2445
+ CVE-2017-2446
+ CVE-2017-2447
+ CVE-2017-2454
+ CVE-2017-2455
+ CVE-2017-2457
+ CVE-2017-2459
+ CVE-2017-2460
+ CVE-2017-2464
+ CVE-2017-2465
+ CVE-2017-2466
+ CVE-2017-2468
+ CVE-2017-2469
+ CVE-2017-2470
+ CVE-2017-2471
+ CVE-2017-2475
+ CVE-2017-2476
+ CVE-2017-2481
+ CVE-2017-2496
+ CVE-2017-2504
+ CVE-2017-2505
+ CVE-2017-2506
+ CVE-2017-2508
+ CVE-2017-2510
+ CVE-2017-2514
+ CVE-2017-2515
+ CVE-2017-2521
+ CVE-2017-2525
+ CVE-2017-2526
+ CVE-2017-2528
+ CVE-2017-2530
+ CVE-2017-2531
+ CVE-2017-2536
+ CVE-2017-2539
+ CVE-2017-2544
+ CVE-2017-2547
+ CVE-2017-2549
+ CVE-2017-6980
+ CVE-2017-6984
+
+ BlueKnight
+ whissi
+
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk
index cc5d47a2b2..b71ca59b35 100644
--- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk
@@ -1 +1 @@
-Wed, 31 May 2017 20:08:57 +0000
+Fri, 16 Jun 2017 18:39:35 +0000
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit
index ae68b5bd77..0fd976b0ad 100644
--- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit
+++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit
@@ -1 +1 @@
-742dfe25646ca49d62bb5f6452a3600f934c798d 1496157625 2017-05-30T15:20:25+00:00
+c2f911fc13b81dd715a1b756f739b077f8718170 1496836599 2017-06-07T11:56:39+00:00