Signed-off-by: Andreas K. Hüttel <dilfridge@gentoo.org>
custom setuid programs, although strongly discouraged as a security
practice, cannot be discounted.
-CVE-id: CVE-2025-4802
+CVE-Id: CVE-2025-4802
Public-Date: 2025-05-16
Vulnerable-Commit: 10e93d968716ab82931d593bada121c17c0a4b93 (2.27)
Fix-Commit: 5451fa962cd0a90a0e2ec1d8910a559ace02bba0 (2.39)
export GLIBC_TUNABLES=glibc.cpu.hwcaps=-arch_3_1
-CVE-id: CVE-2025-5702
+CVE-Id: CVE-2025-5702
Public-Date: 2025-06-04
Vulnerable-Commit: 3367d8e180848030d1646f088759f02b8dfe0d6f (2.39)
Fix-Commit: 15808c77b35319e67ee0dc8f984a9a1a434701bc (2.42)
export GLIBC_TUNABLES=glibc.cpu.hwcaps=-arch_3_1
-CVE-id: CVE-2025-5745
+CVE-Id: CVE-2025-5745
Public-Date: 2025-06-05
Vulnerable-Commit: 23f0d81608d0ca6379894ef81670cf30af7fd081 (2.40)
Fix-Commit: 63c60101ce7c5eac42be90f698ba02099b41b965 (2.42)