diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest index 3bcf2234996..81bcdb1a901 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest @@ -1,23 +1,23 @@ -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 -MANIFEST Manifest.files.gz 596980 BLAKE2B eddb25532154bba44bb35623eb68543626c56c08b4a9b70673d678e12e2e9d223dee9cf4d0203ab7966bfde59e62bbac75b407365fffaffd689f74499226bdef SHA512 63607f6c6d89e0de89c2ed0d49a183cf3ebf144547b6b6c3a675072d222d42a76895e60d6f7b099c2762d742420925f50f5f0705f64f212c92b5228a8c6aac91 -TIMESTAMP 2025-05-01T06:40:34Z +MANIFEST Manifest.files.gz 598731 BLAKE2B a123a1f501b9be6c59feffa8b43671d5335b382f4b84aa603f3d15893b45a6086a5a70f86be61d8ea32bb8de2a67e35e334f33fcf58bab7db4e23c13e979ce4d SHA512 cbd4d498b4c86dcefe73be854ac45a943cd3c6f816dc6fbe600e09012c372bed7bc821a0065f103f69d153506ed854c91b2f733b93bdc5d36f8322f3e1dddfab +TIMESTAMP 2025-06-01T06:40:37Z -----BEGIN PGP SIGNATURE----- -iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmgTF2JfFIAAAAAALgAo +iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmg79eVfFIAAAAAALgAo aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY -klDRMQ/+PAi2qYoR0sip4LFgbYOupfpmsR8tU5KJ1/74lCyKWzBeJXLv6ZpzzUfQ -/zdiT7LTQTI/S+rLzGZ9iuru+SDj+TmSaqqe3/V47EMXrIUMQmi2/wpv4Xdz6SZv -vaIEnBvxy7AcER2kd3SjuP7oqh49lY3M8lSxGzDcyLuKLMtA0GruuXoOHK8Kc32p -e4MTmHiysNkwQ48mxpogteDz6UzMDz69H+RidhBJLcXj+VNi69jmLFUUWJ0WlINK -BScxduFU4NdYew2iDUFohVSAvLshHnpWUg/S6WlJo1Kf7XSjROBnuNxbrHrRfBRh -m4mx1fdXE73jM7QOpyx+BflrOEBmvrsGC2WJpI+YU5HmhRldkq9I1+amcPJEx/WD -8lTul44UWczfeDxOjVSwQ4Ez0a3YzGxtvo/6aT/P/8u6lxZwXC73F4vPe9B/qQDn -tCVkS4kDfMQf3zUlypFo3ny6eF54AcWzaT6XDIYVYJD1aSMXXqHhoffznAFB9Tjd -gmYAjCPk/6Oi7WPKEg+TryBnQLv9GEL7TRpQDAAMf0vc8OXwsJbEfS1HO8msMjA7 -+q4SVTPh7y9uKR62hu9MLuEXBxm3w4fS+U8e+62SVPIqwFsa5Q92Sh98AOPjK9yY -ViFNSQ0SCOaoWbmk9YFaC7JywXnlIXpD7si1W5a4hQ9aIF+qLqs= -=4GyX +klAGUQ/9Fv/2zVWg3XQg3WRE6NXq4ZOx6laMZFPX+JnhrfyPURTBZNFgFxLhZmq9 +7i2nZ48Q4oX2pHM0BQJ9Kkmpb/+JxOmm6ndRrX9TIqI+dQiB87SRcz7N+uCtC57j +yFyEN6szKGSERuuCRI/NDQurxN9gWpGzraukfGmJ/Z8KifFMKSRhntjy2EdT7txb +L9nBGrpziJCuLbamA1BZaHW8LXtKoo+YQbFMul1DKN603JfL8cWBM1xWfkwlDK0Z +Bj55FFy7lIMZqfS7toUqKY1wGophf3wAtHAp+O8J8kUNmrqTAHFgz5qU7Db8DZf3 +62AcphUqFo0YQRU+Q0oMZywxIslXbzjseLlGf2BinMATLVgSqlE4InlrUewkHIFg +UBNqSipEhCq36Do99ku7aX3YpoS/UwS9L3YqSsIu3B0aNzd6ehbTdWVIgqlRhLip +rWQPOSJLIn7CbSNVWST/TYOOOU4KSWXamsGH4tA5vFxjB9dwPpf6P9y8SOtjm7LZ +gdxt1WrYto1pS/ugQevFMPFLj3CFkVxDVfATdQvTkV1JIAABw3VucGocTg94RUV6 +aj+0R5M2/nGRsPI9ByU8er/b9dV6qJh5U6MIUyxSWXgtMqBcvMSvYqyuZO/bOjHr +NsotXbeYfj/gTvK5vQ0ZY8u5C5LDt5du5XdKK+B7csCZOVofBxA= +=UP7i -----END PGP SIGNATURE----- diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz index 174f96b7d26..ed4e67fd0ed 100644 Binary files a/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz and b/sdk_container/src/third_party/portage-stable/metadata/glsa/Manifest.files.gz differ diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-01.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-01.xml new file mode 100644 index 00000000000..0e525a79718 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-01.xml @@ -0,0 +1,43 @@ + + + + PAM: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in PAM, the worst of which could lead to password leakage. + pam + 2025-05-12 + 2025-05-12 + 922397 + 942075 + remote + + + 1.7.0_p20241230 + 1.7.0_p20241230 + + + +

PAM (Pluggable Authentication Modules) is an architecture allowing the separation of the development of privilege granting software from the development of secure and appropriate authentication schemes.

+
+ +

Multiple vulnerabilities have been discovered in PAM. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All PAM users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/pam-1.7.0_p20241230" + +
+ + CVE-2024-10041 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-02.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-02.xml new file mode 100644 index 00000000000..9ca69164448 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-02.xml @@ -0,0 +1,85 @@ + + + + Mozilla Firefox: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution. + firefox,firefox-bin + 2025-05-12 + 2025-05-12 + 951563 + 953021 + remote + + + 137.0.1 + 128.9.0 + 137.0.1 + 128.9.0 + + + 137.0.1 + 128.9.0 + 137.0.1 + 128.9.0 + + + +

Mozilla Firefox is a popular open-source web browser from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Firefox. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Firefox users should upgrade to the latest version in their release channel:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-137.0.1:rapid" + # emerge --ask --oneshot --verbose ">=www-client/firefox-bin-128.9.0:esr" + + +

All Mozilla Firefox users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=www-client/firefox-137.0.1:rapid" + # emerge --ask --oneshot --verbose ">=www-client/firefox-128.9.0:esr" + +
+ + CVE-2024-43097 + CVE-2025-1931 + CVE-2025-1932 + CVE-2025-1933 + CVE-2025-1934 + CVE-2025-1935 + CVE-2025-1936 + CVE-2025-1937 + CVE-2025-1938 + CVE-2025-1941 + CVE-2025-1942 + CVE-2025-1943 + CVE-2025-3028 + CVE-2025-3029 + CVE-2025-3030 + CVE-2025-3031 + CVE-2025-3032 + CVE-2025-3034 + CVE-2025-3035 + MFSA2025-14 + MFSA2025-16 + MFSA2025-18 + MFSA2025-20 + MFSA2025-22 + MFSA2025-23 + MFSA2025-24 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-03.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-03.xml new file mode 100644 index 00000000000..30637b9f287 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-03.xml @@ -0,0 +1,107 @@ + + + + Mozilla Thunderbird: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Mozilla Thunderbird, the worst of which could lead to remote code execution. + thunderbird,thunderbird-bin + 2025-05-12 + 2025-05-12 + 945051 + 948114 + 951564 + 953022 + remote + + + 128.9.0 + 128.9.0 + + + 128.9.0 + 128.9.0 + + + +

Mozilla Thunderbird is a popular open-source email client from the Mozilla project.

+
+ +

Multiple vulnerabilities have been discovered in Mozilla Thunderbird. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-bin-128.9.0" + + +

All Mozilla Thunderbird users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=mail-client/thunderbird-128.9.0" + +
+ + CVE-2024-11692 + CVE-2024-11694 + CVE-2024-11695 + CVE-2024-11696 + CVE-2024-11697 + CVE-2024-11699 + CVE-2024-11700 + CVE-2024-11701 + CVE-2024-11704 + CVE-2024-11705 + CVE-2024-11706 + CVE-2024-11708 + CVE-2024-43097 + CVE-2024-50336 + CVE-2025-0237 + CVE-2025-0238 + CVE-2025-0239 + CVE-2025-0240 + CVE-2025-0241 + CVE-2025-0242 + CVE-2025-0243 + CVE-2025-1931 + CVE-2025-1932 + CVE-2025-1933 + CVE-2025-1934 + CVE-2025-1935 + CVE-2025-1936 + CVE-2025-1937 + CVE-2025-1938 + CVE-2025-3028 + CVE-2025-3029 + CVE-2025-3030 + CVE-2025-3031 + CVE-2025-3032 + CVE-2025-3034 + CVE-2025-26695 + CVE-2025-26696 + MFSA2024-63 + MFSA2024-64 + MFSA2024-65 + MFSA2024-67 + MFSA2024-68 + MFSA2025-01 + MFSA2025-02 + MFSA2025-05 + MFSA2025-14 + MFSA2025-16 + MFSA2025-18 + MFSA2025-20 + MFSA2025-22 + MFSA2025-23 + MFSA2025-24 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-04.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-04.xml new file mode 100644 index 00000000000..0dd8cb5be7e --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-04.xml @@ -0,0 +1,60 @@ + + + + NVIDIA Drivers: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in NVIDIA Drivers, the worst of which could result in arbitrary code execution. + nvidia-drivers + 2025-05-12 + 2025-05-12 + 954339 + local + + + 535.247.01 + 550.163.01 + 570.133.07 + 535.247.01 + 550.163.01 + 570.133.07 + + + +

NVIDIA Drivers are NVIDIA's accelerated graphics driver.

+
+ +

A vulnerability has been discovered in NVIDIA Drivers. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifier for details.

+
+ +

There is no known workaround at this time.

+
+ +

All NVIDIA Drivers 535 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-535.247.01:0/535" + + +

All NVIDIA Drivers 550 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-550.163.01:0/550" + + +

All NVIDIA Drivers 570 users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=x11-drivers/nvidia-drivers-570.133.07:0/570" + +
+ + CVE-2025-23244 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-05.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-05.xml new file mode 100644 index 00000000000..32b4836ab20 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-05.xml @@ -0,0 +1,48 @@ + + + + Orc: Arbitrary Code Execution + A vulnerability has been discovered in Orc, which can lead to arbitrary code execution + orc + 2025-05-12 + 2025-05-12 + 937127 + local + + + 0.4.40 + 0.4.40 + + + +

Orc is a library and set of tools for compiling and executing +very simple programs that operate on arrays of data. The "language" +is a generic assembly language that represents many of the features +available in SIMD architectures, including saturated addition and +subtraction, and many arithmetic operations.

+
+ +

Please review the CVE identifier referenced below for details.

+
+ +

It is possible for a malicious third party to trigger a buffer overflow and effect code execution with the same privileges as the orc compiler is called with by feeding it with malformed orc source files. + +This only affects developers and CI environments using orcc, not users of liborc.

+
+ +

There is no known workaround at this time.

+
+ +

All Orc users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/orc-0.4.40" + +
+ + CVE-2024-40897 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-06.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-06.xml new file mode 100644 index 00000000000..a6b234657b8 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-06.xml @@ -0,0 +1,42 @@ + + + + glibc: Buffer Overflow + A vulnerability has been discovered in glibc, which can lead to execution of arbitrary code.. + glibc + 2025-05-12 + 2025-05-12 + 948592 + local and remote + + + 2.40-r8 + 2.40-r8 + + + +

glibc is a package that contains the GNU C library.

+
+ +

A vulnerability has been discovered in glibc. Please review the CVE identifier referenced below for details.

+
+ +

Please review the referenced CVE identifier for details.

+
+ +

There is no known workaround at this time.

+
+ +

All glibc users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-libs/glibc-2.40-r8" + +
+ + CVE-2025-0395 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-07.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-07.xml new file mode 100644 index 00000000000..63db4d35880 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-07.xml @@ -0,0 +1,42 @@ + + + + FreeType: Remote Code Execution + A vulnerability has been discovered in FreeType, which can lead to remote code execution. + freetype + 2025-05-14 + 2025-05-14 + 951286 + local and remote + + + 2.13.1 + 2.13.1 + + + +

FreeType is a high-quality and portable font engine.

+
+ +

Multiple vulnerabilities have been discovered in FreeType. Please review the CVE identifiers referenced below for details.

+
+ +

An out of bounds write exists in FreeType when attempting to parse font subglyph structures related to TrueType GX and variable font files. The vulnerable code assigns a signed short value to an unsigned long and then adds a static value causing it to wrap around and allocate too small of a heap buffer. The code then writes up to 6 signed long integers out of bounds relative to this buffer. This may result in arbitrary code execution. This vulnerability may have been exploited in the wild.

+
+ +

There is no known workaround at this time.

+
+ +

All FreeType users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=media-libs/freetype-2.13.1" + +
+ + CVE-2025-27363 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-08.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-08.xml new file mode 100644 index 00000000000..5d8b1435cf7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-08.xml @@ -0,0 +1,87 @@ + + + + Spidermonkey: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Spidermonkey, the worst of which could lead to execution of arbitrary code. + spidermonkey + 2025-05-14 + 2025-05-14 + 941171 + 942471 + 951565 + local and remote + + + 128.8.0 + 128.8.0 + + + +

SpiderMonkey is Mozilla’s JavaScript and WebAssembly Engine, used in Firefox, Servo and various other projects. It is written in C++, Rust and JavaScript. You can embed it into C++ and Rust projects, and it can be run as a stand-alone shell.

+
+ +

Multiple vulnerabilities have been discovered in Spidermonkey. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Spidermonkey users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=dev-lang/spidermonkey-128.8.0" + +
+ + CVE-2024-8900 + CVE-2024-9391 + CVE-2024-9392 + CVE-2024-9395 + CVE-2024-9396 + CVE-2024-9397 + CVE-2024-9399 + CVE-2024-9400 + CVE-2024-9401 + CVE-2024-9402 + CVE-2024-9403 + CVE-2024-10458 + CVE-2024-10459 + CVE-2024-10460 + CVE-2024-10461 + CVE-2024-10462 + CVE-2024-10463 + CVE-2024-10464 + CVE-2024-10465 + CVE-2024-10466 + CVE-2024-10467 + CVE-2024-10468 + CVE-2024-43097 + CVE-2025-1931 + CVE-2025-1932 + CVE-2025-1933 + CVE-2025-1934 + CVE-2025-1935 + CVE-2025-1936 + CVE-2025-1937 + CVE-2025-1938 + MFSA2024-46 + MFSA2024-47 + MFSA2024-48 + MFSA2024-49 + MFSA2024-50 + MFSA2024-55 + MFSA2024-56 + MFSA2024-57 + MFSA2024-58 + MFSA2024-59 + MFSA2025-14 + MFSA2025-16 + MFSA2025-18 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-09.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-09.xml new file mode 100644 index 00000000000..4f517b2d09d --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-09.xml @@ -0,0 +1,42 @@ + + + + Atop: Heap Corruption + A vulnerability has been discovered in Atop, which can possibly lead to arbitrary code execution. + atop + 2025-05-14 + 2025-05-14 + 952921 + remote + + + 2.11.1 + 2.11.1 + + + +

Atop is an ASCII full-screen performance monitor for Linux that is capable of reporting the activity of all processes (even if processes have finished during the interval), daily logging of system and process activity for long-term analysis, highlighting overloaded system resources by using colors, etc. At regular intervals, it shows system-level activity related to the CPU, memory, swap, disks (including LVM) and network layers, and for every process (and thread) it shows e.g. the CPU utilization, memory growth, disk utilization, priority, username, state, and exit code.

+
+ +

A vulnerability has been discovered in Atop. Please review the CVE identifier referenced below for details.

+
+ +

Atop allows local users to cause a denial of service (e.g., assertion failure and application exit) or possibly have unspecified other impact by running certain types of unprivileged processes while a different user runs atop.

+
+ +

There is no known workaround at this time.

+
+ +

All Atop users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=sys-process/atop-2.11.1" + +
+ + CVE-2025-31160 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-10.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-10.xml new file mode 100644 index 00000000000..b36ba63eb00 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-10.xml @@ -0,0 +1,42 @@ + + + + Tracker miners: Sandbox weakness + A vulnerability has been discovered in Tracker miners, which can lead to a sandbox escape and execution of arbitrary code. + tracker-miners + 2025-05-14 + 2025-05-14 + 916378 + remote + + + 3.5.3 + 3.5.3 + + + +

The Tracker miners are a collection of data extractors for the GNOME Tracker.

+
+ +

A vulnerability has been discovered in Tracker minders. Please review the CVE identifier referenced below for details.

+
+ +

Please review the referenced CVE identifier for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Tracker miners users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=app-misc/tracker-miners-3.5.3" + +
+ + CVE-2023-5557 + + graaff + graaff +
\ No newline at end of file diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-11.xml b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-11.xml new file mode 100644 index 00000000000..7640b898ee7 --- /dev/null +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/glsa-202505-11.xml @@ -0,0 +1,68 @@ + + + + Node.js: Multiple Vulnerabilities + Multiple vulnerabilities have been discovered in Node.js, the worst of which could lead to execution of arbitrary code. + nodejs + 2025-05-14 + 2025-05-17 + 916513 + 924704 + 928532 + 936204 + local and remote + + + 18.20.4 + 20.15.1 + 22.4.1 + 18.20.4 + 20.15.1 + 22.4.1 + + + +

Node.js is a JavaScript runtime built on Chrome’s V8 JavaScript engine.

+
+ +

Multiple vulnerabilities have been discovered in Node.js. Please review the CVE identifiers referenced below for details.

+
+ +

Please review the referenced CVE identifiers for details.

+
+ +

There is no known workaround at this time.

+
+ +

All Node.js users should upgrade to the latest version:

+ + + # emerge --sync + # emerge --ask --oneshot --verbose ">=net-libs/nodejs-22.4.1" + +
+ + CVE-2023-38552 + CVE-2023-39331 + CVE-2023-39332 + CVE-2023-39333 + CVE-2023-44487 + CVE-2023-45143 + CVE-2023-46809 + CVE-2024-21890 + CVE-2024-21891 + CVE-2024-21892 + CVE-2024-21896 + CVE-2024-22017 + CVE-2024-22018 + CVE-2024-22019 + CVE-2024-22020 + CVE-2024-22025 + CVE-2024-27982 + CVE-2024-27983 + CVE-2024-36137 + CVE-2024-37372 + + graaff + graaff +
diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk index 66c0857d6d0..89c32908612 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.chk @@ -1 +1 @@ -Thu, 01 May 2025 06:40:32 +0000 +Sun, 01 Jun 2025 06:40:33 +0000 diff --git a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit index d4c903585d6..819c9834f6d 100644 --- a/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit +++ b/sdk_container/src/third_party/portage-stable/metadata/glsa/timestamp.commit @@ -1 +1 @@ -da2df533a0a1b5799029686bc64ece18ac31947e 1743813771 2025-04-05T00:42:51Z +3b60128583dc9a401386f97b6f98c90fc96838e6 1747473497 2025-05-17T09:18:17Z