Skip to content

Commit 46ce1a5

Browse files
authored
Merge pull request #3522 from flatcar/buildbot/monthly-glsa-metadata-updates-2025-12-01
Monthly GLSA metadata 2025-12-01
2 parents 38b920b + ac6d889 commit 46ce1a5

File tree

12 files changed

+482
-17
lines changed

12 files changed

+482
-17
lines changed
Lines changed: 15 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,23 +1,23 @@
11
-----BEGIN PGP SIGNED MESSAGE-----
22
Hash: SHA512
33

4-
MANIFEST Manifest.files.gz 604600 BLAKE2B 67fa11a1e6485039ed07ecb341dd3eed3351c2e805dffb942c7b1d5a67de5ce334f9c7e8c5cb91c69c6b47f09ddfab8f9675421c6bbcbc7edbff873eafe92a4e SHA512 ca8da2d1e3d921194da4de308aa6824a3315fadb8fa8032bf4faea9a454874b09a269bfba3178304da1473e32d3744bc06c1991003b11e8e16b1624b75ee3551
5-
TIMESTAMP 2025-11-01T06:40:07Z
4+
MANIFEST Manifest.files.gz 605865 BLAKE2B bcadc158253762e9f24c9e6b055b713a9641d9bfc450941217534a559d82b06bbcb49cffa8d81ca2f49f67ef4ee9530b6f3fe207bd5cb748ba4d010bf5f05a43 SHA512 0a179d9b6436cf36bf8fe75f2d424c5e5a2787d4f2be30bec99d500009833c9172e6703303a8e695c1b53afa286a8aeaa479d0807e86f5b0a383be84bc9c6bbe
5+
TIMESTAMP 2025-12-01T06:40:11Z
66
-----BEGIN PGP SIGNATURE-----
77

8-
iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmkFq0dfFIAAAAAALgAo
8+
iQKTBAEBCgB9FiEE4dartjv8+0ugL98c7FkO6skYklAFAmktOEtfFIAAAAAALgAo
99
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldEUx
1010
RDZBQkI2M0JGQ0ZCNEJBMDJGREYxQ0VDNTkwRUVBQzkxODkyNTAACgkQ7FkO6skY
11-
klAlqw//Rh+QFG/HU8p/afZwOkCuKiH3EYyTI6xrchUx//UMbrQlEawqkxbcF9S+
12-
q8cx1x2S0FsrDI7nT0qh7yndM+rBNl0zRuRMzczq8gQo7rCGdePJkklevXUD5B6/
13-
RmRE0ojr+TZSfNsFtGGAs1Smh7QjViKB7L4OV+lGo+i7q+yFPK5yd2gUFvvDJuYz
14-
Orji4sAhdH8n4eDJ63DgJXn0oqLiDAHN55MizeQ1JmvAnuW6KCcflyzJ8wW4b3bB
15-
3tmpUDq0LcNQ5unffo6YhUhIYaALUivdp0sPLbQ3Z3MYWWoIhL6M9E/RyNU6e1Rw
16-
mX/VwyqNJGv+lTDYIEio4GFh0CiD0xyfW2EDD89ONqym3WwTNFWT0Y891FlaZm9q
17-
czYbX0nN8z91rLOj7olRRjbt9Jh8m4ixb8s/F1afK+eDNMvevNQJcY6+rOInDuog
18-
eCOo6hgBhAdKrBePXpnADD2PUG7HXrjijWZAzoOfThs3IvRfSmRhtd9wAU5a+W4U
19-
YpY8ogO9mwP5HQwCs6hARnZB8cIJJZXBgXC1AK139O88KaRlhLT4dTo9DI5as2Lk
20-
2VEUNAGMAoGRuQIHUvLJ83AtV0A1w/wt8O54lcusXxvcYCaxiLRQ5Lb46IrcmEmD
21-
zihw7ItaE4/sYgbqEgpw5W29XDAFrzKv/Cy4wT9HUznGFu0813A=
22-
=hxuR
11+
klDI2A//f1DEIxwY5RAteoK8kAD1VUen5rTkm8/Ed7BQleONRh4qnYK6ic9G05Ei
12+
nleWa6HgOpMPUPv4AR+xx6vxwBH06sKb2Nwc+dLX0KgMolBryTLz50N1ZDJ6FvLf
13+
CagByOIXykQt0q6ktR3Px+F6nHupywQxquJnMAUMH8sf1UPD2qAMG6peBXc0BIeJ
14+
sJ9+lm8ZCU0SAS1jQeLdwoLTfqlOuIMHjdtRYNbqqXc/KVebVl+rzDWadOUCD938
15+
P2idhdguAtBYc2KtV+XHKdQfSPsujLoWRsS3/nxBj7qAwIobT8o48hDOdQ8vlldE
16+
ktXxWIdtT2IZL0RbHfwNa9oh7etO/63nGWfZ9/WVoXj5m2MnqM4ZqNINfCpyk4R8
17+
jtfnQ8YEPk06yfwn/gk4iTgsjU8BTKtQJ8HvIwxQqbCQUXBxeebAPY6wEcO3sN9L
18+
j4dxu1d9gRBtOdzIngnqhLDVc12gDQQYZsmI0WcF8gYRLD3INyyzUBkOQHYCP39q
19+
kGy3x7er7vEPbHWgvmY5FI6twYyGBJRC01Bl7023JAk3s+AKKShiUi1nFyLb26ix
20+
Gwh/vijlztJ5eoqz+MvBosojhKJLaQ5XRMha8z3Hnm26o0dA2h/gW3RDMdzwFFRj
21+
I3YXZvYvS8Fr/vzzlrdQ3mf2nhjS0j8y2kf/qeG3H3eFpW3zWvo=
22+
=4q7u
2323
-----END PGP SIGNATURE-----
Binary file not shown.
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202509-01">
4+
<title>Poppler: Multiple Vulnerabilities</title>
5+
<synopsis>Multiple vulnerabilities have been discovered in Poppler, the worst of which could lead to execution of arbitrary code.</synopsis>
6+
<product type="ebuild">poppler</product>
7+
<announced>2025-09-17</announced>
8+
<revised count="1">2025-09-17</revised>
9+
<bug>843149</bug>
10+
<bug>959944</bug>
11+
<access>local</access>
12+
<affected>
13+
<package name="app-text/poppler" auto="yes" arch="*">
14+
<unaffected range="ge">25.06.0</unaffected>
15+
<vulnerable range="lt">25.06.0</vulnerable>
16+
</package>
17+
</affected>
18+
<background>
19+
<p>Poppler is a PDF rendering library based on the xpdf-3.0 code base.</p>
20+
</background>
21+
<description>
22+
<p>Multiple vulnerabilities have been discovered in Poppler. Please review the CVE identifiers referenced below for details.</p>
23+
</description>
24+
<impact type="high">
25+
<p>Please review the referenced CVE identifiers for details.</p>
26+
</impact>
27+
<workaround>
28+
<p>There is no known workaround at this time.</p>
29+
</workaround>
30+
<resolution>
31+
<p>All Poppler users should upgrade to the latest version:</p>
32+
33+
<code>
34+
# emerge --sync
35+
# emerge --ask --oneshot --verbose ">=app-text/poppler-25.06.0"
36+
</code>
37+
</resolution>
38+
<references>
39+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2022-27337">CVE-2022-27337</uri>
40+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-52886">CVE-2025-52886</uri>
41+
</references>
42+
<metadata tag="requester" timestamp="2025-09-17T21:40:01.591882Z">graaff</metadata>
43+
<metadata tag="submitter" timestamp="2025-09-17T21:40:01.594167Z">sam</metadata>
44+
</glsa>
Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202511-01">
4+
<title>UDisks: Multiple Vulnerabilities</title>
5+
<synopsis>Multiple vulnerabilities have been discovered in UDisks, the worst of which can lead to execution of arbitrary code.</synopsis>
6+
<product type="ebuild">udisks</product>
7+
<announced>2025-11-24</announced>
8+
<revised count="1">2025-11-24</revised>
9+
<bug>827863</bug>
10+
<bug>962126</bug>
11+
<access>remote</access>
12+
<affected>
13+
<package name="sys-fs/udisks" auto="yes" arch="*">
14+
<unaffected range="ge">2.10.2</unaffected>
15+
<vulnerable range="lt">2.10.2</vulnerable>
16+
</package>
17+
</affected>
18+
<background>
19+
<p>UDisks provides a daemon, tools and libraries to access and manipulate disks, storage devices and technologies.</p>
20+
</background>
21+
<description>
22+
<p>Multiple vulnerabilities have been discovered in UDisks. Please review the CVE identifiers referenced below for details.</p>
23+
</description>
24+
<impact type="high">
25+
<p>Please review the referenced CVE identifiers for details.</p>
26+
</impact>
27+
<workaround>
28+
<p>There is no known workaround at this time.</p>
29+
</workaround>
30+
<resolution>
31+
<p>All UDisks users should upgrade to the latest version:</p>
32+
33+
<code>
34+
# emerge --sync
35+
# emerge --ask --oneshot --verbose ">=sys-fs/udisks-2.10.2"
36+
</code>
37+
</resolution>
38+
<references>
39+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2021-3802">CVE-2021-3802</uri>
40+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-8067">CVE-2025-8067</uri>
41+
</references>
42+
<metadata tag="requester" timestamp="2025-11-24T23:57:06.298179Z">graaff</metadata>
43+
<metadata tag="submitter" timestamp="2025-11-24T23:57:06.301913Z">sam</metadata>
44+
</glsa>
Lines changed: 73 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,73 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202511-02">
4+
<title>WebKitGTK+: Multiple Vulnerabilities</title>
5+
<synopsis>Multiple vulnerabilities have been discovered in WebKitGTK+, the worst of which can lead to execution of arbitary code.</synopsis>
6+
<product type="ebuild">webkit-gtk</product>
7+
<announced>2025-11-24</announced>
8+
<revised count="1">2025-11-24</revised>
9+
<bug>938026</bug>
10+
<bug>941276</bug>
11+
<bug>951739</bug>
12+
<bug>961021</bug>
13+
<access>remote</access>
14+
<affected>
15+
<package name="net-libs/webkit-gtk" auto="yes" arch="*">
16+
<unaffected range="ge" slot="4.1">2.48.5</unaffected>
17+
<unaffected range="ge" slot="6">2.48.5</unaffected>
18+
<vulnerable range="lt" slot="4.1">2.48.5</vulnerable>
19+
<vulnerable range="lt" slot="6">2.48.5</vulnerable>
20+
</package>
21+
</affected>
22+
<background>
23+
<p>WebKitGTK+ is a full-featured port of the WebKit rendering engine, suitable for projects requiring any kind of web integration, from hybrid HTML/CSS applications to full-fledged web browsers.</p>
24+
</background>
25+
<description>
26+
<p>Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.</p>
27+
</description>
28+
<impact type="high">
29+
<p>Please review the referenced CVE identifiers for details.</p>
30+
</impact>
31+
<workaround>
32+
<p>There is no known workaround at this time.</p>
33+
</workaround>
34+
<resolution>
35+
<p>All WebKitGTK+ users should upgrade to the latest version:</p>
36+
37+
<code>
38+
# emerge --sync
39+
# emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.48.5:4.1" ">=net-libs/webkit-gtk-2.48.5:6"
40+
</code>
41+
</resolution>
42+
<references>
43+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-40857">CVE-2024-40857</uri>
44+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-40866">CVE-2024-40866</uri>
45+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-44185">CVE-2024-44185</uri>
46+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-44187">CVE-2024-44187</uri>
47+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-44192">CVE-2024-44192</uri>
48+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-44244">CVE-2024-44244</uri>
49+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-44296">CVE-2024-44296</uri>
50+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-54467">CVE-2024-54467</uri>
51+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2024-54551">CVE-2024-54551</uri>
52+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-24201">CVE-2025-24201</uri>
53+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-24208">CVE-2025-24208</uri>
54+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-24209">CVE-2025-24209</uri>
55+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-24213">CVE-2025-24213</uri>
56+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-24216">CVE-2025-24216</uri>
57+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-24264">CVE-2025-24264</uri>
58+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-30427">CVE-2025-30427</uri>
59+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-31273">CVE-2025-31273</uri>
60+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-31278">CVE-2025-31278</uri>
61+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-43211">CVE-2025-43211</uri>
62+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-43212">CVE-2025-43212</uri>
63+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-43216">CVE-2025-43216</uri>
64+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-43227">CVE-2025-43227</uri>
65+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-43228">CVE-2025-43228</uri>
66+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-43240">CVE-2025-43240</uri>
67+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-43265">CVE-2025-43265</uri>
68+
<uri link="https://webkitgtk.org/security/WSA-2025-0002.html">WSA-2025-0002</uri>
69+
<uri link="https://webkitgtk.org/security/WSA-2025-0003.html">WSA-2025-0003</uri>
70+
</references>
71+
<metadata tag="requester" timestamp="2025-11-24T23:57:31.542544Z">graaff</metadata>
72+
<metadata tag="submitter" timestamp="2025-11-24T23:57:31.545141Z">sam</metadata>
73+
</glsa>
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202511-03">
4+
<title>qtsvg: Multiple Vulnerabilities</title>
5+
<synopsis>Multiple vulnerabilities have been discovered in qtsvg, the worst of which could lead to execution of arbitrary code.</synopsis>
6+
<product type="ebuild">qtsvg</product>
7+
<announced>2025-11-24</announced>
8+
<revised count="1">2025-11-24</revised>
9+
<bug>915998</bug>
10+
<bug>963710</bug>
11+
<access>local and remote</access>
12+
<affected>
13+
<package name="dev-qt/qtsvg" auto="yes" arch="*">
14+
<unaffected range="ge">6.9.3:6</unaffected>
15+
<vulnerable range="lt">6.9.3:6</vulnerable>
16+
</package>
17+
</affected>
18+
<background>
19+
<p>qtsvg is a SVG rendering library for the Qt framework.</p>
20+
</background>
21+
<description>
22+
<p>Multiple vulnerabilities have been discovered in qtsvg. Please review the CVE identifiers referenced below for details.</p>
23+
</description>
24+
<impact type="high">
25+
<p>Please review the referenced CVE identifiers for details.</p>
26+
</impact>
27+
<workaround>
28+
<p>There is no known workaround at this time.</p>
29+
</workaround>
30+
<resolution>
31+
<p>All qtsvg users should upgrade to the latest version:</p>
32+
33+
<code>
34+
# emerge --sync
35+
# emerge --ask --oneshot --verbose ">=dev-qt/qtsvg-6.9.3"
36+
</code>
37+
</resolution>
38+
<references>
39+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2023-45872">CVE-2023-45872</uri>
40+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-10728">CVE-2025-10728</uri>
41+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-10729">CVE-2025-10729</uri>
42+
</references>
43+
<metadata tag="requester" timestamp="2025-11-24T23:58:02.219156Z">graaff</metadata>
44+
<metadata tag="submitter" timestamp="2025-11-24T23:58:02.221875Z">sam</metadata>
45+
</glsa>
Lines changed: 106 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,106 @@
1+
<?xml version="1.0" encoding="UTF-8"?>
2+
<!DOCTYPE glsa SYSTEM "http://www.gentoo.org/dtd/glsa.dtd">
3+
<glsa id="202511-04">
4+
<title>Chromium, Google Chrome, Microsoft Edge. Opera: Multiple Vulnerabilities</title>
5+
<synopsis>Multiple vulnerabilities have been discovered in Chromium and its derivatives, the worst of which can lead to remote code execution.</synopsis>
6+
<product type="ebuild">chromium,google-chrome,microsoft-edge,opera</product>
7+
<announced>2025-11-24</announced>
8+
<revised count="1">2025-11-24</revised>
9+
<bug>961477</bug>
10+
<bug>961834</bug>
11+
<bug>962051</bug>
12+
<bug>963024</bug>
13+
<bug>963638</bug>
14+
<bug>963959</bug>
15+
<bug>964335</bug>
16+
<access>local and remote</access>
17+
<affected>
18+
<package name="www-client/chromium" auto="yes" arch="*">
19+
<unaffected range="ge">141.0.7390.107</unaffected>
20+
<vulnerable range="lt">141.0.7390.107</vulnerable>
21+
</package>
22+
<package name="www-client/google-chrome" auto="yes" arch="*">
23+
<unaffected range="ge">141.0.7390.107</unaffected>
24+
<vulnerable range="lt">141.0.7390.107</vulnerable>
25+
</package>
26+
<package name="www-client/microsoft-edge" auto="yes" arch="*">
27+
<unaffected range="ge">141.0.3537.71</unaffected>
28+
<vulnerable range="lt">141.0.3537.71</vulnerable>
29+
</package>
30+
<package name="www-client/opera" auto="yes" arch="*">
31+
<unaffected range="ge">122.0.5643.142</unaffected>
32+
<vulnerable range="lt">122.0.5643.142</vulnerable>
33+
</package>
34+
</affected>
35+
<background>
36+
<p>Chromium is an open-source browser project that aims to build a safer, faster, and more stable way for all users to experience the web. Google Chrome is one fast, simple, and secure browser for all your devices. Microsoft Edge is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. Opera is a fast and secure web browser.</p>
37+
</background>
38+
<description>
39+
<p>Multiple vulnerabilities have been discovered in Chromium and its derivatives. Please review the CVE identifiers referenced below for details.</p>
40+
</description>
41+
<impact type="high">
42+
<p>Please review the referenced CVE identifiers for details.</p>
43+
</impact>
44+
<workaround>
45+
<p>There is no known workaround at this time.</p>
46+
</workaround>
47+
<resolution>
48+
<p>ll Google Chrome users should upgrade to the latest version:</p>
49+
50+
<code>
51+
# emerge --sync
52+
# emerge --ask --oneshot --verbose ">=www-client/google-chrome-141.0.7390.107"
53+
</code>
54+
55+
<p>All Chromium users should upgrade to the latest version:</p>
56+
57+
<code>
58+
# emerge --sync
59+
# emerge --ask --oneshot --verbose ">=www-client/chromium-141.0.7390.107"
60+
</code>
61+
62+
<p>All Microsoft Edge users should upgrade to the latest version:</p>
63+
64+
<code>
65+
# emerge --sync
66+
# emerge --ask --oneshot --verbose ">=www-client/microsoft-edge-141.0.3537.71 "
67+
</code>
68+
69+
<p>All Oprea users should upgrade to the latest version:</p>
70+
71+
<code>
72+
# emerge --sync
73+
# emerge --ask --oneshot --verbose ">=www-client/opera-122.0.5643.142"
74+
</code>
75+
</resolution>
76+
<references>
77+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-8879">CVE-2025-8879</uri>
78+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-8880">CVE-2025-8880</uri>
79+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-8881">CVE-2025-8881</uri>
80+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-8882">CVE-2025-8882</uri>
81+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-8901">CVE-2025-8901</uri>
82+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-9132">CVE-2025-9132</uri>
83+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-9478">CVE-2025-9478</uri>
84+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-10500">CVE-2025-10500</uri>
85+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-10501">CVE-2025-10501</uri>
86+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-10502">CVE-2025-10502</uri>
87+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-10585">CVE-2025-10585</uri>
88+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11205">CVE-2025-11205</uri>
89+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11206">CVE-2025-11206</uri>
90+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11207">CVE-2025-11207</uri>
91+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11208">CVE-2025-11208</uri>
92+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11209">CVE-2025-11209</uri>
93+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11210">CVE-2025-11210</uri>
94+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11211">CVE-2025-11211</uri>
95+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11212">CVE-2025-11212</uri>
96+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11213">CVE-2025-11213</uri>
97+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11215">CVE-2025-11215</uri>
98+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11216">CVE-2025-11216</uri>
99+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11219">CVE-2025-11219</uri>
100+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11458">CVE-2025-11458</uri>
101+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11460">CVE-2025-11460</uri>
102+
<uri link="https://nvd.nist.gov/vuln/detail/CVE-2025-11756">CVE-2025-11756</uri>
103+
</references>
104+
<metadata tag="requester" timestamp="2025-11-24T23:59:25.704414Z">graaff</metadata>
105+
<metadata tag="submitter" timestamp="2025-11-24T23:59:25.706551Z">sam</metadata>
106+
</glsa>

0 commit comments

Comments
 (0)